Tag Archives: Cybercriminal

Will QR code on free water bottle empty your bank account?!

Will the QR code on a free water bottle really empty your bank account if you scan it?! Take a look at the viral claims, and find out what the facts really are!

 

Claim : QR Code On Free Water Bottle Will Empty Your Bank Account!

People are sharing a video on WhatsApp and social media, claiming or suggesting that water bottles are being distributed by scammers, and scanning the QR code on those water bottles will empty your bank accounts!

Don’t scan any gift QR, it will Zero your bank account.

The scammer put a new thermos bottle on the iron door. Never scan the QR code on a thermos. Once scanned, the money from the bank account was stolen by the fraudsters. Please spread the word

Here is a translated transcript of what the man says in the video below:

After we came out of the house, we saw this tumbler. This is one of the ways they placed the tumbler on our gates. My house received one, my neighbour also received one. See.

So people have to be careful because the bottle says “Scan QR get RM200 cash coupon”. Go Shopping. You have to be careful. My neighbour also received one.

Recommended : Bank Letter QR Code Scam : What You Need To Know!

 

Truth : QR Code On Free Water Bottle Will Not Empty Your Bank Account!

This appears to be yet another example of fake news circulating online, and here are the reasons why…

Fact #1 : Go Shopping Appears To Be Legitimate App

I traced the Go Shopping app to both the Google Play Store (archive), and the Apple App Store (archive), and it appears to be a genuine mobile app. In both stores, it describes itself as:

Go Shopping is an online shopping app primarily serving the Southeast Asian region. It has expanded to over 7 countries, amassing more than 200,000 users. Go Shopping garners support from major source manufacturers, differentiating it from other e-commerce platforms.

As a rapidly growing new e-commerce platform, Go Shopping offers Southeast Asian users high value-for-money shopping, a wide range of products, and various discount plans. Many popular products on the Go Shopping platform are available at substantial discounts of 40% to 60%. Consumers can learn more about products and join flash sale groups

In the Google Play Store, the developer was listed as NWS Hardware Trading, while in the Apple App Store, the developer was listed as Yap Chee Leong.

In the Google Play Store, the Go Shopping app has a 3.5 star rating, and it has a 3.3 star rating in the Apple App Store.

Fact #2 : NWS Hardware Trading Appears To Be Legitimate Company

I looked up NWS Hardware Trading, and it appears to be a genuine company that was incorporated on 10 May 2022 in Malaysia, with the SSM registration number of 003396291-V.

According to CTOS (archive), its official business type was listed as “trading in furniture hardware and aluminium glass door for kitchen and wardrobe“.

However, on two different job recruitment websites (here, here), NWS Hardware Trading uses the same Go Shopping logo, and says that it aims to create “a reliable business platform for shoppers to buy good products and save money“:

About NWS Hardware Trading

WORTH is aimed to present a reliable business platform for the Shoppers to buy the good products and save money. More than 3,000 manufacturers and suppliers have business cooperation with us to help factories clear their inventories.

This basically confirms that NWS Hardware Trading is a legitimate company registered in Malaysia, and it developed and owns the Go Shopping app that is available in both the Google Play Store, and the Apple App Store.

Recommended : Can Restaurant Menu QR Code Hack Your Phone?!

Fact #3 : QR Code Is Not Malicious In Nature

QR code (which is short for Quick Response code) is not nefarious or malicious in nature.

The QR code is merely a type of two dimensional barcode that was invented in 1994 by the Japanese company, Denso Wave, to track automotive parts. It has since been adopted for other purposes because it is more efficient and can support more than just numbers. For example, Version 40 QR code can contain up to 7,089 numbers or 4,296 characters.

Ultimately, a QR code is nothing more than a series of numbers or characters – data which can be used for a variety of purposes, including providing a link to an online restaurant menu.

Fact #4 : QR Code Cannot Empty Bank Accounts

While QR codes are not malicious by nature, scammers can and do create fake QR codes to trick people. In Texas, for example, fake QR codes were placed on parking meters to trick drivers into keying their credit card or bank login information in fake (phishing) websites that look like a genuine payment website.

I tried a number of ways to scan the QR code, but was unsuccessful. The resolution appears to be too poor in the video, or the QR code was too distorted to be scanned successfully. So I cannot confirm that the QR code leads to the Go Shopping app, or a phishing website.

That said, scanning the QR code itself won’t empty your bank account, as people are claiming on WhatsApp and social media. That’s the stuff of bad movie plots.

What can happen though is that scammers can create such water bottles using logos of legitimate companies, and insert QR codes that lead to fake (phishing) websites that masquerade as bank or payment platforms, to trick you into giving up your credit card or bank login details.

Then the scammers can use those details to make fraudulent charges on your credit card, or log into your bank account to transfer money.

Recommended : Malaysia Airlines 6 Months Free Flight Card Scam Alert!

Fact #5 : Go Shopping Is Pretty Obscure

Truth be told, scammers would more likely use more famous or familiar brands or apps like TNG eWallet, Grab, Maybank MAE, etc. to trick you into giving up your credit card or bank login details.

You are more likely to trust a QR code from a well-known brand, rather than an obscure brand like Go Shopping, whose app has only garnered some 10,000 downloads in the Google Play Store.

Although I cannot verify the QR code on the water bottle, this looks like a marketing promotion by NWS Hardware to promote its Go Shopping app.

Fact #6 : You Can Choose Not To Scan QR Code

If you receive such a water bottle, there is a simple solution – you can use it without scanning the QR code.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Money | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did WEF Order Cyber Attacks On US Water Supply?!

Did the WEF order devastating cyber attacks on US water supply?! Take a look at the viral claim, and find out what the facts really are!

 

Claim : WEF Orders Cyber Attacks On US Water Supply!

People are sharing an article (archive) by The People’s Voice (formerly NewsPunch), which claims that the WEF ordered devastating cyber attacks on US water supply!

Here is an excerpt of that long and (intentionally???) confusing article. Feel free to skip to the next section for the facts!

WEF Memo Orders Devastating Cyber Attacks on US Water Supply

Recommended : Is WEF Planning Cyber Attack To Disrupt 2024 Election?!

 

Truth : WEF Did Not Order Cyber Attacks On US Water Supply!

This is yet another example of fake news created / promoted by The People’s Voice, and here are the reasons why…

Fact #1 : No Evidence WEF Ordered Cyber Attacks On US Water Supply

Let me start by pointing out that there is no evidence the World Economic Forum (WEF) ordered any cyber attacks on US water supply.

The US Cybersecurity and Infrastructure Security Agency also never once suggested, never mind reported, that there was any cyberattack by the WEF.

But more importantly – why would the WEF bother with cyberattacks when it allegedly has control over world governments? It can simply order them to restrict water supply, as and when it wishes to. Why bother with cyber attacks???

Unsurprisingly, The People’s Voice article provided no evidence to back up its ridiculous claim.

Fact #2 : WEF Video Is From 2022

Instead of providing any actual evidence, The People’s Voice article posted a link to its own video, which featured Professor Mariana Mazzucato, and claimed that the WEF ordered global water rationing to starve people into submission.

The video clip appears to be taken from the May 2022 WEF press conference on The New Economics of Water (link), and not 2023 as suggested by the article.

Needless to say, the actual video does not show Professor Mariana Mazzucato admit that a water crisis would help to starve people into submission, or that the elite was going to “experiment” on humanity.

Recommended : Did Insider Reveal WEF Global Famine False Flag Op?!

Fact #3 : CISA Warned Of Cyberattacks By Iran + China

On 18 March 2024, the US Cybersecurity and Infrastructure and Security Agency (CISA) highlighted two recent and ongoing cyber attacks against critical infrastructure in the United States, including drinking water.

However, those cyber attacks were not conducted by the WEF, but rather, by threat actors affiliated or sponsored by Iran and China. From the full CISA letter to US governors (PDF):

Threat actors affiliated with the Iranian Government Islamic Revolutionary Guard Corps (IRGC) have carried out malicious cyberattacks against United States critical infrastructure entities, including drinking water systems. In these attacks, IRGC-affiliated cyber actors targeted and disabled a common type of operational technology used at water facilities where the facility had neglected to change a default manufacturer password.

The People’s Republic of China (PRC) state-sponsored cyber group known as Volt Typhoon has compromised information technology of multiple critical infrastructure systems, including drinking water, in the United States and its territories. Volt Typhoon’s choice of targets and pattern of behavior are not consistent with traditional cyber espionage. Federal departments and agencies assess with high confidence that Volt Typhoon actors are pre-positioning themselves to disrupt critical infrastructure operations in the event of geopolitical tensions and/or military conflict.

To be clear – these cyberattacks on American water systems have nothing to do with the WEF.

Recommended : Did Bill Gates Order Govts To Replace Farmers With AI Bots?!

Fact #4 : WEF Screenshot Is Fake

The cover image used by The People’s Voice article and video has a screenshot which purportedly shows the World Economic Forum (WEF) posting on X (formerly Twitter) that:

Water will soon become a privilege you must earn!

That is most definitely a fake screenshot, because there is no such post on X by the WEF.

If the WEF actually posted such a shocking warning, it would have been reported by the worldwide media. But of course, that didn’t happen, because the WEF never posted it!

Yet again, and unsurprisingly, The People’s Voice article provided no evidence that such a post ever existed!

Recommended : Did WEF Pass Law To Criminalise Criticism Of mRNA?!

Fact #5 : The People’s Voice Is Known For Fake News

The People’s Voice is the current name for NewsPunch, which possibly changed its name because its brand has been so thoroughly discredited after posting numerous shocking but fake stories.

Founded as Your News Wire in 2014, it was rebranded as NewsPunch in November 2018, before becoming The People’s Voice. A 2017 BuzzFeed report identified NewsPunch as the second-largest source of popular fake news on Facebook that year.

Its articles have been regularly debunked as fake news, so you should never share anything from NewsPunch / The People’s Voice.  Here are some of its fake stories that I fact checked earlier:

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did Cyberattack Cause Dali To Hit Baltimore Bridge?!

Did a cyberattack cause the Dali to hit the Francis Scott Key Bridge in Baltimore, causing it to collapse?!

Take a look at the viral claims, and find out what the facts really are!

 

Claim : Cyberattack Caused Dali To Hit Baltimore Bridge!

Right after news broke that the Francis Scott Key Bridge in Baltimore collapsed after being hit by a massive container ship, some people immediately began suggesting there was more to the tragedy than meets the eyes…

Alex Jones : Looks deliberate to me. A cyber-attack is probable. WW3 has already started..

Andrew Tate : This ship was cyber-attacked. Lights go off and it deliberately steers towards the bridge supports. Foreign agents of the USA attack digital infrastructures. Nothing is safe. Black Swan event imminent.

Recommended : Baltimore Bridge Collapse Conspiracies Debunked!

No Evidence Cyberattack Caused Dali To Hit Baltimore Bridge!

This appears to be yet another example of fake news created or promoted by conspiracy theorists and conspiracists, and here are the reasons why…

Fact #1 : Dali Lost Power Before Hitting Baltimore Bridge!

Let me start by simply pointing out that the Dali – a massive container ship, only hit the Francis Scott Key Bridge in Baltimore, after it lost engine power.

The Dali lost power soon after leaving the Port of Baltimore in the middle of the night. Not only were the crew blinded in the dark, none of its electronics worked and there was no propulsion, so they were unable to control the ship.

As the crew tried unsuccessfully to restart its engine, a local pilot onboard the vessel ordered the ship to be steered to port (left), and the anchor to be dropped. While the crew managed to restore electrical power using an emergency generator, they were not able to restart its engines.

With the ship floating adrift, the two local pilots onboard issued a mayday call at 1:30 AM to warn authorities that a collision was imminent, which allowed them to stop traffic from going over the bridge. A Maryland Transportation Authority official was recorded saying at that time:

There’s a ship approaching that has lost their steering. Until you’ve got that under control, we’ve got to stop all traffic.

The video below, which is being shared on WhatsApp, does not accurately reflect the truth – the ship never regained the use of its engines, but it clearly shows when the ship lost power, and when it restored electrical power.

Recommended : Can Canada Social Credit System Freeze Bank Accounts?!

Fact #2 : No Evidence Dali Was Hit By Cyberattack

Despite claims by people with unnamed “inside sources”, there is simply no evidence that the Dali was hit by a cyberattack which steered it right into a bridge in Baltimore.

Built by Hyundai Heavy Industries, the Dali is powered by a single MAN 9-cylinder S90ME-C9.2 crosshead diesel engine. It also has a single 3,000 kW bow thruster for manoeuvring in ports, and four diesel generators for electricity.

While those engines, and controls, may be connected to a SCADA (Supervisory Control and Data Acquisition), they are not connected to the Internet. Even if the Dali’s SCADA system was somehow taken over by malware, the lack of Internet connectivity would make it impossible for any hacker to steer it into the bridge.

An early Cybersecurity and Infrastructure Security Agency (CISA) report appears to rule out an intentional or act of terrorism, finding that the Dali “lost propulsion” as it was leaving port.

The Baltimore Field Office of the Federal Bureau of Investigation (FBI) said in a press statement, that “There is no specific and credible information to suggest any ties to terrorism at this time.

United States Attorney for the District of Maryland Erek L. Barron also dismissed those claims in a public statement, saying “There is no evidence at this time to suggest that today’s collapse of the Francis Scott Key Bridge in Baltimore has any ties to terrorism.

If the Dali was indeed hit by a cyberattack before its crash, there would be evidence of hacking or malware in its SCADA system. However, until such evidence is discovered, anyone who tells out that it was definitely hit by a cyberattack is likely lying to you.

Unsurprisingly, none of those who claimed that a cyberattack caused the Dali to lose power and hit the Francis Scott Key Bridge ever provided a single shred of evidence from behind their keyboards.

Recommended : Did Russia Arrest Rustam Azhiev For Moscow Attack?!

Fact #3 : Ship Loss Of Power Is Common

The loss of power is common in the maritime industry (source) – as many as 600 cases each year according to FuelTrust, although most occur in open water. They are often associated with poorly mixed fuel, or changing from high-sulphur to low-sulphur fuels when entering coastal emission control areas (ECAs).

In fact, shipping experts think “dirty fuel” may be the reason for Dali to lose power before smashing into the Francis Scott Key Bridge (source).

That power loss could have been caused by dirty fuel clogging filters that lead to the ship’s main generator.

While inside a port, as the Dali was before the collision, ships typically run on a relatively light diesel fuel. That also could have been contaminated. Common contaminants include water, dirt and algae. He definitely could have had dirty fuel

– Gerald Scoggins, a veteran chief engineer in the oil and gas industry and the CEO of the Houston company Deepwater Producers

Ian Ralby, the CEO of I.R. Consilium, a maritime and resource security consultancy, also said heavy marine fuel loaded onto ships in port is mixed with what is called cutter stock, and is prone to being loaded with contaminants and is not closely regulated. Such dirty fuel could have “gummed up all of the fuel lines on the ship.”

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Malaysia Airlines 6 Months Free Flight Card Scam Alert!

Watch out for the Malaysia Airlines free flight scam, and find out why you really cannot get 6 months of free flights for just RM8.80!

 

Malaysia Airlines Free Flight Scam : What Is It?!

Many people are seeing advertisements on Facebook promoting a Malaysia Airlines Enrich card, which claims to offer 6 months of free flights for just RM8.80!

Do ⁠you⁠ lo⁠ve ⁠tra⁠vel⁠ing⁠? T⁠his⁠ pr⁠omo⁠tio⁠n i⁠s f⁠or ⁠you⁠! 6⁠ mo⁠nth⁠s f⁠ree⁠ fl⁠igh⁠ts ⁠wit⁠h M⁠ala⁠ysi⁠a A⁠irl⁠ine⁠s f⁠or ⁠onl⁠y 8⁠.80⁠MYR⁠!

⁠Thi⁠s p⁠rom⁠oti⁠on ⁠wil⁠l l⁠ast⁠ un⁠til⁠ th⁠e e⁠nd ⁠of ⁠the⁠ we⁠ek,⁠ so⁠ hu⁠rry⁠ up⁠!

⁠Cli⁠ck ⁠on ⁠the⁠ “Ord⁠er ⁠Now⁠”⁠ bu⁠tto⁠n t⁠o g⁠et ⁠you⁠r c⁠ard⁠ wi⁠th ⁠fre⁠e s⁠hip⁠pin⁠g!

Recommended : Bantuan Rakyat Malaysia Scam Alert!

 

Malaysia Airlines Free Flight Scam : What You Must Know!

This is yet another scam circulating on Facebook, and here are reasons why…

Fact #1 : No Laws Requiring Malaysia Airlines To Sell Cheap Tickets

First, let me just point out that there is no law requiring Malaysia Airlines to sell flight tickets at such ridiculous prices.

Think about it – you can’t even get a taxi ride for RM8.80 these days, and you expect to travel for free on Malaysia Airlines for 6 months???

Even when AirAsia promoted its Unlimited Pass for domestic flights at the height of the COVID-19 pandemic, it was priced at RM399 and had a lot of restrictions.

Fact #2 : Malaysia Airlines Called It A Scam

To convince you that it’s genuine, and not a scam, the scammers use alternate accounts to post comments, claiming that they received the card, or they confirmed with Malaysia Airlines that the offer is genuine:

I called the Malaysia Airlines hotline to clarify if this promotion exists or it is the work of scammers. The airline manager has confirmed that this is a limited promotion only for Facebook users. Now I’m waiting for my card 🔥

Well, I called up Malaysia Airlines myself, and the staff member confirmed that it is a scam. She also informed me that they received several calls about this scam.

To be clear – there is no such free flight promotion from Malaysia Airlines.

Recommended : STR 2024 Scam Alert : Can You Get RM1,000 Per Month?!

Fact #3 : Enrich Is Malaysia Airlines’ Loyalty Card

To convince you that it’s a genuine deal, the scammers use alternate accounts to post photos of the Malaysia Airlines Enrich card they allegedly received through this promotion.

The trouble is – Enrich is the frequent flyer program for Malaysia Airlines. It’s free for anyone to sign up for Enrich loyalty program and receive a card like that. There is no need to pay RM8.80 for an Enrich card.

The Blue card you see below is actually the basic tier that everyone gets when they sign up for Enrich. Only after flying multiple flights on MAS will Enrich members be able to upgrade to the Silver, Gold, and Platinum tiers.

Fact #4 : Those Are Fake Enrich Cards!

If you look closely at the Enrich cards being shown by these scammers, you will notice a few problems.

None of them have the member’s name, or the membership number! They all state “Name Of Card Holder” and the Member ID is **********, making them fake Enrich cards!

On top of that, the fake Enrich cards state “Card For 6 Free Flight“. Not only is that poor grammar – flights, not flight, it also runs counter to the scam promotion, which claims to offer 6 months of free flights, not just 6 free flights!

Recommended : PDRM Warning : Watch Out For MyBayar Scam!

Fact #5 : That’s Not The Official Malaysia Airlines Page

The scam is being run out of the Promotion | Malaysia Airlines page on Facebook. It is not the official Malaysia Airlines Facebook page, which is at https://www.facebook.com/malaysiaairlines/.

This fake Malaysia Airlines page is also new, apparently created on 19 March 2024.

If Malaysia Airlines has any promotion on its flights, it would be posted on its official website, or its official Facebook page. Never on a completely new Facebook page.

Fact #6 : Scam Leads To Non-MAS Website

If you click on the scam page to order the fake Malaysia Airlines free flights card, you will be taken to a website using the domain gizmoshp.store, which appears to be a placeholder page with Polish text.

It is likely that the scammers keyed in the wrong URL, or their scam page wasn’t been setup properly. Or the page may have malicious scripts.

In any case, please do NOT click on the order button, or attempt to visit this website.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | TravelTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Is WEF Planning Cyber Attack To Disrupt 2024 Election?!

Is the WEF planning to launch a ‘false flag’ cyber attack to disrupt the 2024 US Presidential election?! Take a look at the viral claim, and find out what the facts really are!

 

Claim : WEF Plans Cyber Attack To Disrupt 2024 Election!

People are sharing an article (archive) by The People’s Voice (formerly NewsPunch), which claimed or suggested that the World Economic Forum (WEF) is planning to launch a ‘false flag’ cyber attack to disrupt the 2024 US Presidential election!

WEF Insider: Imminent ‘False Flag’ Cyber Attack Will Disrupt 2024 Election

Recommended : WEF ordered electors to not certify Trump’s 2024 election win?!

 

No Evidence WEF Plans Cyber Attack To Disrupt 2024 Election!

This is yet another example of fake news created / promoted by The People’s Voice, and here are the reasons why…

Fact #1 : No Evidence WEF Plans Cyber Attack To Disrupt 2024 Election!

Let me start by pointing out that there is no evidence of the World Economic Forum (WEF) plans to launch a cyber attack to disrupt the 2024 President election.

If a WEF insider did indeed reveal such a plan, it would have gone viral, and it would have been condemned by everyone from the left to the right. The FBI and US Department of Homeland Security would also have launched criminal investigations.

Yet, there was no such report by the mainstream media, and no social media outrage. Heck, even right-wing American websites did not so much as squeak about a juicy WEF plot to launch a cyber attack against the United States???

That’s because that never happened. The People’s Voice article, unsurprisingly, offered no evidence to back up its “fact checked” claim.

Fact #2 : Voters Don’t Use Ballot Tabulators

The People’s Voice article claimed that South Carolina primary voters were “reportedly unable to vote due to ballot tabulators being unable to connect to the internet [sic]”.

Well, I could find no report of South Carolina primary voters not being able to vote because ballot tabulators were unable to connect to the Internet. That’s probably because no voter ever uses ballot tabulators to cast their vote.

Ballot tabulators are machines used to scan and count ballots, and are never used by voters to cast their votes! So how would any ballot tabulator failure prevent voters from casting their votes?

Unsurprisingly, The People’s Voice article offered no evidence of such ballot tabulator failure, or that South Carolina voters were prevented from voting in its 2024 Presidential primary elections.

Recommended : Biden hired Bill Gates to flood Internet with AI censorship bots?!

Fact #3 : South Carolina Voting System Isn’t Connected To Internet

According to the South Carolina Election Commission, the South Carolina voting system is never connected to the Internet.

In fact, the ballot marking devices (BMD), ballot scanners, and computers used to tabulate the votes, are not even capable of being connected to the Internet!

Is the voting system connected to the Internet?

No, the voting system is never connected to the internet. Computers used to tabulate votes, BMDs, and ballot scanners used in South Carolina are not even capable of being connected to the Internet.

Needless to say, The People’s Voice article provided no evidence that ballot tabulators used in South Carolina were even capable of being connected to the Internet, never mind requiring it to work!

Fact #4 : WEF Screenshot Is Fake

The cover image used by The People’s Voice article and video has a screenshot which purportedly shows the World Economic Forum (WEF) posting on X (formerly Twitter) that:

The coming cyber attack will allow a New World Order to emerge.

That is most definitely a fake screenshot, because there is no such post on X by the World Economic Forum. And it’s a really silly creation too – why would the WEF reveal its nefarious cyber attack plan publicly?

Yet again, The People’s Voice article provided no evidence that such a post ever existed! In fact, it would not need some “WEF insider” to spill the beans when the WEF itself already publicly revealed its cyber attack plan!

Recommended : Did EU Legalise Child Porn As WEF Pedophilia Agenda?!

Fact #5 : The People’s Voice Is Known For Fake News

The People’s Voice is the current name for NewsPunch, which possibly changed its name because its brand has been so thoroughly discredited after posting numerous shocking but fake stories.

Founded as Your News Wire in 2014, it was rebranded as NewsPunch in November 2018, before becoming The People’s Voice. A 2017 BuzzFeed report identified NewsPunch as the second-largest source of popular fake news on Facebook that year.

Its articles have been regularly debunked as fake news, so you should never share anything from NewsPunch / The People’s Voice.  Here are some of its fake stories that I fact checked earlier:

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | PoliticsTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

STR 2024 Scam Alert : Can You Get RM1,000 Per Month?!

Watch out for the STR (Sumbangan Tunai Rahmah) 2024 scam, and find out why you really cannot get RM1,000 per month!

 

STR 2024 Scam : Get RM1,000 Per Month For Free!

Many people are getting messages about getting RM1,000 in free cash through the STR (Sumbangan Tunai Rahmah) scheme on WhatsApp and Telegram, from their family members and friends:

TERKINI: Permohonan untuk bantuan MySTR 2024 RM1000 sebulan
.
📒 Borang Permohonan (Online dan Manual)
📒 Kemaskini Maklumat kerajaan
.
Memohon secara online👇👇
https://xxxx-xxxx-xx-xxx-tunai2024.com/39/kerajaan

Recommended : Bantuan Rakyat Malaysia Scam Alert!

 

STR 2024 Scam : Don’t Fall For The RM1,000 Offer!

This is yet another scam circulating on WhatsApp and Telegram, and here are reasons why…

Fact #1 : STR 2024 Is Only Given Quarterly

First, let me just point out that the 2024 STR (Sumbangan Tunai Rahmah) program is genuine. However, it is restricted to the hardcore poor, and is paid out quarterly.

STR 2024 Application Period Payment Date
Phase 1 1 to 30 Nov 2023 29 January 2024
Phase 2 1 Dec 2023 to 29 Feb 2024 April 2024
Phase 3 1 March to 30 June 2024 August 2024
Phase 4 1 July to 30 Sept. 2024 November 2024

In short – you won’t get the money on a monthly basis, as the scam websites are claiming.

Fact #2 : STR 2024 Scam Targets Your Data + Telegram Account

The real STR (Sumbangan Tunai Rahmah) website will only ask you for your MyKad or user ID to check your STR 2024 status.

The scam websites, on the other hand, will ask you to submit your full name, and your mobile number.

They will send an OTP to your Telegram account, and ask you to key in the OTP to their website. This will allow them to hijack and take over your Telegram account.

To protect your Telegram account from such hijacking, please make sure you turn on Two-Step Verification!

Even if you don’t have a Telegram account, the scammers now have access to your full name and mobile number, which they can use in future scam attacks.

Recommended : PDRM Warning : Watch Out For MyBayar Scam!

Fact #3 : List Of Successful Applicants Is Fake

To convince you that their offer is genuine, the scam websites often show a scrolling list of successful applicants – each one receiving RM1,000. That’s a fake list.

If you check the source code, you can see that the scammer merely created a manual list of fake names. Here is a small segment with the fake details highlighted in bold, to show you what I mean:

<!— record berjaya box —>
<div class=”_record-box”>
<div id=”list” class=”list-box”>
<div class=”list” style=”margin-top: -3.1345px;”>
</div>
<div class=”center”>
<div class=”h1″><span class=”name”>Kaamil bin Haarith</span></div>
<div class=”h2″>Berjaya RM 1.000,00</div>
</div>
</div>
<div class=”item”>
<div class=”record_logo”>
<img src=”assets/masterweb/avatar.png” alt=””>
</div>
<div class=”center”>
<div class=”h1″><span class=”name”>Fat’hi bin Jaasir</span></div>
<div class=”h2″>Berjaya RM 1.000,00</div>
</div>
</div>
<div class=”item”>
<div class=”record_logo”>
<img src=”assets/masterweb/avatar.png” alt=””>
</div>
<div class=”center”>
<div class=”h1″><span class=”name”>Ibrahim bin Khaalid</span></div>
<div class=”h2″>Berjaya RM 1.000,00</div>
</div>
</div>

Fact #4 : STR 2024 Does Not Give RM1,000 Per Month

To help the hardcore poor handle the high inflation in 2024, the Malaysia Ministry of Finance announced an increase in the amount of STR cash aid.

However, even with the increased STR 2024 cash aid, you won’t receive RM1,000 per month. That’s just insane. Here is what the government is giving for STR 2024, in quarterly payments:

Qualifying
Categories
STR 2024 Cash Aid
Household Income
≤ RM2,500
No Children : RM1,000
1-2 Children : RM1,500
3-4 Children : RM2,000
≥5 Children : RM2,500
Household Income
RM2,500 – RM5,000
No Children : RM500
1-2 Children : RM750
3-4 Children : RM1,000
≥5 Children : RM1,250
Senior (Single)
≤ RM5,000
RM600
Single
≤ RM2,500
RM350

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Was Brad Pitt Just Found Dead From Suicide?!

Was Brad Pitt just found dead from suicide?! Take a look at the viral claims, and find out what the facts really are!

 

Claim : Brad Pitt Was Just Found Dead From Suicide!

People are sharing YouTube videos and Facebook posts claiming that Brad Pitt just died, or was found dead from suicide, with titles like :

FOX Breaking News: Brad Pitt found dead (Suicide)

R.I.P country actor Brad Pitt passed away last night, fans burst into tears.

Recommended : Did Justin Bieber Just Die In A High Speed Car Crash?!

 

Truth : Brad Pitt Was Not Found Dead From Suicide!

This is yet another example of FAKE NEWS created and propagated by people to generate income from scams, page views and YouTube advertising, and here are the reasons why…

Fact #1 : Brad Pitt Suicide Ad Was FB Malware

Let me start by warning you that the Brad Pitt being found dead from suicide was a malware scam that circulated through a Facebook advertisement.

Those who clicked on it were directed to a scam website which tries to trick users into installing malware, rogue Facebook apps, rogue antivirus scanners, or tricked into divulging personal information through fake surveys.

Some were also asked to allow a fake Fox News app to gain permission to their profiles. Those who bypassed the permission pop-up were directed to a fake story about Brad Pitt’s suicide:

Brad Pitt, 52, a multi-awarded American actor and husband of Angelina Jolie, 41, shot himself in the head at a shooting range on Sunday. He was under significant stress because the couple “were going through a divorce and he had a history of depression”, sources have said.”

After extensive media coverage, Facebook finally issued a warning to advise people not to click on the fake advertisement, and to warn those who did so earlier, to change their account passwords and scan for malware.

Fact #2 : Brad Pitt Is Still Alive

Brad Pitt (born William Bradley Pitt on December 18, 1963) is still alive as of 21 January 2024. In fact, he was just spotted in public several days ago!

Even though Brad Pitt is notoriously a very private person, he was seen entering the Gagosian Gallery with his new girlfriend, Ines de Ramon, on Friday, 19 January 2024.

Wearing a brown leather bomber jacket, Brad Pitt looked very healthy for someone who is supposed to have died!

Recommended : Did Simon Cowell Just Die In A Car Accident?!

That night, Brat Pitt and Ines de Ramon attended an exhibition by his Moneybag director, Bennett Miller. Britney Spears’ ex-husband, Sam Asghari, was also there. He asked Pitt for a selfie, and later went to chat with Pitt’s former in-laws, James Haven and Jon Voight.

As you can clearly see, Brad Pitt is still very much alive… and looking great!

Fact #3 : No Legitimate Media Outlet Reported His Death

These YouTube videos have been circulating for weeks and months, but people don’t seem to notice that no legitimate media has reported Brad Pitt’s death.

Brad Pitt is one of the most famous celebrities in the world. If he only tripped and fell while walking along Hollywood Boulevard, it would have been international news, covered by celebrity blogs and media outlets.

No legitimate media outlet, or even celebrity blog, reported that Brad Pitt was found dead from suicide, or died suddenly from any cause, because it’s simply not true. Why should you believe some small-time or YouTube channel or random Facebook posts?!

Fact #4 : Brad Pitt Funeral Photos Were Edited

I analysed the photos used in these videos, and traced the origin of two examples used in many of these videos.

This photo used to show Brad Pitt’s funeral is actually a photo from the funeral of Fernando Gaitan, the Colombian TV producer and screenwriter who created the telenovela Yo soy Betty, la fea, which has been adapted in multiple countries.

The funeral was held in Bogota, on Thursday, 31 January 2019. Obviously, that was not Brad Pitt’s funeral, as he was very much alive at that time!

The fake news creator merely added a photo of Brad Pitt, and Angelina Jolie holding up his photo.

Recommended : The Sara Lee Car Accident / Death Video Scam!

This photo does not show Brad Pitt’s coffin being carried out during his funeral. It actually shows the coffin of one of the six Philpott children during their funeral in June 2012. They were murdered by their parents, Mick and Mairead Philpott, who set fire to their home.

If you look carefully, you can see that the pallbearers are carrying multiple coffins. Did it not strike you strange that Brad Pitt’s funeral would have more than one coffin???

Also, the coffin looked remarkably small for an adult. That’s because the coffin was for a 10 year-old little girl called Jade. The fake news creator merely tacked on a photo of Brad Pitt to fool you into believing that it was his funeral.

Fact #5 : Brad Pitt Death Hoax Is Driven By Fake Fact Check Too

This Brad Pitt death hoax, ironically, is also being driven by another fake fact check article by MediaMass Project.

News of actor Brad Pitt’s death spread quickly earlier this week causing concern among fans across the world. However the January 2024 report has now been confirmed as a complete hoax and just the latest in a string of fake celebrity death reports. Thankfully, the actor best known for his roles in Fight Club, Legends of the Fall or A River Runs Through It is alive and well.

Their claim of a viral R.I.P. Brad Pitt Facebook page is false. There is no such Facebook page. It is their standard fake fact check spiel for fake celebrity deaths.

The statement from Brad Pitt’s unnamed reps confirming that he is not dead is exactly the same as statements from other celebrities whose reps MediaMass claimed were victims of death hoaxes, like Angelina Jolie, Arnold Schwarzenegger, Barry Gibb, Bruce Willis, Celine Dion, Clint Eastwood, Cristiano Ronaldo, Dolly Parton, Harrison Ford, Justine Bieber, Lionel Messi, Lucy LiuMadonna, Melanie Laurent, Mike Tyson, Morgan Freeman, Oprah Winfrey, Robert Pattinson, Simon Cowell, Sylvester Stallone, Taylor Swift, Toby Keith, Tom Cruise, and Tom Hanks.

He joins the long list of celebrities who have been victimized by this hoax. He’s still alive and well, stop believing what you see on the Internet.

Hidden in the description page for the MediaMass Project is a disclaimer that they are a “satire” website. That’s the usual “cover” for websites peddling fake news.

Regardless of their reasons, anything posted by MediaMass.net must be considered as fake news, until proven otherwise.

Recommended : Did Bruce Willis Get Aphasia From COVID-19 Vaccine?!

Fact #6 : This Is Just Fake Celebrity News

This is yet another example of fake celebrity news created to generate page views and money through advertising, just like these examples:

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Celebrity Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Is Hillary Clinton Under Investigation For Child Sex Trafficking?!

Was Hillary Clinton just named ‘Person of Interest’ in a child sex trafficking investigation?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Hillary Clinton Under Investigation For Child Sex Trafficking!

People are sharing an article (archive) by The People’s Voice (formerly NewsPunch), which claims that Hillary Clinton was just named ‘Person of Interest’ in a child sex trafficking investigation!

Hillary Clinton Named ‘Person of Interest’ in Child Sex Trafficking Investigation

Recommended : Is Bill Gates Facing Life Behind Bars For Child Rape?!

 

Truth : Hillary Clinton Is Not Under Child Sex Investigation!

This is yet another example of FAKE NEWS created / promoted by The People’s Voice, and here are the reasons why…

Fact #1 : No Evidence Hillary Clinton Is Under Child Sex Investigation

First, let me just point out that there is zero evidence that Hillary Clinton was just named a ‘Person of Interest; in a child sex investigation. The People’s Voice certainly offered no evidence to back up its claims.

If Hillary Clinton was actually named a ‘Person of Interest’, this would have been covered by mainstream media all across the world, not announced only in a notorious misinformation website.

Right-wing QAnon and MAGA conspiracy theorists, fuelled by Russian operatives have long claimed that Hillary Clinton runs a child sex ring in the basement of a Washington D.C. pizza restaurant.

Yet, they have not been able to furnish even one iota of evidence that Hillary Clinton was ever investigated for any child sex crime.

Fact #2 : Hillary Clinton Did Not Cover Up Pedophile Ring

Instead of providing any evidence for Hillary Clinton being named a ‘Person of Interest’ in a child sex trafficking investigation, The People’s Voice linked to its old 2017 article claiming that Clinton covered up a pedophile ring at the State Department.

Not only was that report almost 4 years too late – the NBC report aired in June 2013, it misrepresented what was reported.

The NBC News segment looked at the State Department’s internal investigations into alleged improprieties by an ambassador, who was accused of prostitution and pedophilia. The ambassador, who was later identified as Howard Gutman – the US ambassador to Belgium., was said to have “routinely ditched his protective security detail in order to solicit sexual favors from both prostitutes and minor children“.

NBC News reported that top state department officials directed investigators to “cease the investigation” into the ambassador’s conduct. However, NBC News never claimed or suggested that Hillary Clinton, who was the Secretary of State at that time, covered up any pedophile ring in the State Department.

The State Department Office of Inspector General looked into whether the investigation was mishandled. In October 2014, the Inspector General published its report, in which it said that “the suspected misconduct by the Ambassador was not substantiated“.

The allegations against Ambassador Howard Gutman was never substantiated, or proven. The Inspector General also did not suggest or claim that Hillary Clinton interfered or intervened with the investigation.

In other words – there was no pedophile ring in the State Department, and Hillary Clinton did not cover up anything.

Recommended : Was Tom Hanks Just Accused Of Child Sex Crimes?!

Fact #3 : Hillary Clinton Screenshot Appears To Be Doctored

The screenshot which purportedly shows Hillary Clinton posting that “The Feds are now against me“, and “The videos are on the dark web“, appears to be doctored.

There is no evidence that Hillary Clinton ever posted this on social media, and why would she? Think about this for a moment – why would Hillary Clinton ever post publicly that videos of her alleged child sex crimes are now on the dark web?

And if that was something Hillary Clinton really posted on social media, why would The People’s Voice censor it? Isn’t that odd?

Fact #4 : The People’s Voice Is Known For Publishing Fake News

The People’s Voice is the current name for NewsPunch, which possibly changed its name because its brand has been so thoroughly discredited after posting numerous shocking but fake stories.

Founded as Your News Wire in 2014, it was rebranded as NewsPunch in November 2018, before becoming The People’s Voice. A 2017 BuzzFeed report identified NewsPunch as the second-largest source of popular fake news on Facebook that year.

Its articles have been regularly debunked as fake news, so you should never share anything from NewsPunch / The People’s Voice.  Here are some of its fake stories that I fact checked earlier:

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | ScienceTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did WHO Unveil Global Police Force With Arrest Powers?!

Did the WHO (World Health Organization) just unveil its Global Police Force with the power to arrest people?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : WHO Unveils Global Police Force With Arrest Powers!

People are sharing an article (archive) by The People’s Voice (formerly NewsPunch), claiming that the WHO (World Health Organization) just unveiled its Global Police Force at the 2024 World Economic Forum in Davos.

Ostensibly, this WHO Global Police Force has the power to arrest people who spread “non-mainstream content” on the Internet!

WHO Unveils ‘Global Police Force’ To Arrest Citizens Who Post Independent Media Online

Recommended : Did WEF Order Arrests Of Climate Change Deniers?!

 

Truth : WHO Did Not Unveil Any Global Police Force!

This is yet another example of FAKE NEWS created / promoted by The People’s Voice, and here are the reasons why…

Fact #1 : WHO Did Not Unveil Any Global Police Force

First, let me just point out that the WHO (World Health Organization) did not unveil any Global Police Force, whether at the 2024 World Economic Forum, or elsewhere.

If such a police force was actually established, it would have been reported by mainstream media all over the world. There was no such coverage because it never happened. The People’s Voice article certainly offered no evidence of such a WHO Global Police Force.

In fact, if such a global Internet police force was established, the creators behind fake news websites would have been arrested. The fact that The People’s Voice can freely post such fake news is evidence that such a police force does not exist.

Fact #2 : Pandemic Treaty Was Initiated By WHO Member States

It is also important to point out that the Pandemic Treaty was not initiated by the World Health Organization itself, but rather its member states.

The International Health Regulations (IHR) were first adopted by member states in 1969, empowering the WHO to monitor global diseases. Those regulations have since been revised over the years, including in 2005 – after the SARS outbreak.

On 1 December 2021, world leaders agreed to kickstart the process to draft and negotiate an agreement or convention to “strengthen pandemic prevention, preparedness and response“.

Recommended : Is Biden Admin signing over US sovereignty to WHO?!

Fact #3 : Pandemic Treaty Does Not Outlaw Free Speech

If you read the zero draft of the proposed Pandemic Treaty, you will realise that the WHO is not planning to control the Internet, or outlaw free speech. This is explicitly stated in Article 17, which refers to “Parties” that are the member states.

The Parties commit to increase science, public health and pandemic literacy in the population, as well as access to information on pandemics and their effects, and tackle false, misleading, misinformation or disinformation, including through promotion of international cooperation.

As you can see, under the agreement, each individual country will commit to increase knowledge about science and public health, as well as combat “false, misleading, misinformation or disinformation”.

Not only does the article clearly state that it is up to each country (not the WHO) to implement its policies, it does not mention anything about controlling the Internet.

The only people who need to worry about Article 17 of this proposed WHO agreement are those who peddle “false, misleading, misinformation or disinformation”.

Fact #4 : Pandemic Treaty May Not Be Binding

If you download and read the zero draft, you will realise that the WHO is still calling it a “convention, agreement, or other international instruments“, clearly showing that member countries have not decided whether they want it to be binding or otherwise.

In the third point noted on the very first page of the draft, it was even pointed out that this is just a draft that is being used for “commencing negotiations“, and that “nothing is agreed until everything is agreed“.

The INB (Intergovernmental Negotiating Body) further agreed that the zero draft would be considered at its fourth meeting as a basis for commencing negotiations at that meeting, it being understood that the zero draft will be without prejudice to the position of any delegation and following the principle that “nothing is agreed until everything is agreed”.

While some countries like the European Union, Britain, Indonesia and Kenya would prefer a legally-binding Pandemic Treaty, other countries like the United States, India and Brazil oppose a legally-binding agreement.

So it is ludicrous to claim that the Pandemic Treaty will be legally binding. No such decision has been made.

Recommended : Is ICC launching Nuremberg 2 trials for COVID crimes?!

Fact #5 : The People’s Voice Is Known For Publishing Fake News

The People’s Voice is the current name for NewsPunch, which possibly changed its name because its brand has been so thoroughly discredited after posting numerous shocking but fake stories.

Founded as Your News Wire in 2014, it was rebranded as NewsPunch in November 2018, before becoming The People’s Voice. A 2017 BuzzFeed report identified NewsPunch as the second-largest source of popular fake news on Facebook that year.

Its articles have been regularly debunked as fake news, so you should NEVER share anything from NewsPunch / The People’s Voice.  Here are some of its fake stories that I fact checked earlier:

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | ScienceTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

How Antivaxxers Create Fake News Using VAERS!

Like the British Yellow Card system, VAERS has long been used by antivaxxers to create fake news about vaccines.

Find out why VAERS is so important to doctors, and yet so easily abused by antivaxxers!

Updated @ 2024-01-07 : Refreshed article for new slew of VAERS-based “reports”
Originally posted @ 2021-09-03

 

VAERS : What Is It?

VAERS is an acronym for the Vaccine Adverse Event Reporting System used by the US government.

Like the British Yellow Card system, it is a passive reporting system that relies on individuals to submit reports of their adverse reactions to vaccines.

This open design used by both VAERS and Yellow Card lets scientists catch very rare adverse effects that even large clinical trials may not catch.

For example, anaphylactic reactions to the Pfizer and Moderna vaccines are so rare, they didn’t show up in their large Phase 3 clinical trials at all. They were only identified through VAERS after mass vaccinations started.

Recommended : Did Hackers Release Pfizer + Moderna Vaccine Death Data?!

 

Here’s How Antivaxxers Create Fake News Using VAERS!

Both the American VAERS and the British Yellow Card system suffer from the same problem – their open catch-all design lets ANYONE file a report.

Not just parents and patients, but also any Tom, Dick or Harry with nothing better to do. And you don’t even have to ever been to the United States to file a report!

This allows antivaxxers to abuse both the VAERS and Yellow Card systems to create fake news about vaccines.

Back in 2004, James Laidler famously filed an adverse reaction report into VAERS, claiming that his annual influenza vaccine turned him into the Incredible Hulk!

Incredibly, the CDC had to ask for his permission to remove the fake report. Otherwise, it would remain in the database forever!

Recommended : Were COVID-19 Vaccines Recalled After 40K Deaths?!

More recently, anti-vaccination websites have been using VAERS and Yellow Card reports to fabricate fake news that vaccines are killing people.

The CDC is well-aware of this problem, which is why they explicitly pointed out to everyone that :

  • Reports may include incomplete, inaccurate, coincidental and unverified information.
  • The number of reports alone cannot be interpreted or used to reach conclusions about the existence, severity, frequency, or rates of problems associated with vaccines.

So the next time you read an article claiming that VAERS or the Yellow Card system are reporting injuries and deaths from this or that vaccine, take them with a BIG, BIG PINCH of salt. None of those reports are verified.

 

VAERS : Anyone Can File A Fake Report!

To demonstrate this point, here is a fake report I attempted to file into VAERS, with the following information :

First Name : Donkey
Last Name : Kong
Street Address : Rolling Barrel Avenue
City : Jungle
County : Donkey
Date Of Birth : 1 January 1908
Age : 113 Years Old
Race : 1% white, 2% black, 3% Asian, 4% Latin, 90% alien

Date of Vaccination : 31 May 2021, 1:00 AM
Date of Adverse Event : 31 May 2021, 1:01 AM
Facility / Clinic Name : Jungle Clinic
Facility / Clinic Address : Jungle Clearing, Jungle

Recommended : Did Bill Gates Call For COVID-19 Vaccine Withdrawal?!

Vaccine : COVID19 (Pfizer-BioNTech)
Lot Number : 1110654
Dose Number : 6 (it actually only has 2 doses)

Description of Adverse Event(s)

I asked to be jabbed in my left arm, the doctor insisted right arm is better because right is right, no?

After the jab, I went back and on the way back, two young punks pulled up in their fancy Mercedes at the traffic light.

I challenged them to a race in my Mustang, and midway, they clipped me and sent me flying through the walls of the Grand National Bank.

As a result, I suffered two broken legs and my right arm was ripped off.

I’m absolutely confident that my driving skills were impaired by the vaccine, and it also made my right arm easy to tear off.

Recommended : COVID vaccines have 1000X death rate than safe limit?!

Medical tests and lab results

The doctors at AdventHealth Orlando have all my medical reports and my right arm.

Days hospitalised : 300
Life threatening illness : Yes
Disability or permanent damage : Yes
Congenital anomaly or birth defect : Yes

Other Vaccine : Bullshit Vaccine
Manufacturer : Google
Adverse Event From That Vaccine : My penis fell off after getting the MMR vaccine

I did not hit Submit though, because I did not want to add another fake adverse event to the holster of anti-vaccination advocates.

But take a look at the screenshots, and see just how easy it is for anyone to make a fake VAERS report. There is no need to verify any personal details, and you can do this from anywhere in the world!

Recommended : Are Residual DNA In mRNA Vaccines Dangerous?!

But as you can now see – it is very easy to abuse VAERS. With enough time and persistence, you can file all kinds of fake reports on VAERS, and use those reports to push your narrative.

That’s why responsible people do not use unverified VAERS reports. You should always be wary of anyone who makes a claim based on VAERS reports.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

Don’t forget to protect yourself, and your family, by vaccinating against COVID-19!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Health | Fact Check | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

eWallet May Be Blocked If eMADANI Credit Is Transferred!

Be warned – your eWallet account may be blocked, if you attempt to transfer your free RM100 eMADANI credit! Here is what you need to know…

 

eMADANI : 10 Million Malaysian Citizens To Get Free RM100!

On 27 July 2023, Prime Minister Anwar Ibrahim announced that the Malaysian government will give a special, one-off RM100 eWallet credit.

On Wednesday, 29 November 2023, the government announced that the eMADANI programme will benefit some 10 million Malaysian citizens and 2 million businesses, with a total budget of RM 1 billion.

The eMADANI programme is a new initiative that is designed to stimulate the micro, small and medium enterprises (PMKS), as well as promote cashless payments, and alleviate inflationary pressures on the rakyat.

From 4 December 2023 until 20 February 2024, eligible Malaysians can register and receive RM100 in one of these four eWallets:

  • MAE
  • Setel
  • ShopeePay, and
  • Touch ‘n Go eWallet

Please note that these four eWallet providers will also be offering additional incentives in the form of vouchers, cashbacks, discounts, reward points, and coins. So be sure to “shop around” for the best offers, before deciding on which eWallet to use!

Recommended : How To Get Free RM100 eMADANI eWallet Credit!

 

eWallet May Be Blocked If eMADANI Credit Is Transferred!

On Monday, 4 December 2023, the Malaysia Ministry of Finance issued a statement warning that your eWallet may be blocked if you attempt to transfer your free RM100 eMADANI credit out!

This is partly because the eMADANI programme is meant to promote the digital economy, and the use of cashless payments in Malaysia.

The RM100 eWallet credit must be spent physically in retail stores and businesses using the the eWallet of your choice, except:

  • peer-to-peer transfers
  • cash redemptions
  • bill payments through the eWallet
  • government fee payments through the eWallet
  • telco postpaid payments and prepaid reloads through the eWallet
  • game payments through the eWallet
  • parking and toll payments
  • investment activities through the eWallet
  • e-commerce or online transactions

On top of that, the Ministry is aware of online scams offering “cash out” services to people. To avoid people being tricked into transferring their eMADANI credit out, the Malaysian government may order the blocking of eWallet accounts used in such activities, as well as the eMADANI credit involved.

So please make sure you do not transfer your RM100 eMADANI credit out of your eWallet. Do not fall for scams offering you the option to “cash out” the money. Instead, use the eMADANI credit to purchase at retail stores.

Please SHARE this article out, to warn your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Business | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Free TNG RFID Bar Code Scam Fact Check!

Will your phone get hacked if you scan the TNG RFID bar code?! Take a look at the viral claim, and find out what the facts really are!

Updated @ 2023-11-17 : Added new version, and more details.
Originally posted @ 2023-05-10

 

Claim : Scanning TNG RFID Bar Code Can Hack Your Phone!

This warning about an RFID bar code scam has gone viral on WhatsApp, and social media, claiming that scammers are sending people free TNG RFID stickers, and asking them to scan the bar code.

Allegedly, scanning the TNG RFID bar code will cause your phone to be hacked by these scammers!

They send the RFID to you. When you scan the bar code they hack your hp
It’s a scam

他们将 RFID 发送给您。 当您扫描条形码时,他们会入侵您
这是一个骗局

Mereka menghantar RFID kepada anda. Apabila anda mengimbas kod bar mereka menggodam anda
Ia satu penipuan ☠️👻💩😱😰

If you get this free RFID card via courier, please throw away. Another scam.

Recommended : Bank Letter QR Code Scam : What You Need To Know!

 

Truth : Scanning TNG RFID Bar Code Will NOT Hack Your Phone!

This is yet another example of FAKE NEWS circulating on WhatsApp and social media, and here are the reasons why…

Fact #1 : TNG RFID Bar Code Cannot Hack Your Phone

First of all – let me just say that the TNG RFID bar code cannot hack your phone. In fact, no one can hack your phone just because you scan an RFID bar code.

The bar code is nothing more than a series of numbers, which you can readily see printed under the bar code. These numbers cannot possibly hack your phone / smartphone.

Fact #2 : TNG Bar Code Is Used To Register RFID Sticker

The bar code visible in the clear window of the TNG RFID self-fitment kit is merely the serial number for the RFID sticker (also known as an RFID tag).

This serial number is used to register the RFID sticker, by scanning scan the bar code using the TNG eWallet mobile app. All it does is link the RFID sticker to your TNG eWallet account, so that all toll charges are automatically deducted from that account.

Fact #3 : TNG RFID Swapping Can Be Easily Detected

One of our readers suggested that the scammer might have swapped out the bar code, to trick you into registering a different TNG RFID sticker owned by the scammer.

This would allow the scammer to use his/her TNG RFID sticker to go through highway tolls for free, while you would be charged for his/her travels.

While that is plausible, it would be quickly detected by the victim who would not be able to use the RFID sticker to get through the toll. The victim would also be able to detect the illegal charges to his/her TNG eWallet account.

Read more : TNG RFID Self-Fitment Guide : How To Do It Yourself

Fact #4 : TNG RFID Is Unique To Each Chip

One of our readers suggested that the scammer may be trying to trick people into scanning the barcode of a duplicated RFID sticker. The scammer can then use the duplicate RFID sticker to go through tolls, which would be charged to the victims’ TNG eWallet accounts.

Now, Touch ‘n Go has not revealed much about how it is protecting its RFID stickers, only saying that each TNG RFID sticker has an embedded radio-frequency chip that makes every sticker “unique to each customer”.

But that suggests that the RFID stickers are not only encrypted, the chip has a private key that prevents duplication, which makes a lot of sense. Without such encryption and private key, anyone can literally just read the number off any RFID sticker in a parking lot, and duplicate it in a programmable RFID sticker.

Unless the scammer has somehow stolen the private keys, and can perfectly duplicate the RFID stickers, this seems like an improbable scam. More so when the scammers would be limited to using the tolls for free. Hardly worth the effort, if you ask me.

Fact #5 : There Are Easier + Cheaper Ways To Hack Your Phone

Truth be told – there are far easier and cheaper ways to hack your phone, than send you a free RFID sticker and ask you to scan the bar code.

These scammers will have to put in considerable expense and technical expertise into hacking the TNG eWallet app, and inserting their malware that the fake RFID number would trigger.

But why bother? If they can hack the TNG eWallet, they don’t even need to send you any fake RFID bar code to scan!

Making fake RFID stickers (tags) that look like genuine TNG RFID self-fitment kits costs money. Sending these fake kits also put them at risk, because deliveries can be traced.

There are many other ways to compromise your smartphone. There is simply no reason why scammers to waste time and money on such a convoluted scheme.

Recommended : WhatsApp Block Button Scam : What You Need To Know!

Fact #6 : Packages Do Get Delivered Wrongly

The most plausible explanation for receiving a free TNG RFID sticker out of the blue is that it was wrongly delivered to you. If you receive one, check the name and address on the package. It may not be meant for you. In that case, contact the delivery company and have them resend it to the right person.

I have also personally experienced receiving packages that I did not order, some of which appear to be sent due to a database error of some sort – my name and phone number are on the package, but the address was wrong or non-existent.

Out of an abundance of caution, just don’t install any RFID sticker that you did not order. Or you can call up TNG to verify that the RFID sticker is legitimate.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Can You Get Free Cash Via MyKasih App?!

Is the MyKasih Foundation giving out RM1000 or RM1200 cash aid via its mobile app?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Get Free Cash Via MyKasih App!

Many people are getting messages about getting free cash through the MyKasih Foundation on WhatsApp and Telegram, from their family members and friends:

Terkini: Bantuan Percuma RM1000 Ke Dalam MyKad : Rujuk Cara Semakan & Syarat Kelayakan

Latest: Free RM1000 Assistance Into MyKad : How To Check & Eligibility Conditions

Jom claim RM1200

MyKasih Foundation : Cek MyKad Boleh Dapat Wang RM1000 Secara Percuma

MyKasih Foundation : Check MyKad To Get Free RM1000

Bantuan Tambahan STR 2023 MySARA RM800: Semakan Status & Tarikh Bayaran

Additional STR 2023 MySARA Assistance RM800: Check Status & Payment Date

Recommended : WhatsApp Block Button Scam : What You Need To Know!

 

Truth : MyKasih Free Cash App Is A Scam!

This is yet another example of SCAMS circulating on WhatsApp and Telegram, and here are reasons why…

Fact #1 : MyKasih Free Cash Initiative Is A Scam!

First, let me just point out that these messages on WhatsApp and Telegram, as well as the websites promoting the MyKasih free cash initiative is a scam!

The Malaysian government have already labelled these free cash offers as FAKE NEWS on Facebook and Twitter. Here is a non-exhaustive list of links that have been identified as scam links:

my.mykasihh.online

l.my-kasihapp.com

apps-mykasih.co/twe

There’s no need to memorise these links. These scammers will keep changing them.

Just know that the official MyKasih website is www.mykasih.com.my. Do NOT go to any other website when it comes to the MyKasih Foundation website.

Fact #2 : Those Accounts Were Hijacked

Those viral messages are actually coming from WhatsApp and Telegram accounts that have been hijacked by scammers. That’s why they are so convincing.

Those are really the actual WhatsApp and Telegram accounts of your family members or friends. But they have been taken over by scammers using tricks like the screenshot hack.

Take this opportunity to tighten the security of your own Telegram and WhatsApp accounts, by turning on two-step verification!

Recommended : Can StopNCII Remove All Nude / Deep Fake Photos?!

Fact #3 : SARA Cash Aid Is Only RM600

As part of its initiative to help the hardcore poor handle the high inflation this year, the Malaysia Ministry of Finance announced SARA (Sumbangan Asas Rahmah).

However, the SARA cash aid is only RM600, and limited to the hardcore poor. There is no way for anyone to get RM800, RM1000 or RM1,200 in SARA cash aid from the government.

RM100 x 6 months is credited directly into the MyKad of eligible hardcore poor, allowing them to purchase a limited list of essential goods from grocery stores and supermarkets across Malaysia, from July to December 2023.

In Sabah and Sarawak, the RM600 is credited directly into the bank account, or provided as cash through Bank Simpanan Nasional branches.

Fact #4 : SARA Recipients Are Automatically Selected

There is no need to apply for SARA cash aid. For one thing – it only applies to the hardcore poor. If you are reading this on a computer or a smartphone, you very likely do not qualify as “hardcore poor”.

SARA recipients are automatically determined using the existing eKasih Hardcore Poor data, and includes those who had earlier qualified for the STR 2023 cash aid.

Fact #5 : Real Website Asks Only For Your MyKad

Qualification for the SARA cash aid of RM600 is based entirely on your MyKad number.

On the official Sumbangan Asas Rahmah (SARA) website, you can check for your eligibility using your MyKad number only.

The fake websites look just like the real SARA website, but instead of asking for your MyKad number, they will ask you for your mobile number and ask you to submit a TAC number.

Needless to say – these are scam websites. You should NEVER submit your phone number or any TAC codes.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Sam Bankman-Fried Convicted : Guilty Of FTX Fraud!

Sam Bankman-Fried (SBF) has been found guilty and convicted on all counts of defrauding customers of his crypto-exchange, FTX!

 

Sam Bankman-Fried Convicted : Guilty Of FTX Fraud!

Sam Bankman-Fried, who is also known simply as SBF, has been found guilty on all counts of defrauding the customers of his crypto-exchange, FTX, on Thursday, 2 November 2023.

The former crypto billionaire stood and faced the jury that delivered its verdict after just four hours of deliberations. He was found guilt on all seven counts of wire fraud and conspiracy to launder money, and now faces decades in prison at a separate sentencing hearing set for 28 March 2024.

The jury verdict brought an end to nearly a month of court proceedings, which saw his closest friends and partners turn witness against the former crypto king, and one of cryptocurrency’s most public faces.

Sam Bankman-Fried perpetrated one of the biggest financial frauds in American history – a multibillion-dollar scheme designed to make him the King of Crypto. This case has always been about lying, cheating, and stealing, and we have no patience for it.

– Manhattan US Attorney Damian Williams

SBF maintained his innocence right to the end, maintaining that while he made mistakes, he acted in good faith. After his conviction, his lawyer issued this statement:

We respect the jury’s decision. But we are very disappointed with the result. Mr Bankman-Fried maintains his innocence and will continue to vigorously fight the charges against him

– Sam Bankman-Fried’s lawyer, Mark Cohen

It is currently unknown if SBF plans to appeal the verdict. In any case, this won’t be the last we see of him, as Bankman-Fried is also set to go on trial on a second set of charges brought by prosecutors earlier this year, for alleged foreign bribery and bank fraud conspiracies.

Recommended : SBF Allegedly Hid $8 Billion In Korean Friend Account!

 

Sam Bankman-Fried Conviction : Warning To Other Fraudsters

After the jury convicted SBF, Manhattan US Attorney Damian Williams warned other fraudsters to take note of his fate.

When I became US attorney, I promised we would be relentless in rooting out corruption in our financial markets. This is what relentless looks like. This case moved at lightning speed – that was not a coincidence, that was a choice.

This case is also a warning to every fraudster who thinks they’re untouchable, that their crimes are too complex for us to catch, that they are too powerful to prosecute, or that they are clever enough to talk their way out of it if caught.

Those folks should think again and cut it out. And if they don’t, I promise we’ll have enough handcuffs for all of them.

Recommended : SEC Charges Reveal Fraud Committed By SBF In FTX!

 

Sam Bankman-Fried Conviction : All But Guaranteed

Sam Bankman-Fried’s conviction was all but guaranteed after three of his former close friends and colleagues, including former on-off girlfriend, Caroline Ellison, pleaded guilty and agreed to testify against him in hopes of reducing their own sentences. They are to be sentenced at a later date.

They helped convict SBF by presenting evidence that the crypto-trading firm Alameda Research received deposits on behalf of FTX customers from the early days of the exchange, when traditional banks were unwilling to let it open an account.

Bankman-Fried was accused of swindling FTX customers out of some $10bn. Prosecutors said that his fraud extended from 2019 to November 2022, when FTX collapsed under the weight of a liquidity crisis, caused by the lending of customer funds to Alameda Research, without FTX customer’s knowledge or approval.

Instead of safeguarding FTX customer funds, SBF used the money to repay Alameda lenders, buy property and make investments, as well as political donations. When FTX went bankrupt in November 2022, Alameda owed it US$8 billion.

He took the money. He knew it was wrong. He did it anyway, because he thought he was smarter and better and that he could figure his way out of it.

– Assistant US Attorney Nicolas Roos

Recommended : Caroline Ellison, Gary Wang Plead Guilty To FTX Fraud!

Before FTX’s collapse of his companies, Sam Bankman-Fried was known for appearing frequently in Washington and in the media to promote cryptocurrency. Despite a market downturn, the rapid growth of FTX earned him the moniker – king of crypto, which now appears to be a mirage.

Caroline Ellison testified that Sam Bankman-Fried directed her to shuttle customer funds into Alameda after the spring 2022 crypto downturn. Alameda was saddled with billions of dollars in open-term loans, and lenders started demanding their money back that summer. Alameda couldn’t repay the loans, and Bankman-Fried blamed Ellison for not hedging the fund’s money earlier that year.

Wang similarly implicated his former friend, naming “Sam Bankman-Fried, Nishad Singh and Caroline Ellison”, when the prosecution asked, “Who are the main people you committed these crimes with?”

Wang also told jurors that Sam Bankman-Fried wasn’t shocked by FTX’s massive debt. After telling him about the debt, SBF said “that sounds correct” with “a neutral demeanor”.

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Business | MoneyTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Is It Dangerous To Exit WhatsApp Exit Scam Groups?!

Is it dangerous to exit WhatsApp scam groups? Or quitting such scam groups on WhatsApp cause your phone to be hacked?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : It Is Dangerous To Exit WhatsApp Scam Groups!

People are sharing this warning about quitting WhatsApp scam groups using the Exit Group link option! Take a look!

Here’s another Scam chat group. DO NOT CLICK ON ITS EXIT GROUP BUTTON to exit, instead go to your top right 3dots and click on exit group or report.

Clicking on the group’s exit button might have dire consequences..

Recommended : WhatsApp Block Button Scam : What You Need To Know!

 

Truth : It’s Not Dangerous To Exit WhatsApp Scam Groups!

This viral warning was likely created by well-meaning but clueless Internet “experts” who are apparently not tech-savvy enough to understand what’s going on.

Fact #1 : No Evidence Of WhatsApp Exit Group Hacking

First, let me just point out that there is no evidence that anyone was ever hacked after using the Exit Group link to get out of any WhatsApp group, whether they are scam groups or otherwise.

Even if an enterprising hacker / scammer was able to create a message with a fake Exit Group button that downloads an APK (Android Package Kit) file, it won’t automatically install that file. You will need to manually install the APK file from the Downloads folder.

Those who know how to do that would be tech-savvy enough to avoid installing APK files from unknown sources. Those who don’t know how to do that would not be able to install the downloaded APK file.

Fact #2 : WhatsApp Exit Group Option Is Genuine

The truth is – the Exit Group link that you may see in new messages from strangers is not a scam or a trick. It also does not download or install any APK file.

The Exit Group link is actually a safety feature in WhatsApp, that appears if you have been added to a WhatsApp group by someone who is not in your contact list – like a scammer, for example.

Once you open the new group you have been added to, WhatsApp warns you that you were added by someone who isn’t a contact. You are then given the option to exit the group, or click OK to continue.

There is really nothing malicious about this Exit group link in WhatsApp. Clicking on it to exit any WhatsApp group won’t harm you in any way, or cause your phone to be hacked.

Recommended : Can Israel Seismic Wave Card Hack Your Phone?!

Fact #3 : Older Exit Group Methods Still Work

The WhatsApp Exit group link offers an easy way to quickly remove yourself from a group you don’t want to be in. However, the older exit group methods still work, in case you prefer to use them:

Exit Group Only

  1. Go into the group chat you wish to leave.
  2. Tap on the kebab menu / vertical ellipsis (⋮) icon on the upper right corner.
  3. Select MoreExit group.

An even better option is to actually report the scam group, while quitting it and removing the chat at the same time.

Report + Exit Group Only

  1. Go into the group chat you wish to leave.
  2. Tap on the kebab menu / vertical ellipsis (⋮) icon on the upper right corner.
  3. Select More > Report
  4. Make sure the Exit group and delete chat option is checked.
  5. Tap Report to report and quit from the group, and delete the chat.

Fact #4 : WhatsApp + Telegram Scam Groups Are Real

Before I leave, I just want to remind all of you that there are many scam groups on WhatsApp and Telegram.

If you are added to any of these scam groups, just exit them without a thought. Do not read anything posted in these scam groups, lest you fall for the scam!

That’s why scammers often try to convince you to check out the group first, and “don’t rush to leave the group”:

Hello everyone! Please don’t rush to leave the group, thank you all for taking the time to read this message!

Ignore whatever they post in those scam groups. Hit the Exit group link, or better still – REPORT the group to WhatsApp / Telegram!

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

WithSecure Signs Partnership Agreement With LGMS!

Finland’s WithSecure Corporation just signed a partnership agreement with LGMS Berhad to develop cybersecurity solutions for the SME market in Malaysia!

 

WithSecure Signs Partnership Agreement With LGMS

On Wednesday, 1 November 2023, Finland’s WithSecure Corporation (formerly known as F-Secure Business) signed a partnership agreement with LGMS Berhad (LGMS) to develop cybersecurity solutions for the SME market in Malaysia!

The partnership agreement was signed by LGMS Executive Chairman Fong Choong Fook and WithSecure Corporation CEO Juhani Hintikka, who flew in from Finland to emphasise its importance while demonstrating support for the progress of Malaysia’s Digital Economy.

The signing was witnessed by Malaysia Deputy Communications and Digital Minister Teo Nie Ching, together with His Excellency Sami Leino, Ambassador of Finland to Malaysia and Brunei.

Recommended : WithSecure Takes Offensive Security Approach To Cloud Threats!

The Deputy Minister said that the partnership was ‘timely’, and represents a ‘significant leap’ towards a secured Digital Economy, and more so ahead of the National Cybersecurity Bill the Unity Government is set to unveil in early-2024.

This partnership is also aligned with the government’s ‘Ekonomi Madani’ vision of attracting significant foreign direct investments and generating avenues for technological advancements and innovations.

It serves to demonstrate how collaborative efforts can facilitate a robust, secure and prosperous digital ecosystem, thereby solidifying Malaysia’s position as a preferred destination for global tech investments.

The partnership agreement today between LGMS and WithSecure embodies a philosophy of attracting significant foreign direct investments and generating avenues for technological advancements and innovations.

It serves to demonstrate how collaborative efforts can facilitate a robust, secure and prosperous digital ecosystem, thereby solidifying Malaysia’s position as a preferred destination for global tech investments.

– Malaysia Deputy Communications and Digital Minister Teo Nie Ching

WithSecure CEO Juhani Hintikka expressed his ‘deepest appreciation’ to the Deputy Minister for endorsing this partnership, stating, “Your presence significantly amplifies the resonance of this initiative, showcasing a unified front in our endeavour to foster a secure and prosperous Digital Economy for Malaysia and also the region.

Recommended : How WithSecure Offensive Security Drives Business Resilience!

 

WithSecure – LGMS Partnership Agreement Details

WithSecure is today a leading international cybersecurity group which had also invested significantly in Malaysia and in nurturing local talent. Besides its headquarters in Helsinki, Finland, WithSecure houses its intelligence, customer support, business operations and shared services in Kuala Lumpur for its Asia-Pacific operations.

LGMS Berhad, meanwhile, has been recognised as Cybersecurity Malaysia’s ‘Company of the Year’ with Fong himself being acknowledged as ‘Cybersecurity Professional of the Year’.

Fong said that, within today’s Digital Economy, cyberthreats and ransomware attacks have become more sophisticated and rampant and potential damages to SMEs, who often lack the necessary IT expertise and resources, can be catastrophic.

Most SMEs today are just one cyber attack away from a devastating setback or even closure. Recognising that most SMEs might not possess advanced IT know-how, our collaboration with WithSecure aims to deliver cybersecurity solutions that are not only robust but also intuitive and user-friendly.

The purpose is to empower our SME community to navigate the digital landscape confidently and securely.

– LGMS Executive Chairman Fong Choong Fook

This localised cybersecurity approach underscores WithSecure’s understanding of the region’s unique digital ecosystem and our commitment to crafting solutions that align with local business needs. It embodies WithSecure’s ethos of merging global cybersecurity expertise with local insights to foster a safer digital realm.

– WithSecure Corporation CEO Juhani Hintikka

One product of this partnership is the ‘Made in Malaysia’ StarSentry solution – a plug-and-play model that is more than just a ‘shield’ for SMEs but offers a proactive approach to threat prevention.

This solution is also aligned with broader sustainability goal and embraces the ESG framework of safeguarding critical infrastructures, nurturing a secure digital community and reinforcing stringent governance standards, demonstrating an unwavering commitment to responsible, transparent business operations.

Pre-orders for the solution can already be made.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Business | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Bank Letter QR Code Scam : What You Need To Know!

Are scammers sending bank letters with a QR code that can steal your money?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Bank Letter With QR Code Is A Scam!

People are sharing a photo of a letter from a bank, claiming that the QR code in the letter can steal your money if you scan it with your phone!

Circulating In WhatsApp : If you get a letter from the bank like this and ask to update the book using the QR CODE provided in the letter that was sent, don’t ever scan it, you will lose all your daily savings or old age savings, this is another scammer’s work and method take your money, please spread it to everyone so that siblings, relatives, neighbors & family members are not affected by this kind of scam…

Peng Seong, the one : ⛔️ Another Scam ‼️

Do NOT scan the QR code per the letter even with bank’s letterhead without verifying with the bank

Recommended : WhatsApp Block Button Scam : What You Need To Know!

 

Truth : Bank Letter With QR Code Is Not A Scam!

This is likely another example of FAKE NEWS circulating on WhatsApp and social media platforms, and here are reasons why…

Fact #1 : This Is Old Fake News

First, let me just point out that this photo is not new. It first went viral, with a voice message in August 2022, and has subsequently gone viral on and off over the last year or so.

Fact #2 : CIMB Letter Was Genuine

The letter, which was sent by CIMB, is genuine. CIMB even posted a reply to one viral tweet, that the letter was genuine:

FYI, this [letter] is genuinely from our bank. You can refer to the link below for more information: [link no longer available]

[U]ntuk makluman, ia adalah sah dari pihak kami. Anda boleh rujuk pautan di bawah bagi maklumat lanjut: [link no longer available]

Fact #3 : CIMB Letter Was Only Sent To Business Customers

The letter was not meant for consumers, and was only sent to CIMB business customers, to request that they update their company/organisation’s information.

Re: Update on your records to improve your banking experience

We refer to the above mattes and our letter dated 27/06/2022.

We note that you have vet to update your company/organisations information with us.

As part of the Bank’s ongoing process to know our customers better and provide a seamless banking experience, we would like to remind you to return the completed Customer Information Update form to us

This letter appears to be CIMB’s efforts to comply with KYC (Know Your Customer) requirements set out by regulators like Bank Negara Malaysia (BNM).

Recommended : Can StopNCII Remove All Nude / Deep Fake Photos?!

Fact #4 : QR Code Leads To CIMB Website

QR codes is a type of barcode, which allows people and companies to share / deliver information, that can include links. QR codes can lead you to malicious websites, but they cannot deliver malware, or hack your computer or smartphone.

The QR code in the CIMB bank letter isn’t malicious. It actually codes for a link to the CIMB website. You can verify it by simply scanning the QR code in that “CIMB scam letter”. You will see that it only leads to http://www.cimb.com.my/bizupdate [which no longer exists]

Ultimately, this viral warning was likely created by well-meaning but clueless Internet “experts” who are apparently not tech-savvy enough to even verify the QR code by simply scanning it!

Fact #5 : Form Was To Be Emailed / Delivered

The CIMB letter asked its business customers to download and fill in a form. However, that form was not to be submitted online.

Rather, the letter specifically asked its business customers to email the completed form to a legitimate CIMB email address, or to physically mail or courier it to the bank itself.

Scan the QR Code below to download the form. Once you have completed the form, please submit by email to cimb_updates@cimb.com or mail/courier to the address below within 21 days from the date of this letter, failing which, the Bank reserves the right to suspend or close the account in accordance with the account terms and conditions.

In a real scam, you will be asked to taken to a fake CIMB bank website, and asked to logged into your bank account. That’s how the scammer gets hold of your bank login credentials.

However, even that scam won’t work without access to your TAC (Transaction Authorisation Code), which is sent to your phone by SMS, or authenticated through the bank’s mobile app.

For certain, scammers cannot log into your bank account by simply gaining your company’s information through a form, unless you actually include your company’s bank account login details!

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Can Scammers Hack Your Phone If You Call Back?!

Can scammers hack your phone if you answer their calls, or call back?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Scammers Can Hack Your Phone If You Call Back!

People are sharing this advice about scammers hacking your phone if you answer their calls, or call back!

Very Very Urgent …

Please pass this message to your family and friends NOW.

Recommended : WhatsApp Block Button Scam : What You Need To Know!

 

Truth : Scammers Cannot Hack Your Phone If You Call Back!

This is yet another example of FAKE NEWS circulating on WhatsApp and social media platforms, and here are reasons why…

Fact #1 : This Is Old Fake News

First, let me just point out that this fake message isn’t even new. It has been circulating on WhatsApp and social media platforms since April 2020, if not earlier.

Fact #2 : This Hoax Is Based On One Ring / Wangiri Scam

This hoax appears to be based on the 2019 FCC warning about the “One Ring” or “Wangiri” scam, where scammers use robocall devices to give victims a miss call, in hopes that they would call back and get charged for Pay-Per-Call services.

The Federal Communications Commission is alerting consumers to reported waves of “One Ring” or “Wangiri” scam robocalls targeting specific area codes in bursts, often calling multiple times in the middle of the night. These calls are likely trying to prompt consumers to call the number back, often resulting in per minute toll charges similar to a 900 number. Consumers should not call these numbers back.

Recent reports indicate these calls are using the “222” country code of the West African nation of Mauritania. News reports have indicated widespread overnight calling in New York State and Arizona.

Generally, the One Ring scam takes place when a robocaller calls a number and hangs up after a ring or two. They may call repeatedly, hoping the consumer calls back and runs up a toll that is largely paid to the scammer.

Consumer Tips: · Do not call back numbers you do not recognize, especially those appearing to originate overseas. · File a complaint with the FCC if you received these calls: www.fcc.gov/complaints · If you never make international calls, consider talking to your phone company about blocking outbound international calls to prevent accidental toll calls. · Check your phone bill for charges you don’t recognize.

This scam, however, does not involve hacking any phone. It only requires you to call back the number, which is a Pay-Per-Call service.

Once you call back, you will get charged a premium rate, as the scammers try to keep you on the line for as long as possible.

Recommended : Can Israel Seismic Wave Card Hack Your Phone?!

Fact #3 : Scammers Cannot Hack Phone Through Calls

It is simply not possible to hack your phone through a voice call, even if you’re using VOIP (Voice Over Internet Protocol), or apps like WhatsApp or Telegram.

What is possible though is voice phishing, also known as vishing. This is a form of social engineering, where scammers pose as a bank or police officer (or someone with authority) to obtain your bank account information, or trick you into transferring money into their bank accounts.

Fact #4 : 90# Telephone Scam Only Works With PBX / PABX

The #90 or 90# scam is a very old phone scam that only works on business landline phones that use a PBX (Private Branch Exchange) or PABX (Private Automatic Branch Exchange) system. Here is the official US FCC warning about this scam.

In this very old scam, the scammer pretends to be a telco employee looking into a technical problem with your phone lines, and asks you to help him by either mailing 90# or transferring the call to an outside line. If you do that, you will enable the scammer to place premium-rate calls that will billed to your phone number.

To be clear – these codes do NOT work on mobile phones or smartphones, because they do not run on PBX or PABX systems.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

PayNow PDF Malware Scam : What You Need To Know!

Is there a new malware scam involving a PayNow PDF?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : WhatsApp Block Button Is A Scam!

People are sharing this warning about a new malware scam involving a PayNow PDF. Take a look!

I just received below the latest and new scams Modus Operandi from my Uncle. Forward to warn and share.
======================

The scammers have changed their modus operandi. They don’t ask you to download the app.
My neighbour told me yesterday that her sister (a cancer patient) wanted a part-time helper to clean her house. Hence, she went to Facebook. I called the number and made the request. The advertiser asked whether she had a Paynow, and she said that she had. He directed her to make the partial payment, and he will send the invoice to confirm. (Note: He did not ask her to download an app, as people are getting alerts). When she received the invoice in the PDF format, she did not suspect any foul play and clicked it. The invoice showed the amount paid and the balance to be paid. After that, she went to sleep. The next morning, her phone could not be switched on.
She used her laptop to check her DBS bank account. Her $20K was gone, and her two fixed deposits of $25K, which had not reached the maturity date, were also gone—the total loss was $ 70K.
When she went to the bank and asked why her fixed deposit was also gone, the receptionist told her that digital banking allows you to transfer the amount back to your account to facilitate withdrawals without going to the bank.
Police told her the malware was embedded in the PDF document.
So folks, beware that the scammers are always changing their modus operandi to con your money $$$! 😡😡😡

Recommended : WhatsApp Block Button Scam : What You Need To Know!

 

No Evidence There Is Any PayNow PDF Scam!

This is likely another example of FAKE NEWS circulating on WhatsApp and social media platforms, and here are reasons why…

Fact #1 : No Evidence Of PayNow PDF Scam

First, let me just point out that there is no evidence that anyone was ever scammed by a PayNow PDF invoice.

There has been no actual news report of such a case, never mind multiple cases involving malicious PayNow PDF documents.

Frankly, I don’t know of any PDF malware that can shut down a phone, and transfer money from a bank account, including liquidating fixed deposits!

Fact #2 : PDF Malware Generally Target Computers

PDF documents can contain malware, but malicious PDFs generally target Windows computers. In fact, many aren’t actual PDF documents, but are instead executable files masquerading as PDF files – invoice.pdf.exe, for example.

Malicious PDF documents or executables targeted at Windows computers won’t work on smartphones. The malicious PDF must not only be specifically designed to target smartphones, it must target the right operating system – iOS or Android. A malicious PDF targeting Android won’t work on an Apple iPhone, for instance.

On top of that, many PDF malware actually exploit vulnerabilities in a specific PDF reader – most commonly, the industry-standard Adobe Acrobat Reader. Most smartphones do not have Adobe Acrobat Reader installed, and instead rely on a variety of PDF readers like Samsung Note, OneDrive, Google Drive, Kindle, etc.

Embedded PDF malware that target vulnerabilities in the Adobe Acrobat Reader won’t work with other PDF readers. That’s probably why it’s rare to see PDF malware that target smartphones.

Recommended : Can StopNCII Remove All Nude / Deep Fake Photos?!

Fact #3 : PayNow Scams So Far Involve Phishing

Singapore reported 477 cases of PayNow scams in 2021, with 133 more cases in 2022. However, they were not due to PDF malware. Rather, their victims were deceived into giving scammers their digital banking credentials.

In other words, PayNow scams have so far involved phishing attacks, in which victims are tricked into logging into fake websites, or giving up their Internet banking login details by phone.

In one of these scams, victims received phone calls from people pretending to be bank employees. The callers would ask for the victims’ personal details, such as their Internet banking usernames and passwords, under the pretext that the bank needed them to verify transactions in their accounts.

Fact #4 : Singapore Police Warned About Android Malware

It seems likely that the viral warning is based on a misunderstanding of a Singapore Police Force warning about Android malware withdrawing money through PayNow.

Issued on 17 June 2023, the Singaporean police warned that scammers were tricking victims into installing an Android Package Kit (APK) file through WhatsApp and Facebook Messenger. Once installed, the malware allows the scammers to remotely access the victims’ devices, and steal their passwords.

The victims are then directed to fake websites that mimic banks like DBS to key in their banking credentials. The login information obtained through this phishing attack then allows the scammers to withdraw their victims’ money through PayNow.

To be clear – this PayNow scam does NOT involve any PDF. It requires the victim to install an APK file – to gain access of your 2FA (Two-Factor Authentication) device, and provide bank login information through a fake (phishing) website.

This allows the scammers to log into your bank account using the login info you provided, and authenticate all transfers using your mobile phone.

Recommended : Nurse Lost RM380K After Pressing Instagram ‘Like’ Button?!

Fact #5 : Here Are Some Common Cybersecurity Tips

Here are some simple cybersecurity tips to help you avoid getting scammed online:

  • Never install APK files (for Android) from unknown or untrustworthy sources.
  • Never sideload IPA files (for Apple iOS) from unknown or untrustworthy sources.
  • Always check the entire filename, including its file extension:
    – PDF documents should end with .pdf, and not .pdf.apk or .pdf.ipa or .pdf.exe.
    – Word documents should end with .doc or .docx, and not .doc.apk or .doc.ipa or .doc.exe.
  • Never click on any link to go to any bank website. Always type in the link yourself into a web browser, or better still – use the official app issued by the bank.
  • Never give your bank login details to any person, even if they claim to be a police officer, a bank officer, or even a cybersecurity expert!
  • Never give your 2FA authentication code / TAC or OTP number to any person, even if they claim to be a police officer, a bank officer, or even a cybersecurity expert!

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

WhatsApp Block Button Scam : What You Need To Know!

Will clicking on the WhatsApp block button install a malicious app that will hack your phone?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : WhatsApp Block Button Is A Scam!

People are sharing this advice on a new WhatsApp scam involving the Block button in messages. Take a look!

New Type of Scam in Whatsapp.

Don’t press the “Block” button within the message because when you press on it then, you are effectively downloading this Malicious App. Instead go to WhatsApp setting (3 dots on the right hand top) and block the message.

Do the same if you received this kind of message in your SMS. Someone already got scammed by this fake template.

Whatsapp 中的新型诈骗。
不要按消息中的“阻止”按钮,因为当您按下该按钮时,您实际上是在下载此恶意应用程序,而是转到 WhatsApp 设置(右上角的 3 个点)并阻止该消息。
如果您在短信中收到此类消息,请执行相同的操作。

New Type of Scam in Whatsapp. Don’t press the “Block” button within the message because when you press on it then, you are effectively downloading this Malicious App. Instead go to WhatsApp setting (3 dots on the right hand top) and block the message. Do the same if you received this kind of message in your SMS. Someone already got scammed by this fake template.

Recommended : Can Mexico Did It Photo Infect Your Phone With Virus?!

 

Truth : WhatsApp Block Button Is New Feature!

This is yet another example of FAKE NEWS circulating on WhatsApp and social media platforms, and here are reasons why…

Fact #1 : No Evidence Of WhatsApp Block Button Scam

First, let me just point out that there is no evidence that anyone was scammed by the WhatsApp block button in messages.

Even if an enterprising hacker / scammer was able to create a message with a fake block button that downloads an APK (Android Package Kit) file, it won’t automatically install that file. You will need to manually install the APK file from the Downloads folder.

Those who know how to do that would be tech-savvy enough to avoid installing APK files from unknown sources. Those who don’t know how to do that would not be able to install the downloaded APK file.

Fact #2 : WhatsApp Block Button Is Part Of New Safety Tools

The truth is – the Block button that you may see in new messages from strangers is not a scam. It also does not download or install any APK file.

The Block button is actually part of the new Safety Tools feature that WhatsApp started introducing in July 2023.

The Safety Tools feature will only appear when you receive a message from an unknown number. You will be given some details about the safety of this new contact – whether you are in common groups, and in some cases – the country of origin.

You are given the option of either blocking this new contact, or adding it to your Contact list. You can also click on the Safety tools link for more details.

Recommended : Can Israel Seismic Wave Card Hack Your Phone?!

Fact #3 : Older Blocking Method Still Exists

The new WhatsApp Safety Tools offer an easy way to quickly block and remove obvious spammers and scammers. However, it may not be readily apparent whether the new contact is genuine, or just a spammer / scammer.

If you start messaging with this new contact – to find out if their identity / purpose, the Safety Tools option will disappear. But don’t worry – you can still block this new contact if you realise that he/she is a spammer / scammer.

  1. Go to the messaging screen for the person you want to block.
  2. Tap on the kebab menu / vertical ellipsis (⋮) icon on the upper right corner.
  3. Select More > Block.
    You can also select More > Report (to report block the scammer)

Alternatively, you can block multiple contacts using this method:

  1. Open WhatsApp, and go to the Chats screen.
  2. Tap on the kebab menu / vertical ellipsis (⋮) icon on the upper right corner.
  3. Select Settings.
  4. Tap on the Privacy option.
  5. Scroll down and tap on Blocked contacts.
  6. Tap on the Add Contacts () icon at the upper right corner.
  7. Search for the contacts you want to remove, and select them.

Now, blocking people does not remove your contact details or profile photo from their phones and devices.

However, they will no longer be able to call you, or send you messages. They will also not be able to see changes to your status updates including when you’re online / last seen, or changes you make to your profile photo.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Can StopNCII Remove All Nude / Deep Fake Photos?!

Can the StopNCII website remove all of your nude or deep fake or Photoshopped photos from the Internet?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : StopNCII Can Remove All Nude / Deep Fake Photos!

People are sharing this advice on WhatsApp and social media platforms like X (formerly Twitter) and Facebook, claiming that the StopNCI website can remove all of your nude or deep fake or Photoshopped photos from the Internet!

Attention girls! If someone edits your photo with Al or Photoshop to create a nude photo, then you go to stopncii.org and submit the original photo and the edited photo.

They’ll remove the edited photo from all the places on the Internet and your identity will be confidential. Please immediately inform the cyber cell and file a case to take immediate action.

Recommended : Can Mexico Did It Photo Infect Your Phone With Virus?!

 

Truth : StopNCII Cannot Remove All Nude / Deep Fake Photos!

This is yet another example of FAKE NEWS circulating on WhatsApp and social media platforms, and here are reasons why…

Fact #1 : StopNCII Does Not Remove Photos / Videos

First, let me just point out that the StopNCII website is a project by the Revenge Porn Helpline, which is itself a part of the UK-based charity, SWGfL.

StopNCII is not a government organisation, or even a multinational / international organisation that controls what gets posted on the Internet. It does not have any power or authority or even capability to remove a single photo or video.

To be clear – StopNCII cannot remove all of your photos or videos from the Internet. No organisation can.

Fact #2 : You Don’t Upload Photos / Videos To StopNCII

The advice to upload your nude or edited photos or videos to the StopNCII website is nonsensical. So is the claim that you must also upload your original photos or videos.

StopNCII does not require you to upload your nude / edited photo or video, or your original photo or video.

In fact, StopNCII does not even require you to upload a single photo or video. It merely scans the photos or videos that you are concerned about.

Those photos or videos do not leave your devices (computers, tablets, and smartphones).

Fact #3 : StopNCII Only Generates Digital Hashes

StopNCII only scans the photos or videos that you select on your device, and generate their digital fingerprints (hashes). It does not download or keep your nude photos or videos.

Select the image(s)/video(s) on your device that you would like to protect. Remember, your image(s)/video(s) do not leave your device, they will only be scanned so a unique “hash,” or digital fingerprint, can be generated.

Recommended : Can Israel Seismic Wave Card Hack Your Phone?!

Fact #4 : Photos / Videos Are Only Removed On Certain Platforms

StopNCII itself does not remove any photos or videos, whether they are nude or edited. Instead, they rely on a limited number of partner platforms to do that:

  • Facebook
  • TikTok
  • Reddit
  • Instagram
  • Bumble
  • OnlyFans
  • Threads
  • Pornhub

Only these platforms will receive cases and the digital hashes (fingerprints) from StopNCII.

Fact #5 : Not All Photos / Videos Will Be Removed

Even on those supported platforms, it’s not a guarantee that those photos / videos submitted to StopNCII will be removed.

Those platforms will scan their systems for those digital hashes, and remove them if they are found to have violated their intimate image abuse policy.

This is to avoid the StopNCII system from being abused to remove photos or videos that are not sexual, abusive, personal, or illegal in any way.

Once generated the ‘hash’ will be shared with the participating companies.

Participating companies will look for matches to the hash and remove any matches within their system(s) if it violates their intimate image abuse policy.

The Revenge Porn Helpline reported a 90% removal rate on those platforms since 2015. While that is impressive, that tells us that some 10% of all reported photos or videos were determined not to have contravened the policies of those partner platforms.

Recommended : Can SIM swap attack empty bank account without warning?!

Fact #6 : No One Can Remove All Photos / Videos From Internet

Even if StopNCII is able to partner with every single social media platform, large and small; or Internet service providers, it simply cannot help you remove all of your nude photos or videos from the Internet.

That’s because once released on the Internet, those photos or videos (whether nude or edited) can be transmitted through many means – messaging apps like WhatsApp or Telegram, or email and file-sharing services.

They can also be posted or stored on independent websites / servers on the Internet or the dark web, that no one can shut down. There are revenge porn websites and groups dedicated to this, and it is simply impossible to remove edited / nude photos and videos from those websites and groups.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Nurse Lost RM380K After Pressing Instagram ‘Like’ Button?!

Did a Malaysian nurse lose RM380,000 after pressing the Instagram Like button?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Nurse Lost RM380K After Pressing Instagram Like Button!

People are sharing an article which claims that a Malaysian nurse lost RM380,000 after pressing the Like button in Instagram for RM5 commissions! Here is an excerpt from the article:

M’sian Nurse Loses RM380K After Pressing Instagram ‘Like’ Button For RM5 Commission

Too late to unlike

Recommended : Scam Alert : How Fake Job Syndicates Operate!

 

Nurse Did Not Lose RM380K After Pressing Instagram Like Button!

First of all, I would like to applaud the website for writing about job scams, but that’s really a misleading title.

Unfortunately, many people don’t read beyond the headlines. People are even asking if they will get “hacked” like the nurse if they like Instagram posts!

The truth is – the Malaysian nurse did not lose RM380,000 because she pressed on the Like button in Instagram. In fact, Instagram and its Like button have nothing to do with the actual scam!

Social Media Jobs Are An Easy Lure

As I have earlier written on how fake job syndicates operate, the “job” and “platform” are not important. These scammers generally offer social media jobs, because that’s what most people already use, so it’s easy to hook victims.

These syndicates will offer quick and easy tasks to do on social media, for example – liking Instagram photos and Facebook posts. Other (non-social media) tasks include liking YouTube videos and/or subscribing to YouTube channels, or even making comments on businesses in Google Maps.

Whether the job is on Instagram / Facebook / YouTube / Google Maps, etc. is irrelevant. The first few “jobs” you are given are the bait. You will be paid for those simple tasks, like RM5 for liking an Instagram post, or RM10 for subscribing to a YouTube channel. Such an easy way to make money!

Paying For Jobs Is The Scam!

After you get the first payment, you will be asked to participate in a “prepaid job”. All you have to do is pay a “deposit” for the opportunity to make a lot of money in high-paying “jobs”.

At this point, you may feel that this is a genuine side job opportunity. After all, they paid you for the earlier jobs, didn’t they? Real scammers wouldn’t pay their victims, right? WRONG!

Once you make that first deposit, you are “hooked”. The scammers will not let you withdraw the money, but insist that you must continue with the next “prepaid job”, which would require another deposit. Then, you will be asked to pay again to participate in another “prepaid task”, and so on.

On paper, you appear to be earning a lot of money, but you won’t be able to withdraw any of that money. By the time you realise it’s a scam, you would have lost a LOT of money. That is the scam, not pressing on the Instagram Like button.

Recommended : How A University Student Lost RM22K In Online Job Scam!

Trying To Recover The Money Is The Scam!

In the nurse’s case, she fell for their trap to participate in the “prepaid assignment”. She ended up making 36 transactions worth RM387,000 to 21 different bank accounts over 13 days! She not only emptied her savings, she even loaned money from her friends and family members!

Why would any victim do that? Simple – the more money you invest in this fake job offer, the more desperate you will be to recover the money you “invested” and “earned”. To quit would mean losing everything, so you will feel that you have “no choice” but to continue.

To help you make that decision to “stick with the programme”, the syndicate have fake users in their Telegram group continuously posting bank deposit screenshots, while claiming that they just received their earnings.

The truth is – any money you send to their mule accounts will be quickly transferred to the scammers’ account. You will never see the money again.

As one student shared, he lost over RM22,000 in just two days, because he was so engrossed in trying to get back the money he “invested” earlier:

There’s one trick that this scammer is using. He let me start with a small investment, then proceed with stages.

They force me to continue because I want to rescue the money that I put in in the previous task. So it keeps getting bigger and bigger.

Just like that, two days, RM22300, gone.

Recommended : Must You Disable Facebook Auto-Fill To Block Scams?!

Again, I’m glad to see more publicity about fake job scams. But it is important that YOU understand that the scam does not involve the pressing of the Like button in Instagram, or Facebook, or YouTube, or any other online platform.

This is ultimately just another case of a fake job scam. In this nurse’s case, the scammers used the simple job of liking Instagram posts as the lure, but it will be different for other victims. These scammers will use any convenient platform to give you simple jobs to trick you into falling for their scam.

Just remember – there is no such thing as easy social media jobs. Even unscrupulous social media promoters do not need to pay anyone to like a post, or follow someone. They simply use bots (automated software)!

Don’t fall for such fake job scams. No matter how enticing the offer is – NEVER pay for any job.

Please SHARE this article out, and WARN your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Fact Check : New WhatsApp Cyber Crime Rules?!

Did WhatsApp just implement new cyber crime rules to help the government monitor and record your calls and messages?! Find out what the facts really are!

Updated @ 2023-10-08 : Updated after message went viral again.
Originally posted @ 2023-07-03

 

Claim : WhatsApp Has New Cyber Crime Rules!

People are sharing this warning about WhatsApp implementing new cyber crime rules, to help the government monitor and record all calls and messages!

Tʜᴇ ɴᴇᴡ ᴄᴏᴍᴍᴜɴɪᴄᴀᴛɪᴏɴ ʀᴜʟᴇs ғᴏʀ WʜᴀᴛsAᴘᴘ ᴀɴᴅ WʜᴀᴛsAᴘᴘ Cᴀʟʟs (Vᴏɪᴄᴇ ᴀɴᴅ Vɪᴅᴇᴏ Cᴀʟʟs) ᴡɪʟʟ ʙᴇ ɪᴍᴘʟᴇᴍᴇɴᴛᴇᴅ ғʀᴏᴍ ᴛᴏᴍᴏʀʀᴏᴡ: –

Recommended : How To Block Facebook Ads + Pay Scammers!

 

Truth : WhatsApp Does Not Have New Cyber Crime Rules!

And here is why this is nothing more than yet another Internet hoax :

Fact #1 : Only China Can Do This

The only country that has accomplished most of what was shared above is China, but it took them decades to erect the Great Firewall of China.

It’s not just the massive infrastructure that needs to be created, it also requires legislation to be enacted, and considerable manpower and resources to maintain such a system.

That’s why China is leaning heavily on AI and cloud computing capabilities to automatically and quickly censor information it deems “sensitive”.

However, no other country has come close to spending the money and resources on a similar scale, although Russia, Cuba, Vietnam, Zimbabwe and Belarus have imported some surveillance technology from China.

Fact #2 : WhatsApp, Instagram + Facebook Messenger Have End-to-End Encryption

All three Facebook-owned apps now run on the same common platform, which provides end-to-end encryption.

End-to-end encryption protects messages as they travel through the Internet, and specifically prevents anyone (bad guys or your friendly government censor) from snooping into your conversations.

That is also why all three apps are banned in China…

Recommended : Can SIM swap attack empty bank account without warning?!

Fact #3 : Governments Generally Have No Control Over Those Apps

Outside of authoritarian countries like China and Russia, governments generally have little to no control over social media and instant messaging apps. Even then, their control is generally limited to banning access if they don’t get their way.

The ability to keep conversations and messages safe and private is key to the success of instant messaging apps, in particular. So WhatsApp, Telegram and Signal would never allow governments access to user messages or voice calls, never mind record and monitor them for governments!

In fact, by implementing end-to-end encryption, these companies themselves do not have access to your messages and calls.

Fact #4 : WhatsApp Does Not Have Three Check Marks!

WhatsApp messages only have two ticks / check marks to notify users about the status of their messages:

: The message was successfully sent.
: The message was successfully delivered to the recipient’s phone or any of their linked devices.
: The recipient has read your message.

There is no third check mark, as claimed by the viral message.

Fact #5 : Governments Won’t Tip You About Investigations

It is illogical for WhatsApp to inform you when the government is checking your information, or when it has started proceedings against you.

In fact, it doesn’t make sense for any government to inform you by instant messaging check marks! If the government is charging you with a crime, it will send police officers, not check marks on WhatsApp!

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > InternetFact Check | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Are Street Children Being Used To Lure Victims?!

Are street children being used to lure rape / murder / organ harvesting victims?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Street Children Are Being Used To Lure Victims!

This message has gone viral on WhatsApp and social media, sometimes shared as text, sometimes as screenshots:

URGENT NOTICE
Ministry of Home Affairs.
From all police stations to all citizens

There are children in the streets now carrying papers with their home address written on it and claiming that they are lost. If you see these children, do not take them to the written address because people are waiting for you there to kill you, steal your organs, or rape you, so we ask you to take them to the nearest police station or the nearest emergency patrol and immediately report them.

Please distribute this. This is true, and we confirm that they hand them over to the nearest police station or the nearest patrol that you find. Don’t try to be a hero or a good Samaritan. Send it to all your contacts.
-Rescue Forces.

Recommended : Switching From Maxis To Digi Saves Me RM1.9K / Year!

 

Truth : Street Children Are Not Being Used To Lure Victims!

This is yet another example of FAKE NEWS circulating on WhatsApp and social media, and here are the reasons why…

Fact #1 : Viral Message Has Been Circulating Since 2022

This viral message isn’t new. It has been circulating at least since April 2022, if not earlier. It just keeps going viral on and off on WhatsApp and social media.

The first messages appear to start spreading in Nigeria and Uganda, before going viral in Southeast Asia.

Fact #2 : No Evidence For Street Children Being Used As Bait

There is no evidence that street children are being used to lure victims for criminal gangs looking to kill or rape you, or steal your organs. There is no known case of criminal gangs using street children as bait either.

In fact, it is a rather ridiculous idea. There are easier ways for criminals to target you, than to use street children to lure you in.

Fact #3 : PDRM Calls It Fake News

When the message went viral in Malaysia for the first time in September 2022, the Royal Malaysia Police (PDRM) issued a statement, calling it fake news. Here is the English translation:

The Royal Malaysia Police (PDRM) has detected one (1) message spreading on social media that is alleged to be a ‘warning notice from the Ministry of Home Affairs and police stations nationwide’. The message alleges there are people using street urchins who carry papers with their home address as a tactic to get help to be sent home. Any individual who helps bring such children to the alleged address will be killed, organs stolen and raped.

PDRM confirmed that the viral message is fake and was never issued by the Ministry of Home Affairs (KDN) nor PDRM. An investigation also confirmed that no police reports had been received in relation to criminal incidents as shared.

Recommended : MPH Free Books : Don’t Fall For This Scam!

Fact #4 : Not Logical To Kidnap People For Organs

Human organs are not Legos. You can take Legos from one set and use them in another set, but you can’t take organs from someone and just plunk them into another person.

Harvested or donated organs need to be matched to their recipients, or they will be rejected by the body and fail.

Every donor and recipient needs to undergo three tests to ensure compatibility – blood type, blood cross-matching, and HLA typing. If this is not done, organ rejection is almost a certainty.

This is why it is very unlikely for the criminals to just kidnap anyone just to harvest their organs. They will want to match the donors to the recipients BEFORE they kidnap them.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | InternetTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did Putin Threaten To Release 9/11 Satellite Evidence?!

Did Russian President Vladimir Putin threaten to release secret satellite evidence of US government’s involvement in the 9/11 attacks?!

Take a look at the viral claim, and find out what the facts really are!

Updated @ 2023-09-21 : Added new information on the Pravda article, and the Russian satellite.
Originally posted @ 2022-03-11

 

Claim : Putin Threatened To Release 9/11 Satellite Evidence!

People are sharing a long message which claims that Russian President Vladimir Putin threatened to release secret satellite evidence of US government involvement in the 9/11 attacks!

They appear to believe that Putin issued this threat in retaliation for US sanctions against Russia, and military assistance to Ukraine. It’s a long post, so please skip to the next section for the facts…

Putin is going to hit once, but he’s going to hit hard. Russia is preparing the release of evidence of the involvement of the US government and intelligence services in the September 11 attacks. The list of evidence includes satellite images.

Recommended : Did US Send Nuclear AEGIS Missiles To Ukraine?!

 

Truth : Putin Did Not Threaten To Release 9/11 Satellite Evidence!

This is yet another example of pro-Russia FAKE NEWS that are spamming social media, as well as WhatsApp and Telegram groups. Here are the reasons why…

Fact #1 : Pravda Article Was Posted In February 2015

The Pravda article (translated archive | original Russian) was actually posted on 7 February 2015, and updated on 10 February 2015. This was specifically mentioned in the 2015 examples :

VT Editor’s note:  Russian satellite evidence proving the controlled demolition of the World Trade Center using “special weapons” was reviewed by a VT editor while in Moscow.

The article below was forwarded to us for publication in the US and translated from Russian. It is 3 days old, published on February 7, 2015.

The fake news creators removed that section, to mislead you into thinking that this was a new threat by Putin in 2022 and 2023.

Fact #2 : No Evidence Putin Threatened To Release 9/11 Satellite Photos

Even though the viral post is based on a Pravda article, there never was any evidence that Vladimir Putin himself actually threatened to release satellite photos, or evidence of any 9/11 conspiracy.

The Pravda article itself did not make that claim. It only claimed that Russia is “preparing” to release evidence of the involvement of the US government and intelligence services in the 9/11 attacks.

Fact #3 : Russia Did Not Release Any Evidence Of 9/11 Conspiracy

If the Pravda article is true, then Russia is taking an extraordinarily long time to release evidence of a 9/11 conspiracy by the US government and intelligence services.

Despite preparing for over 8.5 years – since February 2015 – the Russian government has never released any evidence of any conspiracy by the US government in the September 11 attacks.

No satellite imagery… no photos… no documents… no evidence in any form or manner. Why not? Does it take that long to develop and digitise the photos from Russian satellites?

Recommended : Did NATO Promise Russia Never To Expand East?!

Fact #3 : Russian Satellites Were Terrible In 2001

It would also be quite a feat for Russia to provide “conclusive satellite imagery” as the Pravda article alleges, as Russian electro-optical satellites were not quite “state-of-the-art” in 2001, and that’s being generous.

At that time, they used the Yantar-4K2 (Cobalt / Kobalt) satellite – a slightly improved version of the Yantar-4KS1M (Neman / Неман) satellite, which had a resolution of just under a meter using the Zhemchug-18 camera.

These satellites have a limited lifespan of just 26 to 32 weeks, and used film which could be returned using two small canisters mid-mission, and a larger reentry module at the end.

Russia only had one in operation at that time – (Космос 2377) Cosmos 2377, which was launched on 29 May 2001, and dropped out of orbit on 10 October 2001.

Cosmos 2377 could plausibly have taken photos of the September 11 attacks on the World Trade Center in New York City, but the images was likely only as good as the Maxar IKONOS commercial imaging satellite.

Note that the Kobalt satellite is different from the Kobalt-M (Yantar-4K2M) satellite, which features upgraded optics with reported image resolution of 30 cm (0.3m), and a modernised platform. The first Kobalt-M satellite was launched on 24 September 2004.

Fact #4 : There Are Many Satellite Images Of 9/11 Attack

There is no real need for the Russians to share their satellite photos, because there are many publicly-available satellite photos on the September 11 attacks.

The private satellite imaging company, Maxar, for example, shared this high-resolution photo of ground zero at the World Trade Center on 15 September, 2001.

Taken by IKONOS, which had a resolution of 0.82 to 1 metre, it gives you a good idea of the image quality and resolution that are already available for free to the public. So it begs the question – do the Russians really have better images than that?

Recommended : Did Russia Capture US General Roger Cloutier In Azovstal?!

Fact #5 : Satellites Have Limitations

Despite being extremely useful, imaging satellites not magical instruments. They have limitations in what they can and cannot do.

For example, they have to generally stay in a pre-determined orbit, and “fly through” an area – leaving large gaps during which there is no coverage.

They also cannot look inside or under solid objects – planes, buildings, trees; and their view can be obscured by smoke and clouds, unless they have multi-spectral ability.

You can see how the smoke obscures the picture in this Maxar image taken of the Manhattan financial district on September 11, 2001.

It is therefore highly improbable that any satellite image from way up high would have captured “incriminating evidence” of the US government’s involvement in the September 11 attacks.

Recommended : Are Nazis From Japan Fighting For Ukraine?!

Fact #6 : 9/11 Attack Was Committed By Al Qaeda

In the past 22 years, the many conspiracy theories have all been repeatedly looked into and debunked.

We now know, with absolute certainty, that the September 11 attacks were conceived by Khalid Sheikh Mohammed, approved by Osama bin Laden, and carried out by nineteen Al Qaeda terrorists.

There was no US government involvement in the terrorist attacks on September 11, 2001.

Osama bin Laden himself claimed responsibility for the 9/11 attacks on several occasions. You don’t need a satellite to know that.

Now that you know the truth, please help us FIGHT FAKE NEWS by sharing this fact check out!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | MilitaryTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Marshall Minor III Wireless Earphones Scam Alert!

Please watch out for the Marshall Minor III wireless earphones scam! Take a look at the scam, and find out what the facts really are!

 

Marshall Minor III Wireless Earphones Scam Alert!

Scammers are running Facebook ads that promote an awesome discount for the Marshall Minor III wireless earphones! Here is one recent example:

😣”Frustrating” 😣I had to queue for 5 hours at IOI City Mall to buy MARSHALL MINOR III wireless headphones for only RM179 (original price RM596), I was surprised because I thought they only sold directly I heard it’s open for sale online in 2 more days https://www.marshall-ash.asia/ms And also get the same discount as buying at the store. Free shipping nationwide.

But the 4 hours of queuing was worth it. As a Marshall fan, I was very excited when I heard the news that the Minor III series was coming out. And don’t waste your time waiting, the design is very beautiful, more stylish than the old version 💯 Great sound quality. Clear bus, fast Bluetooth connection, suitable for all types of devices, super battery life, 5 hours of continuous use and 25 hours with charging box, waterproof. The best thing about these headphones is the close-to-ear design. Comfortable, can play sports without worrying about falling. If you don’t buy it, you will be very disappointed.

I let my colleagues borrow it to play games because it sounded so realistic. There is no delay in movement.
Many people ask me if the store still has promotions? I just saw information that the store has a discount in the next 2 days. Order quickly. At the end of the promotion, the price will return to the original price of RM596. I leave the purchase link here for those who want to buy: https://www.marshall-ash.asia/ms

Recommended : Bantuan Rakyat Malaysia Scam Alert!

 

Marshall Minor III Offer : Why Is It A Scam?!

This is yet another example of SCAMS circulating on Facebook, and here are there reasons why…

Fact #1 : Marshall Minor III Price Absurdly Low

The first thing about scams involving electronics, is that they often promise ridiculous great deals. If it’s too good to be true, it often is just a scam.

In this particular scam, scammers are offering the Marshall Minor III wireless earphones for just RM179 (US$39). That’s absurd, as the Marshall Minor II wireless earphones has an official retail price of $159 (approximately RM699)!

Marshall is a high-end audiophile brand, and its electronics are never cheap. Even if they offer a discount, it wouldn’t be anything like 70% to 75%. That’s just ridiculous.

For your safety, here are legit purchase options online for the Marshall Minor III earbuds :

Fact #2 : Facebook Advertisement Is Fake

The Facebook advertisement appears to be created by a handsome influencer called 𝐀𝐥𝐯𝐢𝐧𝐧 𝐂𝐡𝐨𝐧𝐠 瑾.鍾.瑾. with 5.5 million followers.

But that’s what the scammers put in the intro. If you look carefully, this scam page only has 13 followers!

Recommended : Warning – PDRM Parking Fine Scam Alert!

Fact #3 : That Is “Push” Puttichai Kasetsin

The page is not owned by any influencer or digital creator called 𝐀𝐥𝐯𝐢𝐧𝐧 𝐂𝐡𝐨𝐧𝐠 瑾.鍾.瑾.

Those are actually photos of Puttichai Kasetsin – a Thai actor, model, DJ and TV host who is also known as “Push”.

Recommended : Media Prima / Nielsen Fake Job Scam Alert!

Fact #4 : IOI City Mall Does Not Have A Marshall Outlet

The claim by these scammers that Alvinn Chong queued up for 5 hours at the IOI City Mall to buy the Marshall Minor III wireless earphones is easily debunked.

If you check the IOI City Mall tenant listing, you will quickly discover that it does not have a Marshall outlet.

Fact #5 : Queue Photos Are From Vietnam

The two photos which claim to show long queues for the Marshall Minor III wireless earphones were not taken in Malaysia. They were actually taken in Vietnam.

This photo does not show people in IOI City Mall queueing up outside a Marshall outlet. It actually shows people queuing up for the opening of the 15th Pandora store at the Long Bien Aeon Mall, on 28 April 2022.

Incidentally, Pandora is a Danish jewellery brand, and does not sell Marshall audio products…

Recommended : PDRM Warning : Watch Out For MyBayar Scam!

The second queue photo is also from Vietnam, but taken many years ago on 11 November 2017. It does not show people queuing up to buy any Marshall products either.

They were actually queuing up at Royal City Shopping Center in Hanoi, for the opening ceremony of the second H&M store in Vietnam.

Recommended : Bantuan Tunai Rakyat Malaysia 2023 Scam Alert!

Fact #6 : Scam Website Not Affiliated With ASH Asia

ASH Asia is an authorised distributor of Marshall products in Malaysia, Thailand and Vietnam.

However, the scam page (https://www.marshall-ash.asia/ms) has nothing to do with ASH Asia, whose official Marshall Minor III page is https://ash-asia.com/ms.

On top of that, ASH Asia does not sell the Marshall Minor III directly (like the scam page). Instead, ASH Asia sells the wireless earphones through Shopee and Lazada.

Recommended : How A University Student Lost RM22K In Online Job Scam!

In fact, if you check the main domain itself, you will get an error message, stating:

Your domain name has been successfully pointed! Please publish a Landing Page with the above domain name to use the service. Thank you!

This not only gives it away as a scam website, it also suggests that the scammers are operating out of Vietnam.

Fact #7 : Scam Website Admits Selling Fake Marshall Minor III

Ironically, the scam website itself has a disclaimer, warning potential buyers that it is not selling genuine Marshall Minor III wireless earphones, but a replica instead…

Most people won’t notice it because if you click to order, the website is designed to skip past this warning.

Recommended : Scam Alert : How Fake Job Syndicates Operate!

Fact #8 : Package Apparently Contained “Trash”?

To assure you that this is safe, the scammers say that you only need to pay on delivery. Sounds good, doesn’t it? That guarantees that you will at least receive the item, doesn’t it?

Not quite, as one person who claimed to have purchased from this scam website explained…

I was attracted and clicked in, filling in my address and phone number. Three days later, I got a call saying that my package would arrive through DHL-COD, and asked me to make sure I was home.

I started looking forward to it, but when I thought about it, I became more suspicious. Since when does DHL provide Cash On Delivery service? I can’t believe they would dare to pay for first-class service without any payment from me. I figured it might be a scam!

What’s the scam? You may not have any doubts when you receive the package. When I open it immediately and take a look, then I realized it was full of garbage. [Unfortunately] I had already paid the delivery person, who ran away.

我被吸引点了进去,填了地址电话。跟着三天后有电话来说我的包裹会到,DHL-COD的,确定我在家等。我开始很期待。跟着想,越想越不对。DHL有COD的服务咩?我还没过账他们就这么敢与服务一流到我不敢相信。我猜可能是诈骗!骗什么?当你收到包裹时是不会怀疑,立刻打开来看的。然后才发现里面是垃圾。人跑了钱给了。。。

If true, the scam involves giving you an empty package filled with trash to receive your cash payment. After which, you have no recourse.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | MobileTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Can Morocco Earthquake Seismic Wave Card Hack Your Phone?!

Can the Seismic Wave Card containing photos of the recent earthquake at Morocco hack your phone?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Morocco Earthquake Seismic Wave Card Can Hack Your Phone!

This warning about the Seismic Wave Card containing photos of the recent earthquake at Morocco has gone viral on WhatsApp:

They are going to upload some photos of the Moroccan earthquake on WhatsApp. The file is called Seismic Waves CARD, don’t open it and see it, it will hack your phone in 10 seconds and it cannot be stopped in any way. Share the information with your family and friends.
DO NOT OPEN IT. They also said it on TV

他们将在WhatsApp上上传一些摩洛哥地震的照片。该文件称为地震波CARD,不要打开或看到它,它会在10秒内破解您的手机,并且无法以任何方式停止。与您的家人和朋友分享信息。
不要打开它。他们还在电视上说过

Recommended : Did Fukushima Just Release Black Radioactive Water?!

 

Truth : There Is No Morocco Earthquake Seismic Wave Card!

This is yet another example of FAKE NEWS circulating on WhatsApp, and here are reasons why…

Fact #1 : There Is No Seismic Wave Card!

First, let me just point out that there is no such thing as a Seismic Wave Card.

The Seismic Wave Card is an Internet hoax that keeps getting recycled for every earthquake that comes along, like these examples show:

They are going to upload some photos of the Cariaco earthquake on Whatsapp. The file is called Waves Seismic CARD, do not open or see it, it will hack your phone in 10 seconds and it cannot be stopped in any way. Pass the information on to your family and friends. DO NOT OPEN IT. They also said it on TV.

They are going to upload some photos of the Calvario earthquake on WhatsApp. The file is called CARD Seismic Waves. Do not open them or see them, they hack your phone in 10 seconds and it cannot be stopped in any way. Pass the information on to your family and friends. Don’t open it. They also said it on TV.

Fact #2 : Photos Are Shared Directly On WhatsApp

There is no need to open any file, or install any app, to view photos on WhatsApp. You simply click to view photos shared by other people on WhatsApp.

Of course, people may sometimes share high-resolution photos in ZIP or RAR files, because WhatsApp greatly reduces the resolution of photos shared on its platform.

Those ZIP or RAR files may be opened using apps like WinZip (Android | iOS) or RAR (Android) or Unarchiver (iOS). However, you should be wary if you are asked to download and install any app.

Unless you know what you are doing, it’s best to only view photos and videos directly inside WhatsApp, and not download any compressed files at all.

Recommended : Can Greeting Photos + Videos Hack Your Phone?!

Fact #3 : Seismic Waves Card Is Not A Browser Hijacker

Seismic Waves Card appears to be falsely labelled as a browser hijacker by at least one “cybersecurity” website:

The scam message known as Seismic Waves Card is notorious for its disruptive behavior while surfing the web. Generally, scams like this, and other like Mintnav and Lookaside fbsbx, are crafted to meddle with your browser’s settings, replacing homepages and default search engines to promote affiliated sites and generate advertising revenue.

This transgression doesn’t end here; they siphon sensitive data and create vulnerabilities in your system’s security framework, providing a gateway for more perilous threats, such as malware and phishing schemes, to invade.

The protracted presence of Seismic Waves Card in your system exponentially escalates the risk of serious compromises, emphasizing the dire necessity for its immediate removal. Recognizing the malicious potential of such unwanted apps is essential in maintaining a secure and safe digital environment. Stay vigilant and prioritize your cybersecurity.

There is no evidence that a malware or browser hijacker called Seismic Waves Card exists. The article itself does not offer any evidence to prove its existence. In fact, the article and its guide on how to “remove” the malware appears to be generic, and may possibly be AI-generated.

Fact #4 : Image-Based Malware Is Possible, But…

Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.

It is also possible to embed malicious code within a photo, but it won’t be a full-fledged malware that can execute by itself.

At most, it can be used to hide the malware payload from antivirus scanners, which is pretty clever to be honest… but it cannot hack your smartphone by itself.

Recommended : Can Restaurant Menu QR Code Hack Your Phone?!

Fact #5 : Image-Based Malware Requires User Action

In January 2019, cybercriminals created an online advertisement with a script that appears innocuous and would pass any malware check.

However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website. Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.

This is an incredibly clever way to bypass malware checks, but even so, this image-based malware requires user action.

You cannot get infected by the Trojan if you practice good “Internet hygiene” by not downloading or installing anything from unknown websites.

Fact #6 : Malicious Code Executes Immediately

If you accidentally download and trigger malware, it will execute immediately. It won’t take 10 seconds, as the hoax message claims.

There is really no reason for malware to wait before it infects your devices. Waiting will only increase the risk of detection.

Whether the malware serves to take over your device, steal your information or encrypt it for ransom, it pays to do it at the first opportunity.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Bantuan Rakyat Malaysia Scam Alert!

Watch out for the Bantuan Rakyat Malaysia scam on WhatsApp, Telegram, Facebook and Twitter!

Find out how this scam works, and WARN your family and friends!

 

Bantuan Rakyat Malaysia 2023 Scam Alert!

These scam messages about Bantuan Tunai Rakyat (BTR) 2023, or Bantuan Percuma Kerajaan Malaysia 2023, is going viral on WhatsApp, Telegram, and social media platforms like Facebook and Twitter.

CARA SEMAKAN TARIKH BAGI PENERIMA BANTUAN RM600 DIKREDITKAN SETIAP BULAN

Untuk mereka yang layak, anda boleh lakukan semakan dengan mengikuti cara yang diterangkan.

Baca Cara Semakan Bantuan 👇
https://bntuanrakyatmalaysia.lynk.eu.org/

SHARE INFO ini kepada rakan-rakan dan saudara mara untuk manfaat semua

HOW TO CHECK THE DATE FOR RECIPIENTS OF ASSISTANCE RM600 CREDIT EVERY MONTH

For those who are eligible, you can check by following the described method.

Read How to Check Help 👇
https://bntuanrakyatmalaysia.lynk.eu.org/

SHARE this INFO to friends and relatives for the benefit of all

As one lady shared in the video below, she got tricked by the scammers, who took over her Telegram account to send the same scam message to all of her contacts!

While she claimed that she did not click any link, I will show you how she got scammed…

Recommended : Beware Of Telegram Screenshot Hack + Scam!

 

Bantuan Rakyat Malaysia Scam : How Does It Work?

Warning : To show you how the scammers work, I will share the links they use. I will highlight those dangerous links in red. Do NOT go to those links.

Super Long Link

To trick people into clicking on the scam links, the scammers intentionally use a misleading and very long URL, so you are less likely to notice the domain.

This is the scam link : https://bntuanrakyatmalaysia.lynk.eu.org/

Note how the scammer used a long list of descriptive keywords – “bantuan“, “rakyat“, “malaysia“, “lynk“, which helps to mislead people, and make it more difficult for them to notice that the domain is “eu.org“.

Obviously, eu.org is not a Malaysian government domain (which ends with .gov.my), and it has nothing to do with Malaysia or financial aid. This domain also has nothing to do with the European Union.

EU.org provides free subdomains, and so scammers use it to not only run their scams, but to give their scams a more “legitimate-looking domain”.

Pro Tip : Always check the domain of a link before you click on it. Avoid super-long links like this because they are often used to mask the domain name.

Recommended : Will Scanning RFID Bar Codes Hack Your Phone?!

Fake Telegram Invitation

After clicking to go to https://bntuanrakyatmalaysia.lynk.eu.org/, you will be taken to what looks like an invitation to join a Telegram group. But in reality, it is a fake Telegram invitation.

A real Telegram invitation will have a link like this – https://t.me/XXXXXXXX. But this scam page has the link – https://bntuanrakyatmalaysia.lynk.eu.org/my.php.

Also, a real Telegram invitation can detect if you are using Windows / Mac or Android / iOS, and suggest that  the right download for your device.

The invitation also has a glaring typo – the link says Massage Now, rather than Message Now. Hilarious!

In any case, a real Telegram invitation will not ask you to Message Now. Rather, it will allow you to either View In Telegram, or Preview channel in the web browser itself.

Recommended : Bantuan Tunai Rakyat Malaysia 2023 Scam Alert!

Fake Telegram Login Page

If you click on Join Group, you will be taken to this Telegram login page. Even though it offers you a list of countries to select from, the only option is Malaysia.

WARNING – THIS IS A SCAM PAGE. This is what is known in cybersecurity as a “phishing attack”.

First of all, Telegram invitations will never ask you to log into your Telegram account. It will simply launch the Telegram app and load the group for you.

Secondly, if you look at the link, it leads to the same scam domain, specifically https://bntuanrakyatmalaysia.lynk.eu.org/my.php.

Do NOT log into your Telegram account in this page.

Recommended : Scam Alert : How Fake Job Syndicates Operate!

If you log into your Telegram account using this phishing page, then the scammers will gain access to your Telegram account, and take it over for their own use.

They can then use your Telegram account to send the same scam message, or worse, cheat your family and friends of their money!

Recommended : Can Restaurant Menu QR Code Hack Your Phone?!

The lady in the viral video likely logged into this phishing page, thus giving the scammers control of her Telegram account. That was likely how they were able to message everyone on her contact list.

She also likely did not enable Two-Step Verification in Telegram, which would let her recover her account even after scammers have gained access.

That is why people who were hit by this scam had to call and inform their relatives and friends, or publicly post about it to warn all of their contacts.

Unfortunately, it is not always possible to warn all of their contacts, and inevitably, someone will get cheated of their hard-earned money. That’s why these scams are so popular – they really work, and scammers are making a ton of money!

Help us fight against these scammers. SHARE this article out, and WARN your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Software | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Warning – PDRM Parking Fine Scam Alert!

Scammers are targeting motorists with the PDRM parking fine scam! Make sure you warn your family and friends!

Here is what you need to know about the PDRM parking fine scam!

 

PDRM Parking Fine Scam Email

People are getting emails warning them that they just committed a parking violation, while offering them a cheap fine if they pay quickly.

Fines Inquiry and Payment

Dear recipient,

We are writing to draw your attention to a recent traffic violation in Malaysian jurisdiction.

Our traffic enforcement staff have observed your vehicle parked in a no-parking zone. This contravenes section (no. 2016-691] of the Road Traffic Act.

The fine is set at MYR 50. Payment of the fine is required within 7 days of the date of notification, to avoid further legal consequences.

If the fine is not paid within the time limit, you may be subject to legal action, resulting in an increase in the original fine.

Payment deadline: [08/26/2023]

Methods of payment accepted:

Cordially,

Malaysian Police Department

Recommended : Bantuan Tunai Rakyat Malaysia 2023 Scam Alert!

 

PDRM Parking Fine Email Is A Scam!

These PDRM parking fine emails are scam emails. This was confirmed by PDRM itself.

On 7 August 2023, the Cyber Crime division of the Royal Malaysia Police (PDRM) posted an alert warning motorists not to fall for the MyBayar scam.

These emails are designed to scare its victims into action. Hence, it offers a very cheap way to quickly “settle the problem”. However, if you take a breath, and analyse the email CAREFULLY, you will see many problems with it.

  • Letter is from PDRM : The Royal Malaysia Police (PDRM) will never write to you by email.
  • Letter is in English : The Royal Malaysia Police (PDRM) will never write to you in English.
  • Typo in the name : The fake email used My Bayar PDRM, instead of MyBayar PDRM.
  • Lack of name and personal details : The fake email refers generically to “Dear recipient“, without listing your full name and MyKad number.
  • Lack of vehicle details : The fake email doesn’t mention the vehicle make and plate number.
  • Lack of location details : The fake email does not mention where the offence occurred, or even when it occurred.
  • Fine is much too low : PDRM traffic fines are never as low as RM50. The cheapest fine is RM150 for Category 4 offences, but you can pay as low as RM70 within 15 days.
  • No such law : The fake email refers to the Road Traffic Act. There is no such act in Malaysia. The proper name is the Road Transport Act 1987 (Act 333).
  • No such section : If you look at the Malaysia Road Transport Act 1987 (PDF download), you will see that there is no such thing as Section 2016-691.

The email appears to be from My Bayar PDRM (typo in the name), but if you inspect the email address, you will see that it was sent by “in-to-no-reply@silverbackgames.xxx” or “hello@sooqr.com” or some other email address.

Obviously, this email did not originate from an official PDRM email address! This should immediately tell you that this is a fake or scam email!

Recommended : How A University Student Lost RM22K In Online Job Scam!

If you click on the Pay My Fine link in the scam email, you will be taken to a fake My Bayar PDRM website (with the same typo in the name).

You may notice that you now have 7 days to pay the RM 50 fine, instead of just 5 days in the email. Odd, isn’t it?

Also odd is the fact that the page does not mention your name, your MyKad number, your vehicle type and model, or even its plate number! The page also doesn’t mention where the offence took place, or the time you were caught committing said offence.

Do NOT proceed after this point… This is a scam website!

But if you have itchy fingers, and click on the Pay The Fine button, you will be asked to pay for the RM50 fine using your debit or credit card.

Needless to say, PLEASE DO NOT SUBMIT YOUR DEBIT / CREDIT CARD DETAILS!!!

If you provide these scammers with your debit / credit card details and TAC / OTP numbers, they will be able to charge ANY AMOUNT they want to your credit card, or withdraw ANY AMOUNT they want from your bank account!

Recommended : Wedding Invitation Scam : Don’t Install APK File!

It’s even worse if you are asked to log into your bank account to pay the fine. DO NOT DO THAT!

If you provide them with your bank login and password, as well as OTP/TAC number, these scammers will be able to transfer money out of your bank account!

Please note – this is a scam! This is a phishing attack to gain access to your credit card and/or bank account.

Regardless of how you get any notification from PDRM about any traffic offence you may have committed, you should always check the status through these official MyBayar PDRM options:

Please SHARE this warning with your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Automotive | Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Media Prima / Nielsen Fake Job Scam Alert!

Please watch out for the Media Prima Digital / Nielsen fake job scam! Don’t forget to warn your family and friends!

 

Media Prima / Nielsen Job Scam : How They Reel You In…

Scammers are targeting people through WhatsApp, offering an easy way to make extra money through a part-time job you can do online.

I am Shirley , a permanent employee at Media Prima Digital Company in the recruitment department. The HR department sent me this number and asked me to contact you to get you to a job opportunity.

I just want to share some work-from-home freelance job information offer .You don’t have to spend a lot of time on the job.I can explain if you are interested

The job appears to be very simple – just use your Instagram account to follow Media Prima Digital’s brand partners, to boost their follower count and exposure.

Our job is to use Instagram to follow our various partner brands and work with Malaysian brand influencers to increase their exposure. We hire freelancers to work with the hope of earning extra income every day.

You don’t have to do any marketing for the brand, you just have to subscribe Brand. The salary will be paid daily using TnG or Bank transfer.

Recommended : How Fake Job Syndicates Operate!

Best of all, the scammers are promising that you can make easy money doing nothing more than help Media Prima Digital boost their brand partners on Instagram…

This job is like freelancing. You can do it from anywhere and anytime if you can use social media. RM 110-550 per day if you can do it energetically without even a little worry. You can earn up to RM 3,300-16,500 per month.

Wow! That’s more than what many people earn in Malaysia, so why the heck not, right? Just use Instagram to help big brands “cheat” on their follower counts. Unethical, but not illegal, right? And easy money to make.

The scammer will let you try one or two tasks to show you just how easy it is to make quick money. Wow – you can earn RM10 just by following one Instagram account? Easy!

Recommended : How To Block Facebook Ads + Pay Scammers!

 

Media Prima / Nielsen Job Scam Runs On Telegram

To get paid, the scammer hands you over to the actual fake job syndicate on Telegram…

Why Telegram? Telegram is popular with scammers because it not only offers end-to-end encryption, it won’t expose their actual telephone numbers.

Go to telegram and add to our receptionist. Use this username @AD or you can easily add her using this Link. https://t.me/KL999654

After successfully adding her send her a message. (I’m a new member.) code: JZ 450032 (ML-OS)Please send me a screenshot to confirm after sending code message to her.

She will invite you to join our working group where you can accomplish many tasks and earn more salary.

Recommended : Watch Out For Telegram Phishing Attack!

This “receptionist” will quickly pay you the RM10 (the bait), to “prove” that this is a genuine operation. She will then explain what you need to do to earn RM200 to RM300 a day. That’s more than what most people make in a day!

The finance department is sending money to you, please inform me when you receive it! Now let me give you a detailed description of our part-time work

The main job is to help Instagram users follow their page. You get RM2 for completing one task. RM80+ commission per day depending on your hours. The daily income is between RM 200 and RM 300, as long as you have enough time to do it, you can join

You will get RM2-RM18 commission for completing the task and an additional RM80 salary, which will be calculated based on your working hours today, ending at 8pm

Complete a task for RM2, accumulate RM10 and you can automatically receive commission. The more tasks you do, the more commissions you earn and the higher your salary

Update the task every 20 minutes and send me screenshots when you’re done so I know how much you’ve accomplished. The timeout task has expired and does not need to be completed. Do the latest task in the group

Only RM2 per task? But okay, they are also offering a daily commission. You work it out, and decide – what the heck, you can still get a decent sum every day. So you agree to participate.

Recommended : Must You Disable Facebook Auto-Fill To Block Scams?!

After you chug along, accumulating a small but nice sum over several hours, they hit you with the scam… you have to invest your money for the next job.

Subscribe to Tasks:
In order to thank you for your support to our company we hereby announce the welfare task and strive for the quota for everyone
Subscription Rule (2-4 orders) This task is based on market demand, we are recruiting customers to transfer subscription to increase transaction flow.
Increase market turnover. 5 to 10 minutes to complete the task, such as subscribe RM100, get RM130, 30% profit.
===========================
MYR 100 Cash back MYR 130 (Newbie subscription)
MYR 200 Cash back MYR 260
MYR 300 Cash back MYR 390
MYR 600 Cash back MYR 780
MYR 1000 Cashback MYR 1300

This is when your receptionist will pressure you into at least taking the “newbie subscription” of “just RM100”. She will assure you that you will instantly get RM30 profit.

In the meantime, people in the Telegram group will publicly announce that they are buying subscriptions of RM300, RM600, etc. These are likely just accounts run by the scammers.

If you hesitate, the receptionist will tell you that you cannot proceed without subscribing to this task. If you refuse, you will also lose the money you earned earlier. This is how they trap you.

If you jump right into it, the group will likely pay you the first time, to tempt you into investing more the next time around. That’s when they take your money for good.

Recommended : How A University Student Lost RM20K In Online Job Scam!

Don’t think that you can’t really lose much on such fake job scams. One university student recently explained how he lost over RM22,000 in a similar job scam.

There’s one trick that this scammer is using. He let me start with a small investment, then proceed with stages. They force me to continue because I want to rescue the money that I put in in the previous task. So it keeps getting bigger and bigger.

So please AVOID such online job offers, and help us fight these scammers – SHARE this article out, and WARN your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

 

Support Us!

If you like our work, please support us by visiting our sponsors, or donating to our fund. Thank you!