Archive for October 24, 2018

Watch Seven Photographer’s Creative Journey Through The South Island Of New Zealand Thanks To UAG

Posted in Commentary with tags on October 24, 2018 by itnerd

UAG, have officially launched their global #BuiltToGoFurther Campaign film featuring seven of Instagram’s best outdoor photographers.

UAG invited notable content creators, @ArtofVisuals@Emmett_Sparling@ItsBigBen@shortstache@kylevandever@braedin, and@lostintheforrest on an epic adventure to the farthest place from home — New Zealand. Created around UAG’s core tenants of making gear that is built to take you further, the trip was designed to push the influencers skill sets, abilities, equipment, and creativity further to see what comes of it.

From fearlessly free falling 440 feet in a blitz of pure fear to kayaking the mysterious fiordlands of Milford Sound, each person took themselves to their furthest limits on the trip, while their UAG protected gear withstood it all.

Here’s the film:

Sigh… Yet Another Extortion Phishing Email Scam Is Making The Rounds

Posted in Commentary with tags on October 24, 2018 by itnerd

This is getting ridiculous.

Another new email extortion Phishing email scam has appeared. Like the last six extortion phishing scams that I told you about in the last few months, this one again plays on the fact that you might have surfed for porn and that you might of done something else related to that. In other words, it is playing on your guilt about doing things that you perhaps should not be doing. Here’s the text of the latest scam email that I came across:

Hello!

I’m a hacker who cracked your email and device a few months ago.
You entered a password on one of the sites you visited, and I intercepted it.
This is your password from [Email redacted] on moment of hack: [Password Redacted]

Of course you can will change it, or already changed it.
But it doesn’t matter, my malware updated it every time.

Do not try to contact me or find me, it is impossible, since I sent you an email from your account.

Through your email, I uploaded malicious code to your Operation System.
I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources.
Also I installed a Trojan on your device and long tome spying for you.

You are not my only victim, I usually lock computers and ask for a ransom.
But I was struck by the sites of intimate content that you often visit.

I am in shock of your fantasies! I’ve never seen anything like this!

So, when you had fun on piquant sites (you know what I mean!)
I made screenshot with using my program from your camera of yours device.
After that, I combined them to the content of the currently viewed site.

There will be laughter when I send these photos to your contacts!
BUT I’m sure you don’t want it.

Therefore, I expect payment from you for my silence.
I think $896 is an acceptable price for it!

Pay with Bitcoin.
My BTC wallet: [BTC Wallet Address Redacted]
If you do not know how to do this – enter into Google “how to transfer money to a bitcoin wallet”. It is not difficult.
After receiving the specified amount, all your data will be immediately destroyed automatically. My virus will also remove itself from your operating system.

My Trojan have auto alert, after this email is read, I will be know it!

I give you 2 days (48 hours) to make a payment.
If this does not happen – all your contacts will get crazy shots from your dark secret life!
And so that you do not obstruct, your device will be blocked (also after 48 hours)

Do not be silly!
Police or friends won’t help you for sure …

p.s. I can give you advice for the future. Do not enter your passwords on unsafe sites.

I hope for your prudence.
Farewell.

Let me be clear. THIS IS A SCAM. Here’s why:

  1. Yes they have a password. But it’s likely a password that is gained via a data breach.  You can figure which data breach by going to haveibeenpwned.com and typing in your email address. And in the case of the person who got this email, it was an old password. That’s what tipped them off that it was fake.
  2. They claim to have uploaded malware to your system. If you have up to date and functioning anti-virus software, that will be a non-issue. But of course, they’re lying about that. But if you’re unsure, have a computer professional look over your system.
  3. They tell you changing your password will have no effect. That’s a lie. I strongly recommend that as a preventive measure that you change all your password so that you can spot these scams easily.
  4. They claim to have pictures of you. Well, they don’t. But if you’re really paranoid about the possibility of that happening, cover up your webcam and disable your microphone.
  5. They want you to pay up. Well, seeing as they have nothing on you, why should you pay them one red cent? You shouldn’t because they are scum. And scum don’t deserve to get paid for this sort of behavior.
  6. They claim that the police can’t help you. Reporting scams to your local authorities is always a good idea. The U.S. Federal Trade Commission has a website for fielding complaints, while the Canadian Anti-Fraud Center is the place to go if you’re in Canada.

The bottom line is this. Like I said earlier, the people behind these scams are scum. Don’t reward scum for running a scam like this. Never, ever pay up. And by taking the precautions that I mentioned above will ensure that you never are a victim. And for the record, I will continue to shine a light on these scumbags as they are like cockroaches who hate the light.

TekSavvy Appears In Front Of The CRTC In Regards To Telco Sales Practices

Posted in Commentary with tags on October 24, 2018 by itnerd

The CRTC is holding hearings this week to examine the retail sales practices of Canada’s large telecommunications carriers. Independent ISP TekSavvy presented to the CRTC panel this morning and here’s some highlights of what Janet Lo, VP Privacy & Consumer Legal Affairs of TekSavvy: said:

  • TekSavvy believes in doing what is right for our customers and strives to treat consumers fairly and honestly. We advertise the best available price, so that our best offer is transparent to both consumers and the competitive market. Additionally, TekSavvy does not use any sales incentives, targets, or rewards to pressure employees to complete sales.
  • TekSavvy offers the unique perspective of a wholesale-based competitor service provider, and the impact of misleading retail sales practices on wholesale-based competitors and competition.
  • Retail sales practices occur in many contexts for telecommunications services – in a store, over the phone, at a consumer’s door, or during an installation or repair appointment. Where an incumbent telecommunications service provider uses a wholesale transaction as an opportunity to complete a sale for their retail services, this is an inappropriate retail sales practice with the potential for misleading or aggressive sales practices.
  • When an end-user gets service from a wholesale-based competitor like TekSavvy, the incumbents’ technicians perform the installation and repairs for that service. Since the same technicians more often serve and sell the incumbents’ own retail services, the technician’s presence at the customer’s home gives them a touchpoint to mislead and inappropriately poach TekSavvy’s end-user to the incumbent’s retail services. TekSavvy’s intervention detailed scenarios of incumbents’ sales practices targeting TekSavvy’s end-users during wholesale-based installation and repair appointments, or providing misleading information about TekSavvy as a competitor.
  • Consumers are harmed where unfair pressure is used to complete a sale or upsell, where misleading or false statements about competitors are used to win a customer, or where consumers experience unsolicited sales in their own home when they are expecting service installation or repair.
  • The competitive marketplace is distorted and disproportionately harms wholesale-based competitors when misleading and aggressive sales practices occur from opportunities that arise when incumbents have a conflict of interest. As described in our intervention, incumbents have a conflict of interest when they control wholesale inputs, including dispatching technicians to install service for a wholesale-based provider’s customer, and they compete with their wholesale customers for the same retail customer.

It will be interesting to see how the big three telcos say because TekSavvy has created a narrative that surely casts them in a negative light.