Tag Archives: Cybersecurity

Are Hackers Using Good Morning Messages To Hack You?

Can Hackers Use Good Morning Messages To Hack You?

Can hackers use Good Morning videos, pictures and messages to hack your devices, and steal your data?

Find out what is happening, and what the FACTS really are!

 

Claim : Hackers Are Using Good Morning Messages To Hack You!

This post about Chinese hackers using Good Morning videos, pictures and messages to hack your devices, has gone viral on social media and WhatsApp.

It’s a long message, so skip to the next section for the facts!

Dear friends, please delete all welcome photos and videos in Good Morning format and the like. Read below the article to the end, which will be clear why I ask about it. From now on I will only send personally prepared greetings.

Read it all !!! Send this message urgently to as many friends as you can to stop the invasion.

Olga Nikolaevna Lawyer: Caution:

ATTENTION

For those who like to send Good Morning pictures! Good day! Good evening!

Do not send these “good” messages.

Today, Shanghai China International News sent SOS to all subscribers (this is the third reminder) that experts recommend: please do not send good morning, good night, pictures and videos,.

Reports show that hackers in China designed the images, the video is so beautiful to hide the phishing codes inside them, when everyone sends these messages, the hackers use your devices to steal personal information, such as bank card information and data to crack the phone.

It has been reported that more than 500,000 victims of fraud have already been deceived.

 

Good Morning Message Hackers : Just Another Hoax!

Many of get spammed with Good Morning or Good Night messages every day from family and friends.

While they often clog up Facebook, Telegram and WhatsApp groups, they really do NOT allow hackers to hack your devices.

Here are the reasons why Good Morning messages are very irritating but harmless…

Fact #1 : Shanghai China International News Does Not Exist

The news organisation, Shanghai China International News, that was stated in the hoax does not exist.

Fact #2 : Hackers Do Not Design Good Morning Pictures + Videos

Hackers (from China or anywhere else) have better things to do than to create these Good Morning pictures and videos.

In fact, they are mostly created by websites and Facebook pages for people to share, and hopefully attract new followers.

Fact #3 : No Fraud Involving Good Morning Messages

There has been no fraud involving Good Morning or even Good Night messages, videos or pictures.

Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case.

Fact #4 : Image-Based Malware Is Possible, But…

Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.

It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself. At most, it can be used to hide the malware payload from antivirus scanners.

In January 2019, cybercriminals created an online advertisement with a script. The script itself would appear innocuous and pass any check.

However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.

Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.

Fact #5 : Malicious Code Executes Immediately

If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.

Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.

Also, most malware require some sort of action to trigger their execution. Generally (but not always), just downloading a malware won’t trigger it.

 

Please Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Thank you in advanced! 

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

FamilyMart 70th Anniversary Survey Scam Alert!

Please watch out for the FamilyMart 70th Anniversary survey scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

FamilyMart 70th Anniversary Survey Scam Alert!

People are now sharing these FamilyMart 70th Anniversary messages on WhatsApp :

FamilyMart 70th Anniversary!

Click to enter to participate in the survey, have a chance to win $1000!

FamilyMart 70th Anniversary!

Through the questionnaire, you will have a chance to get 2000 Ringgit .

 

FamilyMart 70th Anniversary Survey : Why This Is A Scam

Unfortunately, this is yet another survey scam.

For one thing – FamilyMart was established in Sayama, Japan in September 1973 and incorporated on 1 September 1981.

So they would only be celebrating their 70th anniversary in September 2043 or September 2051!

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

Proper contests or events sponsored by major brands like FamilyMart will have a PR or marketing person who will vet the text before allowing it to be posted.

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

FamilyMart isn’t going to give you FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real FamilyMart Domain

A genuine FamilyMart Malaysia campaign would use the real FamilyMart Malaysia domain – www.familymart.com.my.

Or they would run it off the official FamilyMart Malaysia page on Facebook – www.facebook.com/FamilyMartMY/.

If you see nonsensical domains like uglyarticle.club, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Please Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Thank you in advanced! 

 

Recommended Reading

Go Back To > Cybersecurity | BusinessTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Stop Using MySejahtera Helpdesk For Vaccine Appointment!

JKJAV is WARNING people to STOP using the MySejahtera Helpdesk to ask for their vaccine appointment!

Find out what’s going on, and why this is just another Internet hoax!

 

MySejahtera Helpdesk For Vaccine Appointment?

Viral messages have been circulating on the Internet and WhatsApp, advising people on how to get their vaccinations earlier, or to choose their vaccines :

CARA NAK CEPATKAN DAPAT TARIKH VAKSIN

Yang dah lama dafter vaksin tapi masih tak dapat lagi tarikh, buka app MySejahtera dan cuba cara ini:

1) Klik pada ‘Covid-19 Vaccination’
2) Pilih ‘Vaccine Information’
3) Pilih ‘Helpdesk’
4) Pilih ‘Start’
5) Pilih ‘L Other Queries?’
6) Pilih ‘E Other Issues’
7) Taip ‘Nak appointment vaksin’
8) Tekan ‘Next’ dan tekan ‘Submit’

HOW TO GET AN EARLIER VACCINATION DATE

For those who registered long ago but did not get any vaccination date, open MySejahtera and try this method :

1) Click on ‘Covid-19 Vaccination’
2) Choose ‘Vaccine Information’
3) Choose ‘Helpdesk’
4) Choose ‘Start’
5) Choose ‘L Other Queries?’
6) Choose ‘E Other Issues’
7) Type ‘Want a vaccination appointment’
8) Tap ‘Next’ and tap ‘Submit’

 

Stop Using MySejahtera Helpdesk For Vaccine Appointment!

On 4 July 2021, JKJAV issued a warningSTOP using the MySejahtera Helpdesk to get an earlier vaccine appointment!

The Helpdesk is meant for people to get help from the JKJAV team, not for people to request for earlier vaccination appointments!

The COVID-19 vaccination appointments are automatically arranged according to these criteria :

  • When you first registered for COVID-19 vaccination
  • Your age
  • Any co-morbidities (chronic illness) you may have
  • Where you currently live

JKJAV warns that there are no shortcuts to getting vaccine appointments, and that there is no need to use the MySejahtera Helpdesk for this purpose.

People who have been using this method in the fake post are drowning out genuine complaints by other users.

Someone should tell the Perak Health Department too, because they themselves fell for the fake news!

This “confusion” or “fake news” is likely based on the earlier fake news that senior citizens age 60 years and above can use the MySejahtera Helpdesk to ask for a vaccine appointment.

So please STOP using the MySejahtera Helpdesk to request for an earlier vaccine appointment… and TELL YOUR FRIENDS to stop doing that too!

Recommended : New MySejahtera Vaccine Appointment Feature For Seniors?

 

Please Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! 

 

Recommended Reading

Go Back To > Software | Fact CheckTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Scam Alert : COVID-19 Relief Fund By Federal Government!

Please watch out for the COVID-19 Relief Fund by Federal Government scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Scam Alert : COVID-19 Relief Fund By Federal Government!

People are now sharing this COVID-19 RELIEF FUND message on WhatsApp :

Apply For The Covid-19 Relief Fund Provided By The Federal Government. Hurry Up, It takes few seconds to apply. Dont [sic] miss this opportunity.

Apply Here

Note : I added the Scam Alert overlay to prevent it from being further abused.

 

COVID-19 Relief Fund : Why This Is A Scam

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones. Unfortunately, scammers are counting on our desperation to prey on us.

I will now show you why this COVID-19 Relief Fund message is just another scam. Please warn your family and friends!

Fact #1 : No Global Relief Fund By Any Federal Government

When a scam tells you that “the federal government” is giving away money, you should always ask yourself – WHICH federal government???

No government in the world is giving away money to anyone across the world. Not even the three richest economies in the world – US, China and the EU – have a COVID-19 relief fund to give money away like that.

Fact #2 : The Three Questions Are A Red Herring

Most of these scams employ simple but useless questions to trick you into thinking that this is genuine. Look at the three questions this scam is asking :

  • What’s your age range?
  • How much money do you want to receive?
  • What’s your employment status?

In a real government relief programme, your eligibility status will be based on some official document – your identity card, driver’s licence, passport, etc.

No one is going to give you money simply because you answer a few questions. And NO ONE is ever going to ask you how much you want to receive!

Fact #3 : No Government Will Ask You To Invite Friends / Groups

A real government relief programme will NEVER ask you to invite friends and groups on WhatsApp, much less insist that you invite 15 friends or 5 groups before they give you money.

That’s a dead giveaway that this is a scam, and the scammers want you to help them scam other people. So NEVER invite your friends to join the scam.

Fact #4 : SNF Global Relief Initiative Is Not By Any Federal Government

To make the scam look legit, the scammers used the SNF Global Relief Initiative for the COVID-19 Pandemic graphics.

That initiative is not by any government, but by the Stavros Niarchos Foundation (SNF).

And just in case you are wondering, no, the SNF does not give away money to individuals. They only make grants to non-profit organisations and collaborative funds.

Fact #5 : The Domain Is New + Protected

If you check the domain “relief-fund.live“, you will see that it was only created on 24 March 2021.

Even more suspiciously, all contact and ownership details have been REDACTED FOR PRIVACY. That’s often a sign that the owners are worried about being sued or prosecuted.

Name: relief-fund.live
Registry Domain ID: ac787c4c5c19460696fa1bf46d133faa-DONUTS

Nameservers:
dns1.registrar-servers.com
dns2.registrar-servers.com

Registry Expiration: 2022-03-24 11:41:35 UTC
Updated: 2021-03-29 11:42:31 UTC
Created: 2021-03-24 11:41:35 UTC

Name: REDACTED FOR PRIVACY
Organization: Privacy service provided by Withheld for Privacy ehf
Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Tel: REDACTED FOR PRIVACY
Fax: REDACTED FOR PRIVACY
Mailing Address: REDACTED FOR PRIVACY Capital Region REDACTED FOR PRIVACY IS

Fact #6 : The Comments Are Completely Faked

You may notice a bunch of comments at the bottom of the scam website. They are only there to trick you into thinking that other people received the money.

Try refreshing them. They will never change, unlike a real live comment stream. The time codes will not change either.

Try clicking on the Like option. Nothing will happen. Your Like will not register.

That’s because this is a fake comment stream. It’s all hardcoded and fixed.

Now that you know that this is just another scam, please warn your family and friends.

And please remember – no one gives away money like that. Don’t fall for these scams!

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! 

 

Recommended Reading

Go Back To > Fact Checks | Tech ARP

 

Support Tech ARP!

If you like our work, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Thank you!

Was US Soldier Caught Spreading COVID-19 In Wuhan?

Was a US soldier caught spreading COVID-19 in Wuhan by smearing his saliva in a train?

Take a look at the viral video, and find out what the FACTS really are!

 

Was US Soldier Caught Spreading COVID-19 In Wuhan?

A video of an American soldier smearing his saliva on a train pole is circulating on social media, accompanied by this message :

Just to share this clip and its comments from China:

The surveillance cameras in Wuhan have a road map of the US soldiers and a video record of the time.

The American soldier had put on a mask during the military games. Began to spread the epidemic virus by subway. 

If you look at the movement of that hand carefully, from the mouth to the armrest, you will know the evil and evil heart of Americans.

Poor Wuhan citizens are infected with the ruthless epidemic virus. 

The viral message implies that the Chinese have determined that Patient Zero is an American soldier who attended the 2019 Military World Games that was held in Wuhan, China from 18 to 27 October 2019.

It also implies that the Americans brought COVID-19 to Wuhan, and used one of their soldiers to spread it to the Chinese. And the video is the evidence.

Even the Chinese Foreign Ministry’s spokesperson Zhao Lijian pushed the same fake claim, saying, “When did patient zero begin in the US? It might be the US army who brought the epidemic to Wuhan!

Well, all that is HOGWASH. Let us show you why…

 

US Soldier Spreading COVID-19 In Wuhan Hoax Debunked!

The truth is the video was recorded on 9 March 2020 in a Belgian subway, not October 2019 in Wuhan.

The man in the video was not a US soldier, but an intoxicated Belgian who licked his finger and rubbed it on the subway pole.

He was later arrested for doing that, and the train removed and disinfected.

This is just another piece of Chinese propaganda trying to shift the blame for the COVID-19 pandemic to the United States.

Please be wary of such fake news. China has been actively creating and sharing these fake videos and stories on social media.

Share this with your family and friends, so they won’t get fooled!

 

Why Is China Pushing This Fake US Soldier COVID-19 Story?

With China’s aggressive foreign policy moves in recent years, it is not uncommon to see fake pro-China, anti-America stories being created and shared.

Many believe it’s part of a concerted attempt to burnish China’s image overseas, and drown out negative coverage of China’s controversial Belt and Road Initiative, and their aggressive moves in the South China Sea..

China has also been blamed for not handling the initial COVID-19 epidemic better, and unfairly – for being the origin of this new virus.

Hence, they have been trying their best to deflect blame by casting aspersions unto others, using aggressive Wolf Warrior diplomacy tactics, propaganda outlets like GlobalTimes and CTGN, and their 50 Cent Army.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! 

 

Recommended Reading

Go Back To > Fact CheckHealth | Tech ARP

 

Support Tech ARP!

If you like our work, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Thank you!

Will COVID-19 Vaccines Reduce Our Immunity For 6 Weeks?

Will COVID-19 vaccines reduce our body’s immunity for 6 weeks, putting us at greater risk of getting infected by the coronavirus?

Find out what’s this viral Internet advice all about, and what the FACTS really are!

 

Claim : COVID-19 Vaccines Reduce Our Immunity For 6 Weeks!

This piece of medical advice is going viral on WhatsApp, warning that our immunity will drop for 6 weeks after receiving COVID-19 vaccination.

注射了两剂疫苗的人士,敬请注意小心
##############################

值得一提的是,即使注射了兩劑疫苗,人們還是會感染新冠病毒。
第二劑必須在第一劑疫苗注射後的21/28天注射。
第一劑疫苗進入人體後會立即開始形成抗體。
當我們體內形成抗體時,我們的免疫力是會大大的降低。
同樣的情況在21/28天後當我們注射了第二劑的疫苗後,我們的免疫力會降得更低。
在第二次注射後的14天,當抗體在我們體內完全形成了時,我們的免疫力才會開始自然迅速增長。
這一個半月的注射疫苗過程中,由於我們體內的免疫力降低,新冠病毒進入我們體內的機會就變成非常的高。意思是說在這段時間裏,一旦在外接觸到新冠病毒,我們是最脆弱的也是最容易感染病毒。
所以在這注射疫苗一個半月內出外,離開家門是一項非常危險的行爲。
即使注射了兩劑疫苗,我們還是有可能成為新冠病毒的下一個受害者。
一個半月後,體內的免疫力增加了從一百到兩百倍,之後我們感染新冠病毒的風險就會大大的減低,尤其是對于高風險的年長者。
這就是為什麼從首次注射開始的一個半月內,我們要非常注意自己的安全。
確保出門戴口罩。
沒有必要的話就留守在家,千萬不要出門。

Reasons for people getting infected even after taking two doses of the corona vaccine:
The second dose is to be taken 21/28 days after the first dose of the corona vaccine.
The vaccine starts to form antibodies immediately after entering the body.
When antibodies are forming in our body, our immunity decreases a lot.
When we take the second dose of the vaccine after the 21/28 days, our immunity decreases even more.
14 days after the second dose, when the antibodies are completely formed in our body, our immunity starts to grow rapidly.
During this one and a half month, due to low immunity, the chances of the corona virus entering our body are very high. It is due to an exposure to the virus at this vulnerable time that a person gets infected.Hence, it is very risky to get out of the house during this month and a half.
Even after taking two doses of the vaccine, you can become a victim of Corona.
After one and a half months, the immunity in the body rises by 100 to 200 times, after which you are safe.
Need to be careful and safe for one and a half months from the first dose.
That’s why
Make sure to wear a mask
Get out of the house only if necessary.

 

COVID-19 Vaccines Will NOT Reduce Our Immunity At All!

Like 95% of viral messages on COVID-19 – this is yet another piece of FAKE NEWS based on some facts.

Let’s examine each claim and find out what the facts really are!

Fact #1 : Dose Intervals Depends On Vaccine

The dose interval very much depends on the vaccine, and other factors :

Instead of relying on a WhatsApp message of unknown provenance (who wrote it?), ask your doctor or just follow your vaccination appointment.

Fact #2 : Vaccines Don’t Form Antibodies

COVID-19 vaccines are basically training boot camps for your immune system. They don’t form antibodies.

Instead, they mimic the SARS-CoV-2 virus, so that your immune system can learn to identify it, and create antibodies against the real virus.

Your own immune system creates the antibodies, not the vaccine.

Fact #3 : Immunity Does Not Drop With COVID-19 Vaccination

You may feel a bit sick after your vaccination. That is not evidence that COVID-19 vaccines reduce our immunity.

That is your body’s natural reaction, as your immune system is triggered by the viral antigens presented by the vaccine.

As your immune system learns to make antibodies against these antigens, it grows stronger against COVID-19, not weaker.

Fact #4 : Full Immunity Takes Time

It is true that full immunity takes time – often two weeks after the second dose is taken (for a 2-dose vaccine).

The second dose is designed to kick the immune system into high gear, basically telling it – “Warning, this is not a one-time attack! COVID-19 can come again!

This not only triggers the immune system to create more antibodies, it also activates your memory cells to “remember” SARS-COV-2 for faster recognition and antibody production in the future.

That is why it is important to complete both doses of a 2-dose vaccine, and continue to practice COVID-19 precautions until your body has enough time to build its defences.

Recommended : Soap vs Sanitiser : Which Works Better Against COVID-19?

Fact #5 : You Can Get Infected After Vaccination

It is true that you can get infected with COVID-19 even after completing your vaccination. However, that is not because COVID-19 vaccines reduce your immunity.

These vaccine breakthrough infections are expected, because vaccines cannot guarantee complete protection.

Even the best COVID-19 vaccines – from Pfizer and Moderna – can only prevent 94%-95% of COVID-19 infections. That means 5% of those who are fully vaccinated using these vaccines will still get infected.

That does not mean vaccines are useless. The point is COVID-19 vaccines prevent severe disease and death, so even if you get infected after vaccination, it will turn out to be mild or asymptomatic.

Vaccine breakthrough infections can be greatly reduced once herd immunity is established. In the interim, you can protect yourself by continuing to wear face masks, maintain physical distancing, and keep your hands clean.

Fact #6 : Vaccine Will Not Give Your Immune System Superpowers

The claim that your immune system is boosted by 100 to 200 times is nonsensical.

The COVID-19 vaccine does not boost your immune system. It only teaches your immune system to identify the SARS-CoV-2 virus, so it can learn to produce the right antibodies before the real coronavirus attacks.

Because your body has never encountered the SARS-CoV-2 virus before, it has ZERO immunity against this novel coronavirus.

As any math teacher can tell you – you cannot divide by zero, therefore any comparison is nonsensical.

What happens after you are fully vaccinated is that your immune system has learned how to fight against the SARS-CoV-2 virus.

It does not derive any superpower from the vaccine, it just knows how to make antibodies to attack the SARS-CoV-2 virus.

 

Please Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Thank you in advanced! 

 

Recommended Reading

Go Back To > Health | Fact CheckTech ARP

 

Support Tech ARP!

If you like our work, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Thank you!

Fact Check : Amazing Robot Dancers At Shanghai Disneyland!

Did China create these amazing robot dancers at the Shanghai Disneyland, beating even the Japanese?

Watch the viral clip for yourself, and find out what the FACTS really are!

 

Claim : China Created Classic Robot Dancers At Shanghai Disneyland!

Here is the video that countless people have been sharing on social media and even on YouTube. It is often paired with a short explanation in (broken) English.

This classic dance is only created in China and broadcast in Shanghai Disneyland. They are not female dance artists, but all robots made in China.

The performance time is only about 5 minutes, but the ticket queue time takes 4 hours , The ticket price is 499 yuan.

It has surpassed Japan in complexity, and saw its perfect facial expressions. Send this video to everyone to watch, let us enjoy together…

 

Classic Robot Dancers At Shanghai Disneyland : The Truth

The agility and grace of these classic robot dancers at Shanghai Disneyland is amazing.

The less gullible would point out that it is something you would only expect from professional human dancers, and they would be right.

Fact #1 : That Is A Video Of A CBDF Competition

That is actually a video clip from one of the many competitions organised and broadcast by the CBDF (Chinese Ballroom Dance Federation).

Although we cannot ascertain who the dancers are, you can see the CBDF logo in the background, at 4:06 and 4:41.

No robot made today can match their agility and grace.

Fact #2 : 499 Yuan Was The Entry Price To Shanghai Disneyland

The fake story claimed that the ticket to watch this performance costs 499 Yuan – about US$73 / £55 / RM303. That would be ridiculously exorbitant for a single show.

In truth, that was the cost of an entry ticket to the Shanghai Disneyland when it first opened in February 2016.

Since 6 June 2018, it has been priced at 399 Yuan (off-peak), 575 Yuan (peak) and 665 Yuan (peak holiday).

Fact #3 : Disneyland Does Not Charge Extra To Watch Certain Shows

Anyone who has been to Disneyland knows that the entry fee is pricey. That’s because it covers all rides and shows inside Disneyland.

You only need to pay for food and drinks, and arcade games. Or if you opt to purchase Disney Fastpasses (Fastpass, FastPass+, MaxPass) to bypass long queues at popular rides or shows.

Otherwise, all rides and shows are free to enjoy once you enter Disneyland.

Fact #4 : That Is Not The Only Fake Video Of Chinese Robot Dancers

That is not the only fake video of Chinese robot dancers.

This one circulated earlier, claiming to be of a female robot dancer that beats Japanese made-robots.

In this example, they took the video clip from the 2018 World Dance Sport Federation Championship in Lithuania…

Recommended : Did China Create This Amazing Female Dancing Robot?

 

Who Would Create Fake Stories About Robot Dancers?

With China’s aggressive foreign stance in recent years, it is not uncommon to see such fake stories being created and shared.

Some believe it’s part of a concerted attempt to burnish China’s image overseas.

Others believe the many fake stories are being created to drown out the negative coverage of China’s controversial Belt and Road Initiative, and their aggressive moves in the South China Sea.

Whatever the reasons may be, it is our duty as global citizens to stop the proliferation of such fake stories.

Please share this fact check with your friends, so they know the truth!

 

Recommended Reading

Go Back To > Fact Check | Photo + VideoTech ARP

 

Support Tech ARP!

If you like our work, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Thank you!

Is HR 748 (CARES Act) Evidence Of COVID-19 Plandemic?

Is HR 748 – the CARES Act – evidence that the COVID-19 pandemic was planned – a plandemic?

Find out what HR 748 (CARES Act) is all about, and what the FACTS really are!

Note : This article was originally posted on 5 May 2020, and was updated and reposted on 11 June 2021 because the Brian Young video is being recirculated again!

 

Claim : HR 748 CARES Act Is Proof Of COVID-19 Plandemic!

Conspiracy theorists are pointing out that the CARES (Coronavirus Aid, Relief and Economic Security) Act, also known as HR 748, was introduced in January 2019.

Since this was many months BEFORE COVID-19 started appearing in Wuhan, they believe it is evidence that COVID-19 must have been designed and manufactured in a US lab.

One of these conspiracy nut jobs is one Brian Young, who creates all sorts of BS videos on his YouTube channel – High Impact Vlogs.

Here is a “high impact” screenshot of his “documented proof” video, in which he described it as a Plandemic designed to give governments tighter control.

Such videos and claims continue to be shared on social media, with comments like this :

Must watch this video. It shows that based on public documents…. etc, US goverment came out with an act to tackle Corona Virus way back in January 2019!!!

That’s partly because Brian Young himself refused to remove his fake video after it was exposed, probably to keep earning advertising money from it.

 

CARES Act (HR 748) COVID-19 Plandemic Plot : TLDR Summary

These claims are UTTER BULLSHIT based on an intentional “misunderstanding” of the facts :

  • HR 748 was introduced in January 2019 as a completely different act called Middle Class Health Benefits Tax Repeal Act of 2019
  • It was amended by the US Senate in March 2020, becoming the CARES (Coronavirus Aid, Relief and Economic Security) Act at that point.
  • The Trump Administration was not prepared for the pandemic, which would not happen if this was really a planned pandemic.

Brian Young admitted he was wrong, but kept his video up – probably to keep making money off it, even though he knows it’s completely FALSE!

This is yet another example of why conspiracy theorists are nothing more than lying charlatans. You would be wise to stop believing these “geniuses”.

 

CARES Act (HR 748) : The Facts

Fact #1 : HR 748 Was Introduced On January 24, 2019

US House Bill HR 748, which is now known as the CARES Act, was indeed introduced by Congressman Joe Courtney on Connecticut on January 24, 2019.

It passed in the House of Representatives on July 17, 2019, and was sent to the Senate on July 18, 2019.

Fact #2 : HR 748 Was Not The CARES Act In 2019

When it was introduced and passed in the House of Representatives, HR 748 was not known as the CARES Act.

It was the Middle Class Health Benefits Tax Repeal Act of 2019, and was explicitly meant to repeal “the excise tax on employer-sponsored health care coverage for which there is an excess benefit (high-cost plans).

Fact #3 : HR 748 Became The CARES Act In March 2020

Mitch McConnell kept HR 748 in his legislative graveyard from July 2019 until March 2020, when he needed to introduce a third stimulus package in response to the COVID-19 pandemic.

That was when HR 748 was massively amended and became the CARES (Coronavirus Aid, Relief and Economic Security) Act. It was signed into law on March 27, 2020.

Photo Credit : WSJ

Fact #4 : The CARES Act Was Third US Bill Related To COVID-19

What conspiracy theorists fail to notice is that the CARES Act was not even the first US bill to address the COVID-19 crisis.

The first was the Coronavirus Preparedness and Response Supplemental Appropriations Act 2020 – a $8.3 billion bill signed into law on March 6, 2020.

The second was the Families First Coronavirus Response Act – a $104 billion bill signed into law on March 18, 2020.

Fact #5 : The Trump Administration Did Not Prepare For COVID-19

Conspiracy theorists also ignored a very critical flaw with their argument – the Trump Administration’s actions show that they simply did not prepare for COVID-19.

  • The Trump Administration only created a coronavirus task force on January 29, 2020.
  • By the end of February 2020, the United States did not even have proper tests, because of tainted reagents.
  • Only on February 29 did the FDA finally announce that US labs would be allowed to use their own COVID-19 tests.
  • Only on March 13, 2020 did US President Trump finally declare a national emergency.
  • Only on April 3, 2020, did the Trump Administration start recommending that people start wearing face masks, but made it voluntary.

More importantly, by May 5, 2020, the United States had the most coronavirus cases in the world – over 1.2 million infected, and the most deaths from COVID-19 – over 69,000 dead.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! 

 

Recommended Reading

Go Back To > Health | Fact Check | Tech ARP

 

Support Tech ARP!

If you like our work, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Thank you!

Did Singapore Autopsy Confirm COVID-19 Is Not A Virus?

Did Singapore conduct an autopsy that confirmed COVID-19 is not a virus, but a bacterium that causes blood clotting?

Take a look at this new viral message, and find out what the FACTS really are!

 

Claim : Autopsy In Singapore Confirmed COVID-19 Is Not A Virus!

This new WhatsApp message claims that an autopsy in Singapore has finally proven that COVID-19 is not a virus, but a bacterium that causes blood clotting!

Singapore has become the first country in the world to perform an autopsy (post-mortem) for a Covid-19 corpse. After a thorough investigation, it was. discovered that Covid-19 does not exist as a virus, but rather a bacterium that has been exposed to radiation and causes human death by coagulation in the blood.

Covid-19 disease has been found to cause blood clotting, which causes blood clotting in humans and causes blood clotting in the veins, which makes it difficult for a person to breathe because the brain, heart and lungs cannot receive oxygen, causing people to die quickly.

To find the cause of the shortage of respiratory energy, doctors in Singapore did not listen to the WHO protocol and performed an autopsy on COVID-19. After doctors opened arms, legs, and other parts of the body and carefully examined them, they noticed that the blood vessels were dilated and filled with blood clots, which impeded blood flow and also reduced the flow of oxygen. In the body it causes the death of the patient.

After learning about this research, the Singapore Ministry of Health immediately changed the treatment protocol for Covid-19 and gave aspirin to its positive patients. I started taking 100 mg and Imromac. As a result, patients began to recover and their health began to improve. The Singapore Ministry of Health evacuated more than 14,000 patients in one day and sent them home.

After a period of scientific discovery, doctors in Singapore explained the treatment method by saying that the disease is a global trick, “It is nothing but a coagulation inside blood vessels (blood clots) and a method of treatment.

  • Antibiotic tablets
  • Anti-inflammatory and
  • Take an anticoagulant (aspirin).

This indicates that it is possible to treat the disease.

 

Singapore COVID-19 Autopsy : Same Bullshit, Different Country

If you thought this viral message was familiar, that’s because it’s the SAME BULLSHIT that went viral earlier, just swapping out Russia for Singapore and some other changes.

Like 95% of viral messages on COVID-19 – this is yet another piece of FAKE NEWS based on some facts.

Let’s examine each claim and find out what the facts really are!

Fact #1 : First COVID-19 Autopsies Were Conducted In China

Wuhan was the origin of the COVID-19 epidemic in China, and it was there that the first patients died, and where the first autopsies were conducted.

The forensics team from the Tongji Medical College of the Huazhong University of Science and Technology conducted the first autopsy of a COVID-19 patient on 16 February 2020.

By 24 February 2020, they conducted a total of nine autopsies – the results of which was published in the Journal of Forensic Medicine.

Fact #2 : There Is No WHO Protocol Forbidding Autopsies

There is no such thing as a WHO protocol that forbids autopsies of any person who died from COVID-19, or any other disease.

The World Health Organisation is an international advisory body. It has no power over individual countries, and therefore, cannot ban post-mortem autopsies in any country.

In fact, the WHO actually published guidelines on how to perform autopsies and manage the bodies of dead COVID-19 patients.

Fact #3 : COVID-19 Is Caused By SARS-CoV-2

COVID-19 is technically not a virus.

COVID-19 is the disease caused by a novel coronavirus, which was initially called 2019-nCoV, before being officially named as SARS-CoV-2.

Fact #4 : SARS-CoV-2 Is A Real Virus

We know that the SARS-CoV-2 is a real virus, because Chinese scientists isolated it and with the help of the University of Sydney in Australia, released a draft sequence of its genome on 10 January 2020.

The complete genome of approximately 30 kilobytes in length was published on 3 February 2020.

You can look at the entire SARS-CoV-2 viral genome that was released by Chinese scientists here.

SARS-CoV-2 genome diagram. Credit : Rohan Bir Singh, MD

Fact #5 : A Virus Is Not A Bacterium

Any half-decent student of biology can tell you that a virus is not a bacterium. They are completely different.

A virus, for example, is not even a living organism. It is just RNA or DNA encapsulated within a protein or lipid shell, and can only replicate within a host cell.

A bacterium, on the other hand, is a single-celled microorganism that can multiply by itself. It is also much more complex, with intracellular organelles and even extracellular appendages.

SARS-CoV-2 – the COVID-19 coronavirus – is a virus, not a bacterium.

Fact #6 : Imromac + Apronik Do Not Exist

Two of the drugs mentioned in the viral message – Imromac and Apronik – do not even exist!

Fact #7 : There Is No Cure For COVID-19 (Right Now)

As of 10 June 2021, there is no cure for COVID-19. Only vaccines that can help prevent it.

Antibiotics, anti-inflammatory, or anti-coagulant medication cannot cure COVID-19.

Both aspirin and paracetamol are painkillers, and they won’t cure COVID-19.

Fact #8 : Low Dose Aspirin Does Not Prevent COVID-19

100 mg is actually a low dose for aspirin, which is normally given in the form of 325 mg or 500 mg tablets to adults.

Many people already take low-dose aspirin (also called baby aspirin) – usually 81 mg – to reduce the risk of heart attacks or strokes.

However, that has not prevented any of them from being infected with COVID-19.

Fact #9 : COVID-19 Can Cause Blood Clotting

COVID-19 can cause a hypercoagulable state, in which a severe inflammatory response triggers localised blood clotting which can become generalised.

It is especially common in severe COVID-19 disease, and has nothing to do with a bacterium, or radiation.

When a COVID-19 patient presents with blood clots, they are treated with blood thinners like aspirin and heparin.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! 

 

Recommended Reading

Go Back To > Health | Fact Check | Tech ARP

 

Support Tech ARP!

If you like our work, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Thank you!

Scam Alert : Toyota 80th Anniversary Celebration!

The viral message about the Toyota 80th Anniversary Celebration and the giveaway of a Toyota Corolla is a SCAM!

Find out why it is a SCAM, and please alert your family and friends!

 

Scam Alert : Toyota 80th Anniversary Celebration!

This is the link that has gone viral on WhatsApp, claiming to offer you a chance to win a Toyota Corolla during the Toyota 80th Anniversary Celebration!

It’s just a scam, so we added that overlay to prevent it from being further abused.

Please DO NOT CLICK on the link, or proceed with the “contest”.

 

Why Toyota 80th Anniversary Celebration Contest Is A Scam!

For those of you who are wondering – how do you know it’s a scam, here are the facts…

Fact #1 : The Link Is Highly Suspicious

If you look at the URL – the link – it goes to http://1s7wttd.nodxteh.cn.

It is obviously not a Toyota-related link, but an unrelated Chinese-registered (.cn) domain.

In addition, it is not an SSL-encrypted link, which would start with https://. While not a hallmark of a scam link, legitimate websites will use SSL-encrypted links (with https, not http)

When you see such links, DO NOT CLICK on them.

Fact #2 : Toyota’s 80th Anniversary Was In 2017

Toyota was established on 28 August 1937. They celebrated their 80th anniversary in 2017.

Here is a 28 August 2017 tweet by the Toyota Motor Corp.

Fact #3 : Toyota Is In The Business Of Selling Cars

Toyota is in the business of SELLING CARS, not giving them away.

Not surprisingly, they did not give away even a single car when they celebrated their 80th anniversary in 2017!

Fact #4 : The Page Has So Many Troubling Clues

If you click on the link, you will be led to this page, claiming you will get a free gift with Toyota… and a chance to win a Toyota Corolla.

The page is full of grammatical mistakes – something an actual Toyota website would not have.

On top of that, why would Toyota give you a Corolla for answering simple questions like “Do you know Toyota?” Seriously…

And below that is a list of comments by people who claimed to have won the Toyota Corolla. Do you really believe that Toyota is giving away so many cars?

Try clicking on their names, and nothing happens. Nothing happens either if you click to Like. So where are the likes coming from?

They are all FAKE COMMENTS. If you check the code, you can see that both the comments and pictures were manually inserted.

Fact #5 : You Will Always Win The Car

You can try the contest any number of times, and you will ALWAYS win the car.

Why? Because the next step involves you sharing this with 5 groups or 20 friends on WhatsApp!

So no matter how many times you participate, you will ALWAYS win the free Toyota Corolla. Do you think that’s the case with a real contest?

This is a SCAM. DO NOT SHARE and do NOT proceed beyond this page.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! 

 

Recommended Reading

Go Back To > Fact CheckTech ARP

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Is There A Communist Revolution Monument In Penang?

Pictures of a Chinese Communist Revolution Monument in Penang have gone viral, with calls from netizens to TEAR IT DOWN!

Find out what’s going on, and what the facts really are!

 

Claim : DAP Created A Communist Monument In Penang!

Pictures of a Chinese Communist Revolution Monument in Penang are being shared on Facebook and social media, with messages like this (translated into English) :

DAP created a Communist monument in Penang after they took power.

Communist monument on Flag Hill in Penang.

What are you waiting for? When are you going to tear it down?

Do You Know?

In Penang, there is a World War II memorial called the Revolution Memorial.

But it’s full of Chinese letters and the figures are all dressed as Communists.

There is absolutely no information in English or Bahasa Melayu, much less Tamil.

When people say it’s racist, [you get] angry

This monument was built as soon as DAP took over Penang from Gerakan.

Here is a selection of comments that were posted with that misleading picture, showing how it instigates hate and racial tensions :

Roboh kan semuanya,, pulau Pinang ialah tanah Melayu,,jgn lupa tu,, DAP memang haprak

Demolish it all. Penang is Malay soil. Don’t forget that. DAP is useless.

Say no to komunis DAP

Puak2 pengkhianat DAP..musoh melayu..musoh islam..

DAP are traitors, enemies of the Malays, enemies of Islam.

Robohkan Tugu peringatan pembunuh anak anak peribumi Melayu. kenapa di iarkan sebegitu rupa di mana anguta dan bekas angguta keselamatan kita boleh biarkan sebegitu rupa…Letupkan !

Destroy the memorial of the killers of Malay natives. Why is it being left like that? How can our security forces let this be? Blow it up!

 

Communist Revolution Monument In Penang : The Truth

The short version is this – the monument in the pictures exists, but it is neither a Communist monument, nor was it created or built by DAP.

All of the claims about it in the incendiary posts above are FALSE.

We would like to warn everyone to be careful of political fake news being shared to incite hatred and racial tensions.

Fact #1 : That Is The Penang Overseas Chinese Anti-War Memorial

The monument in the picture is the Penang Overseas Chinese Anti-War Memorial Park, also known as the Air Itam War Memorial Park.

It is NOT a Chinese Communist Revolution Monument.

There are two key monuments at this memorial park :

  • a bronze-coloured army supply truck being pushed by three men – memorialising the Nanyang transport volunteers from Malaya, who helped deliver supplies to China when they were blocked by the Japanese.
  • a 45-foot tall white obelisk that commemorates the Marco Polo Incident, that kicked off the Second Sino-Japanese War of 1937-1945.

The ashes of some 800 incomplete skeletons of Penang Chinese residents who died under Japanese occupation, and the Nanyang transport volunteers who died, are also buried under the obelisk.

The truck also has a number plate with the date 1939 on it. Communist China didn’t exist in 1939, so claims that this is a Communist monument is… idiotic.

Fact #2 : It Was Built In 1946 And Opened In 1951

Construction on the Penang Overseas Chinese Anti-War Memorial Park started in 1946, and it was officially opened in 1951.

DAP was only formed on 11 October 1965, so the claim that it was built when DAP gained power in Penang is false.

Because the People’s Republic of China was only established in 1949, the claim that this is a communist revolution monument is idiotic.

It is also extremely stupid to claim that the figures were dressed as Chinese Communists, because Communist China didn’t exist when the monument was being built!

Fact #3 : It Was Privately Funded

The original Penang Overseas Chinese Anti-War Memorial Park was funded entirely by the Penang China Relief Fund, a Penang-based private fundraising organisation.

It was officially opened at 11 AM on 11 November 1951 by Penang Chinese tycoon and philanthropist, Lim Lean Teng, who was the supervisory chairman of the organisation.

After the Penang China Relief Fund was dissolved in 1952, the Kong Min School was entrusted to maintain the memorial with an annual budget of $5,000, and an annual memorial service.

Fact #4 : It Was Upgraded For Its 60th Anniversary

The Board of Trustees of the Kong Min School decided to repair and upgrade the memorial to coincide with its 60th anniversary.

The RM 400,000 project also added a 60 foot-long wall relief showing Malayan transport volunteers on the Burma-China road, and a peace column with flying doves.

On top of private donations by various organisations and individuals, the Penang state government also chipped in.

When it was opened at precisely 11:11 AM on 11 November 2016 by Penang Chief Minister, Lim Guan Eng, politicians from both sides of the political divide attended the launch.

Therefore, the claim that no one knew about it, or that it was only something DAP would do, is categorically FALSE.

Photo Credit : The Sun Daily

Fact #5 : There Is Information In FOUR Languages

The memorial park has information in four languages – English, Bahasa Melayu, Chinese and Japanese.

Here is the information panel in English and Bahasa Melayu, proving that the claim there is no information in both languages are FALSE.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! 

 

Recommended Reading

Go Back To > Fact CheckHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Was Pragya Mishra Killed Over COVID-19 Comments?

Was Indian journalist, Pragya Mishra, murdered in broad daylight after criticising the Kumbh Mela festival for causing the catastrophic COVID-19 surge?

Find out what the viral video of her murder showed, and what the FACTS really are!

 

Claim : Pragya Mishra Killed In Broad Daylight Over COVID-19 Comments!

Two videos and a photo are going viral on WhatsApp, claiming that Indian journalist Pragya Mishra was killed in broad daylight after she criticised the recent Kumbh Mela festival in India for causing the catastrophic surge in COVID-19.

The first video showed the news segment in which Pragya Mishra talked about the Kumbh Mela and the COVID-19 tsunami.

The second video was CCTV footage showing a woman getting stabbed by a man in broad daylight.

The videos are accompanied by one or two pictures showing the woman lying in a pool of blood, with one of these messages :

An Indian broadcaster who spoke against unhealthy Hindu gatherings and the spread of Corona disease was assassinated publicly.

Pragya mishra murdered in broad daylight

Because she was talking in news about kumbh mela in the era of cornavirus

 

No! Pragya Mishra Was NOT Killed Over COVID-19 Comments!

This is yet another COVID-19 related hoax. Pragya Mishra is alive and well.

It has been suggested that the fake news was created as a kind of warning to Pragya Mishra –  watch what you are saying about Hindus and the Kumbh Mela, or else…

That is something we cannot prove, but here are the facts that we can prove…

Fact #1 : Pragya Mishra Is Alive And Well

These videos and photos first circulated on or just before 18 April 2021.

At that time, Pragya Mishra was at home because of “COVID-19 protocols”. When she was informed about the videos and photos, she tweeted that she was safe.

As of 30 April 2021, she’s still active on her Twitter account, @PragyaLive.

Fact #2 : Second Video Was Of A Real Murder

Unfortunately, the second video is genuine, and shows the murder of a real woman on 10 April 2021.

It was not Pragya Mishra, but a 26 year-old lady called Neelu Mehta, who worked at the Safdarjung Hospital in Delhi.

She was stabbed and murdered in broad daylight by her husband, Harish Mehta, an employee of the Marriage Bureau.

Allegedly, he suspected his newly-wed wife of eight months of infidelity, and stabbed her to death. Even after she died, he continued stabbing her.

Sadly, no one intervened or tried to help her.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! 

 

Recommended Reading

Go Back To > Fact ChecksHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Facebook Rolls Out Click To WhatsApp Ads!

You may not have noticed this, but Facebook has started rolling out Click to WhatsApp ads!

Find out what this means for business and customers on Facebook, Instagram and WhatsApp!

 

Facebook Rolls Out Click To WhatsApp Ads!

WhatsApp founders may have promised not to monetise their platform by selling ads, but that was nine years ago, and before they sold out to Facebook in 2014.

At that time, Jan Koum promised that WhatsApp wouldn’t collect and share data of its users. That changed in 2016 and 2021.

So it seems inevitable that Facebook will eventually introduce ads in WhatsApp. They even accidentally let it slip (see below).

But for now, you can rest easy. They are only introducing Click to WhatsApp ads on Facebook and Instagram at the moment…

Originally kicking off in 2017, Facebook has started pushing Click to WhatsApp ads in Asia. Page owners may be surprised by reminders to connect their pages to WhatsApp.

Ignoring this reminder will invite the warning that you cannot run WhatsApp ads, or add a WhatsApp button to your Page.

We are not sure if that’s a Freudian slip, but Facebook actually mentioned WhatsApp ads. LOL!

 

Click To WhatsApp Ads : What Are They?

These are regular Facebook and Instagram ads, with the additional Send Message button.

Clicking on that button will open a conversation thread in WhatsApp with the Facebook / Instagram business owners (using the WhatsApp Business app).

This allows you to interact directly with the business, like you would using Facebook Messenger.

This makes it easier for businesses to reach the 1.5 billion WhatsApp users around the world, who will like how much easier it is to directly message them using WhatsApp.

On the other hand, it is likely to make it easier for scammers who are already leveraging Facebook ads to cheat people.

 

Recommended Reading

Go Back To > Business | Software | Tech ARP

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Scam Alert : CIMB Customers Hit By Fake SMS Messages!

Scammers continue to target CIMB customers, using many different kinds of fake SMS messages.

Do NOT click or call if you receive any of these fake SMS messages!

And please warn your family and friends!

 

Scam Alert : CIMB Customers Hit By Fake SMS Messages!

Whether you are a CIMB Bank customer or not, you may receive one of these alarming SMS messages :

RM 0.00 CIMB: Confidential!

Dear CIMB users, your account will TERMINATED on 24/12/20. Verify via http://www.cimbclickikm.cc to keep on using CIMB Clicks services.

Please make verification within 24hours to avoid service interruption.

RM0 CIMB: Instant Transfer RM4998.78 to CHAY LEE FEN/HONG LEONG on 23-Dec-2020, 13:06:35. Call the no. at the back of your card for queries.

If you receive any of these SMS messages, please DO NOT click on the link, or call the number. JUST IGNORE THEM, or delete them.

RM0.00 CIMB: MYR 2968.00 was charged on your card num 4204 at Shopee.MY. If this is not your txn, call 1800-9767 now.

Cimb Your account is judged as high risk by the system, PLS re-verify your account. cimbclicksecurity.com

Note : These scams do not just affect CIMB Bank. In fact, all banks are affected :

 

Why These CIMB SMS Messages Are Fake

Let us show you how to identify these fake CIMB SMS messages.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Grammatical Mistakes

If you carefully read the first SMS messages above, you can easily spot numerous grammatical mistakes. A bank will never send such poorly worded messages to their customers.

However, they may copy the real SMS message from CIMB to trick you into thinking that this is a real transaction. Such fake SMS messages will have proper grammar.

Warning Sign #2 : Embedded Links

Banks will NEVER embed links (URLs) into the message. If you see embedded links, always think – SCAM SMS!

Unlike the Public Bank SMS scam, they used a copy of the real SMS message to trick you into clicking the URL in the first message.

Warning Sign #3 : Wrong Links

And always check the link – www.cimbclickikm.cc and cimbclicksecurity.com are not the correct addresses for the CIMB Bank websites (www.cimbclicks.com.my or www.cimb.com.my).

The best policy is to manually key in the bank website address. NEVER click on any link in an SMS, even if it looks legit.

When you see any website with .cc links, be wary because the .CC domains are registered in the Cocos (Keeling) Islands – an Australian territory of only 14 km², with only about 600 inhabitants.

Warning Sign #4 : No Personal Login Phrase / Picture

To avoid phishing attacks, banks now give you a secret response (like a picture or a phrase) to confirm that you are visiting their legitimate website.

If the website you are visiting gives you the wrong picture or secret phrase, you have been tricked into visiting a fake website designed to mimic the real bank website.

You should also remember that the bank website must show you secret picture or phrase right after you enter your login, but BEFORE you key in your password.

If you are asked to key in your password without the website displaying the secret phrase or picture, you have been tricked into visiting a fake website designed to mimic the real bank website.

 

CIMB Advice To Protect Against Fake SMS / Email Scams

Here is a list of DOs and DON’Ts to protect yourself against fake SMS / email scams.

Please DO follow these good practices

  1. Pay attention to your transaction alerts and check your account activities regularly. In case of any unusual activity, please contact us immediately.
  2. If you wish to contact us, ONLY call the number on the back of your card or refer to CIMB website “Contact Us” page.
  3. Always check the URL of the website that you are making purchases from. Ensure  the “lock” icon or “https” appears on the website’s address bar.
  4. Always find a reputable seller on online marketplaces by searching for reviews from other customers to know their experience.
  5. To access CIMB Clicks, type the entire URL as follows: www.cimbclicks.com.my
  6. Always remember to log out once you have completed your banking transactions.

Please DO NOT follow these bad practices

  1. Don’t panic and give personal information to fraudsters impersonating representatives of government agencies etc. even if they deploy fear tactics. Immediately call the number on the back of your card to verify with CIMB.
  2. Never apply for personal financing through unverified links or individuals promising a lower rate. CIMB does not impose any application charges for personal financing applications.
  3. Never take instructions from anyone to change the mobile number in CIMB records to any number other than your own mobile number.
  4. When transacting online, never continue with a purchase if you have any doubts if the seller is not genuine.
  5. Never share details such as your card number / User ID / PIN / password / TAC  with anyone or key them in in any website other than CIMB Clicks.
    (Note: CIMB will never ask for  your ‘User ID’, ‘Password’ or ‘TAC’ under any circumstances outside of CIMB Clicks).
  6. Do not click on links or open email attachments from unknown / unreliable senders / sources.
    (Note: Emails from CIMB will always end with @cimb.com such as cimb.marketing@cimb.com

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Warning : Public Bank Customers Hit By Fake SMS!

Scammers continue to target Public Bank customers, using many different kinds of fake SMS messages.

Do NOT click or call if you receive any of these fake SMS messages!

 

Public Bank : Fake SMS Scam Warning! Do NOT Click / Call!

Whether you are a Public Bank customer or not, you may receive one of these alarming SMS messages.

Please DO NOT click on the link, or call the number. JUST IGNORE THEM, or delete them.

The safest thing to do is NEVER CLICK ON A LINK in any SMS. If you need to log into your bank account, key in the website address manually.

RM0 PBB/PIBB: Your PBB account will TERMINATED on 02Dec20 01:30:00 AM. Please make verification via http://www.mypbebank.cc to avoid service interruption. Verify now keep on using PBB services.

RM0 Credit Cash out RM3,000 form card ending no 7102 successful on 01 DEC. Information system sending. Call PBB 1800-81-9566 for any query

Warning: Your account is marked as insecure, please click Return PAC immediately to confirm that it is safe to use. (https://pbevip.vip/)

PBe Your account is in a high-risk state PLS log in immediately and return the PAC to protect your account security https://www.pbebanks.top

PBe Warning: Phishing URLs are frequent recently, PLS log in immediately to strengthen account security. 2Mar21 13:14 https://se1.pbevip.top/

PB e Your account is in a high-risk by the system, PLS re-verify your account https://pbbanks.red/ <security reminder is normal>

RM0 PIBB: Thank you for using your card ending 1098@senQ MYR 2899, Pls call 03-56260232 now, if you didn’t use it

RM0 PBB/PIBB: Trx amt MYR2699.00  @LAZADA for card ending 5738. Call PB 1-800-81-2337 now if didn t perform.

PBB: Your account is judged as high risk by the system. PLS re-verify your account https://www.pbebanks.asia/ <security reminder is normal>

PB e Alarm Your banking Suit now is marked as insecure, PLS re-verify your account https://online-pbebank.com <security reminder is normal>

 

Public Bank Fake SMS Scam : What Happens If You Click?

Clicking on the links will often lead you to a phishing website, a fake website designed to look like a Public Bank website.

You will be asked to key in your personal information, including your Public Bank user name and password. DO NOT KEY IN YOUR INFORMATION!

But if you are free and want to help screw these scammers, key in fake information as many times as possible.

Note : These scams do not just affect Public Bank. In fact, all banks are affected :

 

Public Bank : How To Identify Fake SMS Messages

With a little help from Public Bank, let’s show you how to identify fake SMS messages.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Grammatical Mistakes

Read the two SMS messages above, and you can easily spot numerous grammatical mistakes. A bank will never send such poorly worded messages to their customers.

Warning Sign #2 : Embedded Links

Banks will NEVER embed links (URLs) into the message. If you see embedded links, always think – SCAM SMS!

Warning Sign #3 : Wrong Links

And always check the link – www.mypbebank.cc is not the correct address for the Public Bank website (www.pbebank.com)

When you see any website with .cc links, be wary because the .CC domains are registered in the Cocos Islands – an Australian territory of only 14 km², with only about 600 inhabitants.

The same goes for generic, top level domains like .TOP, .VIP, .TOP, .RED.ASIA, etc.

Warning Sign #4 : No Personal Login Phrase / Picture

To avoid phishing attacks, banks now give you a secret response (like a picture or a phrase) to confirm that you are visiting their legitimate website.

If the website you are visiting gives you the wrong picture or secret phrase, you have been tricked into visiting a fake website designed to mimic the real bank website.

You should also remember that the bank website must show you secret picture or phrase right after you enter your login, but BEFORE you key in your password.

If you are asked to key in your password without the website displaying the secret phrase or picture, you have been tricked into visiting a fake website designed to mimic the real bank website.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Must Foreigners In Malaysia Carry Passport At All Times?

Must foreigners in Malaysia carry their passport at all times, because there is a massive operation to weed out illegal foreigners?

Find out what’s the latest viral message, and what the facts really are!

 

Massive Immigration Op, Have Your Passport At All Times?

A viral message has gone out, purporting to be a warning from Malaysia Immigration Director-General Dato’ Indera Khairul Dzaimee Bin Daud, with his picture attached :

All FOREIGNERS residing in Malaysia from now on should carry their PASSPORT with them at all times.

We are on [a] massive OPERATION to weed out all illegal foreigners and to enable us [to] roll out vaccination for our citizens.

FOREIGN Embassies should take note.

 

Must Foreigners In Malaysia Carry Their Passport At All Times?

Fact #1 : The Viral Message Is Fake, But…

First of all, we should point out that the Malaysia Immigration Department has officially denounced the viral message as FAKE.

That said, we believe that they are referring to the claim of a “massive OPERATION to weed out all illegal immigrants” or that it was “to enable us [to] roll out vaccination for our citizens.

Before we get to the law, let’s take a look at their statement, with our English translation :

PENAFIAN : BERITA PALSU

Orang ramai dinasihatkan supaya tidak terperdaya dengan BERITA PALSU menggunakan gambar Ketua Pengarah Imigresen.

Segera laporkan kepada Jabatan Imigresen Malaysia jika terdapat sebarang berita yang meragukan supaya tindakan sewajarnya dapat diambil.

DENIAL : FAKE NEWS

The public is advised not to be fooled by the FAKE NEWS using the picture of the Director General of Immigration.

Immediately report to the Malaysian Immigration Department if there is any suspicious news so that appropriate action can be taken.

Fact #2 : Foreigners Must Have Passport / Travel Document At All Times

Even though the message above is FALSE, foreigners should carry their passport or travel document with them at all times during their stay in Malaysia.

According to Section 6(3) of the Immigration Act 1959/63, all foreigners must be able to produce a genuine passport / travel document / entry permit with a valid endorsement / pass upon request.

Failure to produce a valid passport or travel document, with a valid pass, could result in these penalties

  • a compound of RM3,000, or
  • a fine of up to RM10,000 and/or up to 5 years imprisonment

In their advisory to foreigners, the Malaysian Immigration Department states :

As such foreign visitors are reminded :-

  1. To take precaution on the safety of their passport / travel document and must carry with them during their stay in Malaysia.
  2. Must ascertain that they produced their passport / travel document to an Immigration officer at the point of entry and has been issued with the relevant pass.
  3. To report immediately to the Immigration Department for the lost of their passport / travel document.

So it really doesn’t matter if there is a massive operation to weed out illegal immigrants or not. All foreigners should carry their passport / travel document with them at all times.

 

Recommended Reading

Go Back To > Travel | Fact ChecksHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

macOS, iOS, iPadOS, Safari CVE-2021-1844 Bug : Fix It Now!

Apple just rushed out macOS Big Sur 11.2.3, iOS 14.4.1, iPadOS 14.4.1 and Safari 14.0.3 to patch a critical security bug.

Find out what they fix, and why you need to update your MacBook, iPhone and iPad right away!

 

Apple Rushes Out macOS, iOS, iPadOS, Safari Critical Bug Fixes!

Released on 8 March 2021, macOS Big Sur 11.2.3 patches only one bug, which may mislead users into thinking that it’s not very important.

WebKit

Available for: macOS Big Sur

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

On the same day, Apple also released iOS 14.4.1 and iPadOS 14.4.1 – both patching the same CVE-2021-1844 vulnerability.

WebKit

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

Apple also released Safari 14.0.3, which patches the same vulnerability for macOS Catalina and macOS Mojave :

WebKit

Available for: macOS Catalina and macOS Mojave

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

 

Why Install These macOS, iOS, iPadOS, Safari Bug Fixes ASAP?

While they appear to only patch WebKit in macOS Big Sur, iOS, iPadOS and Safari, they are CRITICAL bug fixes that you need to install right away.

They patch the new CVE-2021-1844 vulnerability, which was discovered by Clément Lecigne of Google’s Threat Analysis Group and Alison Huffman of Microsoft Browser Vulnerability Research.

This vulnerability allows a remote attacker to trigger a buffer overflow when the victim opens a specially-crafted web page, allowing the attacker to execute arbitrary code on the target system.

It is not known if this vulnerability has been exploited yet, but it is critical to install the new updates to prevent that from happening.

 

Recommended Reading

Go Back To > Software | CybersecurityHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


USS Al Gore Global Warming Research Vessel Frozen In Ice?

Did the USS Al Gore Global Warming Research Vessel get frozen in ice?

Take a look at the pictures, and find out what the facts really are!

 

USS Al Gore Global Warming Research Vessel Frozen In Ice?

People keep sharing pictures of the USS Al Gore Global Warming Research Vessel frozen in ice, some as a joke, some as evidence that global warming does not actually exist.

You will find these being shared on Facebook, Twitter, WhatsApp, Reddit, and even some websites.

Note : We intentionally placed the FALSE overlay to prevent them from being further abused.

Because these have been debunked previously on our sister website, someone started sharing a new picture instead. This time, of a much larger ship.

 

USS Al Gore : The Facts

As you can surmise by now, those pictures are NOT of the USS Al Gore Global Warming Research Vessel.

Climate change is real, and sharing pictures of frozen boats is not going to change the fact that the world is getting warmer.

Here are the reasons why these are all FAKE PICTURES being shared by climate change deniers.

Fact #1 : There Is No USS Al Gore

The USS Al Gore does not exist. The USS (United States Ship) designation is reserved for active commissioned ships of the US Navy. There has never been a ship named for former US Vice-President Al Gore.

Well, a FICTIONAL submersible aircraft carrier – the CVJ-01 USS Al Gore – was named after him, but I don’t suppose that counts… because it’s a SUBMARINE! 😀

Fact #2 : Al Gore Has A Houseboat Called Bio-Solar One

Al Gore has a 100-foot houseboat that is powered by bio-diesel and solar panels, called Bio-Solar One. It was launched sometime in September 2008.

Here, you can see it at the Hurricane Marina in Silver Point, Tennessee. Completely different design and size, and NEVER FROZEN in ice.

Photo Credit : The Tennessean

Fact #3 : The Frozen Boat Was In Switzerland

The original fake picture of USS Al Gore was of a boat moored off Versoix, on the shores of Lake Geneva, Switzerland.

It was hit by an ice storm in 2005 – the freezing rain froze into a thick glaze of ice that covered not only this boat, but also vehicles, buildings and the streets.

This photo of the same boat was taken by a different photographer, Santiago Puig Viladomiu.

The date stamp is clear – this was taken on 28 January 2005 – more than 3.5 years before Al Gore’s Bio-Solar One houseboat was even launched.

Fact #4 : The Frozen Ship Was In Russia

The newer fake photo of USS Al Gore was really taken on 19 January 2006, of the ship GEORG OTS at the port of Saint Petersburg in Russia.

GEORG OTS (IMO 7625835) is a passenger Roll-On, Roll-Off (Ro-Ro) cargo ship built in 1980, and has ceased service since 2013, last seen heading to Zhoushan, China.

Here you can see the original picture used in the fake USS Al Gore photo, and the GEORG OTS during warmer times.

 

Recommended Reading

Go Back To > Fact Checks | ScienceHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

CD PROJEKT RED Hack : Source Codes + Docs Stolen!

CD PROJEKT RED just had their source codes and internal documents stolen in a MAJOR HACK, and they may all end up being leaked!

 

CD PROJEKT RED Hack : Source Codes Stolen, Servers Encrypted!

On 9 February 2021, CD PROJEKT RED announced that their data – including source codes and internal documents – were stolen in a hack, and could possibly be leaked.

Their servers were also encrypted in a secondary ransomware attack by the same hackers, but they had backups of the encrypted data.

CD PROJEKT RED publicly ruled out negotiating with the hackers, or giving in to their demands.

This would likely mean that their source codes and internal documents will eventually be released publicly by the hackers.

The only silver lining – CD PROJEKT RED noted that they do not have any evidence that the personal data of their employees were accessed or stolen.

 

CD PROJEKT RED Hack : The Hackers’ Threats

According to the ransom note left on their servers, the hackers stole :

  • FULL source codes for Cyberpunk 2077, Witcher 3, GWENT and the unreleased version of Witcher 3.
  • ALL of their internal documents on accounting, administration, legal, HR, investor relations and more

They also encrypted all of their CD PROJEKT RED’s servers, but acknowledged that they would most likely recover the data from their backups.

The hackers are giving the CD PROJEKT RED team 48 hours to contact them to negotiate.

If there is no agreement, they threaten to sell or leak the source codes, and release their internal documents to the media.

They claim that the internal documents will make CD PROJEKT RED look bad, causing their stock prices to fall and their investors will lose trust in them.

 

CD PROJEKT RED : Official Statement On Hack

This is the official statement by CD PROJEKT RED on the hack :

Yesterday we discovered that we have become a victim of a targeted cyber attack, due to which some of our internal systems have been compromised.

An unidentified actor gained unauthorized access to our internal network, collected certain data belonging to CD PROJEKT capital group, and left a ransom note the content of which we release to the public. Although some devices in our network have been encrypted, our backups remain intact. We have already secured our IT infrastructure and begun restoring the data.

We will not give in to the demands nor negotiate with the factor, being aware that this may eventually lead to the release of the compromised data. We are taking necessary steps to mitigate the consequences of such a release, in particular by approaching any parties that may be affected due to the breach.

We are still investigating the incident, however at this t time we can confirm that – to the best of our knowledge – the compromised systems did not contain any personal data of our players or users of our services.

We have already approached the relevant authorities, including law enforcement and the President of the Personal Data Protection Office, as well as IT forensic specialists, and we will closely cooperate with them in order to fully investigate the incident.

 

Recommended Reading

Go Back To > Cybersecurity | Games | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Ministry of Education Website Uses Plain Text CAPTCHA!

It is unbelievable, but the Malaysia Ministry of Education’s website uses plain text CAPTCHA that can be copied and pasted!

Take a look at this incredulous security lapse, and find out why it could put your data at risk!

 

Ministry of Education Website Uses Plain Text CAPTCHA!

The recent threat by Anonymous Malaysia to attack government websites over their lack of security appears to be well-justified.

Qusyaire Ezwan spotted an incredulous security lapse in the official Malaysia Ministry of Education website – plain text CAPTCHA!

On top of that, the code can actually be copied and pasted!

 

Ministry of Education Plain Text CAPTCHA : A Serious Cybersecurity Risk!

The CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) test is something most of us are familiar with.

It is a test that helps to identify real humans, and weed out bots, before they are allowed to access a service. This prevents bot fraud and hacking attempts.

In the Ministry of Education website, the plain text CAPTCHA was used to “secure” the retrieval of forgotten passwords for their Student Management Module.

A real CAPTCHA uses distorted images to prevent a bot from “reading” the numbers or letters, thereby ensuring that only a real human being would be able to key in the correct code.

As this screenshot shows, the CAPTCHA used in the Ministry of Education website just uses random sequences of letters and numbers in PLAIN TEXT!

This means a bot can easily copy and paste the plain text code, and bypass the CAPTCHA test.

Frankly, this doesn’t even qualify as a CAPTCHA test, because it cannot differentiate between humans and bots.

Now, the password is still sent to the registered email accounts, not to the hackers or bots. So your data is not in immediate danger.

However, this is still a SERIOUS cybersecurity risk, because a hacker can pair this design flaw with compromised email accounts.

It would allow their bots to easily and quickly make password retrieval requests for compromised email accounts, and then retrieve your Ministry of Education password.

Having access to the Student Management Module would give hackers access to a ton of information on children and their parents :

  • child : name, date of birth, telephone number, home address
  • school : location, class name, teacher’s name,
  • parent : name, occupation, workplace address, contact number, declared salary

On top of that, many people reuse their passwords, so hackers will use the password retrieved from the Ministry of Education website on other websites and online services you may use.

If you use the same password for your banking account, for example, that would expose your banking account to the hacker.

That is why CAPTCHA is important. It doesn’t prevent hacking attempts, but it greatly slows it down by blocking bots from making mass requests.

The use of plain text CAPTCHA in an official government website is a fiasco. A basic cybersecurity checklist would have prevented software vendors from using plain text CAPTCHA in government websites.

The Malaysian government needs to take the security of official websites seriously. This is a disgrace.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Beware Of AirAsia X Scam On WhatsApp!

AirAsia X is warning about a scam on WhatsApp that is trying to trick people into making payments.

Please watch out for this scam, and WARN your family and friends!

 

Beware Of AirAsia X Scam On WhatsApp!

There is a new scam on WhatsApp involving AirAsia A.

Scammers pretending to be AirAsia X are sending messages on WhatsApp, asking people to make a payment into an account allegedly belonging to a credit management company.

AirAsia X announced that neither they nor their employees are involved with that scam.

Just like banks, AirAsia X will NOT engage with customers, or solicit payments through any instant messaging apps like WhatsApp.

All official AirAsia X announcements are made through the mass media, or these official channels on social media :

Twitter: www.twitter.com/airasia
Instagram: www.instagram.com/airasia
Facebook: www.facebook.com/airasia

 

Other Scams To Watch Out For

Other than this new AirAsia X scam on WhatsApp, please watch out for these scams too :

Go Back To > Cybersecurity | TravelHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Why You Should NOT Move WhatsApp Chats To Telegram!

Telegram just highlighted the ability to migrate WhatsApp chats to their app, but you really should NOT do that.

Find out why this is a BIG security and privacy risk than just leaving your chats in WhatsApp!

 

Telegram : Moving Chat History From WhatsApp, Line + KakaoTalk

In a recent version 7.4 update for their iOS app, Telegram announced a new feature – the ability to move your chat messages from other apps like WhatsApp, Line and Kakaotalk to their app.

Curiously, that ability has actually been part of WhatsApp since 2018, when they introduced the ability to export chats to email and other apps.

And while this feature is purportedly available only with the iOS version of Telegram Messenger, you can already do that with existing versions of WhatsApp and Telegram.

 

Why You Should NOT Move WhatsApp Chats To Telegram!

You should note that the privacy risks with WhatsApp have been grossly exaggerated by the media and many Internet “experts”.

For one thing – WhatsApp users have been sharing metadata with Facebook since September 2016, a fact initially lost on many media outlets and “experts”.

But we understand the fear – Facebook is a real snoop. Even so, it would be a mistake to migrate from WhatsApp to Telegram.

Let us share with you why you should NOT migrate from WhatsApp to Telegram, and why it is a BIG mistake to migrate your WhatsApp data to Telegram.

Fact #1 : Telegram Is LESS Secure Than WhatsApp

WhatsApp fully implemented end-to-end encryption across all of their apps and network since 5 April 2016.

End-to-end encryption prevents WhatsApp or Facebook from reading your messages. Only the sender and receiver(s) can read them.

WhatsApp shares a considerable amount of data and metadata that Facebook can use to identify and track your movements and activities. But not the content of your messages.

Telegram, on the other hand, has STILL NOT implemented end-to-end encryption for all messages by default.

Instead, they still insist on offering end-to-end encryption only when you create a Secret Chat.

This leaves the bulk of your messages completely readable by Telegram and anyone who intercepts those messages as they travel from your device through the Internet to the recipient.

The very presence of Secret Chats between certain people is itself metadata that can help oppressive regimes identify their enemies or whistleblowers.

Fact #2 : Your Data Is Stored In Telegram Cloud Servers

All WhatsApp data is stored only in your registered device. WhatsApp also does not retain messages in their servers after they are delivered, and will only store files (like photos and videos) and undelivered messages for 30 days.

It’s the opposite with Telegram – all of your data – messages, photos, videos, documents – is stored in their cloud servers. Even though they are encrypted in storage, Telegram holds the encryption keys, NOT YOU.

This ability has its advantages like convenient access across multiple devices, but it also makes Telegram less secure.

Telegram has access to your encrypted files, including the ability to decrypt them for authorities that legally compels them to do so.

Fact #3 : Moving Your Messages + Media To Telegram Exposes Them

While your chats and media remain within your WhatsApp app, they are encrypted and not available to anyone but yourself (and the recipients).

Migrating your chat messages and media to Telegram would involve sending them unencrypted to Telegram’s servers.

This exposes your hitherto secure chats and media to a man-in-the-middle attack – allowing a third party to snoop or grab a copy of the data as it travels unencrypted to the Telegram servers.

Fact #4 : Facebook Already Has Your Metadata

As we pointed out earlier, WhatsApp has been sharing our metadata with Facebook since September 2016.

So moving your existing chats out of WhatsApp won’t limit or reduce your exposure. That horse has long bolted from the stable.

Moving your chat history and files to Telegram will just offer a new attack surface for cybercriminals and oppressive regimes.

Fact #5 : Facebook Will Still Have Your Data If You Still Use Facebook!

Here is the other thing that people don’t realise – migrating from WhatsApp to another messaging app is pointless if you do not also stop using Facebook.

As long as you still use Facebook, they will still have access to a consideration amount of metadata. Losing your WhatsApp metadata just gives them less metadata.

After all, Facebook can track your movements and activity even if you are NOT on Facebook! This is what they call Off-Facebook Activity.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Is WhatsApp Forcing Us To Share Data With Facebook In February 2021?

Many websites are claiming that WhatsApp is forcing us to share our data with Facebook in February 2021.

Find out what’s going on, and what the FACTS really are!

 

WhatsApp Sharing Data With Facebook : What’s Going On?

We wrote about this earlier, but it looks like many websites (including very influential ones) are still peddling the claim that WhatsApp is going to force us to share data with Facebook in February 2021.

It all started with this pop-up alert that started appearing on WhatsApp a few days ago, alerting us to a change in its terms and privacy policy.

You must accept this new privacy policy to continue using WhatsApp from 8 February 2021 onwards. Otherwise, the alert subtly suggests, you should “delete your account”.

Since then, numerous articles have been written about how this new privacy policy is forcing us to share our WhatsApp data with Facebook.

This has led to many people switching to alternatives like Telegram and Signal, in fear that the new privacy policy would allow Facebook to access and read all of their WhatsApp messages.

 

No, WhatsApp Is Not Forcing You To Share Data With Facebook

As we shared earlier, NO, the new WhatsApp privacy policy does not force you to share data with Facebook, because…

Fact #1 : It Has Been A Requirement Since September 2016!

It is perplexing why so many websites claim that this new privacy policy forces us to let WhatsApp share data with Facebook. After all, this has been a requirement since September 2016!

Back in August 2016, WhatsApp announced that they would start sharing data with Facebook. At that time, they gave existing users 30 days to opt-out.

This was a one-time offer that has never been repeated. Since then, every new and current user MUST agree to let WhatsApp share data with Facebook.

Fact #2 : WhatsApp Will Still Honour The Opt-Out

If you are a WhatsApp veteran who opted out of data sharing in August 2016, WhatsApp will still honour that opt-out.

You can safely agree to the new privacy policy – your data opt-out will remain active.

Fact #3 : WhatsApp Will Share MORE Information With Facebook

The new WhatsApp privacy policy is mainly focused on enabling Businesses on WhatsApp.

So while they DO NOT need your permission to continue sharing data with Facebook, they still need your permission to SHARE MORE data with Facebook.

This is the list of additional data that we must agree to let WhatsApp share with Facebook :

  • Status Information. You may provide us your status if you choose to include one on your account. Learn how to use status on Android, iPhone, or KaiOS.
  • Transactions And Payments Data. If you use our payments services, or use our Services meant for purchases or other financial transactions, we process additional information about you, including payment account and transaction information. Payment account and transaction information includes information needed to complete the transaction (for example, information about your payment method, shipping details and transaction amount). If you use our payments services available in your country or territory, our privacy practices are described in the applicable payments privacy policy.
  • Location Information. We collect and use precise location information from your device with your permission when you choose to use location-related features, like when you decide to share your location with your contacts or view locations nearby or locations others have shared with you. There are certain settings relating to location-related information which you can find in your device settings or the in-app settings, such as location sharing. Even if you do not use our location-related features, we use IP addresses and other information like phone number area codes to estimate your general location (e.g., city and country). We also use your location information for diagnostics and troubleshooting purposes.
  • User Reports. Just as you can report other users, other users or third parties may also choose to report to us your interactions and your messages with them or others on our Services; for example, to report possible violations of our Terms or policies. When a report is made, we collect information on both the reporting user and reported user.
  • Businesses On WhatsApp. Businesses you interact with using our Services may provide us with information about their interactions with you. We require each of these businesses to act in accordance with applicable law when providing any information to us.When you message with a business on WhatsApp, keep in mind that the content you share may be visible to several people in that business. In addition, some businesses might be working with third-party service providers (which may include Facebook) to help manage their communications with their customers. For example, a business may give such third-party service provider access to its communications to send, store, read, manage, or otherwise process them for the business. To understand how a business processes your information, including how it might share your information with third parties or Facebook, you should review that business’ privacy policy or contact the business directly.

Fact #4 : WhatsApp + Facebook Cannot Read Your Messages

WhatsApp finished implementing end-to-end encryption on 5 April 2016, about 4.5 months before instituting the requirement to share data with Facebook.

Since then, WhatsApp nor Facebook can no longer read your messages, as they are encrypted. Only the sender and receiver(s) can read them.

WhatsApp shares a considerable amount of data and metadata that Facebook can use to identify and track your movements and activities. But not the content of your messages.

Fact #5 : Telegram Is Less Secure!

For those who are fleeing to Telegram, you should note that Telegram does not encrypt messages (only Secret Chats).

In fact, all of your data – messages, photos, videos, documents – are stored in Telegram servers. Even though they are encrypted in storage, Telegram holds the encryption keys, NOT YOU.

In contrast, WhatsApp data is only stored in your devices. WhatsApp also does not retain messages in their servers after they are delivered, and will only store files (like photos and videos) and undelivered messages for 30 days.

WhatsApp will, however, store the time and date of the messages you send and receive.

Fact #6 : Signal Is The Most Secure Alternative

Those who want a more private and secure messenger should opt for Signal, instead of Telegram.

It offers end-to-end encryption using the open-source Signal protocol, the same protocol which WhatsApp uses in its own proprietary format.

On top of that, it offers a Sealed Sender feature which prevents everyone – including Signal – from knowing the sender and recipient of a message.

But best of all, Signal does not share your data with any third-party company. In fact, the only metadata it collects is your phone number, and even that is not linked to your identity.

That said, Signal lacks features found in WhatsApp and Telegram, so we cannot call it the best alternative, only the most secure alternative.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Hello? WhatsApp Is Already Sharing Data With Facebook!

People are worried that a new WhatsApp privacy policy update will force them to share data with Facebook.

Well, here’s the real surprise – don’t you know that WhatsApp is already doing that?

Find out what’s going on, and what WhatsApp is really changing…

 

New WhatsApp Privacy Policy : Share Data With Facebook?

Many of you may have woken up to this pop-up on WhatsApp, alerting you to a change in its terms and privacy policy, which takes effect on 8 February 2021.

While you can delay the decision by clicking NOT NOW, you have to accept the new terms and privacy policy, to continue using WhatsApp.

Otherwise, the alert subtly suggests, you should “delete your account”.

 

Hello? WhatsApp Is Already Sharing Data With Facebook!

Many WhatsApp users are shocked by this new development, and pondering about whether they should jump to Telegram or some other instant messenger.

What’s more egregious though is that many websites are “warning” their readers about this new, shocking development.

The fact of the matter is – WhatsApp has been sharing data with Facebook for years!

In The Beginning : Private Communication Assured

After Facebook bought WhatsApp for a cool US$19 billion, Jan Koum set the record straight on 17 March 2014 :

Respect for your privacy is coded into our DNA, and we built WhatsApp around the goal of knowing as little about you as possible: You don’t have to give us your name and we don’t ask for your email address. We don’t know your birthday. We don’t know your home address. We don’t know where you work. We don’t know your likes, what you search for on the internet or collect your GPS location. None of that data has ever been collected and stored by WhatsApp, and we really have no plans to change that.

2016 : WhatsApp Starts Sharing Data With Facebook

In August 2016, WhatsApp announced that they would start sharing data with Facebook, after rolling out end-to-end encryption.

[B]y coordinating more with Facebook, we’ll be able to do things like track basic metrics about how often people use our services and better fight spam on WhatsApp. And by connecting your phone number with Facebook’s systems, Facebook can offer better friend suggestions and show you more relevant ads if you have an account with them. For example, you might see an ad from a company you already work with, rather than one from someone you’ve never heard of.

At that time, WhatsApp offered existing users a special one-time only option to opt-out of the data sharing, but only if they did it within 30 days.

If you are an existing user, you can choose not to have your WhatsApp account information shared with Facebook to improve your Facebook ads and products experiences. Existing users who accept our updated Terms and Privacy Policy will have an additional 30 days to make this choice by going to Settings > Account.

If you did not opt-out within 30 days back in August 2016, your data would be shared with Facebook.

This opt-out option was NOT provided to new WhatsApp users who registered on or after 25 August 2016.

After 24 September 2016 : WhatsApp Has Been Sharing Data With Facebook

With the singular exception of existing users who managed to opt-out by 24 September 2016, the data of every other WhatsApp user has been shared with Facebook.

8 February 2021 Onwards : More Information Is Shared

What will really change from 8 February 2021 onwards is the additional information that WhatsApp will share with Facebook :

  • Status Information. You may provide us your status if you choose to include one on your account. Learn how to use status on Android, iPhone, or KaiOS.
  • Transactions And Payments Data. If you use our payments services, or use our Services meant for purchases or other financial transactions, we process additional information about you, including payment account and transaction information. Payment account and transaction information includes information needed to complete the transaction (for example, information about your payment method, shipping details and transaction amount). If you use our payments services available in your country or territory, our privacy practices are described in the applicable payments privacy policy.
  • Location Information. We collect and use precise location information from your device with your permission when you choose to use location-related features, like when you decide to share your location with your contacts or view locations nearby or locations others have shared with you. There are certain settings relating to location-related information which you can find in your device settings or the in-app settings, such as location sharing. Even if you do not use our location-related features, we use IP addresses and other information like phone number area codes to estimate your general location (e.g., city and country). We also use your location information for diagnostics and troubleshooting purposes.
  • User Reports. Just as you can report other users, other users or third parties may also choose to report to us your interactions and your messages with them or others on our Services; for example, to report possible violations of our Terms or policies. When a report is made, we collect information on both the reporting user and reported user.
  • Businesses On WhatsApp. Businesses you interact with using our Services may provide us with information about their interactions with you. We require each of these businesses to act in accordance with applicable law when providing any information to us.When you message with a business on WhatsApp, keep in mind that the content you share may be visible to several people in that business. In addition, some businesses might be working with third-party service providers (which may include Facebook) to help manage their communications with their customers. For example, a business may give such third-party service provider access to its communications to send, store, read, manage, or otherwise process them for the business. To understand how a business processes your information, including how it might share your information with third parties or Facebook, you should review that business’ privacy policy or contact the business directly.

 

Opted Out In 2016? It Is Still Honoured!

WhatsApp will apparently continue to honour the decision of those who opted-out of data sharing in August 2016.

For those who opted out, you can agree to the new policy, and your data will still NOT be shared with Facebook.

To check if you opted-out in August 2016, you will need to check in your WhatsApp account – Settings > Account > Request Account Info.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

HUAWEI New Year Gift Scam : Don’t Click Or Share!

Watch out for the HUAWEI New Year Gift scam that’s circulating on WhatsApp!

Do NOT click or share. Just delete it, and WARN YOUR FAMILY AND FRIENDS!

 

HUAWEI New Year Gift Scam : Do NOT Click Or Share!

Scammers are sending out this message on WhatsApp, claiming that HUAWEI is giving away New Year gifts.

Please do NOT click on the message, or share it. Just delete it and warn your family and friends!

 

Why This HUAWEI New Year Gift Offer Is A Scam

Let us show you why this HUAWEI New Year Gift offer (and similar offers) is just a scam.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Not Using The Real HUAWEI Domain

A genuine HUAWEI campaign would use the real HUAWEI domain – www.huawei.com.

The use of a different domain (2021-whatsapp3w.bar) should warn you that this is not a legitimate HUAWEI website.

Warning Sign #2 : HUAWEI Does Not Give Away Free Gifts

HUAWEI is a for-profit corporation whose goal is to make money, not give it away.

They are not a charity, and will never give free gifts to celebrate a new year, or anniversary.

They only give free gifts to promote the purchase of their latest products.

Warning Sign #3 : Ridiculous Prizes

While brands may sometimes give away branded swag like a face mask, a t-shirt, or a cap; they will NEVER give away CASH as a prize.

And there is no way they would give away US$5,000 cash prizes. That’s just nuts! It should be cheaper to just give away one of their latest Mate 40 Pro smartphones.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Maybank B40 Subsidy Scam : Do NOT Click Or Call!

Watch out for the new Maybank B40 subsidy scam! It is a phishing attack to gain access to your Maybank account!

Do NOT click or call. Just delete it, and WARN YOUR FAMILY AND FRIENDS!

 

Maybank B40 Subsidy Scam : Do NOT Click Or Call!

Scammers are sending out this SMS claiming that Maybank (MBB) will issue the B40 subsidy after you fill in some information.

Please do NOT click on the message, or call the telephone number. Just delete it and warn your family and friends!

 

Why This Maybank B40 Subsidy Offer Is Just A Scam

Let us show you why this Maybank B40 subsidy offer (and similar offers) is just a scam.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : No Such B40 Subsidy Program

The Malaysian government has not announced any B40 subsidy program.

Neither would Maybank offer free money for the B40. It’s a bank, not a charity.

Warning Sign #2 : Bad Grammar

The bad English grammar should be a warning sign that this is not a legitimate offer.

Warning Sign #3 : Not Using The Real Maybank Domain

A genuine Maybank campaign would use the real Maybank domain – www.maybank.com.my.

The use of a different domain should warn you that this is not a legitimate Maybank website.

In fact, Google Chrome will warn you that this website is a phishing attack – to get your personal and banking information.

Warning Sign #4 : Asking You For Your Information

The banks – whether they are Maybank, Public Bank, CIMB, etc – will NEVER ask you to fill in your personal details.

Think about it – they already have your information because you have an account with them!

Even if there is a legitimate B40 subsidy programme, they only need you to log into your Maybank account. They do NOT need you to register your details again.

These scammers ask you for these details so they can use them in phishing calls, to convince you that they are really from Maybank.

Warning Sign #5 : Asking You For Your Bank Login!!!

This is a BIG warning sign. Banks will NEVER ask you for your user name and password.

If you key in this information, you are basically giving these scammers access to your Maybank account.

They will call or message you and try to get your TAC (Transaction Authorisation Code) number that is sent to your mobile number. DO NOT GIVE THAT TO THEM!

If you sent them your user name and password, please contact the bank immediately, and change your password!

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Tesco New Year Scam Alert : Do NOT Click / Forward!

Now that the New Year is almost here, the Tesco New Year Scam is going viral on WhatsApp!

Do NOT click on the message if you receive it. Do NOT forward it either!

Just delete it, and WARN YOUR FAMILY AND FRIENDS!

 

Tesco New Year Scam Alert : Do NOT Click / Forward!

People are sharing this Tesco New Year promotion that claims to offer a gift card valued up to RM1000, but it is really nothing more than a SCAM!

Please do NOT click on the message, or forward it to anyone. Just delete it and warn your family and friends!

 

Why This Tesco New Year Offer Is Just A Scam

Let us show you why this Tesco New Year gift card offer (and similar offers) is just a scam.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Bad Grammar

Most of these Tesco gift card scams have bad grammar (example #1, example #2), which is a big clue that this isn’t a genuine Tesco offer.

In this example, they capitalised TESCO and use the grammatically incorrect “win up to RM1000 Tesco Gift Card!

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. Nothing is FREE in this world, much less a RM1000 gift card.

Tesco isn’t going to give you FREE money, just because it’s the new year, or their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Tesco Domain

A genuine Tesco Malaysia campaign would use the real Tesco Malaysia domain – www.tesco.com.my.

Or they would run it off the official Tesco Malaysia page on Facebook – www.facebook.com/TescoMY.

This scam is using a BlogSpot.com domain – which is not something any genuine company would do.

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Antivaxxers Keep Creating Fake Tiffany Dover Death Claims!

Antivaxxers are still creating and spreading fake death claims about Tiffany Dover, while hounding her family and her!

Find out what’s going on, and what YOU can do to help Tiffany Dover and her family!

 

Tiffany Dover : Who Is She? What’s Going On?

Here’s a quick primer for those who have not heard of Tiffany Dover, or what has energised anti-vaccination groups recently.

On 17 December 2020, Tiffany Dover fainted on live TV after getting her Pfizer-BioNTech COVID-19 vaccine, due to vasovagal syncope – a very common condition.

She recovered within minutes, and explained that it wasn’t a surprise because she often faints when she feels pain.

However, antivaxxers pounced on the incident as evidence that the Pfizer BNT162b2 vaccine is dangerous, sharing edited versions of the video to sow fear, doubt and uncertainty about the vaccine.

 

Antivaxxers Keep Creating Fake Tiffany Dover Death Claims!

After her fainting episode was explained and the full video was shared, antivaxxers had to switch gears.

They decided to claim that Tiffany Dover later DIED, after recovering from her fainting spell.

Here are three examples…

Joe Leonard

It looks like rumors of Tiffany Dover’s death are TRUE and it is being covered up.

No activity since her highly publicized public vaccination despite regular use of Instagram. No replies to dozens of questions. Family set their profiles to private.

RIP

Kitty Lynn

OMFG! FAINTING NURSE DIED
Tiffany Dover IS DEAD

I saw that fainting nurse died, so I checked it out!
This death record has to be her! Same town, age, and most importantly, the family listed all show up as her friends on fb!

Shannon Haas

BREAKING There is reports Tiffany Dover is dead. She is the nurse who collapsed on live television when being interviewed about the vaccine. We can’t confirm it, we are trying to collect as much intel as possible.
INTEL WE KNOW
– She is from Tennessee
– She collapsed 15+ minutes after taking the Pfizer vaccine on live television
– Her Instagram account is tiffany_dover_ and she hasn’t posted for 5 days, she generally posts every 2-3 days
– There is social media posts about her death from people who were allegedly connected to her or her family
– There is reports of death threats against her family for sharing the info
– There is reports of censorship
– The debunkers are saying it is all false but are providing very little evidence

Someone even created a fake Tiffany Dover memorial page on Instagram (now removed), saying :

She will always be remembered for her bravery. She was a wonderful nurse. #nurse #bravery #covid_19 #tiffanydover #inmemoryof #hospital #alwaysremember

It gained 1650 followers before Instagram finally shut it down. While it was up, antivaxxers used it to promote the claim that she truly did die after being vaccinated with the Pfizer-BioNTech COVID-19 vaccine.

 

How To Help Tiffany Dover With These Fake Death Claims

Creating and sharing fake death claims about Tiffany Dover isn’t about “having an open mind” or “just investigating the truth” or “exploring the possibilities“.

This is literally cyberbullying!

And it doesn’t even stop with fake death claims. People are also hounding her family and friends, calling them fake or crisis actors.

Help stop this cyberbullying of Tiffany Dover, her family and her friends, by :

  • sharing such fact check articles, including this and this.
  • telling the truth to those who shared with you those fake claims
  • sharing the fact check links as comments on those fake social media posts
  • DO NOT SHARE those fake social media posts

 

Why Tiffany Dover Death Claims Are ALL FAKE!

Fact #1 : Tiffany Dover Is Alive And Well!

According to the NewsChannel 9 ABC crew who recorded the whole event on 17 December 2020, Tiffany Dover quickly recovered, and within minutes, was able to get up and speak with them again.

While antivaxxers are claiming that she subsequently died, those are complete lies. She did NOT die.

Her hospital – CHI Memorial – posted this tweet two days later, confirming that she is well, asking that people give her and her family privacy.

Fact #2 : Tiffany Dover Alive And Well On Video, 4 Days Later!

On 21 December 2020, CHI Memorial followed up with a short video showing that she is alive and well, surrounded by her colleagues.

To prove that it was not filmed before her vaccination and alleged “death”, they held up banners that said, “Nursing Leadership Vaccinated Together, #CHIMemorialStrong” and the date “12-21-20“.

Fact #3 : People Found The Wrong Death Record

Conspiracy theorists and antivaxxers are parading online search results showing her death record.

Many searched Tiffany Dover in the wrong state, because they thought she was a nurse in Alabama. Is it any wonder she got the wrong death record?

Some even assumed that SearchQuarry lists only dead people. It’s actually a search engine for public records in the United States.

With such amazing keyboard investigators, who needs the FBI?

Fact #4 : Tiffany Dover Is Not A Unique Name

As unique as Tiffany Dover surely is as a person, her name isn’t unique.

In the entire US, there are currently 47 Tiffany Dovers, with nine of them in Tennessee. And no, they are NOT CLONES, as some people are alleging.

And they do not include Tiffany Dovers who have actually passed away years or even decades ago.

Fact #5 : People Are Not Obligated To Be Active On Social Media

Skeptics like Shannon Haas claim that she must be dead because “she hasn’t posted for 5 days” even though “she generally posts every 2-3 days“.

First of all, NO ONE is obligated to post anything on social media, much less maintain their activity level.

Secondly, a lack of updates does NOT mean she is dead. Some of us actually have lives, like a real social life outside of social media?

Let’s not forget that she’s a nurse manager in CHI Memorial, which is not only actively treating COVID-19 patients, they are also working to administer the Pfizer COVID-19 vaccine.

So is it really that surprising if she has been too busy to update your stalkers with her latest selfies?

But since you are so “concerned” about her well-being, here’s a photo of Tiffany Dover with her CHI Memorial colleagues on 21 December 2020 :

Fact #6 : Claims Of Reports Are Just Claims, Not Actual Evidence

People like Shannon Haas, Joe Leonard and Kitty Lynn are not true skeptics. They are just too damn lazy to go beyond making unverified claims on social media.

He claimed that there are “reports of death threats against her family for sharing the info” and “reports of censorship“.

But when a friend asked for links for those reports, he could only reply, “Not sure.” I kid you not.

Yet, he had no qualms claiming too that “debunkers are saying it is all false but are providing very little evidence“.

If you see claims like that, WITHOUT EVIDENCE, please treat it the same way you would if someone told you he/she can fly without wings.

With the utmost skepticism : Yeah, sure, bro… sure… preferably with a middle finger.

 

Recommended Reading

Go Back To > Fact Checks | ScienceHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Did Alabama Nurse, Tiffany Dover, Die From Pfizer Vaccine?

Antivaxxers are claiming that an Alabama nurse, Tiffany Dover, died on live TV after taking the Pfizer-BioNTech COVID-19 vaccine!

Find out what’s going on, and what the facts really are!

Updated @ 2020-12-25 : Added more fact checks, because antivaxxers continue to post fake claims about Tiffany. It’s Christmas, for crying out loud!

Originally posted @ 2020-12-23

 

Did Alabama Nurse, Tiffany Dover, Die From Pfizer Vaccine?

There are several versions of this story, but they basically boil down to two main storylines :

a) an unnamed Alabama nurse died on live TV after taking the Pfizer-BioNTech COVID-19 vaccine!

COVID 19 -TEST A nurse in Alabama dies directly on the air after taking the Pfizer vaccine for Corona This is clear evidence of the danger of the vaccine, including the toxins and animal genes .. LOOK AT VEDIO CLIP!

b) a Tennessee nurse, Tiffany Dover, died after fainting on live TV (after taking the Pfizer-BioNTech COVID-19 vaccine)

OMFG! FAINTING NURSE DIED
Tiffany Dover IS DEAD

I saw that fainting nurse died, so I checked it out!
This death record has to be her! Same town, age, and most importantly, the family listed all show up as her friends on fb!

So the nurse who took the COVID-19 vaccination on live television is now dead days after being vaccinated..

 

No, Tiffany Dover, Did NOT Die From Pfizer Vaccine!

The short and sweet summary is this – no nurse died after taking the Pfizer vaccine, whether on live TV or otherwise.

For the skeptics who are fond of asking, “How do you know? Were you there?”, here are the facts…

Fact #1 : No Nurse Died On Live TV In Alabama

Despite claims that an unnamed nurse died in Alabama after being injected with the Pfizer COVID-19 vaccine, that is not true.

The claim was shared with the video of Tiffany Dover, a nurse in Tennessee, fainting on live TV after receiving her Pfizer vaccination.

It is likely that antivaxxers intentionally switched the location from Tennessee to Alabama, to mislead those who already knew about Tiffany Dover.

Fact #2 : Tiffany Dover Is Alive And Well!

According to the NewsChannel 9 ABC crew who recorded the whole event on 17 December 2020, Tiffany Dover quickly recovered, and within minutes, was able to get up and speak with them again.

While antivaxxers are claiming that she subsequently died, those are complete lies. She did NOT die.

In fact, her hospital – CHI Memorial – posted this tweet, confirming that she is well, asking that people give her and her family privacy.

Fact #3 : Tiffany Dover Alive And Well On Video, 4 Days Later!

On 21 December 2020, CHI Memorial followed up with a short video showing that she is alive and well, surrounded by her colleagues.

To prove that it was not filmed before her vaccination and alleged “death”, they held up banners that said, “Nursing Leadership Vaccinated Together, #CHIMemorialStrong” and the date “12-21-20“.

Fact #3 : People Found The Wrong Death Record

Conspiracy theorists and antivaxxers are parading online search results showing her death record.

In fact, Kitty Lynn in this example searched for Tiffany Dover in the wrong state – Alabama. Is it any wonder she got the wrong death record?

Note : We intentionally added the HOAX overlay, to prevent it from being misleadingly shared

And this intrepid online investigator discovered that he/she was also listed on searchquarry.com.

Funnily enough, herdsheeple thought that SearchQuarry lists only dead people. It’s actually a search engine for public records in the United States.

With fantastic investigators like herdsheeple and Kitty Lynn, who needs the FBI?

Fact #4 : Tiffany Dover Is Not A Unique Name

As unique as Tiffany Dover surely is as a person, her name isn’t unique.

In the entire US, there are currently 47 Tiffany Dovers, with nine of them in Tennessee. And no, they are NOT CLONES, as some people are alleging.

And they do not include Tiffany Dovers who have actually passed away years or even decades ago.

Fact #5 : No Animal Genes In mRNA Vaccines

Some of these messages include the claim that the Pfizer COVID-19 vaccine contains animal genes, that’s completely false.

There are no genes of any sort in mRNA vaccines, whether they are from Pfizer or Moderna.

The mRNA in these COVID-19 vaccines are merely RNA instructions – coding for the SARS-CoV-2 spike proteins. That’s it.

Recommended : Pfizer + Moderna mRNA Vaccines : How Do They Work?

 

Recommended Reading

Go Back To > Fact Checks | ScienceHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Did China Create This Amazing Female Dancing Robot?

Did China create this amazing female dancing robot for a dance show in Shanghai?

Watch the viral video for yourself, and find out what the FACTS really are!

 

Did China Create This Amazing Dancing Robot?

Here is the video that countless people have been sharing on social media and even on YouTube. It is often paired with a short explanation in (broken) English.

Can u believe that this female dancer is robot ? The dance was held in Shanghai n it lasted only 5 minutes but the queue was 4hrs n cost 499 Yuan!

It has surpassed Japan in complexity, and saw its perfect facial expressions. Send this video to everyone to watch, let us enjoy together…

 

Amazing Female Dancing Robot : The Truth

The agility and grace of this female dancing robot, and its facial expressions, are incredible.

The less gullible would point out that it is something you would only expect from a real human being, and they would be right.

Fact #1 : That Is A Video Of A WDSF Competition

That is actually a video clip from the 2018 World Dance Sport Federation Championship in Lithuania.

The initials WDSF (World Dance Sport Federation) can be seen, together with the recording date at the upper left corner of the video.

Fact #2 : The Dance Only Lasted A Minute

The dance in the video only lasted just over a minute, even though the accompanying fake message claimed it lasted for 5 minutes.

Fact #3 : Those Are Lithuanian Dance Champions

Both dancers are very human. In fact, they are Lithuanian dance champions Ieva Zukauskaite (female), and Evaldas Sodeika (male).

Fact #4 : 499 Yuan Was The Entry Price To Shanghai Disneyland

The fake story claimed that the ticket to watch this performance costs 499 Yuan – about US$73 / £55 / RM303. That would be ridiculously exorbitant for a short dance.

In truth, that was “copied” from the two earlier hoaxes (here and here) about robot dancers at the Shanghai Disneyland.

Even that was not accurate, because 499 Yuan was the cost of an entry ticket to the Shanghai Disneyland when it first opened in February 2016.

Since 6 June 2018, it has been priced at 399 Yuan (off-peak), 575 Yuan (peak) and 665 Yuan (peak holiday).

 

Why Would Someone Create This Fake Story?

With China’s aggressive foreign stance in recent years, it is not uncommon to see such fake stories being created and shared.

Some believe it’s part of a concerted attempt to burnish China’s image overseas.

Others believe the many fake stories are being created to drown out the negative coverage of China’s controversial Belt and Road Initiative, and their aggressive moves in the South China Sea.

Whatever the reasons may be, it is our duty as global citizens to stop the proliferation of such fake stories.

Please share this fact check with your friends, so they know the truth!

 

Recommended Reading

Go Back To > Fact Checks | Home

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!