Pages

Translate

Tuesday, June 25, 2013

Sharing Services Lied to Me!!!

     

Today I received an email from sharing services from sharingservices@aol.com . The sender informed me that their support team just sent me $2,125.00 USD via PayPal. In addition, I was also recommended to withdraw it.

      First of all, I do not know why they chose to send me over 2 thousand dollars for no apparent reason. Nevertheless, I recognized the email as a fake because I checked my PayPal account and no one made any deposit of this sort into my account.

      And to add insult to injury, they even provided a link for me to click which led me to this following site:
http://thecoffeeshopmillionaires.net/?ref_id=1296&sub_id=sentjune17&hid=

      The way I see it, this is an ill mannered attempt to deceive people into joining some multi-level marketing scheme. Personally, I find the email insulting because its designed to mislead people.

      If you intend to send me money via PayPal (for no apparent reason), just send it and do not lie. Once I find you to be a liar, I will not do business with you and obviously expose your fraud.

This spammer/scammer has earned a seal of disapproval!!!





Here is a copy of the email:

Support Team just sent you
$2,125.00 USD with Paypal.

Click here to continue

Sunday, June 23, 2013

The FBI wants to give me $10,500,000.00!!! (Yeah right!!!)


 
Today, I received an email from Special Agent Fred Jones of the FBI’s Anti-Terrorist and Monetary Crimes Division. They claim to have deposited funds into my account (I never knew I had one with them). In addition, It appears that there is a hold on my account due to me not having a Diplomatic Immunity Seal of Transfer (what is it and why I need one is beyond my comprehension).

Nevertheless, it is quite obvious that this message I received is a scam. The sender is just trying to deceive me into sending them money (via western union of course). However, it is so sad that many people are deceived by these tactics. Therefore, I hope this article helps educate someone on the dangers of internet scams.

Here is a copy of the message:
ANTI-TERRORIST AND MONETARY CRIMES DIVISION
FBI HEADQUARTERS WASHINGTON DC
FEDERAL BUREAU OF INVESTIGATION J.EDGAR HOOVER BUILDING
935 PENNSYLVANIA AVENUE, NW WASHINGTON, D.C. 20535-0001
THIS IS TO NOTIFY YOU THAT FUNDS VALUED AT USD10,500,000.00 HAVE BEEN TRANSFERRED INTO YOUR BANK ACCOUNT. THIS TRANSFER WAS STOPPED TODAY BY THE FEDERAL BUREAU OF INVESTIGATIONS (F.B.I) BECAUSE OUR VERIFICATION SHOWS THAT YOU DO NOT HAVE THE DIPLOMATIC IMMUNITY SEAL OF TRANSFER (DIST) TO SHOW THAT THIS FUNDS IS LEGIT AND RIGHTLY BELONGS TO YOU. YOU CAN OBTAIN THE DIST DOCUMENT AT A FEE OF USD550. REPLY TO THIS NOTICE SO WE CAN DIRECT YOU ACCORDINGLY WHERE YOU WILL PROCURE THIS LEGAL WIRING DOCUMENT TO FULLY AUTHORIZE THE CREDIT OF FUNDS IN YOUR MAIN BANK ACCOUNT. EMAIL: fbi_infrom.america@yahoo.es
YOURS FAITHFULLY,

SPECIAL AGENT FRED JONES,
ON BEHALF OF THE FBI DIRECTOR


Thursday, June 13, 2013

Amazon Scams and the Nigeria Connection







I recently tried to sell some electronics on the Amazon.com network. I noticed that I began to receive scripted messages from individuals claiming they wanted to buy my items. They requested that I communicate with them through their private emails.

I reluctantly contacted one of them and after sending them details about my products; they agreed to pay me via Amazon. At first, I figured it was a clean sale, but I began to notice some anomalies in the emails I allegedly received from Amazon.

In one particular transaction, I was to receive approximately $700 USD. Nevertheless, I received an email from Amazon that the customer paid me the said amount( see copy of email below). However, when I checked my Amazon seller account, I noticed that there was no record of the transaction. This immediately raised red flags and of course; I did not ship the product. As a result, I decided to launch an investigation.
 

According to Amazon sellers, it appears that a majority of these types of scams come from the country of Nigeria. Whereas scammers use sophisticated, psycho-social tactics to dupe an unsuspecting public into losing billions of dollars. Please note that I am not against the people of Nigeria. However, I just want to point out one of the many scams that originate from this nation.

 

Here's a copy of one of the e-mails I've just received regarding the "purchase" of my listed iPhone 5:

Greetings from amazon.com


Dear Enlightn1,

We like to inform you that Sara Novo has made payment for your Apple iPhone 5 32GB (Black) - Unlocked [Wireless Phone Accessory].please go through the payment invoice.

Thanks for your order Sara Novo,

Purchasing Information:
PACKING SLIP:
Amazon.com Marketplace Item:Apple iPhone 5 32GB (Black) - Unlocked [Wireless Phone Accessory]
Listing: 1
ASIN: B0097CZF5C
Quantity: 1
Order #:7001-315-513743968
Transaction #:85143176
Purchased on: 06.11.2013
Dispatched by: enlightn1@gmail.com
Shipping estimate for these items: 2Days
Expedited shipping
Earn 3% rewards on your Amazon.com purchases with the Amazon Visa Card. Learn More
Order Summary:
Shipping Details: svoa4@yahoo.com
Dispatch to: Ade Fopa
Delivery address: 10 Custom Street,
City : Lagos Island
State : Lagos
Country : Nigeria
Zip Code : 2341
Buyer Name: Ms Sara Novo
Buyer e-mail:svoa4@yahoo.com
 
Postage & Handling: $57.85
Total Amount: ($650.00)
----------
Less Amazon.com Marketplace Fees:
($8.99)
Less VAT on Amazon.com Marketplace: ($1.99)
Additional shipping credit: $4.99
Total Due Seller: $701.86
Payment Method
The seller requests to be paid via Amazon.
Thank you for the understanding.
After receiving this confirmation that the payment was received. Within 2 business days, you are advised to send the tracking number for the product to the buyer.
Purchase Protection and Refund Information: svoa4@yahoo.com
Currently, this buyer has $3,220.74 deposited in amazon.com managed purchase protection account. Transactions with this amazon buyer are covered 100% in case of fraud and description errors.
You have 3 days after you ship the item to receive your money in your account.
Refund requests are processed within 3 days.
For your safety, the buyer is unable to withdraw the money within this period of purchase till your account is credited. The buyer was informed about this transaction being started and is awaiting for the tracking # of his/her item.
Important Notice: The following other payment methods are not covered for reimbursement by the Amazon.com A-to-Z Guarantee: Wire transfer, Money Orders, Check, Cash, or Credit Card transactions that occur outside Amazon.com. Only orders using Amazon Payments are supported.
Please Note: This e-mail message was sent as a notification of payment concerning your business transaction with the above buyer. Please do not reply to this message, For more inquiry you can contact us via payment@amazon.com
Thanks again for selling with us.
http://pics.ebaystatic.com/aw/pics/securityCenter/hdr1_649x75.gif
http://g-images.amazon.com/images/G/05/help/auction-beginner-tutorial4-graphic.gifAmazon.com
Best regards
Amazon.com.
http://www.amazon.com/exec/ obidos/tg/browse/-/ 3149571
http://t1.gstatic.com/images?q=tbn:ANd9GcQEpkbXQMIWUecKLZPPhJ7YSZf-mpF5s1yXTnmwAGuAJcT_WQXz
(c) 2013 Amazon.com, Inc. or its affiliates. All rights reserved
 
 
 
References:

 

angelchen1111. ( 2009 ). Amazon scam from Nigeria. Retrieved from http://www.theusefulblog.com/post/amazon-scam-from-nigeria/

Blogspot. (2012). Phony Buyer Targets Amazon Marketplace. Retrieved from JHDrickerPhoto Blog: http://jhdricker.blogspot.com/2012/02/another-nigerian-scam-sellers-beware.html

Stephanie. (2012). Scammed. Retrieved from Blogspot: http://didntfallforit.blogspot.com/

Storm, S. (2013). A buyer on amazon scamming me? Retrieved from Yahoo Answers: http://answers.yahoo.com/question/index?qid=20091209174949AA3HxBY

WordPress. (2008, 4 15). Don’t let your guard down, scams are still everywhere. Retrieved from inconsistency: http://inconsistency.wordpress.com/2008/04/15/dont-let-your-guard-down-scams-are-still-everywhere/

Monday, June 10, 2013

The FBI Virus




 

 

 
A type of threat, known as ransomware, displays alerts saying that you need to send money to unlock your computer. A ransomware restricts access to the computer and demands a ransom to be paid to the creator of the threat to use the computer. The threat instructs the user to send money by Moneypak or uKash depending on region. See above:
The threat tries to trick you into sending money by making you think that your computer is no longer accessible.
The FBI virus installs itself on your computer via pornographic websites or illegal music and video sites, the FBI virus will display a bogus notification that pretends to be from the Federal Bureau of Investigation, and states that your computer has been blocked due to it being involved with the distribution of pornographic material, SPAM and copyrighted content.
 The FBI virus will lock you out of your computer and applications, so whenever you’ll try to log on into your Windows operating system or Safe Mode with Networking, it will display instead a lock screen asking you to pay a non-existing fine in the form of a MoneyPak code.
 Furthermore, to make this alert seem more authentic, this virus also has the ability to access your installed webcam, so that the bogus crap
Please note: The FBI virus is a scam, and you should ignore any alerts that this malicious software might generate.
Under no circumstance should you send any MoneyPak code to these cyber criminals, and if you have, you  should request a refund, stating that you are the victim of a computer virus and scam.
 
 
How to remove the virus
STEP 1
Restart your computer in Safe mode with Networking
  1. Restart the computer.
  2. As soon as the computer starts, begin to tap the F8 key until the boot menu appears.
  3. In the Windows Advanced Options Menu, use the arrow keys on the keyboard to select Safe mode with Networking.
  4. Press Enter.
If you are prompted, log on as administrator.
STEP 2
 Restore Windows to a previous state using System Restore
System Restore can return your computer system files and programs to a time when everything was working fine, so we will try to use this Windows feature to get rid of FBI virus.
 
  1. Restart your computer, and then press and hold F8 during the initial startup to start your computer in safe mode with a Command prompt.
    Note: With some computers, if you press and hold a key as the computer is booting you will get a stuck key message. If this occurs, instead of pressing and holding the “F8 key”, tap the “F8 key” continuously until you get the Advanced Boot Options screen.
  2. Use the arrow keys to select the Safe mode with a Command prompt option.
        
  3. At the command prompt, type cd restore, and then press ENTER.
    Next,we will type rstrui.exe , and then press ENTER.Alternatively, if you are using Windows Vista, 7 and 8, you can just type : C:\windows\system32\rstrui.exe , and press ENTER.
    If you are using Windows XP, you will need to type C:\windows\system32\restore\rstrui.exe, and then press ENTER.
 

    
       4. The System Restore utility will start, and you’ll need to select a restore point previous to this infection.
    
5. After System Restore has completed its task, you should be able to boot in Windows normal mode, and perform a system scan .
6. IF the FBI virus didn’t allow you to restore your computer to a previous point, you’ll need to follow Method 3 to get rid of its screen lock.
 
STEP 3
 Remove FBI virus with msconfig utility
When your computer was infected with the FBI virus, this trojan has set a its malicious files to start whenever your computer is booting. IF you didn’t have a restore point, we can use msconfig to remove it’s malicious start-up entry.
1.      While your computer is in Safe Mode with Command Prompt, type msconfig to start the Windows System Configuration utility.
2.      Click on the Startup tab, then search for any suspicious or unknown entries (random numbers or letters, ctfmon.exe, and other suspicious or unknown entries), and uncheck them from startup, then click on OK.


This will stop the FBI virus from starting with Windows, however it won’t remove the malicious files from your computer.

3.      Type shutdown /r in the command prompt to restart your computer, then perform a scan.

The Hidden Cost of Internet Spam


In today’s fast paced environment, technologies such as mobile phones and internet have become very important tools of communication. These tools save a lot of time, money and energy, or do they?

 

In a corporate environment, the company mail has become a very important tool of communication. According to The Guardian, December 17, 2012 article by Nick Atkin1, an independent research by Atos Origin highlighted that the average employee spends 40% of their working week dealing with internal emails which add no value to the business. This is likened to spam emails that take much of your time either reading or deleting. He also included that their own analysis found worrying levels of email traffic: of 95,000 emails sent, 75,000 were internal, while 68% of the 127,000 received also came from internal sources.

 

This is on the internal level; hence we cannot really consider them as spam emails. How about outside sources? If the remaining 32% of the received mails are from outside sources, how much of it are spam? Despite spam filters, around 19%2 are spam emails, which translate to about 7,722.

 

If this bulk of corporate emails were a pie, it would look like the picture below:

 



 

 

These are only figures, but if you look closely, and try to dissect every aspect of it, you will realize that they cost a lot of money, and the dangerous part of it is that they are hiding behind the veils of corporate necessity.

 

 

Financial Impact

 

The federal minimum wage in the United States for covered non-exempt employees is $7.253 per hour effective July 24, 2009, however, many states have also their own laws on minimum wage. In the event that an employee is subject to both the state and the federal minimum wage law, the employee is entitled to receive the higher of the two minimum wages.

 

For the purpose of quantifying how much manpower cost expenditure is wasted, we will use the federal minimum wage rate. Table 1 below summarizes the basic assumptions needed in computing for this expenditure.

 

Table 1: Basic Assumptions
 
Description
Unit
Amount
Minimum Wage Rate
Per Hour
$7.253
Average Time Spent Dealing with Internal Emails
Weekly
40%
Standard Working Hours
Hrs. / Day
8
Standard Working Days
Days / Week
5

 

 

To further illustrate, if we use the 40% mentioned by Atos Origin, then an employee spends sixteen (16) hours a week managing internal emails, for a total cost of US$464.00 per month. If we use this in a ratio and proportion to get the number of hours spent on external emails, we will arrive at eight (8) hours a week, and nineteen percent (19%) of that is spent on spam or two (2) hours to be exact.

 

If the employee is a minimum wage earner, then US$14.50 per week is being paid to him or her to do nothing but manage spam emails. This may be minimal, but if we escalate it to a higher level with more number of employees, the cost is alarming. Table 2 shows an example of the different scenarios depending on the number of employees.

 

 

Table 2: Labor Cost Paid Wasted to Spam Emails
Scenarios
No. of Employees
Cost / Month (US$)
Cost / Year (US$)
Company A
20
1,160.00
13,920.00
Company B
100
5,800.00
69,600.00
Company C
250
14,500.00
174,000.00
Company D
10,000
580,000.00
6,960,000.00

 

 

It must be noted that the figures above are based on a minimum wage earner’s hourly rate, which is very conservative. Consider the highly paid executives in the statistics, who are paid as high as US$97.004 per hour or even more; do the math and the costs will multiply. Aside from that, not included are the overtime charges that may have been paid to employees who had to extend work because the time which should have been devoted to work was spent scanning and deleting these spam emails.

 

 These costs cannot be seen by the naked eye, and if you conduct a survey among the employees on the actual time spent managing emails, whether spam or legitimate, you will not get an honest answer. Try to search the internet for example for the published percentages on how much is spent by employees managing emails. You will come up with different results which according to authors are “based on surveys”.

 

It is for this reason that some offices totally ban the use of internet, except for company emails like Lotus Notes and Microsoft Outlook, wherein spam emails have a lesser chance of penetration.


 

Damages on a Personal Level

 

If the simple computation above shows the magnitude of wasted money in a corporate or workplace set-up, consider it doubled or even tripled on an individual personal level. This is due to the fact that the person is no longer tied to the working hours in the work place; hence more time is devoted to browse individual emails. In addition, the person is paying his or her internet service provider, and worse, if the person has not invested on security, then his or her data and computer maybe at risk against viruses associated with these spam.

 

Take for example the free web based email services like Google or Yahoo. Sometimes, when you are looking for an important email, you have to carefully sort through a lot of spam emails afraid that you might accidentally delete it. In some cases, scam emails sent through friends’ or relatives’ hacked email addresses are threatening, asking for money in the guise of some accident or mishap, or an advertisement for some pornographic sites.

 

There also lost things that we cannot put a tag price. The time you spent cleaning up your inbox could have been used to play with your kid, to do the laundry, to meet up that old college friend you had been planning to see, to repair the leaking faucet, to treat your wife to dinner, or to simply catch some sleep, and a hundred other things.

 

Afterthoughts

 

Email communication is an integral part in corporate survival and even in personal lives in today’s information age. It is for these reasons that scam, spam and the like were also invented, to take advantage of this necessity to serve different purposes. It becomes now the responsibility of the email user, be it on a corporate or individual level, to mitigate this risk if not totally eliminate it. For some, they invest on security measures no matter how costly, because it is worth it in the long run. And for those who don’t, it becomes a battle of who would eventually prevail.

 

 

Sources and References

 

1)    1ATKIN, N. (2012) 40% of staff time is wasted on reading internal emails. The Guardian, 12th Dec. retrieved from:  http://www.guardian.co.uk

 

2)    2WASSERMAN, T. (2012) Email Takes Up 28% of Workers' Time [REPORT]. Available from:  http://mashable.com/2012/08/01/email-workers-time/ (Accessed 5/30/2013)

 

3)    3United States Department of Labor (n.d) Minimum Wage (www.dol.gov) Available from: http://www.dol.gov/dol/topic/wages/minimumwage.htm (Accessed 6/07/2013)

 

4)    MONEY.USNEWS.COM (n.d.) Careers- Best Jobs 2013 (WWW) money.usnews.com. Available from: http://money.usnews.com/careers/best-jobs Accessed (6/09/2013)