<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6569760559005233215</atom:id><lastBuildDate>Tue, 25 Feb 2025 23:57:34 +0000</lastBuildDate><category>facebook</category><category>scam</category><category>hack</category><category>administration. scam</category><category>fraud</category><category>hacking</category><category>Free</category><category>malware</category><category>Google</category><category>breach</category><category>data</category><category>twitter</category><category>Apple</category><category>Gift Card</category><category>Target</category><category>anti virus</category><category>attack</category><category>belly. video</category><category>card</category><category>charge</category><category>crime</category><category>hoax</category><category>iTunes</category><category>location</category><category>major</category><category>message</category><category>new</category><category>pictures</category><category>scammers</category><category>warning</category><category>$25</category><category>2011</category><category>AV Virus</category><category>Amy Winehouse</category><category>Anthony</category><category>Baby</category><category>BlackPos</category><category>Caley</category><category>Casey</category><category>Casey Anthony</category><category>Certificate</category><category>Damian Menscher</category><category>Direct</category><category>Elizabeth</category><category>GPS</category><category>Giftcard</category><category>Jessica</category><category>KAPTOXA</category><category>Kentucky</category><category>Neiman Marcus</category><category>Nicole</category><category>OnStar</category><category>POS</category><category>POSTRAM</category><category>Pizza Hut</category><category>Texas</category><category>Walgreen Gift Card Scam Hack fraud identity theft</category><category>Yahoo!</category><category>accounts</category><category>alert</category><category>amy</category><category>auto</category><category>baseball</category><category>brands</category><category>browser</category><category>canadian</category><category>cancellation</category><category>charging</category><category>cheating</category><category>clickjacking</category><category>closing</category><category>code</category><category>complain</category><category>computer</category><category>contract</category><category>cookies</category><category>coptrollers</category><category>crack</category><category>credit</category><category>criminals</category><category>de-friend</category><category>defriend</category><category>defriended</category><category>deleting</category><category>detected</category><category>drugs</category><category>eat</category><category>elevator</category><category>fake</category><category>farmville</category><category>feud</category><category>geo</category><category>geolocation</category><category>gift scamming</category><category>girl</category><category>hackers</category><category>iPhone</category><category>iframe</category><category>infected</category><category>java</category><category>javascript</category><category>kicking</category><category>killed</category><category>law</category><category>league</category><category>leaked</category><category>list</category><category>main</category><category>man</category><category>murder</category><category>murdered</category><category>must</category><category>network</category><category>october</category><category>office</category><category>outcry</category><category>outrage</category><category>page</category><category>parcel</category><category>pay per click</category><category>petition</category><category>photo</category><category>photos</category><category>pizza</category><category>places</category><category>players</category><category>playstation</category><category>policy</category><category>porno</category><category>president</category><category>privacy</category><category>proxy</category><category>ps3</category><category>revealed</category><category>safari</category><category>scamming</category><category>scandal</category><category>scare</category><category>script</category><category>security</category><category>service</category><category>settings</category><category>shaft</category><category>shocking</category><category>shot</category><category>signals</category><category>solved</category><category>sony</category><category>state</category><category>steal</category><category>stores</category><category>tagging</category><category>taking</category><category>the</category><category>theft</category><category>tracking</category><category>trojan</category><category>united</category><category>unveiled</category><category>ups</category><category>vehicles</category><category>viagra</category><category>video</category><category>videos</category><category>virus</category><category>visit</category><category>watched</category><category>wheel chair</category><category>white</category><category>windeouse</category><category>wrong</category><title>Cesar Ortiz Information Security Blog</title><description>Helpful and useful comments, guides and tips related to Information Security.</description><link>http://cesarortizblogs.blogspot.com/</link><managingEditor>noreply@blogger.com (Cesar Ortiz)</managingEditor><generator>Blogger</generator><openSearch:totalResults>61</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-3491072693766022856</guid><pubDate>Sun, 30 Jun 2024 19:29:00 +0000</pubDate><atom:updated>2024-06-30T12:34:13.381-07:00</atom:updated><title>The Role of AI in Detecting and Preventing Internet Fraud</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZBKy9erPopSmWuwAHuvzaDf398xNzrgpuXsPzbbihDObbUxZYvJUqSi23SVlRIGwVRbJWO6ugf-6gkGnykTTCloJN_yZTjBBjnTn5WqPC-mcnWEtz2VpTdKGqZ-0JvW6AZjN_EP6oxRrN/s1600/11719847_s.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZBKy9erPopSmWuwAHuvzaDf398xNzrgpuXsPzbbihDObbUxZYvJUqSi23SVlRIGwVRbJWO6ugf-6gkGnykTTCloJN_yZTjBBjnTn5WqPC-mcnWEtz2VpTdKGqZ-0JvW6AZjN_EP6oxRrN/s320/11719847_s.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;By Cesar Ortiz&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;June 30 2024&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Title: The Role of AI in Detecting and Preventing Internet Fraud&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; min-height: 12px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;In the digital era, technology has transformed the way we live, work, and communicate. However, as advancements in technology continue to grow, so does the risk of internet fraud. As more transactions and interactions occur online, criminals are finding new ways to exploit these systems for their gain. This is where artificial intelligence (AI) steps in to play a crucial role in detecting and preventing fraudulent internet usage.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; min-height: 12px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;AI technologies have revolutionized the field of cybersecurity by providing powerful tools that can analyze vast amounts of data in real-time. This capability enables AI systems to identify patterns and anomalies that may indicate fraudulent activities. By using machine learning algorithms, AI applications can learn from past incidents and continuously improve their ability to detect suspicious behavior.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; min-height: 12px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;One common use of AI in combating internet fraud is through the use of anomaly detection algorithms. These algorithms can monitor user behavior, transaction patterns, network traffic, and other data points to identify deviations from normal activity. For example, if an AI system detects a sudden spike in transactions from a specific account or location that is inconsistent with previous behavior, it can raise an alert for further investigation.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; min-height: 12px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Furthermore, AI-powered fraud detection systems can also help prevent unauthorized access by implementing advanced authentication methods such as biometric recognition or behavioral analysis. These additional layers of security make it more difficult for cybercriminals to gain access to sensitive information or conduct fraudulent activities.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; min-height: 12px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Additionally, AI can be used to analyze text-based data such as emails or chat messages to detect phishing attempts or social engineering schemes. By scanning for specific keywords or linguistic patterns commonly used in fraudulent communications, AI systems can identify potential threats before they cause harm.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; min-height: 12px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Overall, the use of AI for combating internet fraud is essential in today&#39;s digital landscape. By leveraging advanced technologies like machine learning and anomaly detection algorithms, organizations can enhance their cybersecurity defenses and protect their assets from malicious actors. As cyber threats continue to evolve, AI will play an increasingly critical role in securing our online environment and ensuring a safe digital future.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; min-height: 12px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;In conclusion, while internet fraud poses a significant challenge in today&#39;s interconnected world, AI provides innovative solutions that empower organizations to stay ahead of cyber threats. By harnessing the power of artificial intelligence for fraud detection and prevention efforts, we can create a more secure online ecosystem for all users.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; min-height: 12px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;References:&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; min-height: 12px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;1. https://www.ibm.com/cloud/learn/anomaly-detection-ai&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;2. https://www.mckinsey.com/business-functions/risk/our-insights/global-threats-to-global-threat-detection&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;3. https://www.forbes.com/sites/forbestechcouncil/2020/07/10/how-ai-can-help-combat-cybersecurity-breaches-in-the-age-of-covid-19/?sh=494969623427&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;4. Created using Chat GPT&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://cesarortizblogs.blogspot.com/2024/06/the-role-of-ai-in-detecting-and.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZBKy9erPopSmWuwAHuvzaDf398xNzrgpuXsPzbbihDObbUxZYvJUqSi23SVlRIGwVRbJWO6ugf-6gkGnykTTCloJN_yZTjBBjnTn5WqPC-mcnWEtz2VpTdKGqZ-0JvW6AZjN_EP6oxRrN/s72-c/11719847_s.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-5367657333087363817</guid><pubDate>Sun, 09 Jan 2022 04:30:00 +0000</pubDate><atom:updated>2022-12-07T13:24:24.539-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data</category><category domain="http://www.blogger.com/atom/ns#">geo</category><category domain="http://www.blogger.com/atom/ns#">geolocation</category><category domain="http://www.blogger.com/atom/ns#">GPS</category><category domain="http://www.blogger.com/atom/ns#">location</category><category domain="http://www.blogger.com/atom/ns#">photos</category><category domain="http://www.blogger.com/atom/ns#">pictures</category><category domain="http://www.blogger.com/atom/ns#">places</category><category domain="http://www.blogger.com/atom/ns#">settings</category><title>Smartphones with GPS can tag your pictures with the exact PIC location</title><description>&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhUdFaUz2zJBQdpQ4LQxdho7srEImsMnUjWZkCuaq8nad5XxHiZHm4maBsKVUVErc5KUTo53dQGpoO-mdOHAQFMsFzjvI1uOnP1YGMiiAe-LxuFFl7hDeK5401LhuInL4QoI3R9eB3feChpAPIaSceVTA4LWDZEllempmjYFwigTiM2B-7W3Dew5xl1hw=s400&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;400&quot; data-original-width=&quot;249&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhUdFaUz2zJBQdpQ4LQxdho7srEImsMnUjWZkCuaq8nad5XxHiZHm4maBsKVUVErc5KUTo53dQGpoO-mdOHAQFMsFzjvI1uOnP1YGMiiAe-LxuFFl7hDeK5401LhuInL4QoI3R9eB3feChpAPIaSceVTA4LWDZEllempmjYFwigTiM2B-7W3Dew5xl1hw=s320&quot; width=&quot;199&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Article Re Published By Popular Demand&amp;nbsp;&lt;/div&gt;&lt;div&gt;Originally Published January 20 2012 in Yahoo News&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Author&#39;s comment:&lt;/div&gt;&lt;div&gt;&lt;span face=&quot;arial, sans-serif&quot; style=&quot;background-color: white; caret-color: rgb(32, 32, 32); color: #202020; font-size: 13px;&quot;&gt;Due to recent 2021 court cases, both criminal and civil, this subject is more relevant than ever. Follow the instructions given in the article and you will be able to edit the picture metadata. I just checked the Exif Tag Remover link in the article and is alive and working, January 2022.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span face=&quot;arial, sans-serif&quot; style=&quot;background-color: white; caret-color: rgb(32, 32, 32); color: #202020; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;By Cesar Ortiz&lt;br /&gt;&lt;br /&gt;&lt;/h4&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: medium; font-weight: normal;&quot;&gt;Smartphones GPS chips can tag your shared pictures with the precise location where your picture was taken. Most of the features comes as default &quot;active&quot; on smartphpones and digital cameras. This also applies to pictures taken with modern digital cameras who have GPS features built in. On older digital cameras, geotagging, as it is called, is also used but will provide mostly details of the camera who took the picture, information about the picture name assigned in your PC and date and time the photo was taken. Do you want to share that information with others?&amp;nbsp;&amp;nbsp;If not, use one of the free geotagg or metadata&amp;nbsp;&amp;nbsp;viewing software available to see what your camera is tagging in hidden form., I use the one from &quot;&lt;a href=&quot;http://regex.info/exif.cgi&quot;&gt;Jeffrey&#39;s&lt;/a&gt;&quot;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h4&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: medium; font-weight: normal;&quot;&gt;If you don&#39;t like the hidden information in the picture, remove the metadata or geotagg function from your digital stand alone camera by checking your user manual or vendor.On digital photos already taken, you can edit your picture using a Windows or Mac&amp;nbsp;built in photo editor&amp;nbsp;and remove the metada by hand&amp;nbsp;or buy&amp;nbsp;any of the many #metadata removing tools available in the web.&amp;nbsp; I use the &lt;a href=&quot;http://www.rlvision.com/exif/about.asp&quot;&gt;EXIF&amp;nbsp;Tag Remover&lt;/a&gt; Free Trial,&amp;nbsp;&amp;nbsp;if you decide to buy is $19.95.&amp;nbsp;Your&amp;nbsp;pretty picture taken in your&amp;nbsp;home and posted &amp;nbsp;in Twitter, Facebook and other social media&amp;nbsp;may be telling&amp;nbsp;the world&amp;nbsp;where do you exactly live.&amp;nbsp;Always assume that a picture you are &quot;sharing&quot; with friends can be intercepted and compromised by posting it somewhere by your friend.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h4&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: medium; font-weight: normal;&quot;&gt;Sadly, there are bad people that look for that type of information. If you comment&amp;nbsp;the photo&amp;nbsp;with &quot;I will be away for such and such days&quot; you are providing an invitation for a burglary. Please notice that disabling Location Services will affect any application that uses GPS. Personally, I don&#39;t disable the &quot;Location&quot; option in my devices, I just edit the pictures taken and remove the Geotagg info inserted by Location Services.&amp;nbsp;To remove the&amp;nbsp;&amp;nbsp;geotagging option or function, (to prevent the device from inserting the info in your picture at all times),&amp;nbsp;on smart phones&amp;nbsp;follow the steps below:&lt;br /&gt;
On the Iphone= Go to Settings, General, Location Service and turn off Geotagging.&lt;br /&gt;
On Android= Go to Options, Device, Location Settings, Location Services, select &quot;Location Off&quot;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h4&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: medium; font-weight: normal;&quot;&gt;On other smart phones the instructions to remove the geotagging function&amp;nbsp;permanently are similar. Check with your phone provider.&lt;br /&gt;(c) Cesar Ortiz&lt;/span&gt;&lt;/h4&gt;


&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/01/smartphones-with-gps-can-tag-your.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEhUdFaUz2zJBQdpQ4LQxdho7srEImsMnUjWZkCuaq8nad5XxHiZHm4maBsKVUVErc5KUTo53dQGpoO-mdOHAQFMsFzjvI1uOnP1YGMiiAe-LxuFFl7hDeK5401LhuInL4QoI3R9eB3feChpAPIaSceVTA4LWDZEllempmjYFwigTiM2B-7W3Dew5xl1hw=s72-c" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-6920096622268470423</guid><pubDate>Mon, 25 Nov 2019 23:15:00 +0000</pubDate><atom:updated>2022-01-13T09:42:30.161-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">baseball</category><category domain="http://www.blogger.com/atom/ns#">cheating</category><category domain="http://www.blogger.com/atom/ns#">fraud</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">league</category><category domain="http://www.blogger.com/atom/ns#">major</category><category domain="http://www.blogger.com/atom/ns#">players</category><category domain="http://www.blogger.com/atom/ns#">scandal</category><category domain="http://www.blogger.com/atom/ns#">signals</category><category domain="http://www.blogger.com/atom/ns#">steal</category><title></title><description>&lt;div style=&quot;font-stretch: normal; line-height: normal;&quot;&gt;
&lt;div style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;; font-size: 11px;&quot;&gt;
&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;h2 style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;; text-align: center;&quot;&gt;
&lt;span style=&quot;font-kerning: none;&quot;&gt;Technical Details in The MLB Baseball Players Signals Hacking&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;; font-size: 11px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-family: &amp;quot;helvetica neue&amp;quot;; font-size: 11px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmGiiIfCvEadCkMni4gWaFDPwpwg3RQswOYV87gINYwKlQHw4LaokfJbb8kkHgBGLYFvvB7ZO3-bfNO28fi82rNDO0xB1iPHAUhAeTy8nmXC8LMA2oq6NoUdIfdt3cVPYoT2JI2N7ekIDN/s1600/119273523_s.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;671&quot; data-original-width=&quot;714&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmGiiIfCvEadCkMni4gWaFDPwpwg3RQswOYV87gINYwKlQHw4LaokfJbb8kkHgBGLYFvvB7ZO3-bfNO28fi82rNDO0xB1iPHAUhAeTy8nmXC8LMA2oq6NoUdIfdt3cVPYoT2JI2N7ekIDN/s320/119273523_s.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;; font-stretch: normal; line-height: normal;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: large; font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: large; font-weight: normal;&quot;&gt;By Cesar Ortiz (c)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;November 24, 2019&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;The Mayor League Baseball (MLB) organization is updating the ongoing investigative effort on the&amp;nbsp; 2017 baseball games signal hacking issue. The Houston Astros organization is leading the pack of baseball teams under the investigative radar. Astros front-office employees, on-field staff and the Astros manager, AJ Hinch have already been interviewed. Other players allegedly involved are the current Boston Red Sox manager Alex Cora and the New York Mets manager Carlos Beltran.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;The &lt;a href=&quot;https://www.sny.tv/mets/news/sources-no-evidence-yet-for-carlos-beltran-alex-cora-penalties-for-alleged-astros-sign-stealing/311873844&quot;&gt;&lt;span style=&quot;-webkit-font-kerning: none;&quot;&gt;SNY TV Network&lt;/span&gt;&lt;/a&gt; on November 14, 2019, is quick to state that the MLB has no evidence yet for imposing sanctions to Cora and Beltran,&amp;nbsp; further stating, “ The league does not have either accusations or evidence that would point to severe discipline for either”.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;For years, stealing signals from players was considered an art. It is not illegal, but officials become wary when they find reports of the activity when it is done using banned technology.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;The use of technology to intercept or relay the signals is forbidden. &lt;a href=&quot;https://www.nytimes.com/2017/09/05/sports/baseball/boston-red-sox-stealing-signs-yankees.html?smid=tw-nytimes&amp;amp;smtyp=cur&quot;&gt;&lt;span style=&quot;-webkit-font-kerning: none;&quot;&gt;The New York Times &lt;/span&gt;&lt;/a&gt;reported in 2017 the use of an Apple watch as a means to electronically relay signals to the Red Sox team partners by a Red Sox trainer. The Apple watch use was revealed in a detailed official complaint filed by Brian Cushman, the New York Yankees general manager. Among the exhibits in the complaint was a video shot of the Reds Sox dugout in Boston during the 2017 three-games series. The Red Sox team was fined by the MLB.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Recently, &lt;a href=&quot;https://www.usatoday.com/story/sports/mlb/2018/10/26/manny-machado-sign-stealing-world-series/1780202002/&quot;&gt;&lt;span style=&quot;-webkit-font-kerning: none;&quot;&gt;USA Today &lt;/span&gt;&lt;/a&gt;ran an article explaining how Manny Machado was caught stealing and relaying signals in game two of the 2018 World Series. In the Machado event, there was no violation of any rules because all the signal intelligence was acquired and relayed by Machado using manual signaling skills. No mechanical or electronic devices where used.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-kerning: none; text-decoration: underline;&quot;&gt;&lt;a href=&quot;https://theathletic.com/1363451/2019/11/12/the-astros-stole-signs-electronically-in-2017-part-of-a-much-broader-issue-for-major-league-baseball/&quot;&gt;The Athletic&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt; ran an article detailing how the Astros in 2017 ran a hacking operation using a video camera and drum beats to relay signals from the catchers to everyone in the stadium, only the hacking partners knew the meaning of the beats and how to decode them.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&amp;nbsp;Some suspected means of stealing baseball signals are:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&amp;nbsp;(1) The use of a realistic-looking medical bandage-like device worn by the player at bat that receives a buzzing signal with a&amp;nbsp; predetermined pattern, for example, one buzz for a fastball.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;(2) Hidden catcher aimed mini cameras that feed data of catchers signals and sends out information on the type of pitch.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;(3) Extended range antennas for radio devices to hear the pitcher-catcher-manager conferences at the mound.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;(4) Lips reading text interpreters for conferences between players (that is the reason players cover their mouth with the gloves when they speak to each other).&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;(5) Monitoring of the live video broadcast of the game (MLB mandated a delay in the video monitors that are used in the dugouts and nearby areas).&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;Most of the suspected technical equipment techniques used are detectable by specialized equipment and manual signaling stealing can be detected by a trained eye.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;The fact that we may find such hacking practice, even when they can be detected, tends to show the high amounts of monetary rewards involved, that in the eyes of the perpetrators, warrant the risk of detection. So far, no one has been charged with any criminal or civil offense. MLB is offering leniency to those who speak up on the subject and, as of this date,&amp;nbsp; all technical equipment use events are related to the 2017 year.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-kerning: none;&quot;&gt;The MLB hacking using information technology techniques and equipment brings to the field a new form of platform to think about, perhaps some Silicon Valley entrepreneurs will design custom hardware and software to detect the hacking devices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;; font-stretch: normal; line-height: normal; min-height: 12px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://cesarortizblogs.blogspot.com/2019/11/technical-details-in-mlb-baseball.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmGiiIfCvEadCkMni4gWaFDPwpwg3RQswOYV87gINYwKlQHw4LaokfJbb8kkHgBGLYFvvB7ZO3-bfNO28fi82rNDO0xB1iPHAUhAeTy8nmXC8LMA2oq6NoUdIfdt3cVPYoT2JI2N7ekIDN/s72-c/119273523_s.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-6649497308813799346</guid><pubDate>Thu, 31 Jul 2014 06:41:00 +0000</pubDate><atom:updated>2022-01-13T09:52:52.780-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BlackPos</category><category domain="http://www.blogger.com/atom/ns#">breach</category><category domain="http://www.blogger.com/atom/ns#">criminals</category><category domain="http://www.blogger.com/atom/ns#">data</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">KAPTOXA</category><category domain="http://www.blogger.com/atom/ns#">Neiman Marcus</category><category domain="http://www.blogger.com/atom/ns#">POS</category><category domain="http://www.blogger.com/atom/ns#">POSTRAM</category><category domain="http://www.blogger.com/atom/ns#">revealed</category><category domain="http://www.blogger.com/atom/ns#">solved</category><category domain="http://www.blogger.com/atom/ns#">stores</category><category domain="http://www.blogger.com/atom/ns#">Target</category><category domain="http://www.blogger.com/atom/ns#">unveiled</category><title> Target Data Breach Unveiled</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhckJoKpGuyQUePje_12_2T9RqEnqQhDal_VbK27_CCFJeos4jPWQRalp_KCmfD5WAWBm4dwCLnvckSLQyStVf9D2BisiW4TyphbESVVbCXcRIzZtkSs-qw8vGcNc2cW4G91ZLW6xVPQbZ-/s1600/150_2740656.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxFg_oURmig__e1cPKsfc06eKroUjnCdwkqaqiNEeU4qAek1ZYJLG50MRnsOqCJVIzckgycFGtahT253BTudBjMWJbtN3L4wy43xBditNxymH7dH82K9MmoGOY8QGQW5a_HEQOOxjvbevf/s1600/iStock_000019100622Small.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;226&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxFg_oURmig__e1cPKsfc06eKroUjnCdwkqaqiNEeU4qAek1ZYJLG50MRnsOqCJVIzckgycFGtahT253BTudBjMWJbtN3L4wy43xBditNxymH7dH82K9MmoGOY8QGQW5a_HEQOOxjvbevf/s1600/iStock_000019100622Small.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
How It was done. You will be surprised that all the tools used where known!&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
By Cesar Ortiz- Trojan. POSRAM Identified As the RAM Scraper in the KAPTOXA
Operation That Infected Target&amp;nbsp;Stores&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;
Article first published 1/23/2014&amp;nbsp; as &quot;Target Data Breach Unveiled: Technical Details Are Known&quot; in Yahoo! Contributors/ABC News Network.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;This article won the &quot;Best General Interest Article in 2014&quot;, General- Category by Yahoo Contributors Users.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;
The US government in an effort to warn other point of sale
merchants of the potential danger of &amp;nbsp;more attacks that will provide
another wave of &amp;nbsp;&quot;Target like&quot; customer victims, have released
an internal document where detailed insight of the methodology used by
attackers of the Target data breach is revealed. The consulting firm iSIGHT
Partners was one of the investigative contracted forensics experts. The US Department
of Homeland Security released to merchants a joint Department of Homeland
Security, USSS, FS-ISAC and iSIGHT report titled &quot;&lt;i&gt;&lt;a href=&quot;http://www.isightpartners.com/2014/01/kaptoxa-pos-report-faq/#sthash.okEvt1hr.dpuf&quot;&gt;KAPTOXA
POS Report&lt;/a&gt;&lt;/i&gt;&quot; where we get a look at an insight of the methods and
tools used to hack Target.&amp;nbsp;Hopefully, merchants will take notice and
immediately take preventive measures.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
The methodology used at Target was almost exactly as I
predicted in our original exclusive December 26, 2013 “ &lt;i&gt;The
Target Stores Data Breach &lt;/i&gt;” Yahoo! article, right after the hack. &lt;a href=&quot;http://krebsonsecurity.com/2014/01/a-first-look-at-the-target-intrusion-malware/&quot;&gt;Journalist
Brian Krebs&lt;/a&gt; was also right on target when he mentioned at that time that
the hack might have been based on a known trojan virus called BlackPos that is
readily detected by all anti-virus software. The updated modified version of BlackPos
trojan used in the Target breach is named Trojan.POSRAM, this derivative is
highly sophisticated in stealth features in order to hide to prevent detection.
POSRAM is believed to have originated in &lt;st1:country-region w:st=&quot;on&quot;&gt;Russia&lt;/st1:country-region&gt;.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
When we compile the information given by the report and the
media, specially an article in the &lt;i&gt;Wired &lt;/i&gt;publication named “&lt;i&gt;&lt;a href=&quot;http://www.wired.com/threatlevel/2014/01/target-malware-identified/&quot;&gt;The
Malware that Duped Target Have Been Found&lt;/a&gt;&lt;/i&gt;”, we come close to figure out
the order of events in the Target data breach. First, the merchant network system
is infiltrated with the malware, possibly remotely, exploiting an opening in
the system or by executing a simple human engineering exploit. The malware is a
data scrapping tool that takes data from the memory of the point of sale
terminal (POS) or what we know as the cash register. This tool will reside in
the system and will store the stolen data inside the merchant’s servers. The
tool will monitor the data in the files named “pos.exe&quot; and &quot;PosW32.exe”; these
files contain the memory space that includes magnetic strip data of your bank
card. In the Target&#39;s breach event it remained still for six days. That inactivity period is excellent to prevent detection.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
The residing malware in the merchant creates a connection to
an out of the premises server that receives and transmits data to the victim
server. The outside server, can be located anywhere, in the world, and, queries
the victim server at specific time intervals. This one was located in Russia. Some of the malicious scripts used have references in Russian language. If the local merchant time is for
example between 10 AM and 5 PM, as it is used in the old BlackPos tool, then
the data is deposited in an a&amp;nbsp; temporary
NetBIOS share “host” folder created by the malware. This share folder is then
accessed using file transfer protocol (FTP). Many more complex technical
details have been found by the media in just a few hours after the release of
the &lt;i&gt;KAPTOXA POS Report&lt;/i&gt;. All the
details follow the same pattern; surprisingly, modified known exploits where
used at all times.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&amp;nbsp;KAPTOXA is the name
given by investigators to the specific operation methodology and compilation of
hacking tools in the Target data breach. Nothing in
the KAPTOXA operation is out of the ordinary. Probably the other tools used in
the hack are already known in the trade. It is not that the criminals used
super sophisticated malware, it is the way and the timing they where used. The
fact that known hacking tools where used will open the doors to a wave of
lawsuits that will claim that the merchants could have prevented the hack; this
is one of the reason that the government has taken the unprecedented steps of
releasing some of the facts and data about the crime before even finishing the
investigation. Merchants should verify their systems immediately. Victimized stores should consider making public their breach ASAP. The more time
the notifications to affected customers passes by, the higher the lawsuit
figures will be and more damage to the customer is made.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Two individuals from &lt;st1:country-region w:st=&quot;on&quot;&gt;Mexico&lt;/st1:country-region&gt;
were arrested in &lt;st1:place w:st=&quot;on&quot;&gt;&lt;st1:city w:st=&quot;on&quot;&gt;McAllen&lt;/st1:city&gt;, &lt;st1:state w:st=&quot;on&quot;&gt;Texas&lt;/st1:state&gt;&lt;/st1:place&gt; with ninety six fraudulent bank cards
in their possession. The suspects had used bank cards with account information matching
the Target stolen cards of &lt;st1:place w:st=&quot;on&quot;&gt;South Texas&lt;/st1:place&gt;
residents. After the shopping spree, the suspects left for &lt;st1:country-region w:st=&quot;on&quot;&gt;Mexico&lt;/st1:country-region&gt;.&amp;nbsp;They entered the &lt;st1:country-region w:st=&quot;on&quot;&gt;US&lt;/st1:country-region&gt; again possibly, for another
shopping spree. They where detained upon arrival. This event confirms that the
stolen data is sold in the illicit market by regions. Criminals are maximizing the use of the stolen data by being very creative. Regardless of Target&#39;s downplay efforts to minimize the impact, a customer can be a victim of identity theft with the specific&amp;nbsp;data stolen at Target.&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://cesarortizblogs.blogspot.com/2014/01/target-data-breach-unveiled.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxFg_oURmig__e1cPKsfc06eKroUjnCdwkqaqiNEeU4qAek1ZYJLG50MRnsOqCJVIzckgycFGtahT253BTudBjMWJbtN3L4wy43xBditNxymH7dH82K9MmoGOY8QGQW5a_HEQOOxjvbevf/s72-c/iStock_000019100622Small.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-741716122926615036</guid><pubDate>Wed, 30 Jul 2014 17:35:00 +0000</pubDate><atom:updated>2022-01-13T09:45:14.908-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">alert</category><category domain="http://www.blogger.com/atom/ns#">breach</category><category domain="http://www.blogger.com/atom/ns#">card</category><category domain="http://www.blogger.com/atom/ns#">credit</category><category domain="http://www.blogger.com/atom/ns#">crime</category><category domain="http://www.blogger.com/atom/ns#">data</category><category domain="http://www.blogger.com/atom/ns#">fraud</category><category domain="http://www.blogger.com/atom/ns#">Target</category><category domain="http://www.blogger.com/atom/ns#">Yahoo!</category><title> The Target Stores Data Breach Update</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTSKKqpvoOZGotuXULbGfDyvyz1YoundMO8QM_Io86zSXBgL7f67326YWz4VIKoWFs1R96IOYLSY31k8tMklVvsmUeC00hI6qAmHFMqSQZPAxDoAmq_jrcQpzk4hWR0zbrmh5yrwKdxeHT/s1600/6919175_s.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ3UVlv_QzBD0tdpwhtmj0zju-NuPR_-RBX3JeQ42AWndunL5HHLBUfpjDLOWqVKDP7EkVEA4PLacAh5UELsmaZWdtQ6pNcfW-fq8THO65wMwhtRNdAwlvvgZDvelfGs7v-ryu9IU4UFUh/s1600/6919175_s.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ3UVlv_QzBD0tdpwhtmj0zju-NuPR_-RBX3JeQ42AWndunL5HHLBUfpjDLOWqVKDP7EkVEA4PLacAh5UELsmaZWdtQ6pNcfW-fq8THO65wMwhtRNdAwlvvgZDvelfGs7v-ryu9IU4UFUh/s1600/6919175_s.jpg&quot; height=&quot;320&quot; width=&quot;240&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
A Provocative View of the Event From
an Industry Outsider&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot; style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: center;&quot;&gt;
&lt;/h3&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
By Cesar Ortiz - (Article originally published on Yahoo! Contributors/ABC News). Many legal, commercial and social questions regarding the Target data breach will come to see the light after all the dust is settled. The answer to the technical side of one of the biggest security breaches in the United States history is as complex as these other questions. The &lt;a data-rapid_p=&quot;1&quot; href=&quot;http://krebsonsecurity.com/2013/12/sources-target-investigating-data-breach/&quot;&gt;breach&lt;/a&gt;, which was first reported Wednesday by Brian Krebs, a security blogger, began the day after Thanksgiving.The giant merchant said Thursday that about 40 million credit and debit card accounts may have been compromised in U.S. stores between Nov. 27 and Dec. 15, 2013. Included in the hack are Target&#39;s own credit and debit REDcards. One interesting note is that cards used for purchases made in the company web site were not affected.&lt;br /&gt;
&lt;br /&gt;
&lt;a data-rapid_p=&quot;2&quot; href=&quot;http://krebsonsecurity.com/2013/12/sources-target-investigating-data-breach/&quot;&gt;Target advises at their web site&lt;/a&gt; in a page named; &lt;i&gt;&quot;Notice: unauthorized access to payment card data in U.S. stores&quot;&lt;/i&gt; that &lt;i&gt;&quot;we began investigating the incident as soon as we learned of it. We have determined that the information involved in this incident included customer name, credit or debit card number, and the card&#39;s expiration date and CVV (the three-digit security code) &quot;&lt;/i&gt;. This is what Target said originally. In reality, there are several &quot;CVV&#39;s&quot; and the one with the printed numbers on the card is called CVV2.&lt;br /&gt;
&lt;br /&gt;
The industry regulates the use of credit cards by following several guidelines and standards. Everyone must follow the standards in order to maintain systems compliance. One standard is the &lt;a data-rapid_p=&quot;3&quot; href=&quot;https://www.pcisecuritystandards.org/&quot;&gt;&lt;i&gt;PCI Data Security Standard Council&lt;/i&gt;&lt;/a&gt; &lt;i&gt;(PCI DSS)&lt;/i&gt; that deals with security and operational payments handling methodology and the &lt;a data-rapid_p=&quot;4&quot; href=&quot;http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=50370&quot;&gt;&lt;i&gt;ISO/IEC standard 7811&lt;/i&gt;&lt;/a&gt;, which is used by banks. &lt;i&gt;ISO/IEC 7811&lt;/i&gt; specifies the hardware and methodology used to handle the transaction and specifies that the bank cards must have a magnetic stripe on the back of a credit/debit card, often called a &quot;magstripe&quot;. This magnetic stripe must have three tracks. Your credit card normally uses only tracks one and two. Track three is a read/write track, which includes an encrypted PIN, country code, currency units and amount authorized, Use of track three is not mandatory and its contents is optional. The PIN is encrypted in a data base. It is never in clear text in the magnetic stripe. The Target stolen personal identifier information and financial data was taken from the magnetic strips read out.  &lt;br /&gt;
&lt;br /&gt;
The &lt;i&gt;Card Verification Value CVV2&lt;/i&gt; (a three or four digit) number is not included in the magnetic stripe because it will defeat its main purpose, that is, to validate the card manually when using on line, phone purchases and high value transactions. We know that some merchants in North America require the code at the POS to protect the customer by making sure the card is legitimate since it can be a fraudulent card made from information from some stolen data base that does not include the CVV2.&lt;br /&gt;
&lt;br /&gt;
This is a professional well studied attack that must had taken many weeks of planning and careful design to the point that it started one day before the &lt;a class=&quot;link interlink&quot; data-rapid_p=&quot;5&quot; href=&quot;http://voices.yahoo.com/topic/27517/black_friday.html&quot; rel=&quot;&amp;amp;content_type=topic&amp;amp;content_type_id=27517&quot; title=&quot;Black Friday&quot;&gt;Black Friday&lt;/a&gt; major sale event. Breaking encrypted data is a very hard process that requires massive computing facilities and resources. By design, in all retail stores, all data flowing outside of the merchant&#39;s stores should be encrypted heavily and it is handled by an independent payment processor facility, a communications carrier(s) and marketing analysis facilities. The possibility of a remote access job to a weak point in the systems is very high.&lt;br /&gt;
&lt;br /&gt;
&lt;a data-rapid_p=&quot;6&quot; href=&quot;http://www.nbcnews.com/business/target-offers-shoppers-discounts-investigators-look-overseas-2D11786402&quot;&gt;According to &lt;/a&gt;&lt;a class=&quot;link interlink&quot; data-rapid_p=&quot;7&quot; href=&quot;http://voices.yahoo.com/topic/21951/nbc.html&quot; rel=&quot;&amp;amp;content_type=topic&amp;amp;content_type_id=21951&quot; title=&quot;NBC&quot;&gt;&lt;i&gt;NBC&lt;/i&gt;&lt;/a&gt;&lt;i&gt; News&lt;/i&gt;, Target Spokeswoman, Molly Snyder, released a written statement on Friday that downplayed the initial impact from the event and advised that &lt;i&gt;&quot;To date, we are hearing very few reports of actual fraud, but are closely monitoring the situation,&quot;.&lt;/i&gt; &quot;&lt;i&gt;the stolen information was limited to data stored on the magnetic strip&quot;&lt;/i&gt;, &lt;i&gt;&quot;The hackers did not obtain PIN numbers used to access ATM&#39;s or the three or four digit that are printed on cards to verify online purchases&quot;,&lt;/i&gt; Snyder said. The fact is that reports of fraudulent usage of Target stolen cards sold in the Internet are showing up all over the nation, and in the world. JP Morgan Chase &amp;amp; Co is not downplaying the attack. On Saturday 12/21/2013 the bank sent an email to 2 million Chase debit card holders who used the Chase card at Target during the breach period limiting the bank debit card usage and will issue new debit cards, a costly measure. &lt;a data-rapid_p=&quot;8&quot; href=&quot;https://www.chase.com/services/target-breach?jp_aid_a=57948454&amp;amp;jp_aid_p=col_uk_home/trip3&quot;&gt;Chase also posted a notice in the bank web page&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
If we take into account all the personal identifiers parameters that Target says was compromised, we must conclude that we have three possible alternatives where the hack took place (1) the Point of Sale Module (POS) card scanner (2) in a central card processor system at the merchant and (3) when it arrives at the authorization system processor for approval.&lt;br /&gt;
&lt;br /&gt;
We are ruling out a job at the outside (external) payment processor because they all provide very secure modules, they will not accept unencrypted input from their merchants, that&#39;s their business after all, and they service many other merchants. This hack was to Target only. What probably most likely happen, is that the hackers were able to intercept, remotely, using malware scripts, the swipes of cards from the Target hardware card reader devices to the POS modules or from the credit cards in house gateways, specially if it was unencrypted (clear text) or poorly encrypted and the thieves had gotten the encryption key somewhere in the system, the later had happened before to other principals in other hacks. This is a very serious criminal monumental detrimental event, for the banking industry and the business society as a whole, taking into account that it was done to all the stores in the United States and possibly affecting in some way or another 40 million credit card holders, all at the same date time frame, nationwide.&lt;br /&gt;
&lt;br /&gt;
In the original statement , Target&#39;s Molly Snyder said the breach had compromised the &quot;&lt;i&gt;CVV&quot;&lt;/i&gt;. Target has retracted now. Now they claim it was not compromised. Investigators are looking overseas for possible perpetrators. Stolen credit cards are showing up all over the world and many in the United States. Regardless of the downplay efforts by public relations people, this is a serious threat. If you used any debit/credit card at a Target store in the United States during the breach date time frame, including cards issued by non U.S. banks, don&#39;t take the matter lightly, act immediately and contact your bank first and then contact Target.&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;
Comment by Cesar Ortiz, 7/30/2014: Looks it was right on the
money when I categorized the Target Stores
Data Breach as a “&lt;span style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial; font-family: Georgia; font-size: 10.5pt;&quot;&gt;very serious criminal monumental detrimental event&lt;/span&gt;”
in my article in Yahoo! above. Now, several weeks later after my article was published, we are
finding out that the &lt;a href=&quot;http://www.businesswire.com/news/home/20140110005281/en/Target-Update-Data-Breach-Financial-Performance#.UtAvOi2wVdR&quot;&gt;customer names, mailing address, phone numbers and email addresses &lt;/a&gt;were also compromised and that the impacted customers figure is now
70 million. Now more than ever contact your bank if you used any payment method
other than cash at target during the date time frame and if you did, beware of
postal letters, emails, phone calls &amp;nbsp;and
IM’s, even if they don’t mention Target.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://cesarortizblogs.blogspot.com/2013/12/read-my-article-target-stores-data.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ3UVlv_QzBD0tdpwhtmj0zju-NuPR_-RBX3JeQ42AWndunL5HHLBUfpjDLOWqVKDP7EkVEA4PLacAh5UELsmaZWdtQ6pNcfW-fq8THO65wMwhtRNdAwlvvgZDvelfGs7v-ryu9IU4UFUh/s72-c/6919175_s.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-4254182676207909135</guid><pubDate>Wed, 30 Jul 2014 16:33:00 +0000</pubDate><atom:updated>2014-07-30T18:28:59.943-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">crime</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">playstation</category><category domain="http://www.blogger.com/atom/ns#">ps3</category><category domain="http://www.blogger.com/atom/ns#">sony</category><category domain="http://www.blogger.com/atom/ns#">theft</category><title></title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNInaR1deAjdkeevZP2-xVaRfMcjAVVi6rH86dUYPZevOW8pMutTqUI60dybA7ZLDMFFAnvxjnaQue-daCH8Ar87BFCcN3Oj0XfikeGXvzydIC1AbY9HttcWYXKPmpFbV3P8VuH3QysNYE/s1600/300_1612639.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNInaR1deAjdkeevZP2-xVaRfMcjAVVi6rH86dUYPZevOW8pMutTqUI60dybA7ZLDMFFAnvxjnaQue-daCH8Ar87BFCcN3Oj0XfikeGXvzydIC1AbY9HttcWYXKPmpFbV3P8VuH3QysNYE/s1600/300_1612639.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
How to Protect Your Identity from PlayStation Network Hackers&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;By Cesar Ortiz- (Article first published on Yahoo! Contributors/ABC News) This article still applies because hackers wait a long time to act, sometimes years, giving users time to forget to take measures against the original hack on April 27, 2011, As Sony finally broke the silence on why its PlayStation Network had been down for a week, new questions arise regarding the potential damage to the 70 million users. The illegal, unauthorized intrusion compromised members&#39; real name, complete address, birth date, email, Network ID, password, user handle and security question/answer. All the personal, identifiable data previously mentioned has been breached and, as a matter of fact, confirmed by Sony. Sony warns that, at this time, the credit card names, billing addresses, card numbers and the expiration dates may have also been breached, but the company does not know that information presently.&lt;br /&gt;
&lt;br /&gt;
The Sony PlayStation Network had been in several previous hacker-related incidents, none as serious as this one. Some facts come to light; the site was down for a week without anyone being told that it had been hacked and personal data had been compromised. This gave Sony and forensic criminal investigators time to research, detect and perhaps apprehend the criminal(s), but at the same time left member identities in a compromised mode for a week, and, worse, without the users&#39; knowledge. It all now depends on what the hacker(s) has done with the stolen data.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sony itself, in a &lt;a data-rapid_p=&quot;1&quot; href=&quot;http://blog.us.playstation.com/2011/04/26/update-on-playstation-network-and-qriocity/&quot;&gt;blog post&lt;/a&gt;,
 warns users to prepare for a worst-case scenario. That&#39;s the same thing
 I advise my readers. If you are or know someone who is a member of the 
PlayStation Network, even if you have not used your account but provided
 the credit information, we recommend that you take the following steps 
immediately:&lt;br /&gt;
&lt;br /&gt;
(1) If you are using the same PlayStation Network 
password and security question/answer at other websites or offline 
places, including banking outlets, change it.&lt;br /&gt;
(2) Be extremely careful when opening emails and clicking links in emails, Facebook or &lt;a class=&quot;link interlink&quot; data-rapid_p=&quot;2&quot; href=&quot;http://voices.yahoo.com/topic/57445/twitter.html&quot; rel=&quot;&amp;amp;content_type=topic&amp;amp;content_type_id=57445&quot; title=&quot;Twitter&quot;&gt;Twitter&lt;/a&gt; messages related to this breach; they may be a malicious scam.&lt;br /&gt;
(3) Monitor your bank account regularly&lt;br /&gt;
(4) If in the United States, consider using one of the free alert 
services provided by Expedia, Trans Union or Equifax. See the Sony blog 
post for phone numbers and email addresses.&lt;br /&gt;
Cybercriminals wait a
 reasonable amount of time before they begin to scam the victims using 
stolen personal information. That period of time may tend to make 
potential victims forget about the event.&lt;br /&gt;
&lt;br /&gt;
Don&#39;t expect lots of online 
purchases, purchases by phone and scam emails to flow immediately. When 
the time comes, those who did not change their passwords, monitor their 
bank accounts and stay alert to email scams will be the victims.</description><link>http://cesarortizblogs.blogspot.com/2014/07/how-to-protect-your-identity-from.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNInaR1deAjdkeevZP2-xVaRfMcjAVVi6rH86dUYPZevOW8pMutTqUI60dybA7ZLDMFFAnvxjnaQue-daCH8Ar87BFCcN3Oj0XfikeGXvzydIC1AbY9HttcWYXKPmpFbV3P8VuH3QysNYE/s72-c/300_1612639.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-8109034653918809497</guid><pubDate>Wed, 30 Jul 2014 16:17:00 +0000</pubDate><atom:updated>2014-07-30T18:27:13.648-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer</category><category domain="http://www.blogger.com/atom/ns#">fraud</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">infected</category><category domain="http://www.blogger.com/atom/ns#">scam</category><category domain="http://www.blogger.com/atom/ns#">virus</category><category domain="http://www.blogger.com/atom/ns#">warning</category><title></title><description>Google: &quot;Your Computer Appears to Be Infected&quot; This Warning is Not a Scam, But,  Beware of Where it Shows and What May Come Next&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY1TKURQPB6Y0mClPqM781FIBFGzDYf_OjTe4PFnMYGquXb5cw9mRC85r1CIP5hti7R9TvnojcAqM7OlLLZwyHv1ownKrGJxCsbC9JbvjGGoaRMy2ek5SuV1e8ql8cVnT4VUIj3TMmO5cA/s1600/6645429_s.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY1TKURQPB6Y0mClPqM781FIBFGzDYf_OjTe4PFnMYGquXb5cw9mRC85r1CIP5hti7R9TvnojcAqM7OlLLZwyHv1ownKrGJxCsbC9JbvjGGoaRMy2ek5SuV1e8ql8cVnT4VUIj3TMmO5cA/s1600/6645429_s.jpg&quot; height=&quot;212&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Google&#39;s Virus Warning is NOT a Scam, But, Look Out for Future Postings, They May Be Look-alike Scams&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
By Cesar Ortiz - (Article first published in Yahoo! Contributors/ABC News). This article is based on a &lt;a data-rapid_p=&quot;1&quot; href=&quot;http://googleonlinesecurity.blogspot.com/2011/07/using-data-to-protect-people-from.html&quot;&gt;Google blog page posting&lt;/a&gt;, this issue has been covered in many publications as a news item, including my own blog and my own article published worldwide on Yahoo!/ABC News. In this opinion I express my concern of what will be coming next as a result of &lt;a class=&quot;link interlink&quot; data-rapid_p=&quot;2&quot; href=&quot;http://voices.yahoo.com/topic/1269/google.html&quot; rel=&quot;&amp;amp;content_type=topic&amp;amp;content_type_id=1269&quot; title=&quot;Google&quot;&gt;Google&lt;/a&gt; bringing up the subject matter in the way they did. In other words, Google is using the same procedure that scammers use every day to get users to link to malware,but this time the link they will click is a &lt;a data-rapid_p=&quot;3&quot; href=&quot;http://www.google.com/support/websearch/bin/answer.py?answer=1182191&quot;&gt;real help page&lt;/a&gt;. Scammers will copy-cat the virus warning and hit the users with a malware link instead of a help page.&lt;br /&gt;
&lt;br /&gt;
We received a &lt;a data-rapid_p=&quot;4&quot; href=&quot;http://googleonlinesecurity.blogspot.com/2011/07/using-data-to-protect-people-from.html&quot;&gt;Google Blog posting&lt;/a&gt; from Damian Menscher, a security engineer at Google, describing how he identified that infected computers were sending search traffic through proxies to the search engine. When you do a search, it sends you to a Google proxy IP then, just before doing the search, changes the search string and shows malware pay per click sites in a very &quot;professional looking&quot; graphics to trick you to think that you are going to legitimate sites.&lt;br /&gt;
&lt;br /&gt;
Mr. Menscher explains the following &quot;As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual search traffic while performing routine maintenance on one of our data centers. After collaborating with security engineers at several companies that were sending this modified traffic, we determined that the computers exhibiting this behavior were infected with a particular strain of malicious software, or &quot;malware.&quot;&lt;br /&gt;
&lt;br /&gt;
Google added that &quot;As a result of this discovery, today some people will see a prominent notification at the top of their Google web search results. We hope that by taking steps to notify users whose traffic is coming through these proxies, we can help them update their antivirus software and remove the infections&quot;&lt;br /&gt;
&lt;br /&gt;
This is a Google&#39;s first. They had never done this type of notification before. The notification will ONLY show at the top of the main Google page and it will be a page wide window with a black bar at the top. A similar black bar was seen when Google was testing to launch their Google+ service recently. The body of the window is in yellow and it will read in black letters:&lt;br /&gt;
&quot;Your computer appears to be infected.  &lt;br /&gt;
It appears that your computer is infected with software that intercepts your connection to Google and other sites. Learn how to fix this [Link]&quot;&lt;br /&gt;
&lt;br /&gt;
This message is for real. More than two million computers have been infected worldwide so far. If your receive the message, Google has detected that your PC is infected with a malware that appears to have gotten onto users&#39; computers from one of approximately a hundred variants of a fake antivirus, or &quot;fake AV&quot; software that has been in circulation for some time. This time, one of the variants uses the Google service to scam users, therefore prompting Google to step in. When users click on the &quot;Learn how to fix this&quot; link, they are taken to a real &lt;a data-rapid_p=&quot;5&quot; href=&quot;http://www.google.com/support/websearch/bin/answer.py?answer=1182191&quot; target=&quot;_blank&quot;&gt;Google page&lt;/a&gt; that will help users to get rid of the AV virus.&lt;br /&gt;
&lt;br /&gt;
Up to now everything is running smoothly, but, now comes the catch, we know that scammers will design or copy the warning window that Goggle has been running since July 21, 2011 and that in the &quot;Learn how to fix this&quot; link in the fake window they will send users to an scam malware page. We can expect that Google will make sure that no one will be able to insert a fake message to replace the real one that they are posting in good faith, but no one can prevent hackers to insert a fake look alike window, with a malicious link, somewhere else, including a full fake Google main page.&lt;br /&gt;
&lt;br /&gt;
Users must be alert that when they connect with the Google main page the address bar will show the proper address such as &lt;a data-rapid_p=&quot;6&quot; href=&quot;http://www.google.com/&quot; target=&quot;_blank&quot;&gt;http://www.google.com/&lt;/a&gt;. There will be variants because Google routes users according to their detected geographical location. Make sure you have your &lt;a class=&quot;link interlink&quot; data-rapid_p=&quot;7&quot; href=&quot;http://voices.yahoo.com/topic/24395/anti_virus.html&quot; rel=&quot;&amp;amp;content_type=topic&amp;amp;content_type_id=24395&quot; title=&quot;anti virus&quot;&gt;anti virus&lt;/a&gt; software up to date and that is running in real time mode and be aware that Google will post this warning message ONLY at the top of their main page. If it shows somewhere else, it is a scam, no matter how real it may look.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5VDAPtJwh5xlLIDEeUlZJpMzvIpiRTxVGxq2ZTTKXxQg9j5BZEautDyYGhn2AyrIYX0QCkMcMvXUM0ovaxVSJHLARANj-pdIqaJrMF5YPoAP5-nlXTSO50wQc0_9isyOSCg_KAefk2kUL/s1600/6645429_s.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
</description><link>http://cesarortizblogs.blogspot.com/2014/07/google-your-computer-appears-to-be.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY1TKURQPB6Y0mClPqM781FIBFGzDYf_OjTe4PFnMYGquXb5cw9mRC85r1CIP5hti7R9TvnojcAqM7OlLLZwyHv1ownKrGJxCsbC9JbvjGGoaRMy2ek5SuV1e8ql8cVnT4VUIj3TMmO5cA/s72-c/6645429_s.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-3545229788964864942</guid><pubDate>Wed, 30 Jul 2014 15:52:00 +0000</pubDate><atom:updated>2014-07-30T18:27:50.775-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">fraud</category><category domain="http://www.blogger.com/atom/ns#">Free</category><category domain="http://www.blogger.com/atom/ns#">pizza</category><category domain="http://www.blogger.com/atom/ns#">Pizza Hut</category><category domain="http://www.blogger.com/atom/ns#">scam</category><title></title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzhVPElqN-kUAKo4XjHv2KJ97_U7UOeC6LQO4_IpafY_OFq6aK4HZ0E7a48OTPrQo_brPW5vQ6Wzs9sB9jTa2181BNSRjrBCuVVmBmOdj1oKydTTvNVmwUz2cOhypyA-C7VONza-W2hGQQ/s1600/8002616_s.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzhVPElqN-kUAKo4XjHv2KJ97_U7UOeC6LQO4_IpafY_OFq6aK4HZ0E7a48OTPrQo_brPW5vQ6Wzs9sB9jTa2181BNSRjrBCuVVmBmOdj1oKydTTvNVmwUz2cOhypyA-C7VONza-W2hGQQ/s1600/8002616_s.jpg&quot; height=&quot;240&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
facebook “Eat for Free at Pizza Hut!” Internet Scam is Spreading Virally&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By Cesar Ortiz- (Article first published in Yahoo! Contributors/ABC News) Thousands of facebook users are receiving the following message &quot;Eat for Free at Pizza Hut!&quot; from one of their friends who unwillingly posted this scam message to all his or her friends. The scam leads to at least a one &quot;Work at Home advertising&quot; that is designed to steal a user&#39;s personal information. The scammers change the contact link so fast that when we did a test, several schemes of pay per click and user information request show up, but all use the &quot;Free &lt;a class=&quot;link interlink&quot; data-rapid_p=&quot;1&quot; href=&quot;http://voices.yahoo.com/topic/23261/pizza_hut.html&quot; rel=&quot;&amp;amp;content_type=topic&amp;amp;content_type_id=23261&quot; title=&quot;Pizza Hut&quot;&gt;Pizza Hut&lt;/a&gt; Eat for Free&quot; scheme. Users that fall into this trap receive the following message:  Beginning of quote&lt;br /&gt;
&lt;i&gt;Eat for Free at Pizza Hut!  &lt;br /&gt;  [LINK] changes to avoid facebook ban detection&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;Take advantage of this special Pizza Hut offer! Receive a FREE pizza coupon today! Act quickly before the supply runs out. With only a few coupons left, they&#39;ll go fast!&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;xx minutes ago&lt;/i&gt;&lt;br /&gt;
End of quote&lt;br /&gt;
&lt;br /&gt;
The scammers went with very professional looking Pizza Hut Logos and graphics that will deceive someone that is in a hurry, don&#39;t read security blogs to know what is ahead, or is not very suspicious of scams. Users who receive this message from one of their friends will be taken to a very professional looking web page with a super pretty Pizza Hut logo that explains &quot;that the offer will expire in a certain date or when the remaining xxx offers have been given out!&quot;.&lt;br /&gt;
In the same graphic, users are then presented with a two step option:&lt;br /&gt;
&lt;br /&gt;
Step 1 is to click the &quot;Share&quot; button. At that point and time victims are sending the scam to all their friends, therefore propagating the scam all over the Internet.&lt;br /&gt;
Step 2 is to type &quot;The greatest food!&quot; at the &quot;comments&quot; window. Doing this step redirects your browser to a third party page (pay per click money for the scammers). Users are then taken to a &quot;Work at Home&quot; advertising page that before you make &quot;Tons of Cash&quot; you have to give the following data: Fist Name, Last Name, Address, Country, State, City, Postal Code, e-mail and Phone. After you provide all the information, there is no more communications from the web page and of course, there is no free Pizza Hut offer. As the saying goes, &quot;There is no such thing as a free lunch.&quot;  &lt;br /&gt;
&lt;br /&gt;
What the scammers do with all the personal information provided is anybody&#39;s guess.&lt;br /&gt;
Users who fall into this trap should do the following steps:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;(1) Remove any related items from your Facebook newsfeed wall page (2) Notify your friends and make sure you explain that you sent them the scam posting unwillingly (3) Run your Anti-Virus in full mode and set it to real-time scanning.  &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Opinion by the author - facebook bans scamming addresses (URL&#39;s), but scammers change them so fast that is very hard to cope with; incidentally, someone is using the Pizza Hut Logo in an illegal scam all over the Internet, Where is Pizza Hut or parent company &lt;a data-rapid_p=&quot;2&quot; href=&quot;http://yum.com/&quot;&gt;Yum! Brands, Inc&lt;/a&gt;. the world&#39;s largest restaurant company? There is no mention of the scam on the Pizza Hut &lt;a data-rapid_p=&quot;3&quot; href=&quot;http://www.facebook.com/PizzaHut&quot;&gt;Facebook&lt;/a&gt; page. At least, they can publish a disclaimer or a warning regarding the scam. They sure have the money to hire resources to track this people using their trademark&#39;s logo in illegal internet scams. Are they waiting for someone to sue? If someone uses the Pizza Hut logo illegally in a newspaper or a media outlet outside the Internet, it will be a matter of hours before an army Yum! Brands, Inc. lawyers jump into action, why not do the same when it is on the Internet? Pizza Hut and other brands that know that scammers use their trademarks may not be legally bound to do anything, but practically and morally they are.</description><link>http://cesarortizblogs.blogspot.com/2014/07/facebook-eat-for-free-at-pizza-hut.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzhVPElqN-kUAKo4XjHv2KJ97_U7UOeC6LQO4_IpafY_OFq6aK4HZ0E7a48OTPrQo_brPW5vQ6Wzs9sB9jTa2181BNSRjrBCuVVmBmOdj1oKydTTvNVmwUz2cOhypyA-C7VONza-W2hGQQ/s72-c/8002616_s.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-8795431460351128709</guid><pubDate>Wed, 30 Jul 2014 03:10:00 +0000</pubDate><atom:updated>2014-07-30T18:40:48.574-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Apple</category><category domain="http://www.blogger.com/atom/ns#">browser</category><category domain="http://www.blogger.com/atom/ns#">code</category><category domain="http://www.blogger.com/atom/ns#">cookies</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">iframe</category><category domain="http://www.blogger.com/atom/ns#">iPhone</category><category domain="http://www.blogger.com/atom/ns#">safari</category><category domain="http://www.blogger.com/atom/ns#">tracking</category><title>How Google Tracks Apple iPhone Users Browsing</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZBKy9erPopSmWuwAHuvzaDf398xNzrgpuXsPzbbihDObbUxZYvJUqSi23SVlRIGwVRbJWO6ugf-6gkGnykTTCloJN_yZTjBBjnTn5WqPC-mcnWEtz2VpTdKGqZ-0JvW6AZjN_EP6oxRrN/s1600/11719847_s.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZBKy9erPopSmWuwAHuvzaDf398xNzrgpuXsPzbbihDObbUxZYvJUqSi23SVlRIGwVRbJWO6ugf-6gkGnykTTCloJN_yZTjBBjnTn5WqPC-mcnWEtz2VpTdKGqZ-0JvW6AZjN_EP6oxRrN/s320/11719847_s.jpg&quot; height=&quot;213&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;By Cesar Ortiz -&amp;nbsp; Google and other advertising companies have been following iPhone and Apple users as they browse the Web, even though Apple’s Safari Web browser is set to block such tracking by default. By default, Apple’s Safari browser accepts cookies only from sites that a user visits; these cookies can help the site retain logins or other information. Safari generally blocks cookies that come from elsewhere, but Google, Vibrant, MIG, and PointRoll circumvented Safari cookie blocking, according to tweets by Stanford researcher Jonathan Mayer and his subsequent Wall Street Journal article, and to related research done by the Wall Street Journal Staff.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;When a user “googles” contents related to sites that have Google generated advertising in the web and clicks for anything related in the search engine results, it starts a user tracking sequence. As long as a user clicks in the results for any reason, Google detects the clicks using their code embedded in their “+1” button in the browser. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;In software development terminology, the word container is used to describe any component that can &lt;i&gt;&lt;span style=&quot;font-family: Arial; font-style: normal; mso-bidi-font-style: italic;&quot;&gt;contain&lt;/span&gt;&lt;/i&gt;&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt; &lt;/i&gt;other components inside. &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Examples of containers include Java applets, frames and windows. Some are visible, others are not. In our scenario it is a frame with an invisible form to be filled out.&amp;nbsp;Google&#39;s invisible&amp;nbsp;container is called “iframe” (InLine FRAME). &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;This iframe structure is very common in the industry and allows content from one web site to be embedded into another. As a general rule iframes are visible windows or ads. As we have explained before, In Google’s scenario iframe is created as an invisible container with a “form to be filled out”. The invisible iframe that was received in the user’s computers sent a flag to Google that identified the user as an Apple Safari user in a PC, laptop, iPhone or iPad Touch. This is not usual. When someone wants you to fill a form, it is sent as a visible form, of course. But this technique tricked Safari.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;When Google received the ID flag identifying Safari as the browser, it sent the invisible form to the user device. The user did not see the form, let alone fill it out, it was blank anyway, but Google code sent the blank invisible form to the user device Safari browser nevertheless. &lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Once the form was sent, Safari behaved as though the user had filled something out intentionally, and the browser allowed Google to put a cookie on the user’s machine. One cookie, in invisible form was sent back blank and the other invisible cookie form had user traffic data capture code (not personal data). The cookies were temporary; the blank one was set to expire in 12 hours, and the other expired in 24 hours. The end result is that users wind up visiting sites that they did not selected.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Google’s Rachel Whetstone said the temporary cookie served to create a “temporary communication link between Safari browsers and Google’s servers.” She said “the goal was to ensure that the information passing between the user’s Safari browser and Google’s servers was anonymous–effectively creating a barrier between a user’s personal information and the web content they browse”. Google said the company tried to design the +1 ad system to protect people’s privacy and did not anticipate that it would enable tracking cookies to be placed on user’s computers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;An Apple spokesman said: “We are aware that some third parties are circumventing Safari’s privacy features and we are working to put a stop to it.” An update to Safari has closed the loophole that allows cookies to be set after the automatic submission of invisible forms. Future public versions of Safari could incorporate that update.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://cesarortizblogs.blogspot.com/2012/02/how-google-tracks-iphone-users-browsing.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZBKy9erPopSmWuwAHuvzaDf398xNzrgpuXsPzbbihDObbUxZYvJUqSi23SVlRIGwVRbJWO6ugf-6gkGnykTTCloJN_yZTjBBjnTn5WqPC-mcnWEtz2VpTdKGqZ-0JvW6AZjN_EP6oxRrN/s72-c/11719847_s.jpg" height="72" width="72"/><thr:total>17</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-8250592340984578813</guid><pubDate>Fri, 10 Feb 2012 18:19:00 +0000</pubDate><atom:updated>2012-02-18T09:06:27.150-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">de-friend</category><category domain="http://www.blogger.com/atom/ns#">defriend</category><category domain="http://www.blogger.com/atom/ns#">defriended</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">feud</category><category domain="http://www.blogger.com/atom/ns#">killed</category><category domain="http://www.blogger.com/atom/ns#">list</category><category domain="http://www.blogger.com/atom/ns#">murder</category><category domain="http://www.blogger.com/atom/ns#">murdered</category><category domain="http://www.blogger.com/atom/ns#">shot</category><category domain="http://www.blogger.com/atom/ns#">wrong</category><title>Facebook Feud Takes Tragic Turn</title><description>&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3sR94nlA9YJKuSTmlAHonYdxKPOfSpTHKRicWmz2Jo39VIpjLWbg2CmFji2bA4TX359PTJpMsOjl2K5Qh5xZtsFt8ZpPJva26XPew_MiAKh_QA05kmCss6WddYSJoWq_AluYK_7EUC_Up/s1600/4286576_s.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3sR94nlA9YJKuSTmlAHonYdxKPOfSpTHKRicWmz2Jo39VIpjLWbg2CmFji2bA4TX359PTJpMsOjl2K5Qh5xZtsFt8ZpPJva26XPew_MiAKh_QA05kmCss6WddYSJoWq_AluYK_7EUC_Up/s320/4286576_s.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;By Cesar Ortiz&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;It was a matter of time, now we are facing a double murder and two detained suspects. Although this is not the first time that people have been killed with events regarding social networks, this is a flag that sour events involving social media are escalating and that we have to take the matter more seriously as a society and as parents. In this instance two suspects have been charged with the killing of two victims. The motive? Removing a person from the facebook friend list.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;According to the &lt;a href=&quot;http://www.johnsoncitypress.com/News/article.php?id=98162&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Johnson City Press&lt;/span&gt;&lt;/a&gt;, in &lt;st1:city w:st=&quot;on&quot;&gt;Mountain City&lt;/st1:city&gt;, &lt;st1:state w:st=&quot;on&quot;&gt;Tennessee&lt;/st1:state&gt; a father who was upset after a &lt;st1:state w:st=&quot;on&quot;&gt;&lt;st1:place w:st=&quot;on&quot;&gt;Tennessee&lt;/st1:place&gt;&lt;/st1:state&gt; couple deleted his adult daughter as a friend on Facebook has been charged in the shooting deaths of the couple, authorities said. The victims had complained to police that Marvin&#39;s Potter&#39;s daughter was harassing them after they deleted her as a friend on the social networking site, Johnson County Sheriff Mike Reece stated. Potter, 60, has been charged with two counts of first-degree murder in last week&#39;s slayings of Billy Payne Jr. and his girlfriend, Billie Jean Hayworth. The couple was shot to death in their &lt;st1:place w:st=&quot;on&quot;&gt;&lt;st1:placetype w:st=&quot;on&quot;&gt;Mountain&lt;/st1:placetype&gt; &lt;st1:placetype w:st=&quot;on&quot;&gt;City&lt;/st1:placetype&gt;&lt;/st1:place&gt; home in the far northeast corner of the state.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Facebook does not issue a direct notification message that someone has removed you from his or her friend list but provides, of course, means for a facebook user to know who is in the user friends list or that someone had made a change (if you have the option enabled). Normally, if we are removed from a facebook friend list we take the removal as an action taken by the account holder exercising his or her privilege. That is the sensible and logical way to take it. The reasoning being, is that if I or my relative was removed, the user must have had some valid reason for the removal. It is the user facebook account after all. The reasoning is that if we or a relative are removed from a facebook friends list, the person that removed us or a relative will be missing all the attributes we, a relative or a friend have to offer to social media and to the specific news feed.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;This sad event must serve a warning that we have to be more sensitive to our peers and close relatives concern that someone has done a detrimental action affecting their lives using social media. We have to project that Internet Social Media is just another form of communications like newspapers, radio or TV and as such, people have the right to express themselves, even if they are wrong. &lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;The event teaches us that we have to dig deeper into the effects of social media related to human nature and conduct.&amp;nbsp;It also teaches us how variable the values are in our society.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-size: small;&quot;&gt;    &lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;  &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://cesarortizblogs.blogspot.com/2012/02/facebook-feud-takes-tragic-turn.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3sR94nlA9YJKuSTmlAHonYdxKPOfSpTHKRicWmz2Jo39VIpjLWbg2CmFji2bA4TX359PTJpMsOjl2K5Qh5xZtsFt8ZpPJva26XPew_MiAKh_QA05kmCss6WddYSJoWq_AluYK_7EUC_Up/s72-c/4286576_s.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-8726075206419494241</guid><pubDate>Thu, 29 Dec 2011 03:55:00 +0000</pubDate><atom:updated>2014-07-30T18:29:56.349-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Walgreen Gift Card Scam Hack fraud identity theft</category><title>Get 1 F.R.E.E. Walgreens Gift Card! (limited time only) ” IS A VERY SERIOUS facebook CRIMINAL SCAM</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3dPYprL1Pr5SHannfehCp8qvyGdkUnAyo5iPw1pBT67l-PtCq4sQlTumf0pe5n6yFedvmt4UQHfRqAMiH_Lt8wSYU9uUf4fDQKvjlZPeP5YUJ7qz-NICMoAUQiL94ifMyE7ucj5HPhvKP/s1600/8002616_s.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3dPYprL1Pr5SHannfehCp8qvyGdkUnAyo5iPw1pBT67l-PtCq4sQlTumf0pe5n6yFedvmt4UQHfRqAMiH_Lt8wSYU9uUf4fDQKvjlZPeP5YUJ7qz-NICMoAUQiL94ifMyE7ucj5HPhvKP/s320/8002616_s.jpg&quot; height=&quot;240&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
By Cesar Ortiz - Thousands of facebook users are receiving this message on their message post. This message is originated by one or more of their own friends that felt into the trap of the scam and will send them a copy of the message unwillingly. In the scam, users will receive a very, very professional looking post from a friend that claims to offer the certificate in a very professional  looking Walgreen’s logo message box that requires users, as the first step in order to get the certificate, to  “click Post to Profile” bottom to get the certificate. Please assume that you are the victim for clarity exposure purposes. The moment you click to the blue “Post to Profile” button, you will be sending the scam to all your friends in your facebook account. The scam was reported on the &lt;a href=&quot;http://www.hoax-slayer.com/walgreens-gift-card-survey-scam.shtml&quot;&gt;Hoax Slayer&lt;/a&gt; Web Site.&lt;br /&gt;
&lt;br /&gt;
In our own tests, in the second step of the scam, in what the criminals call the “last step” you are then asked to “like” the post. You are then presented with a very real looking offer congratulating you and advising that you qualify for “the $50 Walgreens Gift card” and in order to claim the certificate you are asked to enter YOUR E-MAIL ADDRESS and the click the red “CLAIM NOW” button.&lt;br /&gt;
&lt;br /&gt;
The script then changes and now you are required to, as a requirement to get the certificate, to complete a survey and a total of four sponsor offers. Let’s say that up to now, this portion of the scam have been able to get your e-mail so far. But now things gets worse, now the hackers are requiring that you provide your NAME, ADDRESS, PHONE NUMBER and DATE of BIRTH in order to get the Gift Card. Needless to say you will never receive any Walgreen’s $50 dollars Gift Card. The facebook security group is busy blocking the URL’s, but, the scammers are also busy switching to other URL’s (Internet addresses) to avoid blocking.&lt;br /&gt;
&lt;br /&gt;
This is a VERY SERIOUS CRIMINAL hack. Users who fall into this trap are in serious problems and should do the following:&lt;br /&gt;
-Remove the post from your profile news feed, if you move the mouse to the right corner of the first line of the message, an “X” will show up, click on that “X”  and delete the post, .. But first report to facebbok using the “report option” that shows up, and then, remove the post.&lt;br /&gt;
-Notify all your friends that you sent them the post unwillingly and help them remove it from their profile.&lt;br /&gt;
-Subscribe to one of the identity theft alert sites.&lt;br /&gt;
-Notify your phone provider.&lt;br /&gt;
-If in the USA, report the incident to the FBI and other US Agencies as a group by going to:&lt;br /&gt;
&lt;a href=&quot;http://www.ic3.gov/complaint/default.aspx&quot;&gt;http://www.ic3.gov/complaint/default.aspx&lt;/a&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/12/get-1-free-walgreens-gift-card-limited.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3dPYprL1Pr5SHannfehCp8qvyGdkUnAyo5iPw1pBT67l-PtCq4sQlTumf0pe5n6yFedvmt4UQHfRqAMiH_Lt8wSYU9uUf4fDQKvjlZPeP5YUJ7qz-NICMoAUQiL94ifMyE7ucj5HPhvKP/s72-c/8002616_s.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-3263207126929589456</guid><pubDate>Wed, 16 Nov 2011 23:25:00 +0000</pubDate><atom:updated>2014-08-22T18:28:13.380-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">administration. scam</category><category domain="http://www.blogger.com/atom/ns#">attack</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">java</category><category domain="http://www.blogger.com/atom/ns#">javascript</category><category domain="http://www.blogger.com/atom/ns#">pictures</category><category domain="http://www.blogger.com/atom/ns#">porno</category><category domain="http://www.blogger.com/atom/ns#">scammers</category><category domain="http://www.blogger.com/atom/ns#">script</category><category domain="http://www.blogger.com/atom/ns#">videos</category><title>Vulnerability in a Browser(s) and Users Tricked to Copy-Paste a JavaScipt May Explain The Facebook Wave of Pornographic and Violent Spam.</title><description>Article first published as &quot;Browser Vulnerability, Tricked Users May Explain Disturbing Facebook Spam&quot;&lt;span style=&quot;color: blue;&quot;&gt; &lt;/span&gt;on Technorati.&lt;br /&gt;
By Cesar Ortiz&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Facebook claims to have found an explanation of the current wave of spam attacks, including explicit hardcore porn images, videos, photo shop created photos of celebrities like Justin Bieber in sexual situations, pictures of extreme violence and even photographs of animal cruelty. These are among many gross pictures being propagated. Users tend to see the images posted on a friend’s account, visible to everyone but the friend in question. &lt;span style=&quot;mso-bidi-font-style: italic;&quot;&gt;Facebook’s latest statement says the root of the attack is a malicious JavaScript that some users were tricked into copy and then paste to their browser URL address bar. Facebook released this statement:&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Beginning of quote&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;“Protecting the people who use Facebook from spam and malicious content is a top priority for us, and we are always working to improve our systems to isolate and remove material that violates our terms. Recently, we experienced a coordinated spam attack that exploited browser vulnerability. Our efforts have drastically limited the damage caused by this attack, and we are now in the process of investigating to identify those responsible. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;During this spam attack users were tricked into pasting and executing malicious java script in their browser URL bar causing them to unknowingly share this offensive content. Our engineers have been working diligently on this self-XSS vulnerability in the browser. We’ve built enforcement mechanisms to quickly shut down the malicious Pages and accounts that attempt to exploit it. We have also been putting those affected through educational checkpoints so they know how to protect themselves. We’ve put in place backend measures to reduce the rate of these attacks and will continue to iterate on our defenses to find new ways to protect people.”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;End of quote&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Hackers are tricking users to manually do a copy-paste. This cross-site scripting mainly allows an attacker to execute JavaScript code in your browser that can access and control the website you are interacting with. Facebook says that users were being tricked to copy and paste the offending JavaScript into their address location bar in the affected web browser, but does not identify the specific browser.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;The modus operandi of the hackers is to entice you to do a copy-&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt; paste. Users are manually spreading the scam unwillingly. Users are told to “&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&quot;&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;Erase everything in your address bar, copy and paste the code below, and press enter&quot; &lt;/i&gt;this is not just any URL, its full-fledged JavaScript code that will initiate the posting of the porno and violent spam to your friend’s news feed. Why the scammers use the “copy-paste” option? Scammers are using a java script. Users are in fact entering and executing the script for the scammers. The “click to a link” method makes the whole task very hard and leaves ID traces, therefore the use of the copy-paste option. The hook to prompt users to do the copy-paste is changed constantly, may be “free Starbucks coffee for a month” or to warn fellow media users of “some danger”, etc. If someone, even a friend, in any social media asks you to do a copy-paste, beware! &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Who is behind this campaign? Facebook uses the word “coordinated” to describe the attack. It could mean several servers, possibly in several locations, at the same time. This time is not that a hacker or a scammer wants to steal your hard earned money or your identity. This is a concerted sophisticated effort to harm and disgrace facebook.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;o:p&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Users  who are victims of this scam should do the following (1) Remove any  related items from your facebook Newsfeed wall page (2) Notify your  friends and make sure you explain that you sent them the scam posting  unwillingly (3) Run your Anti-Virus in full mode and set it to real time  scanning.&lt;/span&gt;&lt;/span&gt;&lt;/o:p&gt;&lt;/span&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/11/vulnerability-in-browsers-and-users.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-4542575121228863792</guid><pubDate>Sat, 22 Oct 2011 01:50:00 +0000</pubDate><atom:updated>2014-08-22T18:16:10.269-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">administration. scam</category><category domain="http://www.blogger.com/atom/ns#">brands</category><category domain="http://www.blogger.com/atom/ns#">complain</category><category domain="http://www.blogger.com/atom/ns#">eat</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Free</category><category domain="http://www.blogger.com/atom/ns#">major</category><category domain="http://www.blogger.com/atom/ns#">outcry</category><category domain="http://www.blogger.com/atom/ns#">outrage</category><title>Name Brands Question My Comments Regarding a Brand Lax Attitude When Scammers Use Their Company Logo On The Internet</title><description>By Cesar Ortiz&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:WordDocument&gt;   &lt;w:View&gt;Normal&lt;/w:View&gt;   &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:PunctuationKerning/&gt;   &lt;w:ValidateAgainstSchemas/&gt;   &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:Compatibility&gt;    &lt;w:BreakWrappedTables/&gt;    &lt;w:SnapToGridInCell/&gt;    &lt;w:WrapTextWithPunct/&gt;    &lt;w:UseAsianBreakRules/&gt;    &lt;w:DontGrowAutofit/&gt;   &lt;/w:Compatibility&gt;   &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;  &lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:LatentStyles DefLockedState=&quot;false&quot; LatentStyleCount=&quot;156&quot;&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin:0in;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:10.0pt;
 font-family:&quot;Times New Roman&quot;;
 mso-ansi-language:#0400;
 mso-fareast-language:#0400;
 mso-bidi-language:#0400;}
&lt;/style&gt; &lt;![endif]--&gt;  &lt;span style=&quot;font-family: Arial; font-size: 10.0pt;&quot;&gt;An exclusive article that I wrote on the Yahoo-ABC News Network titled “&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10.0pt; mso-ansi-language: EN;&quot;&gt;Facebook Eat for Free at Pizza Hut! Scam is Spreading Virally” &lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 10.0pt;&quot;&gt;has stirred an out cry from some companies. In the article I comment that Pizza Hut or its parent company, &lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10.0pt; mso-ansi-language: EN;&quot;&gt;&lt;a href=&quot;http://yum.com/&quot;&gt;Yum! Brands, Inc&lt;/a&gt;, the world&#39;s largest restaurant company, had done nothing to warn its clients of a major Internet scam using their company logo. Some other companies jumped into the bandwagon all claiming the same posture as follows; it is not the major brand responsibility to get into the act. It is the Internet Social Network carrier i.e. facebook, twitter or Google+ responsibility to handle the scam. “We are not in the IT business”. These corporate entities might be right on their assertion, but, may I ask, Why not then warn the public that their name brand is being used in a scam in their corporate and social web pages? The more users that are warned, the fewer victims we have. After all, users will curse the social carrier and the brand if their personal identifier data is stolen. One exception is Starbucks who always warns its clients of scams. That was the main objective of my article and still it is. We stand by what we commented on the article regarding some name brands attitude.&lt;/span&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/10/name-brands-question-my-comments.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-5912812082158114642</guid><pubDate>Mon, 26 Sep 2011 20:02:00 +0000</pubDate><atom:updated>2011-09-26T15:58:20.152-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2011</category><category domain="http://www.blogger.com/atom/ns#">accounts</category><category domain="http://www.blogger.com/atom/ns#">administration. scam</category><category domain="http://www.blogger.com/atom/ns#">charging</category><category domain="http://www.blogger.com/atom/ns#">deleting</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">fraud</category><title>facebook: “ Facebook Charging in 2011 ” is a Scam. &quot; Facebook Is Deleting Accounts &quot; is Another Scam</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;By Cesar Ortiz&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Now that facebook, suddenly without a major hint, in the f8Conference in San Francisco, dropped a major change to the way they present their interface to the users with a new platform &amp;nbsp;concept, scammers are having a field day taking advantage of the sweeping change in the facebook interface. Facebook &amp;nbsp;introduced its Open Graph platform, including the Timeline front end. Facebook does not need to charge for their portal, they make plenty of money on advertising, game sales and other paid for commission and value added services. This is another scam. A similar scam is that “ Facebook is Deleting Accounts ”.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Friends that fall into the trap will unwillingly send you a message post that reads:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Beginning of quote&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;“IT IS OFFICIAL. IT WAS EVEN ON THE NEWS. FACEBOOK WILL START CHARGING DUE TO THE NEW PROFILE CHANGES. IF YOU COPY THIS ON YOUR WALL YOUR ICON WILL TURN BLUE AND FACEBOOK WILL BE FREE FOR YOU. PLEASE PASS THIS MESSAGE ON, IF NOT YOUR ACCOUNT WILL BE DELETED IF YOU DO NOT PAY”&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;End of quote&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;If you take a look at the facebook login page- below the word “Sign Up”- you will see a statement in small blue type that say “It’s free and always will be.” Enough said. &amp;nbsp;Users who fall into the “ Facebook Charging in 2011 ” trap will be contributing to spamming or worse. According to HUFFPOST, these are the top nine worse case scenarios to this date that a user will fall into this “Facebook Charging In 2011” or similar scams.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(1)&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Clickjacking: Clickjackers on Facebook entice users to copy and paste text into their browser bar by posting too-good-to-be-true offers and eye-catching headlines. Once the user infects his own computer with the malicious code, the clickjackers can take control of his account, spam his friends and further spread their scam.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(2)&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Fake Polls or Questionnaires: If you click on an ad or a link that takes you to questionnaire on a site outside Facebook, it&#39;s best to close the page. When you complete a fake quiz, you help a scammer earn commission.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(3)&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Phising Schemes: Phishers go after your credentials (username, password and sometimes more), then take over your profile, and may attempt to gain access to your other online accounts. Phishing schemes can be difficult to spot, especially if the scammers have set up a page that resembles Facebook&#39;s login portal.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(4)&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Phony Email Or Message: &lt;a href=&quot;http://www.facebook.com/help/?page=1187&quot; target=&quot;_hplink&quot;&gt;Facebook warns&lt;/a&gt; users to be on the lookout for emails or messages from scammers masquerading as &quot;The Facebook Team&quot; or &quot;Facebook.&quot; These messages often suggest &quot;urgent action&quot; and may ask the user to update his account.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(5)&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Money Transfer Scams: If a friend sent you a desperate-sounding Facebook chat message or wall post asking for an emergency money transfer, you&#39;d want to help, right? Naturally. That&#39;s what makes this scam so awful.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(6)&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Fake Friends Request: Not all &lt;a href=&quot;http://www.huffingtonpost.com/2011/02/10/facebook-friend-request-spam_n_821584.html?page=1&quot; target=&quot;_hplink&quot;&gt;friend requests&lt;/a&gt; come from real people, despite Facebook&#39;s safeguards against bots. Some Facebook accounts exist purely to establish broad connections for spamming or extracting personal data from users, so watch out whose friend requests you accept.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(7)&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Fake Page Scam: Malicious pages, groups or event invitations aim to trick the user into performing actions that Facebook considers &quot;abusive.&quot;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(8)&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Rogue Applications: Oftentimes, the apps look convincingly real enough for users to click &quot;Allow,&quot; as they would do with a normal Facebook app. However, rogue apps use this permission to spread spam through your network of friends.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(9)&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;The Koobface Worm: Koobface spreads across social networks like Facebook via posts containing a link that claims to be an Adobe Flash Player update.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/09/facebook-facebook-charging-in-2011-is.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-4183186087598418191</guid><pubDate>Mon, 26 Sep 2011 17:09:00 +0000</pubDate><atom:updated>2014-08-22T18:16:37.338-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">auto</category><category domain="http://www.blogger.com/atom/ns#">cancellation</category><category domain="http://www.blogger.com/atom/ns#">contract</category><category domain="http://www.blogger.com/atom/ns#">location</category><category domain="http://www.blogger.com/atom/ns#">new</category><category domain="http://www.blogger.com/atom/ns#">OnStar</category><category domain="http://www.blogger.com/atom/ns#">policy</category><category domain="http://www.blogger.com/atom/ns#">privacy</category><category domain="http://www.blogger.com/atom/ns#">vehicles</category><title>New OnStar Policy Raises User Concerns About Privacy</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Article first published as &quot;New OnStar Policy Raises User Concerns About Privacy&quot; on Technorati.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;By Cesar Ortiz&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Last week, General Motors supported OnStar system subscribers began receiving an e-mail with a change in their Terms of Service Agreement. The changes are mainly related to cancellations and to the use of the data collected by the device. The OnStar system collects, stores and sends vehicle and location data to the provider command center. Some of the services are Automatic Crash Response, Emergency Services, Turn-by-turn Navigation, e-Nav, Stolen Vehicle Tracking and Roadside Assistance. The system is available on GM and Non GM vehicles.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;Two changes in the policy are raising privacy concerns: &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;(1) If a you cancel the service and leave the unit installed in the car, OnStar will stop monitoring the vehicle for the featured charged services but will still be receiving your location tracking and vehicle technical data using the OnStar two way cellular device built- in the unit. Until now, when OnStar service stopped, so did the vehicle’s two-way communications system. As of Dec. 1, however, that will not be the case. Vehicles of users who no longer subscribe will still be sending data via the system’s still-active two-way cellular link. In other words, you will not receive any benefits but will still be sending your vehicle location tracking and technical data to OnStar. The good news is that if you cancel and request that your two-way link be shut down, OnStar will comply. As a default however, users who do not call requesting the two-way cellular shutdown will keep on sending user data. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;(2) Under the new terms, OnStar reserves the right to share the information it collects with other companies and organizations. Vijay Iyer, an OnStar spokesman, said in a telephone interview with the &lt;a href=&quot;http://wheels.blogs.nytimes.com/2011/09/22/changes-to-onstars-privacy-terms-rile-some-users/&quot;&gt;New York Times&lt;/a&gt; that “OnStar maintains the cellular connection after the subscription is canceled, as a practice intended to collect data that could be useful to municipalities, for example, trying to improve traffic flow or to first responders attempting to determine the severity of a crash before arriving at the scene”. Does this last statement means that OnStar will keep providing emergency services even when a user cancels the paid monitoring service? If it does not, there is no reason to leave the cellular two-way unit active when canceling. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;The GPS-Two Way cellular communications type of technology in vehicles may raise some concerns about user privacy but the safety advantages and life savings features that comes with a paid subscription are worth the risk, this happens all the time with cellular phones, laptops, tablets and with vehicle navigation systems. OnStar must be very careful how they handle this issue of the changes in policy and to whom and how they provide the acquired data or they may be adding fuel to the user privacy concerns fire. &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;
&lt;b&gt;UPDATE:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
On September 27, 2011, I&amp;nbsp;received&amp;nbsp;an e-mail from OnStar Vice President, Public Affairs. The e-mail is regarding an original  article  published by me&amp;nbsp;as &quot;New OnStar Policy Raises User Concerns About Privacy&quot;&lt;span style=&quot;color: #339900;&quot;&gt;&lt;u&gt; &lt;/u&gt;&lt;/span&gt;on Technorati.  &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;
Immediately after receiving the e-mail, I contacted Technorati and published a second article titled &quot;OnStar Reverses  Decision to Change Terms and Conditions&quot; We think the decision announced by Mr. Iye in the e-mail is a savvy move. An hour after I received the e-mail, the OnStar reversal was a major media event world wide.&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
Tue, Sep 27, 2011 3:16  pm&lt;br /&gt;
From : (e-mail) Vijay Iyer│OnStar Communications&lt;br /&gt;
Vice President Public Affairs &amp;amp; Corporate  Communications&lt;br /&gt;
To : (e-mail) Cesar Ortiz, Technorati&lt;br /&gt;
e-mail title: OnStar Reverses  Decision to Change Terms and Conditions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://technorati.com/technology/article/onstar-reverses-decision-to-change-terms/#ixzz1bXFvJS9L&quot; style=&quot;color: #003399;&quot;&gt;&lt;/a&gt;&lt;/div&gt;
</description><link>http://cesarortizblogs.blogspot.com/2011/09/new-onstar-policy-raises-user-concerns.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-3290921216058767012</guid><pubDate>Tue, 13 Sep 2011 23:51:00 +0000</pubDate><atom:updated>2011-09-26T16:00:06.988-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">administration. scam</category><category domain="http://www.blogger.com/atom/ns#">belly. video</category><category domain="http://www.blogger.com/atom/ns#">clickjacking</category><category domain="http://www.blogger.com/atom/ns#">elevator</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">man</category><category domain="http://www.blogger.com/atom/ns#">shaft</category><category domain="http://www.blogger.com/atom/ns#">shocking</category><category domain="http://www.blogger.com/atom/ns#">wheel chair</category><title>Facebook: “ Man in Wheel Chair Falls Down Elevator Shaft ” This Click Jacking Scam is Spreading Very Fast Worldwide</title><description>&lt;span lang=&quot;EN&quot; style=&quot;color: black; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;By Cesar Ortiz&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;EN&quot; style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;Scammers intending to click jack your facebook account to force you to take surveys and take you to malware sites are using this latest attempt to incite facebook user’s curiosity on watching a specific video that in fact, you will never see. This scam is based in a real life incident that happened in &lt;st1:country-region w:st=&quot;on&quot;&gt;Korea&lt;/st1:country-region&gt;, &lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;The incident, which happened in August, was caught on security cameras in a shopping centre in &lt;st1:place w:st=&quot;on&quot;&gt;&lt;st1:city w:st=&quot;on&quot;&gt;Daejon&lt;/st1:city&gt;,  &lt;st1:country-region w:st=&quot;on&quot;&gt;South Korea&lt;/st1:country-region&gt;&lt;/st1:place&gt;.&lt;/span&gt; T&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;he photo used in this scam appears to have been taken from that news clip. The scam begins when one of your friends sends you a post with what appears to be video with a play button embedded in a still photo of an elevator shaft security camera with the date-time stamped. The following text will appear:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;Start of quote&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;“&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Man in wheelchair falls down the elevator shaft *SHOCKING VIDEO*&lt;br /&gt;
apps.facebook.com[LINK]&lt;br /&gt;
This Video is really shocking. a man in a wheelchair is falling down the elevator shaft.”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;End of quote&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Users who click on the “Play” button of the video are sent to a facebook page with all the looks of a real facebook page. A blank black background of a video with a “Play” button is in the center of the page with the title “Man in wheelchair falls down the elevator shaft “SHOCKING VIDEO1”. As soon as a user clicks on the “play” button, a malicious malware script in the facebook page will tag the post as if you have “Like” it and will send the same message that you received to all your friends from your account, therefore propagating the scam.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;After clicking the “Play” button on the “Shocking Video” screen something strange happens; another page will load with the elevator picture video in the background but in front of the video there is “facebook looking” message that says “You will not be allowed to continue until you have completed a survey” “Win an Ipad2!” and a “Complete” blue button for you to go to the survey or surveys or perhaps a high monthly fee cellular phone plan or worse. As I always say, you where taken there by deception, therefore, expect the worse. These guys are not angels.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Users who are victims of this scam should do the following (1) Remove any related items from your facebook Newsfeed wall page (2) Notify your friends and make sure you explain that you sent them the scam posting unwillingly (3) Run your Anti-Virus in full mode and set it to real time scanning.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/09/facebook-man-in-wheel-chair-falls-down.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-7812407395212332665</guid><pubDate>Sat, 10 Sep 2011 19:59:00 +0000</pubDate><atom:updated>2011-09-26T16:01:24.938-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">administration. scam</category><category domain="http://www.blogger.com/atom/ns#">Baby</category><category domain="http://www.blogger.com/atom/ns#">belly. video</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">kicking</category><category domain="http://www.blogger.com/atom/ns#">Nicole</category><category domain="http://www.blogger.com/atom/ns#">scammers</category><title>Facebook:  ‘   AWESOME Video Nicole’s Baby Kicking – The Belly View – Unbelievable &quot;  Scam is Spreading Virally</title><description>&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;By Cesar Ortiz &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Scammers are now using a real &lt;a href=&quot;http://www.youtube.com/watch?v=bDnx63RT0MU&quot;&gt;YouTube Video&lt;/a&gt; of a real life Nicole with a baby kicking inside her belly while at the beach as an inspiration for a scam. The real video reached viral proportions and when we saw the real video it had 3,754,503&amp;nbsp; views. There is nothing wrong with that video. The lady is dressed in a two piece bikini type swim suit.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;In the scam, users will receive a post from a friend in her or his News Feed wall. The picture shown in the post appears to be a copy- paste of the original real Nicole picture. The post will have the following message:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Start of quote&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;tt&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&quot;AWESOME Video &quot;Nicole&#39;s Baby Kicking - The Belly View - Unbelievable&quot;&lt;/span&gt;&lt;/tt&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
video.caxbee.com[link]&lt;br /&gt;
&lt;tt&gt;&lt;span style=&quot;font-family: Arial;&quot;&gt;An amazing view of a baby kicking and moving his way out of the belly while at the beach.&quot;&lt;/span&gt;&lt;/tt&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;End of quote&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;If you click on the &quot;video.caxbee.com[link]&quot; to see the video, you are directed to a page with three advertisings (money per click for the scammers) and an embedded video that looks very much like the original YouTube video. The first indication that this is a scam is that the page we are facing is not a YouTube page. The next indication of a scam is that in this page, there is a statement that says:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&amp;nbsp;&quot;To watch the video&quot; &quot;Click Share and then click on the Share link button&quot; &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;A big blue &quot;Share&quot; button is shown as the only option. Users who click on this &quot;Share&quot; button will immediately send this message to all the user friends, therefore propagating the scam. YouTube nor Vimeo or others video portals require that you share anything to view a video. There will not be any real video shown anywhere. So far, at the time of this writing, the only damage done is that you are taken to pay per click advertising sites without your consent. Beware that you have been presented this page by deception and that the deception may continue and escalate to more serious damages if you click on one of the advertisings that turns out to be a trap.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Users who are victims of this scam should do the following (1) Remove any related items from your Facebook Newsfeed wall&amp;nbsp; page&amp;nbsp; (2) Notify your friends and make sure you explain that you sent them the scam posting&amp;nbsp; unwillingly (3) Run your Anti-Virus in full mode and set it to real time scanning.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;entry-title&quot; style=&quot;margin: auto 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/09/facebook-awesome-video-nicoles-baby.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-4561760944390176612</guid><pubDate>Mon, 05 Sep 2011 16:26:00 +0000</pubDate><atom:updated>2011-09-05T21:30:38.915-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">farmville</category><category domain="http://www.blogger.com/atom/ns#">Gift Card</category><category domain="http://www.blogger.com/atom/ns#">hoax</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">white</category><title>Facebook: “ATTENTION EVERY FARMVILLE NEIGHBOR - THERE IS A WHITE GIFT BOX” Virus Hoax  is Spreading Wild</title><description>&lt;span style=&quot;color: black; font-family: Arial; font-size: 10pt; mso-bidi-font-size: 9.5pt;&quot;&gt;By Cesar Ortiz&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black; font-family: Arial; font-size: 10pt; mso-bidi-font-size: 9.5pt;&quot;&gt;Facebook Farmville users are hereby warned not to waste their time clicking or forwarding this message post. It is a hoax. There is no virus anywhere.&amp;nbsp;Users will receive this message:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial; font-size: 10pt; mso-bidi-font-size: 9.5pt;&quot;&gt;Beginning of quote&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial; font-size: 10pt; mso-bidi-font-size: 9.5pt;&quot;&gt;“&lt;/span&gt;&lt;span style=&quot;color: black; font-family: Arial; font-size: 9.5pt;&quot;&gt;ATTENTION EVERY FARMVILLE NEIGHBOR - THERE IS A WHITE GIFT BOX ...surrounded by a blue lace. It says &quot;someone has sent you a gift&quot; ... IT ISN&#39;T BEING SENT BY FARMVILLE !!! IT&#39;S A VIRUS!!! PLEASE DO NOT OPEN.. PLEASE COPY A PASTE THIS ON YOUR WALL SO THAT WE CAN ALL PROTECT EACH OTHER...........Very important KEEP IT GOING”&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial; font-size: 10pt; mso-bidi-font-size: 9.5pt;&quot;&gt;End of quote&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;color: black; font-family: Arial; font-size: 10pt; mso-bidi-font-size: 9.5pt;&quot;&gt;Nothing evil on the contents of the post. No harm is done. We and&amp;nbsp;all security experts that have researched this post agree that there is no malware related to the message. Since this message is reaching almost a million hits, you can imagine what a waste of time and resources this one is. We are glad that so far, as of this date, there is no harm involved. Those critics that say that we only publish malware related items, take note, this one is not a malware. Just ignore it or delete it from your desktop wall to save space and avoid that others&amp;nbsp;will re-post to friends.&lt;/span&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/09/facebook-attention-every-farmville.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-5536696425844199432</guid><pubDate>Fri, 19 Aug 2011 04:22:00 +0000</pubDate><atom:updated>2011-08-19T08:06:54.085-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">charge</category><category domain="http://www.blogger.com/atom/ns#">closing</category><category domain="http://www.blogger.com/atom/ns#">fraud</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">october</category><category domain="http://www.blogger.com/atom/ns#">petition</category><category domain="http://www.blogger.com/atom/ns#">scam</category><category domain="http://www.blogger.com/atom/ns#">trojan</category><category domain="http://www.blogger.com/atom/ns#">twitter</category><title>Twitter: “ Twitter Might Start to Charge in October, Sign This Petition to Keep the Service Free ” Scam is Spreading Fast</title><description>By Cesar Ortiz&lt;br /&gt;
In this variation of the “scares” scam, hackers are attempting to steal your user name and your password and in turn, your private credentials, and in effect, take control of your account for hidden criminal actions. Users will receive a message from one of their friends passing up the “news” of a possible monetary charge for the social service. Hackers are using human social engineering in making sure they are not mentioning a final determination to charge, but rather they mention that there is a “possibility”. Users will think that there is no harm to sign such a petition. The research firm Sophos warned of the scam originally. In the scam scenario,one of your friends that already have fallen in the scam will unknowingly send you a message post that will say: &lt;br /&gt;
&lt;br /&gt;
&quot;Twitter might start to charge in October, sign this petition to keep the service free! -URL-       http:/bitly.zxxx[Link]”&lt;br /&gt;
&lt;br /&gt;
Let’s pretend for a moment you are the victim user. When you click on the short link to access your petition, a problem “appears” to happen. You are then presented with a very, very Twitter professional looking frame with logo and perfect colors and typefaces (a fake). In the window you are warned that your session has timed out and that you need to &quot;re-authenticate&quot; and login again. Users will “need” to proceed and type their password and user name in the Twitter fake window. As soon as the user clicks the login button, a hidden script will propagate the same message received about the scam to all his or her friends, therefore propagating the scam. The same script will record your credentials.&lt;br /&gt;
&lt;br /&gt;
Needless to say, the “petition” is not shown anywhere. Unsuspecting users that clicked the short link may expect that many other unknown actions will take place from that point on, since the criminals have the user name and password. Users who fall into this trap should move quickly and do the following:&lt;br /&gt;
&lt;br /&gt;
(1)	Change your password immediately.&lt;br /&gt;
&lt;br /&gt;
(2)	Go to the Twitter Web Site using a PC, if you can, and revoke any application with a related name to the scam and revoke and delete any unknown posts, photos, API’s and any post, friends or anything else that does not look familiar to you. Remember, the scammers had full access to your account and a malicious script can create and post anything using a hidden malware. Be on the look out for scam e-mails and scam phone calls. Take your time on this task. Twitter is aware of this scam and is taking measures to block, warn users and mitigate the scam damage, but scammers will change the location of their DNS servers and URL’s sites very fast to keep the scam alive.&lt;br /&gt;
&lt;br /&gt;
(3)	Notify your friends of the scam and help them clean up the mess, make sure that you mention that you did not send the scam related post willingly, but rather unknowingly. &lt;br /&gt;
&lt;br /&gt;
(4)    Run your anti virus in full scan mode and make sure you set the anti virus program menu to &quot;Real Time&quot; scan.&lt;br /&gt;
</description><link>http://cesarortizblogs.blogspot.com/2011/08/twitter-twitter-might-start-to-charge.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-7587938972740847129</guid><pubDate>Sun, 07 Aug 2011 00:53:00 +0000</pubDate><atom:updated>2011-09-06T09:15:41.191-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">girl</category><category domain="http://www.blogger.com/atom/ns#">Jessica</category><category domain="http://www.blogger.com/atom/ns#">Kentucky</category><category domain="http://www.blogger.com/atom/ns#">law</category><category domain="http://www.blogger.com/atom/ns#">must</category><category domain="http://www.blogger.com/atom/ns#">photo</category><category domain="http://www.blogger.com/atom/ns#">scam</category><category domain="http://www.blogger.com/atom/ns#">tagging</category><category domain="http://www.blogger.com/atom/ns#">watched</category><title>Facebook: “ This Girls Must Be Watch Out Of Her mind After Making This Video &quot; scam uses photo tagging. The USA Law Does Not Requires a User Permission to Be Tagged</title><description>By Cesar Ortiz&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;This scam is spreading virally in Facebook. The syntax errors and improper use of the English language in the title is done on purpose by the scammers to fool scam detection robots. This is a variant of the “This Girl Must Must Be Watched” scam theme widely used in Facebook. In the scam, you receive a video with the title above from one of your friends. The video will show a semi sexual explicit image. Coming from one of your friends, one wonders what is in the video and will click the “Play” video arrow. The friend video has been tagged by a malicious scam script and the video will show that it is coming from him or her. In reality, your friend did not send you the video on purpose, but rather a malicious scam script tagged his or her name to the video and originated the post. The same scam will be sent to all his or her friends and you will activate the malicious tagging script if you click on the video. Users who click on the “Play” video arrow will be taken to a permission screen before “seeing” the video. In that permission screen, users will be granting the following to the scammers:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;strong&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; font-weight: normal; mso-ansi-language: EN;&quot;&gt;(1&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; font-weight: normal; mso-ansi-language: EN; mso-bidi-font-weight: bold;&quot;&gt;) “Access my basic information” (2) “Post to my Wall” (3) “Access my data any time” (4) &quot;Access my photos and videos”. When all is done, there is no video anywhere.&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;strong&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; font-weight: normal; mso-ansi-language: EN; mso-bidi-font-weight: bold;&quot;&gt;In other words, a user has given a scammer total control of his or her account, including control of video tagging. The malicious script manages to tag the victims name to the friend’s porno video post. &lt;/span&gt;&lt;/strong&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;Facebook will notify you when a friend tags you, but not as a default. Much better and safer will be if you are notified by default and be asked to approve the tag before it is accepted by Facebook. That is not the case at this time. Incidentally, even when done in good faith with no scam involved, the law does not require the taggee to be asked when it is tagged. This subject has been covered fully by Sophos IT Security experts. Please, see the example below:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt; mso-font-kerning: 18.0pt;&quot;&gt;(Beginning of Judge Opinion extract”&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;a href=&quot;http://ky.findacase.com/research/wfrmDocViewer.aspx/xq/fac.20110225_0000218.KY.htm/qx&quot;&gt;APPEAL FROM BOYD CIRCUIT COURT HONORABLE GEORGE DAVIS, JUDGE ACTION NO. 08-CI-01308&lt;/a&gt;&lt;span style=&quot;mso-font-kerning: 18.0pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt; mso-font-kerning: 18.0pt;&quot;&gt;“Jessica J. Lalonde v. Adam N. Lalonde&lt;/span&gt; case at the &lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Commonwealth&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt; of Kentucky   Court of Appeals&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;. The opinion of the court was delivered by: Lambert, Senior Judge Rendered: February &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;25, 2011; 10:00 A.M. by Lambert, Senior Judge. Jessica J. LaLonde appeals from that portion of a decree of dissolution of marriage that confirmed the report of the domestic relations commissioner and awarded her joint custody of a minor child but granted physical custody of that child to her former husband Adam N. LaLonde.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Jessica first argues the commissioner&#39;s decision was partially based on improperly admitted evidence. Adam introduced pictures of Jessica taken from the social network site Facebook. These pictures in general display Jessica enjoying parties and apparently consuming alcoholic beverages against the advice of her mental health treatment providers. Adam argued she had obviously not been truthful with her treatment providers when she indicated she had suspended or significantly diminished her consumption of alcohol. Jessica additionally argues that because Facebook allows anyone to post pictures and then &quot;tag&quot; or identify the people in the pictures she never gave permission for the photographs to be published in this manner.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&amp;nbsp;&lt;style&gt;
st1\:*{behavior:url(#ieooui) }
&lt;/style&gt;   &lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Demonstrative evidence such as these pictures must be supported by sufficient evidence to support a finding that the pictures are an accurate representation of what is claimed. Kentucky Rules of Evidence (KRE) 901(a). While typically, such supporting evidence is the testimony of the person who took the picture that it accurately depicts the reality of the photographed situation that is not the only manner to authenticate a photograph. Authentication only requires “testimony that a matter is what it is claimed to be.&quot; KRE 901(b)(1). Here, it was Jessica herself who acknowledged that indeed, she had been drinking alcohol and the pictures accurately reflected&amp;nbsp;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&lt;/span&gt;that activity. That testimony was sufficient to authentic the photographs and they were properly admitted into evidence”.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(End of Judge Opinion Extract)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Users who where affected by this scam must take the following steps: &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;To remove this hack, users will have to do four things (1) Remove the subject messages by clicking on the small “x” to the right of the message, this stops spreading the scam to your friends and (2) remove any related application in the “Profile Information”, “Privacy settings”, “Application websites” such as “This Girls Must Be Watch Out”. (3) Make sure you notify your friends that you where infected so that they can clean up their own account (4) Change your Facebook password immediately (5) Run your Anti-Virus in full scan mode.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/08/facebook-this-girls-must-be-watch-out.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-7190569178386782820</guid><pubDate>Tue, 02 Aug 2011 15:33:00 +0000</pubDate><atom:updated>2011-08-02T16:01:44.634-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">card</category><category domain="http://www.blogger.com/atom/ns#">Free</category><category domain="http://www.blogger.com/atom/ns#">Gift Card</category><category domain="http://www.blogger.com/atom/ns#">gift scamming</category><category domain="http://www.blogger.com/atom/ns#">hoax</category><category domain="http://www.blogger.com/atom/ns#">iTunes</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">scam</category><category domain="http://www.blogger.com/atom/ns#">twitter</category><title>Twitter:  iTunes Gift Card Scam Moves From Facebook to Twitter</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;By Cesar Ortiz&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;A variant of the familiar Facebook Free iTunes Gift card scam that we covered in this Blog on &lt;a href=&quot;http://cesarortizblogs.blogspot.com/2011/07/facebook-free-apple-itunes-25-giftcard.html&quot;&gt;July 6, 2011&lt;/a&gt; is back, but now is spreading virally in Twitter. The scam begins when users receive messages from their friends with enticing text that offer free iTunes Gift Cards. The message from the unsuspecting, already a victim, friend, read like the samples below:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(Beginning of quote)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;“&lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;i have got,get yrs free iTunes Gift Card giveaway today [LINK]&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;wow,iTunes Gift Card got just today free lol [LINK]&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;awesome lol,today got iTunes Gift Card [LINK]&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;Your Chance to choose Your Best iTunes Gift Card [LINK]&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;Find out how to get a iTunes Gift Card! [LINK]”&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;(End of quote)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;Unsuspecting users who click on the friend’s message about the “Free iTunes Gift Card” will trigger the scam hidden script immediately. According to security researchers, all of the scams will show a profile of a pretty female&amp;nbsp;photo, at times wearing very few clothes or a bikini. The very professional looking window will tempt users to follow the lady, sometimes called Milda Fountaine or Lucy Adams with interesting feeds of tweets like quotes of the day, but inserted in the feeds is one that says:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;“[Blue letters link] Milda Fountaine2-Milda Fountaine awsome lol &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;today got iTunes Gift Card&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;&lt;a href=&quot;http://www.arks.in/ogtd&quot;&gt;www.arks.in/ogtd&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;xx minutes ago&quot;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;Users who click on the blue link before the Milda name in the hope of receiving a Free iTunes card will immediately send the same message that they just received to all their friends, therefore propagating the scam. After clicking the blue link, users will receive an enticing advertising or form related to the user location country and city. It could be an offer for a Friends Club, Dating Club or any male oriented&amp;nbsp; “pay per filled form” site that unsuspicious or shady merchants contract the scammers for. If you clicked on to “Follow” Milda Fountaine, you have given permission to the scammers to play and even hack your Twitter account. Another option is to invade you and your friends with scam offers. Please beware that a malware (virus, password, credit data hacks) link can be inserted anywhere in the scam, therefore creating a more serious problem. There is no iTunes Free Card anywhere.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;To remove this hack from your Twitter account, (1) &lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;Go &lt;/span&gt;&lt;tt&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;to the Twitter Website page, log-in to your profile (1) Click on your user window pull down arrow at the top right of the menu where your thumbnail picture is ( 2) Select “Settings” (3) Select “Applications” (4) “Revoke Access” to any related scam application (if any) (5) Delete all related tweets (6) Contact and help your friends to clean up their accounts (7) Run your Anti Virus in Full Scan mode.&lt;/span&gt;&lt;/tt&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 6.85pt; mso-margin-top-alt: auto;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/08/twitter-itunes-gift-card-scam-moves.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-4126093878222752472</guid><pubDate>Tue, 26 Jul 2011 02:11:00 +0000</pubDate><atom:updated>2011-08-02T14:11:35.370-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">administration. scam</category><category domain="http://www.blogger.com/atom/ns#">canadian</category><category domain="http://www.blogger.com/atom/ns#">Direct</category><category domain="http://www.blogger.com/atom/ns#">message</category><category domain="http://www.blogger.com/atom/ns#">twitter</category><category domain="http://www.blogger.com/atom/ns#">viagra</category><title>Twitter: &quot;Direct Message From The Twitter Administration&quot; Scam is Spreading Fast</title><description>By Cesar Ortiz&lt;br /&gt;
This scam is making the rounds by the thousands on Twitter. You receive a message that says:&lt;br /&gt;
&lt;br /&gt;
(Beginning of quote)&lt;br /&gt;
&lt;br /&gt;
“Hi,&lt;br /&gt;
You have 2 direct message on Twitter!&lt;br /&gt;
http://twitter.com/account/messages/info/LDSV6-7XZ44-522266&lt;br /&gt;
The Twitter Team&lt;br /&gt;
&lt;br /&gt;
If you received this message in error and did not sign up for a Twitter account, click not my account.&lt;br /&gt;
Please do not reply to this message; it was sent from an unmonitored email address. This message is a service email related to your use of Twitter. For general inquiries or to request support with your Twitter account, please visit us at Twitter Support.”&lt;br /&gt;
&lt;br /&gt;
(End of quote)&lt;br /&gt;
&lt;br /&gt;
Unsuspecting users who click on the link are taken to a webpage that claims to be a Canadian Pharmacy affiliate advertising pharmaceutical drugs such as Viagra, Cialis and Levitra.   &lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;&lt;tt&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;/span&gt;&lt;/tt&gt;&lt;o:p&gt;  &lt;/o:p&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;To remove this hack from your Twitter account, (1) &lt;/span&gt;&lt;span lang=&quot;EN&quot; style=&quot;font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;Go &lt;/span&gt;&lt;tt&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;to the Twitter Website page, log-in to your profile (1) Click on your user window pull down arrow at the top right of the menu where your thumbnail picture is ( 2) Select “Settings” (3) Select “Applications” (4) “Revoke Access” to any related scam application (if any) (5) Delete all related tweets (6) Contact and help your friends to clean up their accounts (7) Run your Anti Virus in Full Scan mode.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/tt&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/07/twitter-direct-message-from-twitter.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-510872983052818258</guid><pubDate>Sun, 24 Jul 2011 04:58:00 +0000</pubDate><atom:updated>2011-07-26T08:43:34.465-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">amy</category><category domain="http://www.blogger.com/atom/ns#">Amy Winehouse</category><category domain="http://www.blogger.com/atom/ns#">crack</category><category domain="http://www.blogger.com/atom/ns#">drugs</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">leaked</category><category domain="http://www.blogger.com/atom/ns#">scam</category><category domain="http://www.blogger.com/atom/ns#">video</category><category domain="http://www.blogger.com/atom/ns#">windeouse</category><title>Facebook Amy Winehouse Leaked Video Scam Spreading Fast Worldwide</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;By Cesar Ortiz&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Just a few hours after the unfortunate death of singer Amy Winehouse, insensitive money &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;driven scammers have began to circulate a&amp;nbsp;malware scam where they claim to have a bad taste video of the singer. We hate to publish the text of the scam, but we have to in order to warn users not to fall into the scam. Reality is reality and there are some bad souls out there in the social media field that mean to do harm specially when tragedy arises. &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;The scam will show the following window from one of your friends in your Facebook Newsfeed:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;A Facebbok real looking window and links with a sepia-green tone picture of what appears to be the late singer. The window shows the following:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;“&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;Amy Winehouse is dead!!!&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Leaked Video!! Amy Winehouse On Crack hours before death&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;[Link]&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Amy Winehouse getting high on crack just hours before she died&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Xx hours ago&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;”&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Another scam derivate, with a gross picture will say:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;“Video leaked of amy winehouse&#39;s death!!! Warning: Graphical Content.&lt;br /&gt;
[LINK]&lt;br /&gt;
Amy Winehouse OVERDOSE VIDEO LEAKED! - RIP AMY”&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt; mso-ansi-language: EN;&quot;&gt;When unsuspecting users click on the “Share”, “Comment” or&amp;nbsp;“Like”&amp;nbsp; link, the&amp;nbsp;malware&amp;nbsp;will immediately send the same &quot;Leaked Video&quot; message&amp;nbsp;received by the user&amp;nbsp;to all his or her friends, therefore propagating the scam. The next step in the scam is another window that asks users to complete a survey before they see the “video”. When users complete the survey they are sent to a fake none descript page that shows nothing, of course. This is where the scammer gets the money. Unscrupulous or unsuspecting merchants will pay scammers per completed survey. The survey is one route the scammer will take. Other options are more dangerous and will change fast, like signing for expensive alerts plans, Two dollars per minute charge calls, cellular scams and outright fraud.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;To clean this mess, victims should do the following:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: list .5in; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;- Go to your Facebook page and select your “Newsfeed” and delete the related post by clicking the blue “X Remove Post” button to the right of the Amy Winehouse Leaked Video entry. The button will show when the mouse cursor is moved&amp;nbsp;around the top right margin of the post.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: list .5in; text-indent: -0.25in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: list .5in; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;-Notify your friends to follow the same steps.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: list .5in; text-indent: -0.25in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: list .5in; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;I urge users to please report this ugly&amp;nbsp;scam directly to Facebook:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: list .5in; text-indent: -0.25in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(1) Go to the Facebook website. Log into your account with your username and password.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(2) Click on the &quot;Messages&quot; link in the left navigation pane.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(3) Click on the message that you want to report as spam.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;(4) Click on the &quot;Actions&quot; drop-down box. Choose &quot;Report as Spam&quot; from the list of options.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&amp;nbsp;(5) Click the &quot;Report as Spam&quot; button to confirm.&lt;/span&gt;&lt;/div&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/07/facebook-amy-winehouse-leaked-video.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-5917704251285988115</guid><pubDate>Fri, 22 Jul 2011 04:05:00 +0000</pubDate><atom:updated>2011-08-31T10:56:52.426-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti virus</category><category domain="http://www.blogger.com/atom/ns#">AV Virus</category><category domain="http://www.blogger.com/atom/ns#">Damian Menscher</category><category domain="http://www.blogger.com/atom/ns#">detected</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">main</category><category domain="http://www.blogger.com/atom/ns#">page</category><category domain="http://www.blogger.com/atom/ns#">pay per click</category><category domain="http://www.blogger.com/atom/ns#">proxy</category><category domain="http://www.blogger.com/atom/ns#">scam</category><category domain="http://www.blogger.com/atom/ns#">warning</category><title>Google: “ Your Computer Appears To Be Infected ” Warning is Not a Scam, but, Beware Of Where It Shows And What May Come Next</title><description>&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;Original Article Published by The Author in Yahoo Content Network as: &lt;/span&gt;  &lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.associatedcontent.com/article/8257511/google_your_computer_appears_to_be.html?cat=15&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: black; font-family: Arial; font-size: 10pt; mso-ansi-language: EN; mso-bidi-font-weight: bold; mso-font-kerning: 18.0pt;&quot;&gt;Google: “ Your Computer Appears To Be Infected ” Warning is Not a Scam, but,&amp;nbsp;Beware Of Where It Shows And What MayCome Next.&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span lang=&quot;EN&quot; style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;By Cesar Ortiz&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: black; font-family: Arial; font-size: 10pt;&quot;&gt;In July 21, 2011 in Google&#39;s own Blogger page there is an article signed by &lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Damian Menscher,&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;a security engineer at Google, describing how he identified that infected computers were sending search traffic through proxies to the search engine. &lt;span style=&quot;color: #333333;&quot;&gt;When you do a search, the malware sends you to a Google proxy IP, then, just before doing the search, changes the search string and shows malware pay per click sites in&amp;nbsp;a way that leads you to think that you are still being in the real Google.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Mr. Menscher explains the following “As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual search traffic while performing routine maintenance on one of our data centers. After collaborating with security engineers at several companies that were sending this modified traffic, we determined that the computers exhibiting this behavior were infected with a particular strain of malicious software, or “malware.” As a result of this discovery, today some people will see a prominent notification at the top of their Google web search results. We hope that by taking steps to notify users whose traffic is coming through these proxies, we can help them update their antivirus software and remove the infections”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;The notification will ONLY show at the top of the main Google page and it will be a page wide window with a black bar at the top. This same bar was seen when Google was testing to launch their Google+ service recently. The body of the window is in yellow and it will read in black letters:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt; font-weight: normal;&quot;&gt;“Your computer appears to be infected. &lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: Arial;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;tt&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;It appears that your computer is infected with software that intercepts your connection to Google and other sites. Learn how to fix this [Link]”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/tt&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;tt&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;This message is for real. More than two million infected computers have been&amp;nbsp;detected worldwide so far. If you receive the message, Google has detected that your PC is infected with a &lt;/span&gt;&lt;/tt&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;malware that appears to have gotten onto users&#39; computers from one of roughly a hundred variants of a fake antivirus, or &quot;fake AV&quot; software that has been in circulation for a while. This time, one of the variants uses the Google service to scam users, therefore prompting Google to step in. When users click on the “Learn how to fix this” link, they are taken to a real &lt;a href=&quot;http://www.google.com/support/websearch/bin/answer.py?answer=1182191&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Google page&lt;/span&gt;&lt;/a&gt; that will help users to get rid of the AV virus.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Up to now everything is running smoothly, but, now comes the catch, we know that scammers will design or copy the warning window that Google has been running since July 21, 2011 and that in the “Learn how to fix this” link they will send users to&amp;nbsp;malware scam trap. We can expect that Google will make sure that no one will be able to insert a fake message to replace the real one that they are posting in good faith, but no one can prevent hackers to insert a fake look alike window somewhere else, including a fake Google main page. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Users must be alert that when they connect with the Google main page the address bar will show the proper address such as &lt;a href=&quot;http://www.google.com/&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;http://www.google.com/&lt;/span&gt;&lt;/a&gt;&amp;nbsp; there will be variants because Google routes users according to their detected geographical location. Make sure you have your anti virus software up to date and that is running in real time mode and be aware that Google will post this warning message ONLY at the top of their main page. If it shows somewhere else, it is a scam, no matter how real it may look.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;UPDATE By the Author August 31, 2011&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Update-August 29, 2011 Researchers evade Google redirect notice&lt;br /&gt;
Staff Report: SC Magazine- &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 10pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;br /&gt;
http://www.scmagazineus.com/researchers-evade-google-redirect-notice/article/210774/&lt;br /&gt;
&lt;br /&gt;
Researchers evade Google redirect notice &quot;The Burmese YGN hacker group on Sunday detailed a URL redirect vulnerability that bypasses Google&#39;s notification to users that they might be visiting a malicious site.The flaw exists in the way that Google checks redirected URLs against a blacklist of known malicious web sites.&lt;br /&gt;
The attacker would send a victim a proxy server link which redirected to a malicious URL and, when clicked, would verify if the landing website was blacklisted by Google, researchers said. If it was, the server would generate a second malicious URL to infect users.&quot;&lt;br /&gt;
&lt;br /&gt;
This is exactly what&amp;nbsp;I predicted in the article above on July 23, 2011.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/07/google-your-computer-appears-to-be.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6569760559005233215.post-7404508266403395942</guid><pubDate>Thu, 14 Jul 2011 23:12:00 +0000</pubDate><atom:updated>2011-07-14T16:12:14.177-07:00</atom:updated><title>Facebook Google+ Invite Scam Can Steal All Your Personal Information Including Name, Date of Birth, Password, And Current Location</title><description>&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:WordDocument&gt;   &lt;w:View&gt;Normal&lt;/w:View&gt;   &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:PunctuationKerning/&gt;   &lt;w:ValidateAgainstSchemas/&gt;   &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:Compatibility&gt;    &lt;w:BreakWrappedTables/&gt;    &lt;w:SnapToGridInCell/&gt;    &lt;w:WrapTextWithPunct/&gt;    &lt;w:UseAsianBreakRules/&gt;    &lt;w:DontGrowAutofit/&gt;   &lt;/w:Compatibility&gt;   &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;  &lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:LatentStyles DefLockedState=&quot;false&quot; LatentStyleCount=&quot;156&quot;&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin:0in;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:10.0pt;
 font-family:&quot;Times New Roman&quot;;
 mso-ansi-language:#0400;
 mso-fareast-language:#0400;
 mso-bidi-language:#0400;}
&lt;/style&gt; &lt;![endif]--&gt;  &lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10.0pt; mso-ansi-language: EN;&quot;&gt;By Cesar Ortiz&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Google+ is the new rival for Facebook. Users in the thousands are receiving fake invitations as part of a rogue scam designed to steal your entire Facebook page private Information. If users fall into this trap, we can say that the hackers own their Facebook page. The scam begins as follows:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10.0pt; mso-ansi-language: EN;&quot;&gt;Users receive a message with the Google+ logo that says:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10.0pt; mso-ansi-language: EN;&quot;&gt;“Google+ -Get Invite&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10.0pt; mso-ansi-language: EN;&quot;&gt;Unofficial Fan Page&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10.0pt; mso-ansi-language: EN;&quot;&gt;118,500 people like this” &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10.0pt; mso-ansi-language: EN;&quot;&gt;If the user clicks on the invite, it is then taken to a “Request for permission” fake screen frame designed to look very, very professional. In that permission page you are allowing the criminal, disguised as Google+, to “Access my basic information, Send me e-mail, Post to my wall, Access my data any time, Access my Profile information” In other words, users are surrendering their account to a third party, a criminal in this instance.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10.0pt; mso-ansi-language: EN;&quot;&gt;The next step in the scam is that users are taken to a very pro looking Facebook like window with a “Continue” link. Facebook never uses this type of window but users may click on the “Continue” link. Since victims already gave the scammer permission to access all his or her friends list, the hacker uses social deception techniques and presents you with a very, very professional Facebook looking page titled “Select friends for Google Plus-Direct Access requests” This page even has a photo and name of each of your friends. In theory, every friend selected will receive the same message you received therefore propagating the scam. I believe that all your friends will receive the message regardless if you choose them or not. Hackers will not give up this priceless opportunity to steal account data in the thousands.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;color: #333333; font-family: Arial; font-size: 10.0pt; mso-ansi-language: EN;&quot;&gt;Probably, the original hacker will not use your personal data itself; it will sell the listings in bulk in the Internet open hackers market to the best bidder, who will use it at will. To remove this hack, users will have to do four things (1) Remove the subject messages by clicking on the small “x” to the right of the message, this stops spreading the scam to your friends and (2) remove any related application in the “Profile Information”, “Privacy settings”, “Application websites” such as “Google+ invite”. (3) Make sure you notify your friends that you where infected so that they can clean up their own account (4) Change your Facebook password immediately.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://cesarortizblogs.blogspot.com/2011/07/facebook-google-invite-scam-can-steal.html</link><author>noreply@blogger.com (Cesar Ortiz)</author><thr:total>0</thr:total></item></channel></rss>