Email Scams, Fake Antivirus & Phishing Attacks Regarding The Japan Earthquake & Tsunami Disasters

US-CERT would like to warn users of potential email scams, fake antivirus and phishing attacks regarding the Japan earthquake and the tsunami disasters. Email scams may contain links or attachments which may direct users to phishing or malware-laden websites. Fake antivirus attacks may come in the form of pop-ups which flash security warnings and ask the user for credit card information. Phishing emails and websites requesting donations for bogus or charitable organizations commonly appear after these types of natural disasters.

Cybercriminals launched Facebook pages claiming to contain Japanese tsunami videos to lure users to the malicious site. The Facebook page title is “Japanese Tsunami RAW Tidal Wave Footage!” and a script on that page leads users to a fake video page where the video is actually a clickable image. Clicking the image eventually leads users to a page asking for the user’s mobile phone number. The script also triggers an automatic “Like” and displays the link on the victim’s wall.
US-CERT encourages users to take the following measures to protect themselves:

• Do not follow unsolicited web links or attachments in email messages.
• Maintain up-to-date antivirus software.
• Review the Recognizing Fake Antivirus document for additional information on recognizing fake antivirus.
• Refer to the Avoiding Social Engineering and Phishing Attacks document for additional information on social engineering attacks.
• Refer to the Recognizing and Avoiding Email Scams (pdf) document for additional information on avoiding email scams.
• Review the Federal Trade Commission’s Charity Checklist.
• Verify the legitimacy of the email by contacting the organization directly through a trusted contact number. Trusted contact information can be found on the Better Business Bureau National Charity Report Index.

For more information please feel free to click on the imbedded links

Google Chrome 5

Just installed the latest Google Chrome 5 Beta a few days ago and I’m LOVIN it!  No I am not going into the technical aspects of it but what I will say it’s that it’s SUPER FAST and Finally I’m able to do online banking with it! So looks like for the next year or so, this will be my DEFAULT BROWSER OF CHOICE!

Click here to get the latest version if you’re interested….or the big logo above..

cheers mates! 🙂

Latest Phishing Emails – Fake Visa & Mast links

Beware of links embedded in these emails requesting you to act on them immediately.  They might even provide fake official sounding ‘CASE IDs’ as if they were offically assigned.  If you right click the properties of the links you’d see IP addresses instead followed by some bogus server names.



PSA – Carrefour Is Having A Book Sale

Lots of paperback novels selling for $6, the bigger sized ones are only $10. 

Majority of the Children’s books are priced at $3.

Bicycles Sales are on too at the foyer….


Wolfram Alpha Is Great!




Wolfram Alpha has been available since May 2009 though I didn’t quite know how great it was till I really started fooling around with it trying to get answers to currency conversions, percentages etc etc etc.

So what is wolfram alpha all about, is it another search engine?

No. It’s a computational knowledge engine: it generates output by doing computations from its own internal knowledge base, instead of searching the web and returning links.

What can I do with Wolfram|Alpha?

Many, many things. Check out the Examples by Topic page and the Visual Gallery of Examples for a few pointers. Or visit the Blog or Community to see what others are doing.


This is the result when I typed in Singapore to Perth

Input interpretation: Centre of Singapore to Perth, Western Australia

Distance : 2424 Miles

Direct Travel Times : Aircraft (550 mph) 4.4hours
Sound : 191 Minutes
Light in fiber : 18.2ms
Light in vacuum: 13ms

Then a map was shown with a red line drawn depicting the path.

Cool eh?

Avoid Watching Harry Potter Online For Free!

Your risk infecting our PCs with Malware and damaging it!

Read All about it HERE

Finextra: Consumers warned of man-in-the-phone bank scam

10 July 2009 – 13:29
Consumers warned of ‘man-in-the-phone’ bank scam
Telephone banking customers are being warned about a new low-tech, man-in-the-phone (MitP), fraud technique being employed by criminals.

Vendor Actimize says it has recently spotted the scam through its fraud surveillance at several large retail banks. It originally targeted British banks but is now spreading to the US and Canada.

In a typical MitP attack, a fraudster calls the victim claiming to work for their bank, warning that their account may have been breached or compromised. The criminal then puts the customer on hold and calls their bank, connecting the two while remaining on the line.

The bank then requests authentication information, such as social security number, passwords and other personal information. Once the personal information is provided, the fraudster quickly ends the conference line and informs the customer that the issue has been resolved.

Meanwhile, with the personal information gathered during the call, the fraudster can take over the customer’s phone banking relationship and transfer money out of their accounts.

James Van Dyke, president, Javelin Strategy & Research, says: “As consumers shift more financial transactions to secure online arenas, fraudsters have become more creative in utilising traditional telephones. Access through mail and telephone transactions grew from three per cent of ID theft in 2006 to 40% in 2007 and fraudsters are getting creative and leveraging new techniques to commit fraud, so consumers need to be as diligent as ever in protecting their personal information.”

At the banking end, Actimize says firms should combine cross channel behaviour profiling and anomaly detection technologies with better call center processes and training. Call center employees should be trained to listen more closely and ask who originated the call.

Says the vendor: “Attacks may be thwarted or losses minimised if bank employees ask simple (but random instead of static) security questions at various points in the phone conversation when confirming personal credentials.”


Full Story