Tag Archives: Fraud

Was Katie Hobbs Caught On Camera Fixing Votes?!

Was Katie Hobbs Caught On Camera Fixing Votes?!

Was Arizona gubernatorial candidate Katie Hobbs caught on camera in a secure vote counting facility?!

Take a look at the viral photo, and find out what the facts really are!

 

Claim : Katie Hobbs Was Caught On Camera Fixing Votes!

A screenshot of a CCTV feed has gone viral, with people claiming that it’s evidence Arizona gubernatorial candidate Katie Hobbs was caught on camera in a secure vote counting facility!

LOOK WHO WAS INSIDE THE BALLOT ROOMS. KATIE HOBBS. Time Stamped too.

How is @katie4az allowed in the ballot counting area the day after elections (time stamped)?
@karilake and the state of Arizona are prob gettin robbed?

👀 Katie Hobbs was inside the ballot room. Unreal. Time stamped too.

 

Truth : Katie Hobbs Was Not Caught On Camera Fixing Votes!

The truth is – this is just another FAKE STORY created by Republicans to create doubt about the integrity of the 2022 midterm election.

Fact #1 : Maricopa County Labelled The Claim As False

Maricopa county official dismissed the claim as false, after confirming that the woman in the photo was a party observer.

Not every woman with glasses is Katie Hobbs.

We can confirm this was a party Observer. Please refrain from making assumptions about workers who happen to wear glasses.

Fact #2 : That Lady Is Not Katie Hobbs

At first glance, yes, you may think that the lady in the CCTV screenshot is Katie Hobbs. She’s white and wears black-rimmed glasses… like perhaps thousands of other white women wearing black-rimmed glasses in Arizona.

But if you take a closer look at the photo, you can see that she is not Katie Hobbs. Katie’s hair is much lighter in colour, and parts more to her left; compared to the lady in the screenshot.

Fact #3 : Live Footage At Count Center Is Streamed Online

Maricopa County is no stranger to election conspiracy theories, since it became the epicentre of a nail gripping fight for Arizona in the 2020 Presidential Election.

The loss of Arizona, after the votes in Maricopa were finalised, was one of the reasons Donald Trump lost to Joe Biden. Needless to say, the former President continues to whine about election fraud in Arizona, and his sycophantic supporters just repeat his false claims.

Because of these controversies, Maricopa County streams live footage of its vote counting centre online, so everyone who wants to watch the counting process is free to do so.

In fact, that is how it was possible for people to take that viral screenshot. If that lady (even if she’s not Hobbs) committed some kind of election fraud, they would have seen it.

But they didn’t. Instead, all the person took was a screenshot of a lady walking with her arms folded.

Fact #4 : She Identified Herself As Jackie Marshall

The lady in the screenshot posted a photo of herself with her daughter, in response to the fake post.

She identified herself as Jackie Marshall, and stated that she was an election judge (poll worker), not a poll watcher.

Fact #5 : There Are Many Observers Watching The Count

American voters of the MAGA persuasion may not know this, but there are many observers at the vote counting center.

Some are partisan observers – from both parties (like Jackie Marshall), while others are non-partisan citizen observers, or members of the media.

So it would be impossible for any gubernatorial candidate to walk into a vote counting center, without getting noticed by any of the many observers walking around.

Fact #6 : Vote Counting Centers Are Secured

Vote counting centers are also secured by law enforcement and county security officers.

In Maricopa County, the polling locations and vote counting facilities are kept safe and secure by the Sheriff’s Office, Maricopa County Security Services, and their local, state and federal law enforcement partners.

It would be impossible for any gubernatorial candidate to walk into a vote counting center, without anyone noticing.

Even if the security guards miss what anything nefarious that goes on – the CCTV feeds are all recorded!

Fact #7 : Katie Hobbs Has Staff / Minions

Think about this for just a minute. Katie Hobbs is the sitting Arizona Secretary of State. She has staff… minions, if you prefer, to do her bidding.

Do you really believe that she would waste her precious time stuffing ballots, if she can get someone else to do it for her?

Even if you think she’s that desperate, why put her political career at risk, when she can get someone else to risk their own careers instead?

Use a little common sense, will ya? This fake story is so full of holes, it might as well be Swiss cheese!

Now that you know the facts, please SHARE THIS FACT CHECK out!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Fact CheckTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did US Military Find Evidence Of 2022 Election Fraud?!

Did the US military find evidence of fraud in the 2022 midterm election?!

Take a look at the viral claim, and find out what the FACTS really are!

 

Claim : US Military Find Evidence Of 2022 Election Fraud!

On 9 November 2022, Real Raw News posted an article claiming that the US Army Cyber Command found evidence of fraud in the 2022 midterm election!

It is long and rambling, so please feel free to skip to the next section for the facts!

As citizens and politicians anxiously scrutinized results, so too did the White Hat partition of the U.S. military. At U.S. Army Cyber Command headquarters in Fort Gordon, Georgia, cyber security analysts began noticing election irregularities early in the day. Approximately 35% of vote tabulators—electronic devices into which ballots are fed and counted—experienced what the Maricopa County Elections Department called a “technical hiccup,” which persisted for several hours. Unbeknownst to election officials, White Hats had undercover boots on the ground as the “glitch” forced voters to cast ballots elsewhere or forego voting altogether. At least one machine had active Wi-Fi and was connected to the internet, a Cyber Command source told RRN.

 

Truth : US Military Did Not Find Evidence Of Fraud In 2022 Election!

The truth is – this is just another FAKE STORY created by Real Raw News, just to generate page views and money.

Everything that Real Raw News posts must be regarded as FAKE NEWS, until proven otherwise.

Fact #1 : Real Raw News Is A Fake News Website

Real Raw News is a FAKE NEWS website that capitalises on making shocking but fake stories to generate page views and money.

To protect himself from legal repercussions, the owner and writer, Michael Baxter (real name – Michael Tuffin), claims that his articles are “humour, parody, and satire“.

This disclaimer, which is not clearly mentioned in his articles, lets him keep creating fake news that will go viral, and generate him money.

His articles have been regularly debunked as fake news, so you should NEVER share anything from his website. Here are some of his fake stories that I personally debunked earlier:

As Michael Tuffin himself admitted, he writes as Michael Baxter to “indemnify [himself] against potential legal ramification“.

Fact #2 : Real Raw News Never Offer Actual Evidence

Real Raw News reports always quotes anonymous sources, and offer no evidence to back up those claims. It’s no different in this new claim of electoral fraud in the 2022 midterm election.

Michael Baxter / Tuffin wrote such a long story, and quoted anonymous sources, but when you really look carefully – there is ZERO EVIDENCE for any of his claims.

That’s not really surprising though. How likely is it for this “former English teacher” to get the “inside scoop” from so many anonymous sources from his home in Texas? And why do all his scoops always end up false?

Read more : Moderna CEO Stéphane Bancel Arrested For Murder?!

A March 2018 screenshot of Michael Tuffin, who goes by the pseudonym Michael Baxter

Fact #2 : 2022 US Election Was Protected By Three Agencies

It is important to understand that the 2022 midterm US election was not actually protected by the US Army Cyber Command, as Real Raw News claimed.

The 2022 midterm election in the United States was protected by three different agencies, from two different departments:

  • Cybersecurity and Infrastructure Security Agency (Department of Homeland Security)
  • Cyber Command (Department of Defense)
  • National Security Agency (Department of Defense)

The US Army Cyber Command is merely one part of the US Cyber Command, which oversaw the protection of the 2022 election and is based in Fort Meade.

Fact #3 : All Three Agencies Detected No Fraud Or Threat

On November 8 and 9, 2022, officials from all three agencies said that they detected no evidence of fraud or threat to disrupt the election infrastructure.

Jen Easterly, director of the US Cybersecurity and Infrastructure Agency said:

We have seen no evidence that any voting system deleted or lost votes, changed votes, or was any way compromised in any race in the country.

General Paul Nakasone who heads the US Cyber Command and NSA operation to protect the 2022 midterm election said:

We continue to refine what we learned from the 2018 and 2020 elections. We generate insight to enable defense of the homeland, and ultimately impose costs by degrading and exposing foreign adversary capabilities and operations.

Fact #4 : No Legitimate Report Of Fraud In 2022 Election

There was no remotely similar report from any legitimate news outlet, nor an official statement by any government agency.

In fact, not even Fox News, which is notorious for pushing fake claims, actually reported that there was evidence of fraud in the 2022 midterm election.

Everything that Real Raw News posts should be regarded as FAKE NEWS.

Now that you know the facts, please SHARE THIS FACT CHECK out!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Fact CheckTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Kim Kardashian Fined $1.26 Mil For Promoting Crypto!

Kim Kardashian just agreed to pay a $1.26 million fine for promoting cryptocurrency on Instagram! Here is what you need to know…

 

Kim Kardashian Fined $1.26 Million For Promoting Crypto!

On Monday, October 3, 2022, Kim Kardashian agreed to pay a $1.26 million fine for promoting the cryptocurrency, EthereumMax (not to be confused with Ethereum) on Instagram.

The Securities and Exchange Commission (SEC) charged that the reality TV star received $250,000 to advertise EthereumMax without disclosing she was paid to promote it.

She also agreed not to promote any crypto assets / securities for three years.

This case is a reminder that, when celebrities or influencers endorse investment opportunities, including crypto asset securities, it doesn’t mean that those investment products are right for all investors.

We encourage investors to consider an investment’s potential risks and opportunities in light of their own financial goals.

– SEC Chair Gary Gensler

The settlement comprised of a $1 million fine, seizure of the $250,000 payment she received, plus interest, coming up to a total of $1.26 million.

Despite the large sum, the fine will not bother Kim Kardashian too much. With a net worth estimated at $1.8 billion, the $1.26 million fine is roughly equivalent to an $85 fine for a typical US family with a net worth of $122,000.

Her lawyers hinted as much in the statement they released :

Ms. Kardashian is pleased to have resolved this matter with the SEC.

Kardashian fully cooperated with the SEC from the very beginning and she remains willing to do whatever she can to assist the SEC in this matter.

She wanted to get this matter behind her to avoid a protracted dispute. The agreement she reached with the SEC allows her to do that so that she can move forward with her many different business pursuits.

As you can tell – the fine was more like dust in her eyes than a lesson to learn from. I doubt it even feels like a slap on the wrist to her.

 

How Kim Kardashian Got Into Trouble Promoting Crypto…

On June 13, 2021, Kim Kardashian promoted a new cryptocurrency called EthereumMax (not to be confused with the famous and more established Ethereum) on Instagram.

Are you guys into crypto???? This is not financial advice but sharing what my friends told me about the Ethereum Max token!

A few minutes ago Ethereum Max burned 400 trillion tokens – literally 50% of their admin wallet giving back to the entire E-Max community.

#EMax #DisruptHistory #EthereumMax #WTFEMax #GIOPEmax @EthereumMax #Ad

Swipe up to join the E-Max Community

She had 225 million followers on Instagram at that time, and EthereumMax paid her $250,000 for that post.

Despite the misleadingly similar name, EthereumMax has no legal, business or technical connection to the Ethereum cryptocurrency. One could be forgiven for thinking that they were trying to mislead people into thinking that they are the same – they are not!

In January 2022, Kim Kardashian, boxer Floyd Mayweather Jr, basketball player Paul Pierce and the creators of EthereumMax were sued by investors who alleged that the celebrities collaborated to “misleadingly promote and sell” the cryptocurrency in a “pump and dump” scheme.

In plain terms, EthereumMax’s entire business model relies on using constant marketing and promotional activities, often from ‘trusted’ celebrities, to dupe potential investors into trusting the financial opportunities.

The class action lawsuit filing pointed out that such promotion caused EthereumMax to increase more than 1,300% in value (the pump) before plummeting to “an all-time low” just over a month after Kim Kardashian promoted it.

It alleged that this enabled the defendants to sell EthereumMax tokens for “substantial profits” (the dump) before the inevitable crash in value.

It is unknown how many investors were hurt, but after the initial celebrity-fuelled surge, EthereumMax quickly tanked and never recovered.

This is another lesson in why you should not take investment advice from celebrities, especially when they are only famous for … being infamous?

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Business | CelebrityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

BNM : Banks To Stop Using SMS OTP To Fight Scams!

Bank Negara Malaysia has ordered banks to stop using SMS OTP, as a way to fight financial scams!

Here is what you need to know…

 

BNM : Banks To Stop Using SMS OTP To Fight Scams!

Bank Negara Malaysia (BNM) has ordered banks in Malaysia to stop using SMS OTP (One Time Passwords), and migrate to a more secure form of authentication for online transactions.

This move comes after many Malaysians were hit by scams that bypassed the security offered by SMS OTP, leading to great loss of their hard-earned money.

BNM governor Tan Sri Nor Shamsiah Mohd Yunus said major banks in Malaysia have already started migrating from SMS OTP to more secure forms of authentication.

 

BNM : More Measures Beyond SMS OTP To Fight Scams!

In addition to “banning” SMS OTP, BNM has ordered the further tightening of detection rules and triggers to block potential scams.

This includes adding a cooling-off period for first-time enrolments of online banking services, as well as devices being registered for authentication purposes.

Banks will also be required to set up dedicated scam hotlines, and provide convenient ways for customers to suspend their bank accounts if they suspect that those accounts have been compromised.

Banks also have to ensure that customers are able to reactivate their accounts after a reasonable period, after ensuring that their accounts have been secured.

Together with the financial industry, BNM will continue to ensure that banking and payment channels remain secure and equipped with the latest security controls. The effort to combat financial crimes also requires the support of all parties. As consumers, each of us are responsible for protecting ourselves from the threat of scams.

The reality, however, is that methods used by criminals will continue to evolve. BNM therefore continuously intensifies efforts and take steps to combat scams by introducing additional controls and safeguards from time to time.

– BNM governor Tan Sri Nor Shamsiah Mohd Yunus

Read more : Bank Negara Malaysia Email Scam Alert!

Despite these efforts, it is critical that we must all learn to safeguard our personal information and avoid downloading files or installing applications from unverified sources on our computer or smartphones.

We should also check our bank and credit card statements, and notify the banks once we notice anything suspicious.

Those who believe that they are victims of a scam should contact the Commercial Crime Investigation Department Scam Response Centre at 03-2610 1559/1599 or BNMTelelink at 1-300-88-5465; and lodge a police report to facilitate investigations.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Business | CybersecurityTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Was Starbucks CEO Howard Schultz Just Arrested?!

Did New York police just arrest Starbucks CEO Howard Schultz for multiple counts of fraud?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Starbucks CEO Howard Schultz Was Just Arrested!

Vancouver Times just posted an article, claiming that New York police just arrested Starbucks CEO Howard Schultz for multiple counts of fraud!

The CEO of Starbucks, Howard Schultz, has been arrested and charged with multiple counts of fraud. He was arrested at his home in New York and is in custody awaiting a bail hearing.

Schultz is an American businessman and author, currently sitting as the chief executive officer (CEO) of Starbucks. A spokesperson for the company said that Schultz plans on resigning through his lawyers as soon as possible.

Starbucks is currently in hot water for banning cash payments at its stores in the UK, with plans to ban cash internationally. As a result, the term ‘boycott Starbucks’ continues to trend on social media.

It is unclear what the charges relate to, but a source close to the CEO indicated it may be linked to allegations of Schultz stealing money from his employees.

The mainstream media and big tech want to hide the truth. Beat them at their own game by sharing this article!

Read more : Did Interpol Order Arrest Of Bill Gates, Justin Trudeau, Klaus Schwab?!

 

Truth : Starbucks CEO Howard Schultz Was Not Arrested!

This is yet another example of FAKE NEWS created by Vancouver Times to generate page views and money from gullible people.

Fact #1 : Vancouver Times Is A Fake News Website

Vancouver Times is a “content aggregator” (copy and paste) website that is known for creating fake news to generate more page views and money.

To look legitimate, they copy and paste news from legitimate news organisations. To drive traffic, they create fake news, sometimes masked as “satire”.

To give themselves a veneer of deniability, they label themselves as a “satire website” in their About Us section.

Vancouver Times is the most trusted source for satire on the West Coast. We write satirical stories about issues that affect conservatives.

Here are some of their fake news that we debunked :

Fact #2 : Howard Schultz Was Not Arrested

Starbucks CEO Howard Schultz was not arrested by the police for fraud. He remains a free man.

Not only was there no police report on his arrest, there was zero media coverage, which is impossible because his arrest would have been worldwide news.

Starbucks is also a public-listed company (SBUX) on the Nasdaq, which means it is legally required to announce the arrest of its CEO publicly and to investors. There was no such announcement.

Fact #3 : Howard Schultz Is A Billionaire

Howard Schultz is a billionaire with a net worth of some 4 billion US dollars. He earned almost a quarter of that – 940 million dollars – during the COVID-19 pandemic.

So Schultz certainly does not need to rob his employees. He’s earning about $640,000 every day – more than what most of his store employees will earn in a lifetime!

Even if you believe Jason Pires from Vancouver Times, how exactly do you think Schultz steals from his employees? By sneaking a few dollars from the till at every store?

Fact #4 : There Is No Such Thing As A Publication Ban

Vancouver Times likes to use the “media blackout” claim, to explain why you can’t find any reputable media outlet reporting on Howard Schultz’s arrest.

That’s utter and complete bullshit. No one – not a judge, not even the US government – can control the worldwide media, or prevent anyone from writing about such a momentous arrest.

You can also be sure that even if the mainstream media refused to run the story, it would have been reported by many other websites and bloggers.

Yet, not a single blogger or online website published this incredible story? That’s because IT NEVER HAPPENED…

Fact #5 : Mainstream Media + Big Tech Would Have Loved The Hype

Vancouver Times is gaslighting you about how mainstream media and Big Tech want to hide the “truth” about the arrest of Starbucks CEO Howard Schultz.

They would all loved such shocking news, because it would have driven tons of traffic and engagement to their websites / platforms.

In fact, that was precisely why Vancouver Times created the fake story – to drive traffic, for the ad money.

Everything that Vancouver Times publishes should be regarded as FAKE NEWS, until proven otherwise.

Please help us fight fake news websites like Vancouver Times – SHARE this fact check out, and SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | BusinessTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Can Greeting Photos + Videos Hack Your Phone?!

Can hackers use greeting photos and videos to hack your phone, and steal your data?

Take a look at the viral claim, and find out what the FACTS really are!

 

Claim : Greeting Photos + Videos Can Hack Your Phone!

People keep sharing this warning about greeting photos and videos, which claims that they can hack your phone and steal your data.

It’s a long message, so just skip to the next section for the facts!

Hello Family and friends,

Starting tomorrow, Please do not send network pictures. Look at the following article to understand. I’m going to stop too.

Please delete all photos and videos of Good morning, Evening and other greetings and religious messages as soon as possible. Read the following article carefully and you will understand why.

Read all! Please send this message urgently to as many friends as possible to prevent illegal intrusion.

 

Truth : Greeting Photos + Videos Cannot Be Hack Your Phone!

Many of us get spammed with Good Morning, Good Afternoon, Good Evening photos and videos every day from family and friends.

While they often clog up Facebook, Telegram and WhatsApp groups, they really cannot hack your phone. Here are the reasons why Good Morning messages are very irritating, but harmless…

Fact #1 : Shanghai China International News Does Not Exist

The news organisation that was claimed to be the source of this warning – Shanghai China International News –  does not exist!

Fact #2 : Greeting Photos + Videos Not Created By Hackers

Hackers (from China or anywhere else) have better things to do than to create these greeting photos and videos.

They are mostly created by websites and social media influencers for people to share and attract new followers.

Fact #3 : No Fraud Involving Greeting Photos / Videos

There has been no known fraud involving Good Morning or Good Night messages, videos or pictures.

Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case…. because it never happened.

Fact #4 : Image-Based Malware Is Possible, But…

Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.

It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself.

At most, it can be used to hide the malware payload from antivirus scanners, which is pretty clever to be honest…

Fact #5 : Image-Based Malware Requires User Action

In January 2019, cybercriminals created an online advertisement with a script that appears innocuous and would pass any malware check.

However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.

Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.

Such a clever way to bypass malware checks, but even so, this image-based malware requires user action.

You cannot get infected by the Trojan if you practice good “Internet hygiene” by not downloading or installing anything from unknown websites.

Fact #6 : Malicious Code Executes Immediately

If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.

Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.

There is really no reason for malware to wait before it infects your devices. Waiting will only increase the risk of detection.

Whether the malware serves to take over your device, steal your information or encrypt it for ransom, it pays to do it at the first opportunity.

Now that you know the facts, please SHARE this article with your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Fact CheckTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Was Pfizer VP Rady Johnson Arrested For Vaccine Fraud?!

Was Pfizer Vice President Rady Johnson just arrested and charged with multiple counts of vaccine fraud by US federal agents?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Pfizer VP Rady Johnson Arrested For Vaccine Fraud!

Vancouver Times has gone viral with an article claiming that Pfizer Vice President Rady Johnson was just arrested and charged with multiple counts of vaccine fraud by US federal agents!

The article is long, so feel free to skip to the next section for the facts!

Rady Johnson, the executive Vice President of Pfizer, has been arrested at his home and charged with multiple counts of fraud by federal agents. He was taken into custody and is awaiting a bail hearing. This comes as 1,000s of classified documents from Pfizer were released, showing the true risks of the experimental vaccine.

As a result of Rady’s arrest, the hashtag #pfizerdocuments has started trending on Twitter. Multiple celebrities are now calling for other employees at Pfizer to be arrested. Twitter has begun the process of censoring the hashtag, and this publication. Other social media platforms have followed suit.

The Chinese 50 Cent Army (wumao, 五毛) and pro-CCP netizens have also been promoting the article.

Read more : Was Pfizer Vice President Arrested For Vaccine Scandal?!

 

Truth : Pfizer VP Rady Johnson Was NOT Arrested For Vaccine Fraud!

This is yet another example of FAKE NEWS created to generate page views and money from gullible people.

Fact #1 : Rady Johnson Was Not Arrested

Let me be clear – Pfizer Executive Vice President Rady Johnson was not arrested, period.

His arrest would have been worldwide news, especially if it’s related to the COVID-19 vaccine.

Pfizer is also a public-listed company on the New York Stock Exchange, and they are required to announce his arrest publicly, and to investors.

Pfizer inadvertently created a kerfuffle when they delisted their 0.25% note on the NYSE. Don’t you think that they would have to report the arrest of their Executive Vice President too?

Read more : Did NYSE Just Delist Pfizer Over Vaccine Scandal?!

Fact #2 : Vancouver Times Is A Fake News Website

Vancouver Times appears to be a copy of the infamous Conservative Beaver – a “content aggregator” (copy and paste) website that is known for creating fake news to generate more page views and money.

To look legitimate, they copy and paste news from legitimate news organisations. To drive traffic, they create fake news masked as satire.

They revealed their true nature in their About Us section, hidden at the very bottom of the page, after a long list of comments.

Vancouver Times is the most trusted source for satire on the West Coast. We write satirical stories about issues that affect conservatives.

We are not affiliated with the mainstream media (CBC, CTV etc.) in any way, and any similarities between our content and the work of the MSM is purely coincidental.

Earlier, they also created and propagated the fake story that Gilbert Gottfried’s wife said that he was killed by the COVID-19 vaccine.

Read more : Did Gilbert Gottfried Die From COVID-19 Vaccine?!

Fact #3 : No Judge Can Order A Media Blackout

Vancouver Times used the same “media blackout” claim as the Conservative Beaver.

The truth is no judge can order a media blackout of an arrest, even if it’s of a celebrity or a notable person like the Executive Vice President of Pfizer.

Even if that is somehow possible – it’s not – no judge can control the worldwide media, or prevent anyone from writing about such a momentous arrest.

You can also be sure that even if the American press refused to run the story, it would have been gleefully published by the likes of RT, Al Jazeera, CGTN, Global Times, etc.

Yet, not a single press outlet published their account of this incredible story? That’s because IT NEVER HAPPENED…

Remember the fake story of how Pfizer CEO Albert Bourla was arrested by the FBI for fraud? That was also fake…

Read more : Was Pfizer CEO Arrested For Fraud By FBI In #PfizerGate?

Fact #4 : Pfizer Documents Did Not Reveal Any Wrongdoing

The fake news builds upon the longstanding fake news that the Pfizer documents revealed damning evidence of wrongdoing.

  • FDA wanted to hide the Pfizer documents for 75 years : False
  • A Texas judge forced Pfizer to release 9 pages of vaccine side effects : False
  • The Pfizer vaccine documents revealed 1,291 side effects : False
  • Pfizer tried to hide documents showing 158,000 vaccine adverse effects : False

The truth is – the Pfizer documents did NOT show any evidence of fraud or deception in the COVID-19 vaccine trials.

In fact, the “bombshell” Pfizer document that people keep talking about actually shows that they looked for 1,291 adverse events in over 158,000 reports, and found “no new risks” from the vaccine.

Hence, it is absurd for any Pfizer executive to be arrested for vaccine fraud. There is simply no evidence of that.

Read more : Did Pfizer Try To Hide 158K Vax Adverse Events For 75 Years?

Everything that Vancouver Times posts should be regarded as FAKE NEWS, until proven otherwise.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | HealthTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Crypto Boom Scam Alert : Fake Celebrity Endorsements!

Please watch out for the Crypto Boom scam involving fake celebrity endorsements, and warn your family and friends!

 

Crypto Boom Scam Alert : Fake Celebrity Endorsements!

You may have seen advertisements and posts on Facebook and Twitter, claiming that certain celebrities are sharing the secrets of their success.

Here is a recent example involving Jono Armstrong and Tony Fernandes. It’s an extremely long post, so feel free to skip to the next section for the facts!

NEWS THAT SENT SHOCKWAVES: Jono Armstrong And Tony Fernandes Partnership Is Shaking The Financial World And Big Banks Are Terrified

Big banks are loosing their chokehold of the financial markets. Malaysian citizens are from what private investment banks want off the market. Is it a real deal?

 

Crypto Boom : Yet Another Cryptocurrency Scam

Crypto Boom appears to be yet another “automated trading app”, claiming to use a trading robot to generate “daily ROI of up to 60%”.

Cryptocurrency is unregulated, and these cryptocurrency trading apps are of unknown provenance and ownership.

So unless proven otherwise, you should consider such cryptocurrency apps as SCAMS, including Crypto Boom for these reasons…

Fact #1 : That Malaysiakini Article Is Fake

There is no such Malaysiakini article. It’s completely FABRICATED. You can search Malaysiakini’s website if you don’t believe me.

The website it made to look like Malaysiakini, but does not have a Malaysiakini link, but an AWS cloud server link.

https://malaysia2022.s3.ap-south-1.amazonaws.com/MalaysiaJono.html

The Malaysia2022 website does not even exist. The only page on that server slice appears to be that MalaysiaJono.html page.

Fact #2 : Tony Fernandes Never Partnered With Jono Armstrong

As far as we can tell – Tony Fernandes has never met Jono Armstrong, much less partnered with him to bring Crypto Boom to Malaysia.

There was no such interview of Tony Fernandes and Jono Armstrong on Selamat Page Malaysia. Neither was there ever a threatening call by Farid Alias – the Group President and CEO of Maybank.

Fact #2 : Crypto Boom Is A Technology, Marketing + Advertising Service

While Crypto Boom claims to be an automated trading software that can give you “an average daily ROI of up to 60%“, their fine print states otherwise.

If you scroll down to the bottom of their official website, they clarified that they are merely a “technology, marketing and advertising service“.

They also clarified that they are “only used as a marketing tool by third party advertisers and brokers to receive more customers“.

Crypto Boom also warned, in their fine print, that when you sign up – “a broker is automatically assigned to you“, but that “it is your obligation to check if the Broker applies to all local rules and regulations“.

Crypto Boom is a software created by a development company and does not provide investment or brokerage services.

Crypto Boom does not gain or lose profits based on your trading results and operates as a technology, marketing and advertising service.

Crypto Boom does not operate as a financial services firm and is only used as a marketing tool by third party advertisers and brokers to receive more customers. When you signup to Crypto Boom a broker is automatically assigned to you.

It is your obligation to check if the Broker applies to all local rules and regulations and is regulated in your jurisdiction and is allowed to receive customers from your location. If you find out the Broker that was assigned to you is not duly regulated in your jurisdiction please contact us using the support menu in the software.

Fact #3 : No Celebrity Has Endorsed Crypto Boom

You may see other variants of this fake news, localised to the media in your country, with different celebrities endorsing Crypto Boom.

The truth is – no celebrity or business person of any note has ever publicly endorsed Crypto Boom.

If you do a quick online search, you will note that those celebrities have never mentioned Crypto Boom, much less endorsed it.

The fake story claims that Crypto Boom is backed by Richard Branson, Elon Musk and Bill Gates among others, but Crypto Boom themselves admitted that all those “rumours” are false.

The picture of Richard Branson and Bill Gates that was used in the fake Crypto Boom article was not taken at CES 2022. It was taken at the Grand Challenges Annual Meeting, in London on 26 October 2016.

This is the same kind of fake celebrity endorsements that drive the marketing campaigns of other cryptocurrency scams like Bitcoin Revolution.

Read more : Bitcoin Revolution Fake Celebrity Endorsements Exposed!

Fact #4 : SEC Warned About Such Scams

Many financial regulatory agencies like the SEC are warning investors and the public about fraudulent digital asset and “crypto” trading websites.

There have been many cases of people getting defrauded by such “get rich quick” schemes, including pump-and-dump and rug pull scams.

The SEC’s Office of Investor Education and Advocacy (OIEA) and the Commodity Futures Trading Commission’s Office of Customer Education and Outreach (CFTC) warn investors to scrutinize investment opportunities through websites purporting to operate advisory and trading businesses related to digital assets. These websites often contain “red flags” of fraud including claims of high guaranteed returns and promises that the investments carry little or even no risk.

SEC and CFTC staff have recently observed investment scams where fraudsters tout digital asset or “cryptocurrency” advisory and trading businesses. In some cases, the fraudsters claim to invest customers’ funds in proprietary crypto trading systems or in “mining” farms. The fraudsters promise high guaranteed returns (for example, 20-50%) with little or no risk.

After the investors make an investment, typically using a digital asset such as Bitcoin, the fraudsters in some cases stop communicating with the investors altogether. These fraudsters can quickly send your money overseas, with little chance of you being able to get it back. Sometimes the fraudsters direct investors to pay additional costs (such as purported taxes) to withdraw fake “profits” earned from the investment. This is an example of an advance fee fraud scam, where investors are asked to pay a bogus fee in advance of receiving proceeds, money, stock, or warrants.

If anyone tells you that their software or trading service will automatically generate you high ROI, without effort or risk, that’s a scam.

Anyone who develops such a magical system does not need you to invest – they would be keeping it to themselves, and making BILLIONS with no effort or risk.

Please help us fight against such scams – SHARE THIS FACT CHECK with your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact CheckTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Can SIM Swap Attack Empty Bank Accounts Without Warning?

Can a SIM swap attack clear out your bank accounts without warning?

Take a look at the viral warning, and find out what the facts really are!

 

Claim : SIM Swap Attack Can Empty Bank Accounts Without Warning!

This message has gone viral on social media and WhatsApp, warning about a new high tech fraud called SIM Swap Fraud that can empty bank accounts without warning.

The message includes a link to a Straits Times report about a young couple who lost $120,000 in a fake text message scam targeting OCBC Bank customers.

Your BANK Account could be Emptied without an Alert!

Dear All, Please let’s be very careful.. There is a new HIGH TECH FRAUD in town called the SIM SWAP FRAUD, and hundreds of persons are already VICTIMS.

 

Truth : SIM Swap Attack Are Real, But Don’t Work Like That

The truth is – SIM swap attacks are real and very dangerous, but they do not work like the viral message claims.

Here is what you need to know about the viral message, and SIM swap attacks.

Fact #1 : SIM Swap Attacks Are Not New

SIM swap attacks are really not that new. They have been around at least since 2015.

Fact #2 : Viral Message Is Partly Fake

The viral message is correct about the risk of SIM swap attacks, but pretty much wrong about everything else.

In fact, the method by which the SIM swap attack works is completely made up. So the viral message is really FAKE NEWS.

Fact #3 : Straits Times Article Was Not About SIM Swap

The fake news creator added a link to a Straits Time article, to mislead you.

That’s because the article isn’t about a SIM swap attack, but a phishing attack, where the victim received an SMS  with a link that took him to a fake website that “looked exactly like the OCBC login page“.

The victim then keyed in his bank login details, thus handing over control of his bank account to the scammers. He also ignored automated messages warning him that his “account was being setup on another phone“.

It had nothing to do with a SIM swap attack. It was an SMS-based phishing attack.

Fact #4 : SIM Swap Attack Generally Does Not Require Any Action

In most SIM swap attacks, scammers use your personal information, either purchased from other criminals or obtained through earlier phishing attacks or social engineering, to request for a SIM card replacement.

All that does not require any action on your part. In most cases, you only realise you’ve been hit when you lose access to your mobile number.

Fact #5 : SIM Swap Attack May Require Action In Some Cases

The Press 1 claim in the viral message is partially correct, but it only happens in a particular circumstance.

In India, scammers have tricked people by offering a free network upgrade, or to help improve signal quality on their phones :

  1. The scammer will call the victim, claiming to be from their mobile service provider.
  2. The scammer will try to get the victim to reveal his/her 20-digit SIM card number.
  3. The scammer will use the 20-digit SIM number to initiate a SIM swap with the mobile service provider.
  4. The mobile service provider will automatically send an SMS to confirm the swap.
  5. Once the victim confirms the swap, his/her SIM card will stop working.
  6. The scammer now has access to the victim’s mobile number.

Fact #6 : SIM Swap Attack Does Not Hack Your Phone

The SIM swap attack does not involve any hacking of your phone.

You only lose access to your mobile number. Your phone is not hacked.

Fact #7 : SIM Swap Attack Does Not Empty Bank Accounts

Once the scammers successfully gain control of your mobile number, they can use it to intercept one-time passwords (OTP) like TAC numbers.

This allows them to change passwords to your bank accounts, social media accounts, etc. which is why SIM swap attacks are so dangerous and damaging.

However, it does not mean your bank accounts are immediately emptied. For one thing – the scammers need to know your bank login.

That’s why SIM swap victims often have had their bank logins and passwords stolen earlier though phishing attacks. The scammers only need their mobile numbers to receive OTP / TAC numbers to authenticate the transfers.

Fact #8 : SIM Swap Attack Can Be Used To Cheat Friends Too!

Stealing money from your bank account requires extra work, so scammers who do not have your bank login details will resort to cheating your friends.

With access to your phone number, they can easily gain access to your social media accounts (Facebook, Twitter, Instagram) as well as instant messaging apps (WhatsApp, Telegram).

Once they have control, they can send messages to your friends, pretending to be you. Naturally, they will concoct some story to ask your friends for money.

The idea is to use your (now) stolen accounts to convince your friends that you genuinely need their help. The money that they transfer goes directly to the scammers, or their mules (people who rent their bank accounts to scammers).

Now that you know the facts behind the SIM swap attack or scam, please SHARE this article with your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | MobileTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Can Hackers Use Good Morning Greetings To Hack You?

Can hackers use Good Morning videos, pictures and messages to hack your devices, and steal your data?

Find out what is happening, and what the FACTS really are!

 

Claim : Hackers Are Using Good Morning Messages To Hack You!

This post about Chinese hackers using Good Morning videos, pictures and messages to hack your devices, keeps going viral on social media and WhatsApp.

It’s a long message, so just skip to the next section for the facts!

Dear friends, please delete all welcome photos and videos in Good Morning format and the like. Read below the article to the end, which will be clear why I ask about it. From now on I will only send personally prepared greetings.

Read it all !!! Send this message urgently to as many friends as you can to stop the invasion.

Olga Nikolaevna Lawyer: Caution:

ATTENTION

For those who like to send Good Morning pictures! Good day! Good evening!

Do not send these “good” messages.

Today, Shanghai China International News sent SOS to all subscribers (this is the third reminder) that experts recommend: please do not send good morning, good night, pictures and videos,.

 

Truth : Good Morning Greetings Not Being Used To Hack You!

Many of us get spammed with Good Morning or Good Night messages every day from family and friends.

While they often clog up Facebook, Telegram and WhatsApp groups, they really do NOT allow hackers to hack your devices.

Here are the reasons why Good Morning messages are very irritating, but harmless…

Fact #1 : Shanghai China International News Does Not Exist

The news organisation that was claimed to be the source of this warning – Shanghai China International News –  does not exist!

Fact #2 : Good Morning Greetings Not Created By Hackers

Hackers (from China or anywhere else) have better things to do than to create these Good Morning pictures and videos.

They are mostly created by websites and social media influencers for people to share and attract new followers.

Fact #3 : No Fraud Involving Good Morning Messages

There has been no known fraud involving Good Morning or even Good Night messages, videos or pictures.

Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case…. because it never happened.

Fact #4 : Image-Based Malware Is Possible, But…

Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.

It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself.

At most, it can be used to hide the malware payload from antivirus scanners, which is pretty clever to be honest…

Fact #5 : Image-Based Malware Requires User Action

In January 2019, cybercriminals created an online advertisement with a script that appears innocuous and would pass any malware check.

However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.

Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.

Such a clever way to bypass malware checks, but even so, this image-based malware requires user action.

You cannot get infected by the Trojan if you practice good “Internet hygiene” by not downloading or installing anything from unknown websites.

Fact #6 : Malicious Code Executes Immediately

If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.

Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.

There is really no reason for malware to wait before it infects your devices. Waiting will only increase the risk of detection.

Whether the malware serves to take over your device, steal your information or encrypt it for ransom, it pays to do it at the first opportunity.

Now that you know the facts, please SHARE this article with your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Fact Check : Does The LPG Gas Tank Pressure Test Work?

Can we determine which brands are cheating their customers using the LPG gas tank pressure test?

A viral video shows how LPG gas tanks from various brands have different pressures, suggesting gas fraud.

Take a look at the video for yourself, and find out if that LPG gas tank pressure test actually works!

 

LPG Gas Tank Pressure Test Proves Fraud?

In the viral video, a man lined up gas tanks from six different brands – MyGaz, Mira Gas, Petron, Petronas, BHP and Solar Gas.

He then tears off their cap seals and checks their pressure with a pressure gauge, noting how different LPG gas tanks have different tank pressures.

Although he does not directly claim there was gas fraud, it’s implied in the video.

 

The LPG Gas Tank Pressure Test : It Works But There’s No Fraud

While we do not believe the video is fraudulent, it is nevertheless MISLEADING.

The amount of LPG in each gas tank is determined by WEIGHT, not pressure. So the video itself, while interesting, is of no consequence.

The LPG gas tank pressure test may be accurate, but it’s NOT an indicator of how much gas is inside each tank.

And here are the reasons why…

Reason #1 : LPG Gas Is Sold By Weight, NOT Pressure

LPG (Liquefied Petroleum Gas) all around the world is sold by weight, and not by pressure. That’s why the tanks are labelled and sold in different sizes based on WEIGHT :

Naturally, the weight listed above is the weight of the LPG , and not the tank itself which is considerably heavier.

For example, a 45 kg LPG gas tank weighs 78 kg fully loaded, while a 90 kg tank weighs 155 kg.

This infographic by The Hindu is useful in demonstrating how to determine how much LPG gas is in each tank.

Reason #2 : LPG Gas Pressure Varies A Lot

LPG gas pressure varies according to the gas mixture, temperature and even motion.

LPG is not one type of gas, but a mixture of mainly propane and butane. Here in Malaysia, it’s about 70% propane and 30% butane.

Propane vaporises much easier and at a lower temperature than butane, so the more propane in the LPG mix = the higher the pressure inside the tank.

A higher tank temperature (leaving it in the sun) or even shaking the tank will increase the pressure in the tank because more propane will vaporise.

Assuming they were not shaken or placed in the sun before the video was shot, the LPG gas tanks in the video have different pressures because they have different LPG gas mixes.

Reason #3 : LPG Gas Regulators Keep The Pressure Low

Irrespective of the pressure in the LPG gas tank, the gas regulator you hook up to it will maintain a constant, low pressure of just 2.75 kPA (0.4 psi or 0.0275 bar)

So it really doesn’t matter if the gas tank from your favourite LPG brand can deliver 100 psi or just a pitiful 55 psi. It’s going to get down-regulated to just 0.4 psi.

Reason #4 : High Pressure = Dangerous + Incomplete Combustion

The reason why gas regulators keep pressure so low is because stoves are designed to work properly and efficiently with such low pressures.

If you bypass the gas regulator, the 150X to 250X higher gas pressure will create extremely large flames that are dangerous, if not impossible, to cook with.

The high pressure will also prevent the gas from mixing properly with the air, resulting in complete combustion of the gas, wasting your money.

 

Recommended Reading

Go Back To > Fact Check | Home Tech | ScienceHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


INTERPOL : Alarming Rate Of COVID-19 Cyberattacks!

According to INTERPOL, cybercriminals are taking advantage of the COVID-19 pandemic, boosting cyberattacks at an alarming pace.

Learn more about their key findings, and what they are projecting will happen in the near future!

 

COVID-19 Pandemic : New Opportunities For Cyberattacks!

The COVID-19 pandemic has forced organisations and businesses to rapidly deploy remote work systems and networks to support staff working from home

Cybercriminals are taking advantage of these new COVID-19 work-from-home normals, targeting staff of major corporations, governments and critical infrastructure to steal data and generate profits.

Online Scams + Phishing

 Threat actors have revised their usual online scams and phishing schemes. By deploying COVID-19 themed phishing emails, often impersonating government and health authorities, cybercriminals entice victims into providing their personal data and downloading malicious content.

Around two-thirds of member countries which responded to the global cybercrime survey reported a significant use of COVID-19 themes for phishing and online fraud since the outbreak.

Ransomware + DDoS

Cybercriminals are increasingly using disruptive malware against critical infrastructure and healthcare institutions, due to the potential for high impact and financial benefit.

In the first two weeks of April 2020, there was a spike in ransomware attacks by multiple threat groups which had been relatively dormant for the past few months.

Law enforcement investigations show the majority of attackers estimated quite accurately the maximum amount of ransom they could demand from targeted organisations.

Data Harvesting Malware

Taking advantage of the increased demand for medical supplies and information on COVID-19, there has been a significant increase of cybercriminals registering domain names containing keywords, such as “coronavirus” or “COVID”. These fraudulent websites underpin a wide variety of malicious activities including C2 servers, malware deployment and phishing.

From February to March 2020, a 569 per cent growth in malicious registrations, including malware and phishing and a 788 per cent growth in high-risk registrations were detected and reported to INTERPOL by a private sector partner.

Misinformation

An increasing amount of misinformation and fake news is spreading rapidly among the public. Unverified information, inadequately understood threats, and conspiracy theories have contributed to anxiety in communities and in some cases facilitated the execution of cyberattacks.

Nearly 30 per cent of countries which responded to the global cybercrime survey confirmed the circulation of false information related to COVID-19. Within a one-month period, one country reported 290 postings with the majority containing concealed malware. There are also reports of misinformation being linked to the illegal trade of fraudulent medical commodities.

Other cases of misinformation involved scams via mobile text-messages containing ‘too good to be true’ offers such as free food, special benefits, or large discounts in supermarkets. 

 

INTERPOL : Projection Of Future COVID-19 Cyberattacks

Here are INTERPOL’s projection of future COVID-19 cyberattacks :

  • A further increase in cybercrime is highly likely in the near future. Vulnerabilities related to working from home and the potential for increased financial benefit will see cybercriminals continue to ramp up their activities and develop more advanced and sophisticated modi operandi.
  • Threat actors are likely to continue proliferating coronavirus-themed online scams and phishing campaigns to leverage public concern about the pandemic.
  • Business Email Compromise schemes will also likely surge due to the economic downturn and shift in the business landscape, generating new opportunities for criminal activities.
  • When a COVID-19 vaccination is available, it is highly probable that there will be another spike in phishing related to these medical products as well as network intrusion and cyberattacks to steal data.

 

Recommended Reading

Go Back To > CybersecurityEnterprise + Business | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Kaspersky Lab Launches The Goondus Awards!

Petaling Jaya, 18 August 2017Kaspersky Lab just launched a campaign in Asia Pacific to educate the public and spread awareness on Internet safety. Known as the Goondus Awards, the campaign is inviting submissions from the public on Internet mistakes and faux pas that have led to reputational, financial or property damage or loss for individuals.

 

The Goodus Awards

The Goondus Awards website which features the submissions anonymously, highlights real life incidents where a naïve or ill-informed Internet practice led to some form of misfortune.

“We want to educate people about safer Internet behaviours and to showcase real world examples of missteps leading to some form of loss or damage. While some stories may be humorous and even incredulous, the repercussions and damage were real and in some cases severe,” explained Sylvia Ng, General Manager, South East Asia. “As our entries are entirely anonymous, we’re encouraging a community led campaign to drive home the message that only safe practices will make the Internet safer for users.”

The Goondus Awards showcases a wide array of stories ranging from humorous occurrences to unintelligent acts and sad episodes involving monetary or reputational loss. The campaign acts as an initiative to raise cyber security awareness in an engaging form through the sharing of personal stories. It also serves to help web visitors foster positive and pleasant online experiences.

With the ease of access to the Internet, users have developed a sense of complacency or even a mild form of naivety in their daily digital lives, potentially lending themselves to becoming victims of cybercrime.

The Goondus Awards aim to remind users that they are not completely safe from cybercriminals and that they need to be vigilant, practice and maintain Internet etiquette to protect themselves.

Malaysians, including millennials and Gen Y professionals have also been burnt by the infamous love scams. According to a report by the Federal Commercial Crime Investigation Department (CCID) in 2016, a total of 2,497 love scam cases were reported with losses close to RM100 million. It proves that Goondus are fools for love.

The fact that identity theft can happen so close to home and lead to financial loss was very disturbing and shocking to the individuals in this example.

 

Goondus Awards Submission & Contest Details

The criteria for the story entries are that they must be based on actual events leading to tangible or intangible losses concerning Internet use. The winning stories will be selected by a panel of judges where participants stand a chance of winning an iPad Mini or a Tablet and even monthly prizes like a Kaspersky Lab premiums hamper.

The website also includes tips and advice from cyber security experts and elaborations on the different types of scams such as Internet love sex scams, credit for sex scams and phishing scams, to further inform users.

To submit a story, fill in the requested information such as your name, email address and contact number, along with the type of scam, story title and the full story in the website. The “Tips” section of the website features articles from the Kaspersky Lab blog and are categorised based on the various issues and forms of scams highlighted in the website. This educational content serves to advise users on how to prevent such incidents from occurring.

 

Cybersecurity Incidents In Malaysia

[adrotate group=”2″]

In 2016 alone, CyberSecurity Malaysia received 8,334 reports related to cyber security incidents. Between 2012 to 2016, CyberSecurity Malaysia received a total of 50,789 cyber security incidents. Of the figure, fraud contributes to almost 40 per cent or 20,141 followed by hacktivism (9,918), spam (9,210) and cyber threats (2,333).

More than 70 per cent of the incidents reported involved financial implications, including phishing, online banking fraud, credit card fraud and online scams among others. Statistics from The Royal Malaysian Police recorded 113 phishing cases resulting in total losses of RM1.91.

Comparing last year’s May and 2017’s May result in terms of cybercrime rate, is it evident that the figure has grown and especially cyber harassment case has rose over 50% according to CyberSecurity Malaysia. It is also evident that, statistics in May shows cases such as frauds, spams and malicious codes rose compared to last year.

Go Back To > News | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!