<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8594684788614514069</atom:id><lastBuildDate>Mon, 07 Oct 2024 04:02:20 +0000</lastBuildDate><category>cyber scam</category><category>hackers</category><category>Poll analysis</category><category>cyber scams</category><category>internet fraud</category><category>tips</category><category>tips on avoiding cyber aware.</category><category>Auction Fraud</category><category>Contest</category><category>Internet earnings</category><category>Nigerian 419 Letter</category><category>Online Shopping Tips</category><category>Online games scams</category><category>Phishing scams</category><category>Web Application Attacks</category><category>application</category><category>cheating</category><category>cyber scam. aware on cyber scam</category><category>gaming</category><category>phising</category><category>scams</category><category>security</category><category>uncle scam</category><title>eCyber-aware</title><description>To raise awareness on Cyber scams</description><link>http://ecyber-aware.blogspot.com/</link><managingEditor>noreply@blogger.com (Jackson Chee)</managingEditor><generator>Blogger</generator><openSearch:totalResults>21</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-1996079420248814984</guid><pubDate>Thu, 20 Oct 2011 06:10:00 +0000</pubDate><atom:updated>2011-10-20T15:09:31.629+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Contest</category><category domain="http://www.blogger.com/atom/ns#">cyber scam</category><category domain="http://www.blogger.com/atom/ns#">cyber scams</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><title>Blog Contest Result</title><description>Finally! the long awaited blog contest has come to an end, thank you for participating in the contest! &lt;br /&gt;
&lt;br /&gt;
Unfortunately, there are many submissions that are not acceptable, therefore disqualified. There are only 2 participants that manage to go through. And they are :&lt;br /&gt;
&lt;br /&gt;
First prized goes to Lee Kok Weng :&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBZn3tITpnphaXg04fN0rDXrOCTz3CgAlc32JlRUAKe6dpvaJnzdm4dKf77uKxAW243-AzbQiQdtwEKNTh5PfghA_L_mHyTM05bOhqkBVPoE88f0YXJtsU3-PJyJ0xF7WzPqcJ_1VyWkYT/s1600/lee+kok+weng.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBZn3tITpnphaXg04fN0rDXrOCTz3CgAlc32JlRUAKe6dpvaJnzdm4dKf77uKxAW243-AzbQiQdtwEKNTh5PfghA_L_mHyTM05bOhqkBVPoE88f0YXJtsU3-PJyJ0xF7WzPqcJ_1VyWkYT/s1600/lee+kok+weng.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Second prize goes to Welsh MunChean :&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEindBb3KmpyLLd_bACiHpWlTs8Piick3klWDFdOlSRFaIsWdt1_B8P5XmOAyt4qRAQmHfE4pWLUf-fXPArprO3xqG1_xtO3yQ-i81z3j3air_OJpgv3vuucljNL9KQDiR_x9J90QxbDAaKK/s1600/IMAG0452.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEindBb3KmpyLLd_bACiHpWlTs8Piick3klWDFdOlSRFaIsWdt1_B8P5XmOAyt4qRAQmHfE4pWLUf-fXPArprO3xqG1_xtO3yQ-i81z3j3air_OJpgv3vuucljNL9KQDiR_x9J90QxbDAaKK/s1600/IMAG0452.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Congratulations to all the winners, and thank you for participating!&lt;/div&gt;</description><link>http://ecyber-aware.blogspot.com/2011/10/blog-contest-result.html</link><author>noreply@blogger.com (Tee)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBZn3tITpnphaXg04fN0rDXrOCTz3CgAlc32JlRUAKe6dpvaJnzdm4dKf77uKxAW243-AzbQiQdtwEKNTh5PfghA_L_mHyTM05bOhqkBVPoE88f0YXJtsU3-PJyJ0xF7WzPqcJ_1VyWkYT/s72-c/lee+kok+weng.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-5706689749430183959</guid><pubDate>Wed, 19 Oct 2011 02:34:00 +0000</pubDate><atom:updated>2011-10-20T10:42:44.338+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Online games scams</category><title>Young children being attack by scammers through online games</title><description>Internet security should always be ramped up when children are using the internet, and a new rigged online game highlights that there is usually no exception, as it has been trying to scam children for their parents&#39; banking information and more.&lt;br /&gt;
&lt;br /&gt;
Online scammers are rigging an educational online game meant for preschoolers with malicious viruses that can take bank account details from a computer, according to Security News Daily.&lt;br /&gt;
&lt;br /&gt;
Games that are rigged include some that let children nurture online pets or catch falling objects. The website said the young child thinks they are playing a harmless game but may open their parents&#39; computer up to spyware and other Trojan viruses, such as Zeus, capable of forcing the PC to join a botnet or stealing online banking information.&lt;br /&gt;
&lt;br /&gt;
Microsoft said families should first decide where their children can and cannot go on the internet, then increase antivirus software and other internet security measures just in case something does go wrong, such as what happens in this scam. The company said to monitor where children go online and remind them to never talk to strangers online.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://static.basilmarket.com/screen/MapleStory-BasilMarket-Screen-116542.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear:left; float:left;margin-right:1em; margin-bottom:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;410&quot; width=&quot;510&quot; alt=&quot;How scammers scam players in Maplestory(Online Games&quot; title=&quot;How scammers scam players in Maplestory(Online Games)&quot; src=&quot;http://static.basilmarket.com/screen/MapleStory-BasilMarket-Screen-116542.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
Scammers attack young children through online games. 2011. Scammers attack young children through online games. [ONLINE] Available at: http://www.bitdefender.com/security/scammers-attack-young-children-through-online-games.html. [Accessed 19 October 2011].</description><link>http://ecyber-aware.blogspot.com/2011/10/young-children-being-attack-by-scammers.html</link><author>noreply@blogger.com (Jackson Chee)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-8246894474342313972</guid><pubDate>Tue, 18 Oct 2011 02:58:00 +0000</pubDate><atom:updated>2011-10-20T15:04:02.398+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Poll analysis</category><title>Fifth Poll Analysis</title><description>&lt;a alt=&quot;Poll analysis&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxI6Wdgb3-CbL_LPlDrc0t0HXO0TViEd2vcPE2p2zAXWIzSQnVtRjSOfXqTagnACf7vVSTYqUHfEUUg1mFz0KdCyG7x6z36e2TVgKTyzFrpKuvykss8mXEU9zjfEtzZVzdVedopH9ptS-3/s1600/cad93d53-22c5-477d-93d7-bba32f0ed24b.png&quot; title=&quot;Poll analysis&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5665403801233245730&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxI6Wdgb3-CbL_LPlDrc0t0HXO0TViEd2vcPE2p2zAXWIzSQnVtRjSOfXqTagnACf7vVSTYqUHfEUUg1mFz0KdCyG7x6z36e2TVgKTyzFrpKuvykss8mXEU9zjfEtzZVzdVedopH9ptS-3/s320/cad93d53-22c5-477d-93d7-bba32f0ed24b.png&quot; style=&quot;cursor: hand; cursor: pointer; float: left; height: 315px; margin: 0 10px 10px 0; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;This shows that after few weeks of education and awareness on scaming and scamers. Most of our followers are well aware of the hackers...&lt;/div&gt;</description><link>http://ecyber-aware.blogspot.com/2011/10/poll-analysis.html</link><author>noreply@blogger.com (Thanaraj)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxI6Wdgb3-CbL_LPlDrc0t0HXO0TViEd2vcPE2p2zAXWIzSQnVtRjSOfXqTagnACf7vVSTYqUHfEUUg1mFz0KdCyG7x6z36e2TVgKTyzFrpKuvykss8mXEU9zjfEtzZVzdVedopH9ptS-3/s72-c/cad93d53-22c5-477d-93d7-bba32f0ed24b.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-4754740555150139911</guid><pubDate>Thu, 13 Oct 2011 11:12:00 +0000</pubDate><atom:updated>2011-10-20T10:31:54.086+08:00</atom:updated><title>Short Video Regarding The Contest</title><description>&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;270&quot; src=&quot;http://www.youtube.com/embed/ZgI_oxDhIq0?fs=1&quot; alt=&quot;Video for contest promotion&quot; title=&quot;Video for contest promotion&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;</description><link>http://ecyber-aware.blogspot.com/2011/10/short-video-regarding-contest.html</link><author>noreply@blogger.com (Jackson Chee)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/ZgI_oxDhIq0/default.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-4143215885277866072</guid><pubDate>Fri, 07 Oct 2011 16:29:00 +0000</pubDate><atom:updated>2011-10-20T10:23:23.515+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cheating</category><category domain="http://www.blogger.com/atom/ns#">cyber scam</category><category domain="http://www.blogger.com/atom/ns#">gaming</category><category domain="http://www.blogger.com/atom/ns#">phising</category><category domain="http://www.blogger.com/atom/ns#">scams</category><title>Phising through Modern Warfare</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHuf9mZP4WoxObLZsF4H5GoE5ckHkJaPNsq-DbIao5LrFV31Tffr8GjC10MHZpp2d7J-Qka70vPA6Jbxo7Q3awO8wzfXY-sHXeta5m4kRsbO4ZULmvCW_bHLaUhg5hMsrS0AZxs7LkCosK/s1600/gaming_modern_warfare_2.jpg&quot;&gt;&lt;img alt=&quot;Call Of Duty : Modern Walfare 2 Picture&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5660788500671115602&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHuf9mZP4WoxObLZsF4H5GoE5ckHkJaPNsq-DbIao5LrFV31Tffr8GjC10MHZpp2d7J-Qka70vPA6Jbxo7Q3awO8wzfXY-sHXeta5m4kRsbO4ZULmvCW_bHLaUhg5hMsrS0AZxs7LkCosK/s320/gaming_modern_warfare_2.jpg&quot; alt=&quot;Call Of Duty : Modern Walfare 2 Picture&quot; title=&quot;Call Of Duty : Modern Walfare 2 Picture&quot; style=&quot;cursor: hand; cursor: pointer; float: left; height: 120px; margin: 0 10px 10px 0; width: 160px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
Microsoft has issued an Xbox Live service alert of phishing scams operating through Call of Duty: Modern Warfare 2.&lt;br /&gt;
&lt;br /&gt;
Phishing scams are an attempt to acquire personal information about a user, such as usernames, passwords or credit card details, by posing as a trustworthy source.&lt;br /&gt;
&lt;br /&gt;
The service alert warns: &quot;Users may receive potential phishing attempts via title specific messaging while playing Modern Warfare 2.&quot;&lt;br /&gt;
&lt;br /&gt;
Though information regarding the source of the messages has not been released, the phishing messages are likely perpetuated by individual Xbox Live accounts. There is no indication that it is a hack of the Xbox Live service similar to the breach of the PlayStation Network.&lt;br /&gt;
&lt;br /&gt;
Microsoft stated that it is &quot;working to resolve the issue&quot;.</description><link>http://ecyber-aware.blogspot.com/2011/10/phising-through-modern-warfare.html</link><author>noreply@blogger.com (Thanaraj)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHuf9mZP4WoxObLZsF4H5GoE5ckHkJaPNsq-DbIao5LrFV31Tffr8GjC10MHZpp2d7J-Qka70vPA6Jbxo7Q3awO8wzfXY-sHXeta5m4kRsbO4ZULmvCW_bHLaUhg5hMsrS0AZxs7LkCosK/s72-c/gaming_modern_warfare_2.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-6766190172932659951</guid><pubDate>Thu, 06 Oct 2011 10:35:00 +0000</pubDate><atom:updated>2011-10-20T10:24:09.042+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">Poll analysis</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">tips on avoiding cyber aware.</category><title>Poll Analysis #4 : What should a protected computer have?</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLty38P3WsfW1rNBZDHJj8Sxt3owKMwnJnYwRyplulZr8S5M7S113KOFw5piZEzhmyG5p1xP0d9j-cKTuqRPcHArDfuDd1zJ5BCd2kRDoKYxiDk4xSI_SMlIR3wUPnGL4sG1mGDP7rCqnX/s1600/poll+4.jpg&quot; img alt=&quot;What Should a Computer Have?&quot; title=&quot;What Should a Computer Have?&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;99&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLty38P3WsfW1rNBZDHJj8Sxt3owKMwnJnYwRyplulZr8S5M7S113KOFw5piZEzhmyG5p1xP0d9j-cKTuqRPcHArDfuDd1zJ5BCd2kRDoKYxiDk4xSI_SMlIR3wUPnGL4sG1mGDP7rCqnX/s400/poll+4.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;As usual, a poll is posted on our blog for visitors to vote through a duration of a week. The picture on the left is the result of the poll. Because this poll has multiple choice enabled, users are able to vote for more than one answers. According to the results, the most important feature for a protected computer is to have a firewall. Firewalls may be considered the most important because they are built in and come together as a system unit. The other two choices, which are anti virus and spyware software, and the most recent updates , scored a 60%.</description><link>http://ecyber-aware.blogspot.com/2011/10/poll-analysis-4-what-should-protected.html</link><author>noreply@blogger.com (Tee)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLty38P3WsfW1rNBZDHJj8Sxt3owKMwnJnYwRyplulZr8S5M7S113KOFw5piZEzhmyG5p1xP0d9j-cKTuqRPcHArDfuDd1zJ5BCd2kRDoKYxiDk4xSI_SMlIR3wUPnGL4sG1mGDP7rCqnX/s72-c/poll+4.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-7752862669375854532</guid><pubDate>Wed, 05 Oct 2011 14:50:00 +0000</pubDate><atom:updated>2011-10-12T20:00:34.120+08:00</atom:updated><title>Contest</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;Hi! there everyone thanks for giving us your support through out every week by participating on the poll questions. Due to your great support the eCyber-aware blog team have come with an event which is more over to a contest, Most of you guys might be jumping all over ready due to this event or contest&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;Well this is a drawing contest more like a poster...participants are asked to draw a picture a poster of a hacker in a cruel and ugliest way they can and they must send a scanned version of their artwork to the following email address; kingofbloging@gmail.com&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;Rules and Regulation:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;Participants must be a follower of this e-Cyberaware blog&lt;/span&gt;&lt;/li&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;
&lt;li&gt;Artwork must be original and not be a copy paste item(artworks sent will be check for plagiarism)&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;&lt;div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;Winners will be awarded with the following prizes:&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;ol&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt; Champion gets a 4GB pen-drive&lt;/span&gt;&lt;/li&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;
&lt;li&gt; 1st runner up gets a cooling pad&lt;/li&gt;
&lt;li&gt; 2nd runner up gets a mouse pad&lt;/li&gt;
&lt;/span&gt;&lt;/ol&gt;&lt;div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;So hurry up and send us your artwork!&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;For more info on this please check out our events page...&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://ecyber-aware.blogspot.com/2011/10/contest.html</link><author>noreply@blogger.com (Thanaraj)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-8362764515371296325</guid><pubDate>Tue, 04 Oct 2011 06:26:00 +0000</pubDate><atom:updated>2011-10-12T20:00:54.998+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Web Application Attacks</category><title>Web Application Attacks</title><description>&amp;nbsp; &amp;nbsp; &amp;nbsp;There are two types of Web application attacks: automated and manual.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;Automated attacks can be used to exploit a Web application using automated&lt;br /&gt;
Web application attack tools such as wget, curl, blackwidow and teleport pro. &lt;br /&gt;
Using these automated tools, crawling and attacks can be done shortly. &lt;br /&gt;
This type of attack can be avoided by setting “honey traps” using HTTP Module &lt;br /&gt;
(used in pre/post-processing of requests). The attacker can be put into an infinite &lt;br /&gt;
loop using defence trick once it is trapped.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;To launch manual attacks, hackers must conduct information gathering such as&lt;br /&gt;
address identification, port scanning, social engineering and vulnerability scanning &lt;br /&gt;
to find out vulnerabilities that can be exploited.&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;a href=&quot;http://www.cybersecurity.my/data/content_files/13/87.pdf?.diff=1176417313&quot;&gt;http://www.cybersecurity.my/data/content_files/13/87.pdf?.diff=1176417313&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/goog_445181014&quot;&gt; &lt;/a&gt;</description><link>http://ecyber-aware.blogspot.com/2011/10/web-application-attacks.html</link><author>noreply@blogger.com (Jackson Chee)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-7516945973067579374</guid><pubDate>Mon, 03 Oct 2011 14:17:00 +0000</pubDate><atom:updated>2011-10-20T10:25:08.827+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">application</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>SECURING APPLICATIONS FROM HACKER</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNB-4TukEkiZCVANSe1tPoPZVG3F6lEszmHZU4XfwbXg9zQsi4-W_OY-LwFv4gVcJO7oOLin3cvhF5DQ4QGYWEGonT9W4ciH5hQvfUBqtDFL0Y1poD1IV8MvT9B0xBxPdWArL0c65iPTdw/s1600/cybersecurity.gif&quot;&gt;&lt;img alt=&quot;Cyber Security Malaysia Logo&quot; title=&quot;Cyber Security Malaysia Logo&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5660384030908130818&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNB-4TukEkiZCVANSe1tPoPZVG3F6lEszmHZU4XfwbXg9zQsi4-W_OY-LwFv4gVcJO7oOLin3cvhF5DQ4QGYWEGonT9W4ciH5hQvfUBqtDFL0Y1poD1IV8MvT9B0xBxPdWArL0c65iPTdw/s320/cybersecurity.gif&quot; style=&quot;cursor: hand; cursor: pointer; display: block; height: 60px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;MOST companies today use the Web to do business with customers, employees, &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;suppliers and others. This is because it is easier  to maintain a Web-based &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;application than a Windows-based one. But how can we be sure that a Webbased application is secured? Or that data is being shared only by the authorised &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;users? &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;The Gartner Group estimates that 75 per cent of cyber attacks today are at the &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;application level. And about 97 per cent of over 300 Web sites audited are &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;vulnerable to Web application attacks. The US Federal Bureau of Investigation &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;also reveals that 95 per cent of the companies are hacked from Web applications, &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;and only five per cent of them are aware of the attacks &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;(&lt;a href=&quot;http://conference.hackinthebox.org/hitbsecconf2005kl/materials/TT-ShreerajShah-Webhacking-Kungfu.pdf&quot;&gt;http://conference.hackinthebox.org/hitbsecconf2005kl/materials/TT-ShreerajShah-Webhacking-Kungfu.pdf&lt;/a&gt;). &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;From the figures, we can deduce that most company Web sites are prone to cyber &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;attacks, and some of these companies are not aware that their Web applications &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;have vulnerabilities that can be exploited by hackers. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;According to statistics published by the National ICT Security and Emergency &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;Response Centre, there have been significant increases in Web defacement &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;incidents. In the first quarter of this year, there were 256 Web defacements &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;involving both public and private Web sites, compared to the previous quarter &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;which recorded 42 of such incidents. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;To have a secure Web application, developers of the application must know each &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;attribute such as query string, form, cookie, script, etc, because they are &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;vulnerable. These attributes can be exploited by an attacker and expose sensitive &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;company information if they are not used securely. &lt;/span&gt;&lt;/div&gt;</description><link>http://ecyber-aware.blogspot.com/2011/10/securing-applications-from-hacker.html</link><author>noreply@blogger.com (Thanaraj)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNB-4TukEkiZCVANSe1tPoPZVG3F6lEszmHZU4XfwbXg9zQsi4-W_OY-LwFv4gVcJO7oOLin3cvhF5DQ4QGYWEGonT9W4ciH5hQvfUBqtDFL0Y1poD1IV8MvT9B0xBxPdWArL0c65iPTdw/s72-c/cybersecurity.gif" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-8854883752918077503</guid><pubDate>Thu, 29 Sep 2011 11:00:00 +0000</pubDate><atom:updated>2011-10-20T10:27:21.086+08:00</atom:updated><title>Third Poll Analysis</title><description>Last week, we posted a poll question for our visitors to  titled : &quot;Which one of these scams have you heard before?&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAcDuUapSVk0pG69idCgomrdbxNWrpcuBGeDTNaLrpI_zeGCA8KTteKauTARrX9kkbJo3_wg5smrFGPyYdgsNy7Spen_UP-Tw8QX57tbPiyZ0JHEFuFXDlbxTtaH2KzNHvSj7PZPKG5Lam/s1600/poll+3.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; alt=&quot;Question for third poll analysis&quot; title=&quot;Question for third poll analysis&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAcDuUapSVk0pG69idCgomrdbxNWrpcuBGeDTNaLrpI_zeGCA8KTteKauTARrX9kkbJo3_wg5smrFGPyYdgsNy7Spen_UP-Tw8QX57tbPiyZ0JHEFuFXDlbxTtaH2KzNHvSj7PZPKG5Lam/s1600/poll+3.jpeg&quot; /&gt;&lt;/a&gt;From the result, 1 person chooses &quot;Phisher Scams&quot;. Another person also chooses &quot;Nigerian Scams&quot;. 3 person chooses &quot;Lottery Scams&quot;. This has shown that most of our visitors were scammed because of greed in money. Users should be more careful when playing lottery online. We should be cautious of &amp;nbsp;those lottery scams website.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu9zDGnwiPjw6H2UFrRI-9LYEPC_ogWFdnXJyD4uJO8HybnKkA-y4TUwwVpHbg3BMM3J_2gkE6E87Nl9iJPLWvGwo5tymxsLwr-E9vjhkeyhyZJUlRZHOos7EKDtC3LfpjkcWgtpbzzH-M/s1600/pie.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;187&quot; alt=&quot;Pie chart for third poll analysis&quot; title=&quot;Pie chart for third poll analysis&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu9zDGnwiPjw6H2UFrRI-9LYEPC_ogWFdnXJyD4uJO8HybnKkA-y4TUwwVpHbg3BMM3J_2gkE6E87Nl9iJPLWvGwo5tymxsLwr-E9vjhkeyhyZJUlRZHOos7EKDtC3LfpjkcWgtpbzzH-M/s320/pie.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;</description><link>http://ecyber-aware.blogspot.com/2011/09/third-poll-analysis.html</link><author>noreply@blogger.com (Jackson Chee)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAcDuUapSVk0pG69idCgomrdbxNWrpcuBGeDTNaLrpI_zeGCA8KTteKauTARrX9kkbJo3_wg5smrFGPyYdgsNy7Spen_UP-Tw8QX57tbPiyZ0JHEFuFXDlbxTtaH2KzNHvSj7PZPKG5Lam/s72-c/poll+3.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-1852906695097186306</guid><pubDate>Wed, 28 Sep 2011 09:30:00 +0000</pubDate><atom:updated>2011-10-12T20:01:33.782+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber scam. aware on cyber scam</category><category domain="http://www.blogger.com/atom/ns#">tips on avoiding cyber aware.</category><title>Top ten tips on avoiding cyber scams</title><description>&lt;div style=&quot;color: white; font-family: times new roman; text-align: justify;&quot;&gt;People since time immemorial have fallen for scams of various kinds.  Chalk it up to wishful thinking, dreaming, greed, what have you, but  eventually, everyone finds themselves gullible. If that weren’t the  case, life would lose some of its luster. We love to play act; we love  to be fooled; and, we love to fool others as long as it’s all in good  fun. Unfortunately, there are malicious people–cyber criminals and scam  artists–who love to take advantage of those traits for their own gain  and our (usually financial) loss.&lt;/div&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Here are the top ten tips&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;, &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;courtesy of &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://onguardonline.gov/&quot; style=&quot;color: #000099;&quot; target=&quot;_blank&quot; title=&quot;http://OnGuardOnline.&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;OnGuardOnline.gov&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #000099;&quot;&gt; &lt;/span&gt;for avoiding online scams:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;   &lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Don’t send money to someone you don’t know.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;     Don’t  respond to messaes that ask for your personal or  financial information.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;     Don’t play a foreign lottery.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;     Keep in mind that wiring money is like sending cash: once  it’s gone, you  can’t get it back.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;     Don’t agree to deposit a check from someone you don’t know  and then wire money back.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;     Read your bills and monthly statements regularly - on paper  and online.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;     In the wake of a natural disaster or  another crisis, give  to established  charities rather than one that  seems to have sprung up  overnight.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
Resource:&lt;br /&gt;
&lt;a href=&quot;http://onguardonline.gov/&quot;&gt;http://onguardonline.gov/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.bbb.org/us/article/top-ten-cyber-monday-tips-for-staying-safe-when-shopping-online-23416&quot;&gt;http://www.bbb.org/us/article/top-ten-cyber-monday-tips-for-staying-safe-when-shopping-online-23416&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;    &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;blockquote&gt;&lt;/blockquote&gt;&lt;/ul&gt;</description><link>http://ecyber-aware.blogspot.com/2011/09/people-since-time-immemorial-have.html</link><author>noreply@blogger.com (Thanaraj)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-5696381776775407947</guid><pubDate>Sun, 25 Sep 2011 09:47:00 +0000</pubDate><atom:updated>2011-09-29T17:50:03.737+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber scam</category><category domain="http://www.blogger.com/atom/ns#">internet fraud</category><category domain="http://www.blogger.com/atom/ns#">tips</category><title>How do scammer target you</title><description>There are many forms of scam all around us;&lt;br /&gt;
&lt;br /&gt;
In our everyday life, watch out for :&lt;br /&gt;
&lt;br /&gt;
1. &amp;nbsp;Unsolicited offers that are promoted through email, SMS (short message service) or MMS (multimedia message service). These offers often come from unknown contacts that have never been in contact with you before.&lt;br /&gt;
&lt;br /&gt;
2. &amp;nbsp;Offers of unlikely promises, like the certainty of winning lotteries, wealth, or lose weight.&lt;br /&gt;
&lt;br /&gt;
3. &amp;nbsp;Emails using a lot of capital letters, bad grammars, or unusual subject headings.&lt;br /&gt;
&lt;br /&gt;
4. &amp;nbsp;Work-at-home schemes offering easy ways to earn a big amount of money.&lt;br /&gt;
&lt;br /&gt;
5. &amp;nbsp;Incredible health cures that claim to cure difficult-to-cure conditions and illnesses&lt;br /&gt;
&lt;br /&gt;
6. &amp;nbsp;E-mails from &quot;legitimate&quot; companies asking for account details (usually providing a phising link)&lt;br /&gt;
&lt;br /&gt;
7. &amp;nbsp;Lottery, prizes, and other wins, asking you to send money or personal details to claim your winnings&lt;br /&gt;
&lt;br /&gt;
8. &amp;nbsp;Modem jacking -- make sure websites, especially adult sites don not download internet diallers, which will cost us money in our phone bills.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Source :&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.scamwatch.gov.au/content/index.phtml/itemId/693900&quot;&gt;http://www.scamwatch.gov.au/content/index.phtml/itemId/693900&lt;/a&gt;</description><link>http://ecyber-aware.blogspot.com/2011/09/where-do-scammer-target-you.html</link><author>noreply@blogger.com (Tee)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-5136801805759628711</guid><pubDate>Thu, 22 Sep 2011 13:39:00 +0000</pubDate><atom:updated>2011-09-23T22:44:27.287+08:00</atom:updated><title>Podcast #3 : Poll Analysis 2 (Bahasa Malaysia)</title><description>&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Salam sejahtera semua nama saya Thanaraj dari blog e-cyber-aware. Minggu lepas kami telah menyediakan sebuah soalan untuk para pengikut kami, menyatakan bahawa macam mana anda hendak memastikan bahawa anda tidak menjatuhi dalam sebuah perangkap semasa anda membeli barang dari laman sesawang.&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;color: red; white-space: pre;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Daripada keputusan yang diperolehi kami dapat tahu bahawa ramai memilih! iaitu daripada 50% daripada pengikut kami memilih jawapan tentang &quot;bayaran balaik dan jaminan ke atas semua barang. Ini menunjukkan bahawa para pengikut kita takut akan kualiti barang iaitu dari segi mendaoat barang yang rosak atau pecah.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Pilihan kedua, para pengikut blog kita pula ialah ingin, &quot;Memastikan bahawa laman web itu selamat apabila anda menghantar nombor kad kredit anda secara electronik dan pilihan ini telah memuaskan 33% peratus sahaja.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Seterusnya, pilihan ketiga para pengikut blog kita berhati hati apabila membalas kepada tawaran istimewah ini menunjukan bahawa para pengikut blog kita amat awas akan trik trik penipuan penipu laman sesawang.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Pilihan akhir merupakan &quot;menyiasat laman web lain yang berkaitan dengan jumlah syarikat yang dipuaskan oleh mereka.Jawapan ini telah memuaskan 0%.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;Hello all! my name is Thanaraj from the blog e-cyber aware. Last week we have prepared a question to the followers of our eCyber-aware blog, asking The way to ensure that you are not falling in a trap when you buy the merchandises online. From the results obtained we knew that our followers choose an answer of &quot;inquire about refund and warranties on all items&quot;.Which rank number 1 by fulfilling 50% percentage of the chart. This shows that the followers  fear the quality of the goods in terms of mendaoat damaged goods.&lt;br /&gt;The second option, the followers of our blog is the want to, &quot;Ensure that the website is safe when you send your credit card number electronically, and this option has satisfied 33% percent of the chart.&lt;br /&gt;&lt;br /&gt;Next, The third option of our blog followers to be careful when replying to this Super deals show that the followers of our blog is very alert to scams scammers will trick trickswebsite.&lt;br /&gt;&lt;br /&gt;The final choice is &quot;investigating other sites related to the number of companies satisfied 0% percentage of the chart by them.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;object classid=&quot;clsid:D27CDB6E-AE6D-11cf-96B8-444553540000&quot; height=&quot;26&quot; width=&quot;540&quot;&gt;&lt;param value=&quot;true&quot; name=&quot;allowfullscreen&quot;&gt;&lt;param value=&quot;always&quot; name=&quot;allowscriptaccess&quot;&gt;&lt;param value=&quot;high&quot; name=&quot;quality&quot;&gt;&lt;param value=&quot;true&quot; name=&quot;cachebusting&quot;&gt;&lt;param value=&quot;#000000&quot; name=&quot;bgcolor&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.archive.org/flow/flowplayer.commercial-3.2.1.swf&quot;&gt;&lt;param value=&quot;config={&#39;key&#39;:&#39;#$aa4baff94a9bdcafce8&#39;,&#39;playlist&#39;:[{&#39;url&#39;:&#39;aasd.mp3&#39;,&#39;autoPlay&#39;:false}],&#39;clip&#39;:{&#39;autoPlay&#39;:true,&#39;baseUrl&#39;:&#39;http://www.archive.org/download/AnalysisSoalanPollMingguKedua/&#39;},&#39;canvas&#39;:{&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;backgroundGradient&#39;:&#39;none&#39;},&#39;plugins&#39;:{&#39;audio&#39;:{&#39;url&#39;:&#39;http://www.archive.org/flow/flowplayer.audio-3.2.1-dev.swf&#39;},&#39;controls&#39;:{&#39;playlist&#39;:false,&#39;fullscreen&#39;:false,&#39;height&#39;:26,&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;autoHide&#39;:{&#39;fullscreenOnly&#39;:true},&#39;scrubberHeightRatio&#39;:0.6,&#39;timeFontSize&#39;:9,&#39;mute&#39;:false,&#39;top&#39;:0}},&#39;contextMenu&#39;:[{},&#39;-&#39;,&#39;Flowplayer v3.2.1&#39;]}&quot; name=&quot;flashvars&quot;&gt;&lt;embed src=&quot;http://www.archive.org/flow/flowplayer.commercial-3.2.1.swf&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;540&quot; height=&quot;26&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; cachebusting=&quot;true&quot; bgcolor=&quot;#000000&quot; quality=&quot;high&quot; flashvars=&quot;config={&#39;key&#39;:&#39;#$aa4baff94a9bdcafce8&#39;,&#39;playlist&#39;:[{&#39;url&#39;:&#39;aasd.mp3&#39;,&#39;autoPlay&#39;:false}],&#39;clip&#39;:{&#39;autoPlay&#39;:true,&#39;baseUrl&#39;:&#39;http://www.archive.org/download/AnalysisSoalanPollMingguKedua/&#39;},&#39;canvas&#39;:{&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;backgroundGradient&#39;:&#39;none&#39;},&#39;plugins&#39;:{&#39;audio&#39;:{&#39;url&#39;:&#39;http://www.archive.org/flow/flowplayer.audio-3.2.1-dev.swf&#39;},&#39;controls&#39;:{&#39;playlist&#39;:false,&#39;fullscreen&#39;:false,&#39;height&#39;:26,&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;autoHide&#39;:{&#39;fullscreenOnly&#39;:true},&#39;scrubberHeightRatio&#39;:0.6,&#39;timeFontSize&#39;:9,&#39;mute&#39;:false,&#39;top&#39;:0}},&#39;contextMenu&#39;:[{},&#39;-&#39;,&#39;Flowplayer v3.2.1&#39;]}&quot;&gt;&lt;/embed&gt; &lt;/object&gt;</description><link>http://ecyber-aware.blogspot.com/2011/09/pod-cast-of-poll-analysis-of-week3.html</link><author>noreply@blogger.com (Thanaraj)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-7113187976533513276</guid><pubDate>Tue, 20 Sep 2011 18:42:00 +0000</pubDate><atom:updated>2011-10-12T20:02:00.231+08:00</atom:updated><title>Podcast #2 : Phishing - Technique Used In Cyber Scam (Bahasa Malaysia)</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Hello everyone, today i will be&amp;nbsp;discussing one of the technique that is used by scammer to scam internet user which is phishing. Phishing is t&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;he act of sending an e-mail&amp;nbsp;to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Website&amp;nbsp;where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user&#39;s information&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Phishing, also referred to as&amp;nbsp;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;brand spoofing&lt;/em&gt;&amp;nbsp;or&amp;nbsp;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;carding&lt;/em&gt;, is a variation on &quot;fishing,&quot; the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; line-height: 19px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: inherit;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Hello rakan-rakan sekalian, hari ini saya akan berbincang tentang perlakuan &quot;phishing&quot; iaitu satu teknik yang digunakan oleh penipu siber untuk mendapatkan maklumat pengguna internet. &quot;Phishing&quot; berlaku melalui tindakan menghantar e-mel kepada pengguna secara palsu yang mendakwa untuk menjadi perusahaan yang sah yang ditubuhkan dalam usaha untuk penipuan pengguna ke dalam menyerahkan maklumat peribadi yang akan digunakan untuk kecurian identiti. E-mel yang mengarahkan pengguna untuk melawat laman web di mana mereka diminta untuk mengemaskini maklumat peribadi, seperti kata laluan dan kad kredit, keselamatan sosial, dan nombor akaun bank, bahawa organisasi yang sah sudah mempunyainya. Laman web, bagaimanapun, adalah palsu dan hanya untuk mencuri maklumat pengguna.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: inherit;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&quot;Phishing&quot;, juga dirujuk sebagai menipu jenama atau &quot;carding&quot;, adalah perubahan daripada perkataan &quot;memancing,&quot; idea yang berkaitan tentangnya ialah &amp;nbsp;umpan yang tercampak keluar dengan harapan bahawa manakala kebanyakan akan mengabaikan umpan, ada yang akan tergoda ke dalam gigitan.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;object classid=&quot;clsid:D27CDB6E-AE6D-11cf-96B8-444553540000&quot; height=&quot;26&quot; width=&quot;640&quot;&gt;&lt;param value=&quot;true&quot; name=&quot;allowfullscreen&quot;/&gt;&lt;param value=&quot;always&quot; name=&quot;allowscriptaccess&quot;/&gt;&lt;param value=&quot;high&quot; name=&quot;quality&quot;/&gt;&lt;param value=&quot;true&quot; name=&quot;cachebusting&quot;/&gt;&lt;param value=&quot;#000000&quot; name=&quot;bgcolor&quot;/&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.archive.org/flow/flowplayer.commercial-3.2.1.swf&quot; /&gt;&lt;param value=&quot;config={&#39;key&#39;:&#39;#$aa4baff94a9bdcafce8&#39;,&#39;playlist&#39;:[{&#39;url&#39;:&#39;mpp3.mp3&#39;,&#39;autoPlay&#39;:false}],&#39;clip&#39;:{&#39;autoPlay&#39;:true,&#39;baseUrl&#39;:&#39;http://www.archive.org/download/MyPodcast_742/&#39;},&#39;canvas&#39;:{&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;backgroundGradient&#39;:&#39;none&#39;},&#39;plugins&#39;:{&#39;audio&#39;:{&#39;url&#39;:&#39;http://www.archive.org/flow/flowplayer.audio-3.2.1-dev.swf&#39;},&#39;controls&#39;:{&#39;playlist&#39;:false,&#39;fullscreen&#39;:false,&#39;height&#39;:26,&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;autoHide&#39;:{&#39;fullscreenOnly&#39;:true},&#39;scrubberHeightRatio&#39;:0.6,&#39;timeFontSize&#39;:9,&#39;mute&#39;:false,&#39;top&#39;:0}},&#39;contextMenu&#39;:[{},&#39;-&#39;,&#39;Flowplayer v3.2.1&#39;]}&quot; name=&quot;flashvars&quot;/&gt;&lt;embed src=&quot;http://www.archive.org/flow/flowplayer.commercial-3.2.1.swf&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;540&quot; height=&quot;26&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; cachebusting=&quot;true&quot; bgcolor=&quot;#000000&quot; quality=&quot;high&quot; flashvars=&quot;config={&#39;key&#39;:&#39;#$aa4baff94a9bdcafce8&#39;,&#39;playlist&#39;:[{&#39;url&#39;:&#39;mpp3.mp3&#39;,&#39;autoPlay&#39;:false}],&#39;clip&#39;:{&#39;autoPlay&#39;:true,&#39;baseUrl&#39;:&#39;http://www.archive.org/download/MyPodcast_742/&#39;},&#39;canvas&#39;:{&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;backgroundGradient&#39;:&#39;none&#39;},&#39;plugins&#39;:{&#39;audio&#39;:{&#39;url&#39;:&#39;http://www.archive.org/flow/flowplayer.audio-3.2.1-dev.swf&#39;},&#39;controls&#39;:{&#39;playlist&#39;:false,&#39;fullscreen&#39;:false,&#39;height&#39;:26,&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;autoHide&#39;:{&#39;fullscreenOnly&#39;:true},&#39;scrubberHeightRatio&#39;:0.6,&#39;timeFontSize&#39;:9,&#39;mute&#39;:false,&#39;top&#39;:0}},&#39;contextMenu&#39;:[{},&#39;-&#39;,&#39;Flowplayer v3.2.1&#39;]}&quot;&gt; &lt;/embed&gt;&lt;/object&gt;</description><link>http://ecyber-aware.blogspot.com/2011/09/podcast-2-phishing-technique-used-in.html</link><author>noreply@blogger.com (Jackson Chee)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-4452701712179735312</guid><pubDate>Tue, 20 Sep 2011 17:34:00 +0000</pubDate><atom:updated>2011-10-20T10:28:45.757+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Online Shopping Tips</category><title>Tips For Staying Safe When Shopping Online</title><description>&lt;a href=&quot;http://profile.ak.fbcdn.net/hprofile-ak-snc4/50253_93580760473_2248711_n.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; alt=&quot;Scams target you : Protect yourself&quot; title=&quot;Scams target you : Protect yourself&quot; src=&quot;http://profile.ak.fbcdn.net/hprofile-ak-snc4/50253_93580760473_2248711_n.jpg&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Many internet users get scam when they buy things online. One of those reason is that they are too easy to believe those scammer. Actually there are many ways we can do to avoid being scams when shopping online. First of all, &amp;nbsp;we should &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;protect our computer&lt;/span&gt;.&lt;/b&gt;&amp;nbsp;We should always have our computer have the most recent updates installed for spam filters, anti-virus, and anti-spyware software and a secure firewall. Secondly, we should &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;shop on trustworthy websites&lt;/span&gt;.&amp;nbsp;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 13px;&quot;&gt;Shoppers should start to check on the seller’s reputation and record for customer satisfaction. Always look for widely-recognized “trustmarks” on &amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 13px;&quot;&gt;retailer websites and click on the seals to confirm that they are valid.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 13px;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Thirdly, we should &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 13px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;protect our personal information&lt;/span&gt;.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&amp;nbsp;We&amp;nbsp;recommends taking the time to read the site’s privacy policy and understand what personal information is being requested and how it will be used. If there isn’t one posted, it should be taken as a red flag that personal information may be sold to others without permission.&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 13px;&quot;&gt;&amp;nbsp;Apart from that, we should also &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;b&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;eware of deals that sound too good to be true&lt;/span&gt;.&amp;nbsp;&lt;/strong&gt;Offers on websites and in unsolicited e-mails can often sound too good to be true, especially extremely low prices on hard-to-get items. Consumers should always go with their instincts and not be afraid to pass up a “deal” that might cost them dearly in the end.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Besides that, we should &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;beware of phishing website&lt;/span&gt;&lt;/b&gt;.Legitimate businesses do not send e-mails claiming problems with an order or an account to lure the “buyer” into revealing financial information. If a consumer receives such an e-mail, BBB recommends picking up the phone and calling the contact number on the website where the purchase was made to confirm that there really is a problem with the transaction. We should also &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;confirm that our online purchase are safe&lt;/span&gt;.&amp;nbsp;&lt;/b&gt;Shoppers should always look in the address box for the “s” in https:// and in the lower-right corner for the “lock” symbol before paying. If there are any doubts about a site, we recommends right-clicking anywhere on the page and select “Properties.” This will let you see the real URL (website address) and the dialog box will reveal if the site is not encrypted.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Moreover, we should&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&amp;nbsp;k&lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;eep documentation of our order&lt;/span&gt;.&amp;nbsp;&lt;/strong&gt;After completing the online order process, there may be a final confirmation page or the shopper might receive confirmation by e-mail. We recommends saving a copy of the Web page and any e-mails for future reference and as a record of the purchase. Lastly, we must &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;check our credit card statement often&lt;/span&gt;.&lt;/b&gt;&amp;nbsp;We shouldn&#39;t always&amp;nbsp;wait for paper statements. We recommends consumers check their credit card statements for suspicious activity by either calling credit card companies or by checking statements online regularly.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px;&quot;&gt;Sources:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px;&quot;&gt;http://www.bbb.org/us/article/top-ten-cyber-monday-tips-for-staying-safe-when-shopping-online-23416&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black; font-family: Arial, sans-serif; font-size: 9pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;</description><link>http://ecyber-aware.blogspot.com/2011/09/tips-for-staying-safe-when-shopping.html</link><author>noreply@blogger.com (Jackson Chee)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-7889669623031492584</guid><pubDate>Tue, 20 Sep 2011 09:26:00 +0000</pubDate><atom:updated>2011-09-22T22:14:19.107+08:00</atom:updated><title>Rights of using your credit card online</title><description>Pay with a credit card – It’s best to use your  credit card, because under federal law, the shopper can dispute the charges if he or she doesn’t receive the item. Shoppers which is you! also have dispute rights if there are unauthorized charges on their credit card, and many card issuers have “zero liability” policies under which the card holder pays nothing if someone steals the credit card number and uses it. If you are going to shop on classifieds web sites like Craigslist, never wire money and only buy locally.</description><link>http://ecyber-aware.blogspot.com/2011/09/rights-of-using-your-credit-card-online.html</link><author>noreply@blogger.com (Thanaraj)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-8460328328833691101</guid><pubDate>Mon, 19 Sep 2011 16:14:00 +0000</pubDate><atom:updated>2011-10-12T20:02:05.252+08:00</atom:updated><title>Podcast #1 : Why we fall for Cyber Scams (Bahasa Malaysia)</title><description>&amp;nbsp; &amp;nbsp;Hello everyone, today, what i&#39;ll be discussing about is why we fall into the hands of cyber scammers, making ourselves lose a large amount of money.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;Money. We live with money. Money is important, and we NEED money. Normally, money is hard to get, we need to work so hard, just to get our paycheck by the end of the month, to pay our ever so costly living e expenses.&amp;nbsp;What if, one day, all you have to do is &quot;invest&quot; in a few thousands ringgit&amp;nbsp;Malaysia, and get back tens of thousands of ringgit&amp;nbsp;Malaysia?&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;Sounds too good to be true? It probably is. Never let greed take over our common sense, and always think of the risk we are taking before we make our final decision. There is no such thing as free lunch in the world, and even if there is, it will be a one in a million chance.&lt;br /&gt;
Remember, greed will not bring good, so resists the temptation, and work hard to earn legit money!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #f3f3f3;&quot;&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp;Hello rakan-rakan sekalian, hari ini, apa yang saya akan berbincang tentang ialah mengapa kita jatuh ke dalam tangan penipu siber, dan menyebabkan diri kita kehilangan jumlah duit yang besar. &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;Wang. Kita hidup dengan duit wang. Wang memang penting, dan kita MEMERLUKAN wang. Biasanya, memang sukar kita hendak mendapat wang. Kita perlu bekerja keras, hanya untuk mendapatkan gaji kami menjelang akhir bulan, untuk membayar perbelanjaan sara hidup kita yang selalunya sangat tinggi. Bagaimana jikalau, satu hari, semua yang anda perlu melakukan adalah &quot;melabur&quot; dalam beberapa ribu ringgit Malaysia, dan menguntung berpuluh-puluh ribu ringgit Malaysia?&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;Kedengaran seperti ini sesuatu yang terlalu baik untuk menjadi benar? Memanglah tidak benar. Jangan biarkan ketamakan mengambil alih akal kita, dan sentiasa memikirkan risiko yang kami sedang mengambil sebelum kita membuat keputusan muktamad kita. Tidak ada benda yang percuma di dunia, dan jika ada pun, peluangnya sangat nipis. Ingat, ketamakan tidak akan membawa baik, justeru, tahanlah godaan, dan bekerja keras untuk mendapatkan duit wang yang halal!&lt;/i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;i style=&quot;background-color: white;&quot;&gt;&lt;span title=&quot;Remember, greed will not bring good, so resists the temptation, and work hard to earn money!&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;i&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Remember, greed will not bring good, so resists the temptation, and work hard to earn money!&quot;&gt;Click play to listen to podcast!&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;object classid=&quot;clsid:D27CDB6E-AE6D-11cf-96B8-444553540000&quot; height=&quot;26&quot; width=&quot;640&quot;&gt;&lt;param value=&quot;true&quot; name=&quot;allowfullscreen&quot;/&gt;&lt;param value=&quot;always&quot; name=&quot;allowscriptaccess&quot;/&gt;&lt;param value=&quot;high&quot; name=&quot;quality&quot;/&gt;&lt;param value=&quot;true&quot; name=&quot;cachebusting&quot;/&gt;&lt;param value=&quot;#000000&quot; name=&quot;bgcolor&quot;/&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.archive.org/flow/flowplayer.commercial-3.2.1.swf&quot; /&gt;&lt;param value=&quot;config={&#39;key&#39;:&#39;#$aa4baff94a9bdcafce8&#39;,&#39;playlist&#39;:[{&#39;url&#39;:&#39;project.mp3&#39;,&#39;autoPlay&#39;:false}],&#39;clip&#39;:{&#39;autoPlay&#39;:true,&#39;baseUrl&#39;:&#39;http://www.archive.org/download/WhyWeFallForCyberScams/&#39;},&#39;canvas&#39;:{&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;backgroundGradient&#39;:&#39;none&#39;},&#39;plugins&#39;:{&#39;audio&#39;:{&#39;url&#39;:&#39;http://www.archive.org/flow/flowplayer.audio-3.2.1-dev.swf&#39;},&#39;controls&#39;:{&#39;playlist&#39;:false,&#39;fullscreen&#39;:false,&#39;height&#39;:26,&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;autoHide&#39;:{&#39;fullscreenOnly&#39;:true},&#39;scrubberHeightRatio&#39;:0.6,&#39;timeFontSize&#39;:9,&#39;mute&#39;:false,&#39;top&#39;:0}},&#39;contextMenu&#39;:[{},&#39;-&#39;,&#39;Flowplayer v3.2.1&#39;]}&quot; name=&quot;flashvars&quot;/&gt;&lt;embed src=&quot;http://www.archive.org/flow/flowplayer.commercial-3.2.1.swf&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;540&quot; height=&quot;26&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; cachebusting=&quot;true&quot; bgcolor=&quot;#000000&quot; quality=&quot;high&quot; flashvars=&quot;config={&#39;key&#39;:&#39;#$aa4baff94a9bdcafce8&#39;,&#39;playlist&#39;:[{&#39;url&#39;:&#39;project.mp3&#39;,&#39;autoPlay&#39;:false}],&#39;clip&#39;:{&#39;autoPlay&#39;:true,&#39;baseUrl&#39;:&#39;http://www.archive.org/download/WhyWeFallForCyberScams/&#39;},&#39;canvas&#39;:{&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;backgroundGradient&#39;:&#39;none&#39;},&#39;plugins&#39;:{&#39;audio&#39;:{&#39;url&#39;:&#39;http://www.archive.org/flow/flowplayer.audio-3.2.1-dev.swf&#39;},&#39;controls&#39;:{&#39;playlist&#39;:false,&#39;fullscreen&#39;:false,&#39;height&#39;:26,&#39;backgroundColor&#39;:&#39;#000000&#39;,&#39;autoHide&#39;:{&#39;fullscreenOnly&#39;:true},&#39;scrubberHeightRatio&#39;:0.6,&#39;timeFontSize&#39;:9,&#39;mute&#39;:false,&#39;top&#39;:0}},&#39;contextMenu&#39;:[{},&#39;-&#39;,&#39;Flowplayer v3.2.1&#39;]}&quot;&gt; &lt;/embed&gt;&lt;/object&gt;</description><link>http://ecyber-aware.blogspot.com/2011/09/podcast-1-why-we-fall-for-cyber-scams.html</link><author>noreply@blogger.com (Tee)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-64732314559014315</guid><pubDate>Sun, 18 Sep 2011 14:24:00 +0000</pubDate><atom:updated>2011-10-20T10:29:55.381+08:00</atom:updated><title>First Poll Analysis</title><description>Last week, we posted a poll question for our visitors to &amp;nbsp;titled : &quot;Have You Ever Become a Victim of Cyber Scam Before?&quot;&lt;br /&gt;
&lt;br /&gt;
The results is as follow :&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcuZ8FrLF2sUwqKyYPbYjorQqsfkg9zWkRKzQmaDGDYhFacPVhletrjvXaNoqEx85Y8_mShSrKBjfe_jdAwdCajc-wINXdJz-EcmenDVjzgxp3PNC53k5jxNJFCFKPEK8RhcpP_g5M5ZkM/s1600/Pie+chart.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; display: inline !important; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcuZ8FrLF2sUwqKyYPbYjorQqsfkg9zWkRKzQmaDGDYhFacPVhletrjvXaNoqEx85Y8_mShSrKBjfe_jdAwdCajc-wINXdJz-EcmenDVjzgxp3PNC53k5jxNJFCFKPEK8RhcpP_g5M5ZkM/s200/Pie+chart.jpg&quot; alt=&quot;Pie chart for first poll analysis&quot; title=&quot;Pie chart for first poll analysis&quot; width=&quot;171&quot; /&gt;&lt;/a&gt;The results are 12 No (80%), which is a lot higher than Yes (20%)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is shown that most of our blog visitors are very cautious about these cyber scam cases, therefore they can prevent themselves from being a victim of cyber scam.</description><link>http://ecyber-aware.blogspot.com/2011/09/last-week-we-posted-poll-question-for.html</link><author>noreply@blogger.com (Tee)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcuZ8FrLF2sUwqKyYPbYjorQqsfkg9zWkRKzQmaDGDYhFacPVhletrjvXaNoqEx85Y8_mShSrKBjfe_jdAwdCajc-wINXdJz-EcmenDVjzgxp3PNC53k5jxNJFCFKPEK8RhcpP_g5M5ZkM/s72-c/Pie+chart.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-1762566409787166289</guid><pubDate>Sat, 03 Sep 2011 05:02:00 +0000</pubDate><atom:updated>2011-10-20T10:30:45.284+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet earnings</category><category domain="http://www.blogger.com/atom/ns#">uncle scam</category><title>Not all Internet earnings are genuine</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2BBkZvbtke2KNwMaRGSO3d5Vz-wEZFlSn20HlXY0mZK7_wO1A9WOKoe0yvyV8EH8ikCmy2xfG-Gl9zFqreFgJVZZA85YqCi1IHOH_uiLNH2DlJ5uKtr3WKyyYG4wfGwq_72wazVbO7OvZ/s1600/lens7251392_1254151699UncleScam.jpg&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Nowadays people are more towards earning money in the internet, well this actually works for some but most of them failed by a deceiving uncle scam! &lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; In order not to fall in the hands of these &quot;Uncle Scam&quot; the users should learn to identify and differentiate between a genuine site and a fake scam trap site. the following are the methods or ways of a scam-er approaching:&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; The most important part of a scam is making the FIRST CONTACT.It will trigger a series of emails if you fall to their traps.It is obvious it is synonymous to SPAM so you better be able to recognize these sites that is apt to get your money and leave you in the middle of Timbuktu.&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; See how you may identify these culprits right from the very intro of their page or email. Their links may be catchy so might as well follow the tips on the latter part of this blog so that you may no fall prey to these abusive individuals.&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; It&#39;s better to be aware right from the very start so I suggest you refer your friends and loved ones to this blog to give them an insight of the opportunities that the internet offers and the hazards of falling prey to scumbags ready to get your money just for the ploy of earning quickly or getting rich easily.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2BBkZvbtke2KNwMaRGSO3d5Vz-wEZFlSn20HlXY0mZK7_wO1A9WOKoe0yvyV8EH8ikCmy2xfG-Gl9zFqreFgJVZZA85YqCi1IHOH_uiLNH2DlJ5uKtr3WKyyYG4wfGwq_72wazVbO7OvZ/s1600/lens7251392_1254151699UncleScam.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2BBkZvbtke2KNwMaRGSO3d5Vz-wEZFlSn20HlXY0mZK7_wO1A9WOKoe0yvyV8EH8ikCmy2xfG-Gl9zFqreFgJVZZA85YqCi1IHOH_uiLNH2DlJ5uKtr3WKyyYG4wfGwq_72wazVbO7OvZ/s320/lens7251392_1254151699UncleScam.jpg&quot; alt=&quot;Uncle Scam&quot; title=&quot;Uncle Scam&quot; width=&quot;208&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://ecyber-aware.blogspot.com/2011/09/not-all-internet-earnings-are-genuine.html</link><author>noreply@blogger.com (Thanaraj)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2BBkZvbtke2KNwMaRGSO3d5Vz-wEZFlSn20HlXY0mZK7_wO1A9WOKoe0yvyV8EH8ikCmy2xfG-Gl9zFqreFgJVZZA85YqCi1IHOH_uiLNH2DlJ5uKtr3WKyyYG4wfGwq_72wazVbO7OvZ/s72-c/lens7251392_1254151699UncleScam.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-8211440720090924186</guid><pubDate>Thu, 01 Sep 2011 17:05:00 +0000</pubDate><atom:updated>2011-09-16T10:02:52.374+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Auction Fraud</category><category domain="http://www.blogger.com/atom/ns#">Nigerian 419 Letter</category><category domain="http://www.blogger.com/atom/ns#">Phishing scams</category><title>Popular cyber scam techniques</title><description>&lt;a href=&quot;http://dictionary.reference.com/browse/greed&quot;&gt;Greed&lt;/a&gt;; is the nature of humans, we can never get enough, and we often seek ways to get more of everything, be it fortune or fame. Sometimes, the nature &#39;greed&#39; can cross the line.&lt;br /&gt;
&lt;br /&gt;
In the 21st century, where computer and internet has been parts and parcels of life, there are as many as &lt;a href=&quot;http://6%2C930%2C055%2C154/&quot;&gt;6.9 billion&lt;/a&gt;&amp;nbsp;(and growing)&amp;nbsp;people that are capable of accessing the internet.&lt;br /&gt;
&lt;br /&gt;
Alongside&amp;nbsp;the 6.9 billion people, a minority of those people has found out ways to abuse the internet users, specifically for their money. This is commonly known as Cyber scam.&lt;br /&gt;
&lt;br /&gt;
Today, when internet has been around for so many years, these selfish users has refined their scam techniques to trick even the most careful users of the internet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following list are the list of a few popular techniques used by cyber scam operators.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Auction Fraud&lt;br /&gt;
&lt;br /&gt;
Today, there are many websites that offer auctioning services, whereas a user can bid for a desired item. But, the catch is, due to the various location of the traders, the transaction is usually done online, and the item is delivered through postage services.&lt;br /&gt;
&lt;br /&gt;
In most cases, the trade will be done within a few days of shipping the item to the destined owner; Whereas , scammers, after receiving the money, does not deliver the goods as promised. For example, they might not give item in the condition as shown in the picture, or sometimes they don&#39;t even send the items.&lt;br /&gt;
&lt;br /&gt;
These auction frauds are hard to prevent as scammers can make multiple accounts to fake positive feedbacks, tricking users into believing them.&lt;br /&gt;
&lt;br /&gt;
2. Phishing scams&lt;br /&gt;
&lt;br /&gt;
The e-mail has been replacing the conventional land mail in today&#39;s world. There are billions and billions of users with registered email addresses that are used from a day to day basis.&lt;br /&gt;
The email has been a massive tool of malice because if anyone can send an email, anyone can recieve and read it.&lt;br /&gt;
If anyone can send an email, anyone can receive it.&lt;br /&gt;
&lt;br /&gt;
The setup is begun by sending thousands and thousands of email to different email addresses, to get a slight chance of getting the victims attention.&lt;br /&gt;
&lt;br /&gt;
For example, a scammer can fake an exact copy of an email from a bank, and send it to the victim asking for personal information, giving fake excuses such as promotions, account verification, or the upgrade of the system.&lt;br /&gt;
&lt;br /&gt;
Sometimes, these users are unaware of the phishing scams around the internet, and foolishly enter their bank account numbers, pins, and personal IDs. This will grant the scammers with access to do transactions with the victims bank account, without the victims approval nor knowledge.&lt;br /&gt;
&lt;br /&gt;
3. Nigerian 419 Letter&lt;br /&gt;
&lt;br /&gt;
Named for the section of Nigeria&#39;s penal code that this scam violates, this popular technique has been on the internet for quite some time as it rakes a big amount of money from the victim.&lt;br /&gt;
&lt;br /&gt;
This setup too begins by sending thousands and thousands of email, hoping to grab the attention of an innocent victim. The content of the message is usually capitalized to emphasize the importance and urgency of the message. An example of the message :&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, helvetica, sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;&quot;DEAR SIR/MADAM: I REPRESENT THE RECENTLY DEPOSED MINISTER OF AGRICULTURE FOR NODAMBIZIA, WHO HAS EMBEZZLED 30 MILLION DOLLARS FROM HIS STARVING COUNTRYMEN AND NOW NEEDS TO GET IT OUT OF THE COUNTRY...&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
This scam revolves around asking the victim to &quot;help&quot; transfer funds to their bank account, and get a share out of it. But before the transaction can be done, the victim must pay thousands of dollars for the so called &quot;tax&quot;, &quot;attorney&quot;, &quot;bribes&quot;, and other fees.&lt;br /&gt;
&lt;br /&gt;
As for most cases of fraud, after the scammer gets hold of the money, they disappear and the victim will never hear from them again.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sources :&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.pcworld.com/article/119941/top_five_online_scams.html&quot;&gt;http://www.pcworld.com/article/119941/top_five_online_scams.html&lt;/a&gt;</description><link>http://ecyber-aware.blogspot.com/2011/09/popular-cyber-scam-techniques.html</link><author>noreply@blogger.com (Tee)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8594684788614514069.post-1237465010354007756</guid><pubDate>Wed, 31 Aug 2011 18:29:00 +0000</pubDate><atom:updated>2011-09-01T02:29:11.906+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber scams</category><category domain="http://www.blogger.com/atom/ns#">internet fraud</category><title>Definition of Cyber Scam</title><description>&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Cyber Scam is refers to the use of internet service to trick a victim for their money. There are a few characteristic that you will find in cyber scams. Most scam are done through e-mail which is also known as spam. E-mail user will be tricked by giving the scammer (person who do cyber scam) their critical information such as usernames, passwords, credit card information, or other types of account information.&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Another way of cyber scams is through the spyware. Spyware is software&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: black;&quot;&gt;&amp;nbsp;&lt;/span&gt;that covertly gathers user information through the user&#39;s Internet&amp;nbsp;connection without his or her knowledge, usually for advertising purposes. Spyware application&amp;nbsp;are typically bundled&amp;nbsp;as a hidden component of freeware&amp;nbsp;or shareware&amp;nbsp;programs that can be download&amp;nbsp;from the Internet. However, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail&amp;nbsp;addresses and even passwords and credit card numbers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;An example of cyber scam through e-mail:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; line-height: 24px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; line-height: 24px;&quot;&gt;Subject: Windows Account Alert™‏&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: 1.5em; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;From: Windows Microsoft™ Center (war.veteran @ hotmail.com)&lt;br /&gt;
Sent: Fri 4/30/10 7:58 AM&lt;br /&gt;
To: accountprotectteam2010 @ hotmail.com&amp;nbsp;&lt;b&gt;Microsoft Live Account Alert!!!&lt;/b&gt;&amp;nbsp;Dear Account Owner This Email is from Microsoft Customer Care and we are sending it to every Hotmail Email User Accounts Owner for safety. we are having congestion&#39;s due to the anonymous registration of Hotmail accounts so we are shutting down some Hotmail accounts and your account was among those to be deleted. Please verify your account and let us know if you still want to use this account. If you are still interested please confirm your account by filling the space below.Your User name, password, date of birth and your country information would be needed to verify your account.&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;line-height: 1.5em; list-style-image: url(data:image/png; list-style-type: square; margin-bottom: 0.5em; margin-left: 1.6em; margin-right: 0px; margin-top: 0.3em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Username: ...............................&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Password: ................................&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Date of Birth: ............................&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; line-height: 24px;&quot;&gt;Country Or Territory: ................&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Confirm your E-mail by filling out your Login Information below after clicking the reply button, or your account will be suspended within 48 hours for security reasons. Sincerely,&lt;br /&gt;
The Windows Live Hotmail Team&lt;div style=&quot;line-height: 1.5em; margin-bottom: 0.5em; margin-top: 0.4em; text-align: right;&quot;&gt;—&amp;nbsp;&lt;cite style=&quot;font-style: inherit;&quot;&gt;An example of an email phishing for user&#39;s&amp;nbsp;Hotmail&amp;nbsp;account passwords&lt;/cite&gt;&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;Sources:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;a href=&quot;http://www.cybertopcops.com/anti-fraud.php&quot;&gt;http://www.cybertopcops.com/anti-fraud.php&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.webopedia.com/TERM/P/phishing.html&quot;&gt;http://www.webopedia.com/TERM/P/phishing.html&lt;/a&gt;</description><link>http://ecyber-aware.blogspot.com/2011/09/definition-of-cyber-scam.html</link><author>noreply@blogger.com (Jackson Chee)</author><thr:total>1</thr:total></item></channel></rss>