Tumgik
#in my day a Nigerian prince asked you for your name and address
Text
Les Misérables 210/365 -Victor Hugo
BOOK EIGHT THE WICKED POOR MAN
201
It was winter and the old man and his daughter didn’t show up in Luxemburg gardens (well it is winter) and Marius only wanted to see her face again but couldn’t find her and was now a lost dog. (that in my opinion should be neutered) He was melancholy, why did he follow her, Courfeyrac guessed what his problem was and in September took Marius to a ball to see if he could find his love, but Marius just left the party alone and went home. On one occasion he thought he saw the old man on the street but why is he in working clothes, so Marius tried to follow but lost him.
202
Marius was at the Gorbeau house, he didn’t pay attention to the Jondrettes. In February to took to dining again and Bougon complained of the prices these days. (I hear ya) In Rue Saint-Jacques someone bumped into him, two young girls running past, they had escaped the police. Marius picked up a package they dropped, on the way he saw a child’s coffin thinking one thing more terrible than a dead child is one turned to crime, then back to thoughts of how gloomy his life became. (you chose to live like this)
203
When going to bed he remembered the package he had, he looked for an address on it and read the letters under different names but the same hand begging for money with different sob stories. (if you don’t get it it’s a nineteenth century Nigerian Prince scam) The next morning a young girl knocked on his room door.
204
She looked wretched, dressed in poor clothes, thin and missing teeth, poverty was hard on her, she had a letter for him. It’s from his neighbor, since he paid for their rent, he asks for more money for food. (such a demanding beggar) With the letters he found and now this one he knew his neighbors were in dire straits that he risked his daughters. His daughter is a creature of neither good nor evil, that once out of childhood already had nothing, he let her look around his meager room in amazement. She knows how to read and write, and her father was at Waterloo and they weren't always this destitute, she’s seen him before on the stairs and with Father Mabeuf. Marius gives her her lost letters and she keeps talking about how poor their lives are, once they had to live under a bridge in winter. He gives her five francs and she’s happy they’ll have food and took an old loaf of moldering bread as she left.
205
Marius lived five years in poverty but now knew he didn’t know real misery like just now. All youth, honor, modesty, are sinisterly manipulated in seeking resources in a hut of fate that young girl Marius encountered was from those shadows. He almost reproached himself for not noticing them earlier and just automatically paying their rent, he should have done better. (exactly how at one point you only had the clothes on your back and turned down a job with better pay because you wanted more free time) He was so close and didn’t pay attention to those right beside him. Marius scolded himself more than he deserved, (well more like not for the right reasons) He found a hole in the plaster wall and used it as a peep hole to now see what they are like. (do you have any redeeming qualities first you make stupid decisions that lead to poverty then you stalk a girl and now you spy because you want information on this family)
206
Cities like forests have caverns for the most wicked creatures to hide, what Marius saw was a hovel worse than his own poverty. There was a framed Napoleon and at the table with a pen and papers sat the scoundrel, he had tobacco to smoke but no bread. (so he’s a selfish bastard that spends what little money they have not on food for his children but indulgencies for himself) The woman was by the fire and the younger sister on a pallet, she was smaller from malnutrition. They drew together in the cold, but their hearts drew apart.
207
The eldest daughter ran in to say the gentleman from Saint-Jacques is coming behind her. She doesn’t want to wear her tattered shoes anymore and would rather be barefoot, but she can't go into churches without shoes. He has his wife put out the fire and make their hovel look worse to get more sympathy such as have his daughter hurt herself by breaking a window and his wife pretend to be sick.  
208
Jondrette worried he did this all for nothing, these charitable men who think they are above them and humiliate them by bringing clothes when he wants money. (we already see you waste it on tobacco) In his rant there was a knock on the door, it was the old man and the girl, the eldest Jondrette daughter stared at her nice clothes. (ok so once again the Thenardiers meet Valjean and Cosette but neither recognize the other because of how time greatly changed their circumstances)
209
The old man brought them some clothes, blankets and stockings, Jondrette praised his charity but in a low voice complained there is no money. When asked his gives a fake name of Fabantou, a starving artist. He plays up his youngest daughter’s cut wrist, they may have to amputate and watches the old man's reactions. Their friends won't help, they have no coats, his wife is sick, daughter injured and not one sou. He raised his daughters religiously, won't, have the hussies fall into theatre, (at the time being an actress was a skeevy job) they are virtuous and now they’ll be evicted tomorrow. The old man gave him five francs and Jondrette complained it wasn’t enough as the old man gave him his outer coat and say he’ll come later with sixty francs.
210
Marius wasn’t paying attention to anything but the young girl and watched as she left and wanted to follow her but thought for a moment that this sudden move would alarm them. (you think) He waited then descended in haste and chased after the carriage that was a long way off. He called a cab and had it follow, (really a follow that car trope) but with no money to pay it left without him (pff the car leaving without them is the subverted trope) and he returned to his room in despair. He noticed Jondrette in the philanthropist’s coat talking to men of disquieting aspects, one looked like a roamer Courfeyrac warned him about. (these are the four ruffians that were brought up a ten chapters ago)
NEXT
0 notes
qwuilleran · 5 years
Text
Tumblr media
Companies really be out there like, "Give us access to your name and personally identifiable information AND the name of another person without their consent. You get to play spy and feel justified. We get to keep your info and do whatever we want with it. Win-win 🤞🏼"
And @staff Tumblr supports this underhanded identity theft.
0 notes
migleefulmoments · 5 years
Note
Klaineownsmysoul and her response to my message 'Heaven help us all. How do you know that person is in fact a child? Because they say so? You believe everything you read on the Internet, then?' (um, isn't that what the coven do? lol) I never saw the child's initial post; but did see their response to it, and have no reason to believe they aren't a child; a child who's maturity level far exceeds the coven's. Wish they'd practice what they preach and stay in their own lane.
Flowers finally got an anon and it really set her off...she went on full bitch mode and then tagged it #Michy. Sorry Flo, it wasn’t me. I find it HI-LARIOUS that they keep misidentifying anons as me. Their maniacal documenting of IP addresses is even more of a waste of time if you can’t figure out who sent it. 
Here’s the progression of the conversation: 
flowersintheattic254
Darren laughing anon - feel the need to debunk again?
I think @cassie1022 is correct. It’s like a regular bowel movement with you.
I do worry about you anon. That you wait for the slightest thing to jump on.
So I guess that some of SK are on that compilation and he looks happy. Of course he is, as they are people he’s known since university with a shared sense of humour and D riffs off some of them naturally. The girls and wives unfortunately facilitate the beard, as do some of the men occasionally and we all know about the sham, but I guess they get some attention from that. I suppose everyone needs to work. D just did a show with some of them so I guess he has repaid their loyalty for whatever they supported him with.
Doesn’t make M less of a beard. I also wouldn’t say the recent SK weddings showed Mi@rren as a perfect couple (see below), but you can dream away Anon.
Tumblr media
Also from the beginning they all had a pretty insensitive attitude towards M. Regardless of what changed as time dragged on they didn’t show much respect in the early days. Yup I hope you can defend these heinous people making a joke at M’s expense. Please attack their extended families and threaten to dox them professionally in the name of Mi@rren too you absolute ass.
leka-1998 Oh, thanks for reminding me of the first wives club. In the words of L/ena H/all, “First husband? Hahahahaha, kidding!!! First and only husband.”
Caution, dramatic gif incoming.
Tumblr media
flowersintheattic254 @leka-1998 😂. Thank you.
************************************
Flowers:  Wow anon - Guess my last post really stung you huh!
I was going to write you a long response as I do have some points to make about SK and their mutually beneficial arrangements, then I realized what you said was a tad petulant and childish. You know just saying they are all in a happy love bubble with no supporting argument doesn’t make it real right?
Then I realised you are just one of those people that have to have the last word. So here have this on me.
Tumblr media Tumblr media
Anonymous asked:
Tumblr media
Okluvubye😘😂
#michy #hey look i got the last word #so I’ll be the fool this time.
************************************************
anon: You know why I sounded like a fucking child is because I am a child because no grown woman has time to bitch on a blog and google about having the last word.And I might be a child but judging by your posts I’m a lot more mature.I don’t go around and criticizing a celebs wife and weirdly fetishising about two guys that don’t even seem friends.Hope someday you get a grip on reality and realize that spending your day blogging about people unaware of your existence is a waste of time.kluvyabye*
flowersintheattic254 answered: I wasn’t going to post you, but I wanted to show my followers just how crazy you still are (although between me and you, I think they already know) 😉. Also way to go on the whole maturity thing with how you started and ended your email. Cleary ‘more mature* of you 🤦‍♀️.
You should copy the historic example below and send me some love 😀. Instead of shooting a quick anon of hate.
Let me be very clear about something. I don’t care what you think of me, my blogging habits or any of my other interests and you won’t police what I write. So I will continue to mock you and not take anything you say particularly seriously and do me. I like me, a me who is happy and confident in what she knows and who she is.
I will ask you one thing, as you always say the players don’t know of our existence. Then why are YOU so bothered about it. Why is your belief so fragile it’s threatened by what we write here. Your fragility over proving her authenticity as a wife and D’s str8ness isn’t badass and neither is this anon.
So here’s a message from me to you below. Maybe try it?
Toodles!!!! 👋
klaineownsmysou
************************************************
Anonymous asked: You and your so called friends wouldn't know a TRUE sign of maturity if it bit you on your nose. Grow the fuck up! Chastising a child because she dared to question you and your hags is low. Darren would be so proud. Shame on you.
Klainownsmysoul: Heaven help us all.  How do you know that person is in fact a child?  Because they say so?  You believe everything you read on the Internet, then?  OK, well I’m a Nigerian prince and I have a fortune to send you if you’ll only share your routing, account, and social security numbers with me.  And if so, why is a child sending hateful messages to strangers - not “questioning” as you put it - but a rude vulgar comment?  And you’re ok then, with them doing so?  They are allowed to say whatever they like and spew vile ridiculous messages to anyone and no one can comment otherwise?  I’m sure D would be proud of that as well.  And you for doing the exact same thing.  Congratulations.  I’d bring up the term “ironic” here but I’m not sure you’d understand.
One more time for the people in the back: WHY DO YOU CARE SO MUCH?  Why are you stalking blogs that post content you don’t agree with?  I just don’t get it.  And we are the crazy obsessed ones? I have never once sent nasty notes to someone on this site and will never do so. Sending hate via the anon feature is the coward way’s out.  I don’t reblog, like, or comment on every post that comes across my dashboard; I am perfectly capable of scrolling by something and letting it go - that is what mature people do.  Perhaps give it a whirl?  Meanwhile, me and my hags will be over here in our little corner.  Try staying in yours.
#Anonymous
************************************************
What a hot mess of total nonsense.  
7 notes · View notes
inboldmagazine · 4 years
Text
INBOLD MEETS: Nwaobiala, the artist healing the hidden traumas of the African Diaspora
Tumblr media
Nwaobiala poses with paintings created by BAKHITA. Photo taken by BAKHITA. Interview and Text by Nandi Ndoro. 
Nwaobiala (they/them/their) is the mixed-media artist the African Diaspora never knew it needed. Hailing from Nigeria and Prince George's County, Maryland, Nwaobiala is a 21-year-old creative using short films, photography, personal essays, mixed-media collages, and other mediums of art to promote self-care and self-expression.
Since starting university as a pre-med major to appease their traditional parents, Nwaobiala has been shifting into full-time artistry. Addressing everything from their first time having an STI to intergenerational abuse amongst African mothers, Nwaobiala's art is powerful, especially to black people who have never been able to have these conversations. There is no doubt that as they continue to explore their artistic capabilities, they are creating a movement of young black people who seek to explore, expose, and heal the hidden traumas of communities in the African Diaspora.
Nwaobiala’s most recent project, “we are more than bodies,” explores the effects of cultural homophobia in Queer Nigerian Americans via photography and digital collaging.
Nwaobiala sat down with Inbold in July to talk about their upbringing and what it has been like being honest in communities that often promote secrecy.  
How did you get into art?
I've been writing stories ever since I was in 2nd grade. I showed them to my teachers but never to my parents. They used to say, "You have to be a doctor. You have to go to medical school." They still say that. Then from seventh grade to the middle of 10th grade, I went to school in Nigeria. When I came back to the States, I ended up in this English class taught by this really dope, black woman. When we got to the Poetry unit, I didn't know how to write poetry but I ended up writing a piece about women empowerment. I performed it in front of the class and I got a standing ovation. I was like, "Wow, I'm actually kind of good at this." Then, during my senior year of high school, I took a TV production class and that was the first time I ever held a camera. I thought it was cool how some people used visuals to tell their stories. I had started working around that time so I decided to buy myself a camera. I had also just come out of a terrible breakup so it was perfect timing. I was still using that camera when I got to college.
When did you start doing slam poetry?
After that poetry performance about women empowerment, I found a lot of spoken word videos on YouTube which I became obsessed with. Then, during my freshman year of college, I joined CUPSI, the College Unions Poetry Slam Invitational, so I was competing in poetry slam events across the country. I did that for two years and it was really cool. That was really when I started to express myself more. I just met so many cool people doing their thing: being queer as hell and gay as shit. It was everything I needed. I'm taking a break this year though because I'm not really into slam poetry anymore.
Why is that?
At the time I was doing slam poetry, it was bringing up a lot of trauma in my life. I didn't have therapy and I couldn't deal with it. I feel like people want you to tell them about your traumatic experiences during performances but that's re-traumatizing for me. I needed to take a break. Looking back now, I don't think I'm going to go back to it. I also don't like when my writing is in that "slam poetry format". I realized that when I took poet Ariana Brown's workshop and I was like, "Wow, I hate the way my writing is structured." Once I left that format, I liked my writing a lot more.
How did you get into collages?  
Last year, I was at home for Christmas, and I was really bored. My parents are really strict so when I go home, I don't leave the house that much. So I was like, "Okay, let's make art." I couldn't take pictures though because it was cold, plus I needed models and transportation. I had been seeing people make digital collages so I started making them and they were a really big hit.
Tumblr media
“we are more than bodies” by Nwaobiala
Are you still making them?
Definitely. I think digital collages are really cool because you get to put different parts together to create a whole new message. I have one about intergenerational trauma via mothers that's inspired by Safia Elhillo. She has literally some of the best diaspora poems that I've ever read, specifically from her book The January Children. The college is about how cultures that only see women as objects for breeding children, not as a people to be loved, impact our mothers. I think my mother is very much affected by that culture. She's not happy in her marriage but she'll still go around telling people, "At least I kept my man." I'm like, "Who cares?". That nigga stresses her out so why is she happy about that? I think a lot of women are unhappy in their marriages, especially in Nigeria. It makes me so sad. Even more, when I watched the Nina Simone documentary, it reminded me of this intergenerational trauma. Nina Simone was abused by her husband and went on to abuse her daughter. You can see the cycle of trauma within that situation. Now that I think about it, we all remember Nina Simone differently than how she really lived. Exploring that type of trauma and how we interact with our mothers is an example of what my collages are about. Outside of that, I'm also trying to get into music.
I was gonna ask you about that… music is the one thing you haven't conquered yet!
Yeah, I'm trying to get into DJing because I think it's so sexy.
Honestly, it is.
Yeah, but the equipment is a barrier. Same thing with photography. Honestly, all this art shit is extremely expensive. Photography is really expensive. The one lens that I have only cost me $30, so that's good. It's nice but it's not versatile. I've been applying to a million, trillion grants and they’re hard to get so I have to wait until I win some before getting more photography equipment. My laptop is also running out of storage every day because of my YouTube channel. Lol, it's just been a lot.
I love your videos!
Thank you! I actually make my videos via my external hard drive because I can't have them on my laptop. Oh, man. It's a mess. Art is expensive and tedious.
But it's something that you have to continue?
Oh, yeah. Art is the only thing that feels right to me. I'm not drawn to anything else. I don't see myself looking up YouTube videos about engineering, for example. I don't feel any type of drive to do anything but art. I'm interested in a variety of subjects but I like the medium of art. I like how it gets to people and I like making it.
Tumblr media
“we are more than bodies” by Nwaobiala
What has your relationship with your parents been like since you started spending more time creating art?
My parents don’t really know about the art thing. See what had happened was, I had told my dad that I was going to go to university as a Bioengineering major to eventually get into medical school, I’m still on an engineering scholarship, but my first semester was so stressful. It was really anxiety-inducing and I was stressed about my GPA all the time. I couldn’t live like that. So I changed my major to Industrial engineering, which even though it’s still STEM, my dad doesn’t approve.
But being a full-time artist is the goal?
Yes. I’m building my brand now with my website and social media. I’m mostly financially independent so even if my parents tell me I can’t do it, I’m just gonna do it.
When did you start identifying with the Diaspora as opposed to just Africans in general?
The Diaspora is home for me. Even though I grew up in Nigeria partly, I can't fully identify with Nigerians because I do have that "Americanness" in me. Whenever I have a dissenting opinion about our culture, they often attribute it to me being "spoiled" or "damaged" by western culture.
Yeah, that "Americanness" will separate you so fast from an African community.
Facts. It's just hard for a lot of people to understand or see any other point of view that's different from theirs. But recently, I've been connecting with a lot of people that I went to boarding school within Nigeria. Some of them are roaring feminists now and that's hella cool. I know two who are queer so I would really like to interview them. In Nigeria, the ignorance about queer identity is real. Actually, I don't even have to go back there to feel the ignorance. I can just go to a family reunion or talk to my Dad. It's really hard to deal with, honestly. It makes me so mad that I need to calm myself down.
Who are some of your influences?
Oh man, this question is so hard! I need to pull out my Instagram. One of the first people that comes to mind is Yagazie Emezi. She's a Nigerian photographer and she's a trailblazer. I like everything that her work revolves around. I also like her personality: she's the type of person to say that the photography industry is really white and male and that they all want you to be a certain type of way. They want you to be quiet and aloof. You're just an artist so you can't have a presence to you. But she's like "Fuck all of that! I'm going to be whoever I want and you should just take it or leave it." She also doesn't let people dangle money in front of her and she's very successful. Who else? Oh, Koffee, the musician! She's just herself and I love it.
What has your networking been like with other artists?
A lot of my friends are artists. I have one friend who I went to school with in Nigeria and in the States as well. Her name is Crystal Anokam and she's an amazing photographer. She's really been my support system because she's also a Nigerian American so she knows what's up. In general, I surround myself with a lot of people from the African Diaspora. If you're Diaspora: I want to value your work, I want to pay for your work, I want to see your work. I care about the stories that you're telling. That's the art I want to see. I hate going to museums sometimes because there's so much white art! If I wanted to see white art, I'd go to church. For example, the MFA in Boston is hella white. I was there one time and this teacher was taking a group of students through the African art section. The teacher said to the students, "Oh yeah, this is the African art. We haven't really talked about Africa this year..." and he just kept speeding past all the work. I was like, "Bruh, this is your chance to talk to your students about our continent!" It's sad because there were black kids in that group too. But yeah, I like to surround myself with people who have that background because they know where I'm coming from. Even if our parents don't support our art, we know that the art that we create matters. It's so important for us to talk about heavy subjects and these stories because no one is specifically scouting for African artists. You have to push yourself into the spotlight. You also need to be able to connect with other people. Ever since I started my YouTube channel, I've had so many people message me and tell me "Damn, I'm going through the exact same thing!" It's nice to hear people say that and to be able to have these difficult conversations. Sometimes I feel like I'm just kind of here by myself. This shit can get rough so that's nice.
You can find more of Nwaobiala’s work at www.nwaobiala.com, on Instagram @nwaobiala, or on YouTube: nwaobiala. 
2 notes · View notes
kevintor · 6 years
Text
I Watch a Movie I Should Have Seen: “Flatliners”
Tumblr media
This movie was...a movie. It had a story. It was fine. I’m not upset I saw it.
I knew they stopped their hearts to try to experience the afterlife. I figured that wouldn’t go well but the repercussions were not that bad actually.
My thoughts:
So you’re telling me that Kiefer Sutherland left the set of “The Lost Boys” and refused to take off that jacket for 3 years??
Julia Roberts wears glasses to look smart and doctor-y (a standard 80s actor move) but she really just looks like the hottest Harry Potter I’ve ever seen.
Kevin Bacon was suspended from medical school for performing surgery without permission from his attending. He leaves his dorm room by rappelling out of the building. They must have also suspended him from using stairs.
Kevin Bacon stole his truck from the set of MASH.
If Jack Bauer wants to find out what’s on the other side, can’t he just ask Chloe? “Damn it, Chloe! Is there an afterlife? Yes or no? I don’t have time!" <Tick><Tock> <Tick><Tock>”
The medical school is like if the director said, “I want something that looks like a church, a museum, a renaissance fair, Plato’s cave, the Parthenon, and the cover of a Dan Brown book (which will exist one day) ALL AT ONCE!" And then Kiefer yelled, “AND THE VAMPIRE HOME IN SANTA CLARA!” “That too,” said the director. It’s such a weird building.
Oliver Platt is concerned about his medical future if he helps with these experiments. If only I could show him that he’s a well-respected doctor at Chicago Med!
You feel really cold when you get back from the dead. I might start doing this flatlining stuff to get through the summer.
NOTE: After coming back from the dead, don’t spend your first few moments shivering in a black-lit alley painted with creepy faces.
Womanizer Billy Baldwin sees an afterlife of boobies. It makes sense.
Flatlining causes you to confront your darkest secret by making you have hallucinations of the person or thing you wronged. I’d just be followed around by that one Chili’s bathroom.
Kevin Bacon’s hallucination is a little girl he used to bully calling him more total horrible names in 1 minute than I’ve ever called anyone ever.
I know she probably didn’t want to show her breasts and that’s fine. It would have been really weird to see Harry Potter’s breasts. But Julia Roberts being defibrillated in a pretty, white bra is just weird. Better to just film from a different angle than make the med students look like they don’t know what they’re doing.
Kiefer installs a super deadbolt on his door to keep the hallucinations out. It doesn’t work. I hope he’s never my doctor.
Kevin Bacon tries to track down Winnie, the girl he bullied by cold-calling Winnie’s mom. Winnie’s mom just gives him all of Winnie’s information. Address. New name. Winnie’s mom has definitely donated to a Nigerian prince.
We finally learn that Kiefer killed a kid when he was younger and he’s only now haunted by it?? Every night before: sleeping like a baby.
Kiefer comes up with a plan to fix everything. He calls Julia Roberts and tells her he’s sorry for everything and he’s going back under. Julia Roberts asks him where he’s going. Like she has to narrow down all the one places they’ve been temporarily killing each other. Thankfully, she guesses right on the first try.
I think the problem with this movie is that Kiefer Sutherland doesn’t get enough comeuppance.  He killed a kid. So he has a couple of bad hallucinations and we’re good? He’s flatlined a longer time than they all think one should be flatlined and he wakes up okay? He just moves on with his life and becomes a doctor? Not cool. I’m still haunted by that Chili’s bathroom and no amount of repeated apologies when I wash my hands there can fix it.
4 notes · View notes
techcrunchappcom · 4 years
Photo
Tumblr media
New Post has been published on https://techcrunchapp.com/how-the-us-caught-flashy-nigerian-instagrammers-with-40m/
How the US caught flashy Nigerian Instagrammers 'with $40m'
Tumblr media Tumblr media Tumblr media
Image copyright mrwoodbery
Image caption Olalekan Jacob Ponle, known as “mrwoodbery” to his Instagram followers, flaunted his wealth
The day after his 29th birthday in May, Olalekan Jacob Ponle posted a picture on his Instagram standing next to a bright yellow Lamborghini in Dubai.
“Stop letting people make you feel guilty for the wealth you’ve acquired,” he admonished, wearing designer jewellery and Gucci from head to toe.
A month later, the Nigerian, who goes by the name “mrwoodbery” on Instagram, was arrested by Dubai Police for alleged money laundering and cyber fraud.
The most famous of the dozen Africans nabbed in the dramatic operation was 37-year-old Ramon Olorunwa Abbas, “hushpuppi” or just “hush” as he was known by his 2.4 million Instagram followers.
Police in the emirate say they recovered $40m (£32m) in cash, 13 luxury cars worth $6.8m, 21 computers, 47 smartphones and the addresses of nearly two million victims.
Mr Abbas and Mr Ponle were both extradited to the US and charged in a Chicago court with conspiracy to commit wire fraud and laundering hundreds of millions of dollars obtained from cybercrimes.
The two have not yet been asked to plead and are presumed innocent until proven guilty.
“I think there’s probably a certain arrogance when they believe they’ve been careful about maintaining anonymity in their online identities, but they live high on the hog and get careless on social media,” said Glen Donath, a former senior prosecutor in the US Attorney’s Office in Washington, DC.
It is a spectacular crash for the two Nigerian men who extensively documented their tacky, high-flying lifestyle on social media, raising questions about the sources of their wealth.
They unwittingly provided crucial information about their identities and activities for American detectives with their Instagram and Snapchat posts.
They are accused of impersonating legitimate employees of various US companies in “business email compromise” (BEC) schemes and tricking the recipients into wiring millions of dollars into their own accounts.
On Instagram, hushpuppi said he was a real estate developer and had a category of videos called “Flexing” – social media lingo for showing off. But the “houses” were actually a codeword for bank accounts “used to receive proceeds of a fraudulent scheme”, investigators allege.
“Our value system in Nigeria needs to be checked, especially the emphasis we place on wealth, no matter how you got it,” the economist Ebuka Emebinah told the BBC from New York.
“It’s a culture where people believe that results speak for you. We don’t place as much emphasis on the process and this has built up over time.”
English Premier League team targeted
In April, hushpuppi renewed his lease for another year at the exclusive Palazzo Versace apartments in Dubai under his real name and phone number.
“Thank you, Lord, for the many blessings in my life. Continue to shame those waiting for me to be shamed,” he captioned an Instagram picture of a Rolls-Royce just a fortnight before he was arrested.
“Abbas finances this opulent lifestyle through crime, and he is one of the leaders of a transnational network that facilitates computer intrusions, fraudulent schemes (including BEC schemes), and money laundering, targeting victims around the world in schemes designed to steal hundreds of millions of dollars,” the Federal Bureau of Investigations (FBI) said in an affidavit.
Skip Instagram post 2 by hushpuppi
View this post on Instagram
What y’all think about my new bespoke black badge Rolls-Royce Wraith? Lol. This post is to everyone who has been made to feel low about themselves, to those who has been told will never amount to anything, to those who has been looked down upon, I want you to know today that as long as you don’t see yourself as low as they make you seem, as long as you have a valid dream and work hard, and most importantly if you believe in God, you can achieve anything and everything. This post is specially dedicated to all Hushpuppi fans worldwide, to those who don’t know me and has defended and supported me in anyway or the other, to my real friends JJ, Rawflesh, OvaWise, Debo Bentley, SK, Hp and S.p of Ghana and all those that I can’t mention, God bless you all. Make una repost and congratulate me o make my success loud pass my failures and shortcomings 🤣 #RollsRoyce #Bentley #Wraith #Bentayga #BlackBadge #Versace m
A post shared by HUSHPUPPI (@hushpuppi) on Feb 27, 2019 at 4:19am PST
End of Instagram post 2 by hushpuppi
In one case, a foreign financial institution allegedly lost $14.7m in a cyber-heist where the money ended up in hushpuppi’s bank accounts in multiple countries.
The affidavit also alleged that he was involved in a scheme to steal $124m from an unnamed English Premier League team.
The FBI obtained records from his Google, Apple iCloud, Instagram and Snapchat accounts which allegedly contained banking information, passports, communication with conspirators and records of wire transfers.
About 90% of business email compromise scams originate in West Africa, research from American email security firm Agari shows.
‘Yahoo boys’
The complaint against Mr Abbas and Mr Ponle describe tactics that resemble what the company calls Vendor Email Compromise tactics where scammers compromise an email account and study communication between a customer and a vendor.
Tumblr media Tumblr media
Larry Madowo
The ‘Nigerian prince’ trope has become shorthand for deception”
“The scammer would gather contextual details, as they watched the legitimate email flow,” explains Crane Hassold, Agari’s senior director of threat research.
“The bad actor would redirect emails to the bad actor’s email account, craft emails to the customer that looked like they are coming from the vendor, indicate that the ‘vendor’ had a new bank account, provide ‘updated’ bank account information and the money would be gone, at that point.”
Mr Ponle, known online as “mrwoodberry”, used Mark Kain in emails, according to the FBI.
He is accused of defrauding a Chicago-based company into sending wire transfers of $15.2m. Companies in Iowa, Kansas, Michigan, New York, and California are also said to have fallen victim.
The cash trail allegedly disappeared after his accomplices, called money mules, converted the money into the cryptocurrency bitcoin.
Email scams have become so prevalent globally, and so deeply linked to Nigeria, that the fraudsters have a name in the country: “Yahoo boys”.
They try to convince a recipient to wire money to the other side of the world or they go “phishing”, stealing a user’s identity and personal information for fraud.
The FBI warns against the Nigerian letter or “419” fraud; emails promising large sums of money called advance fee scams. The “Nigerian prince” trope has become shorthand for deception.
How a 419 and romance scam works
Tumblr media Tumblr media
Media playback is unsupported on your device
Media captionOnline scamming: ‘If it doesn’t look right, don’t trust it’
An individual may contact you via e-mail, explaining he needs help to transfer money
Will tell you that political turmoil or a natural disaster makes it difficult for him to make the transfer
Will ask you to give him your financial details so that he can transfer the money into your account
This allows him to access and steal from your account
Be careful what you post on social media and dating sites as scammers use the details to better understand you and target you
A Washington, DC-based attorney, Moe Adele, finds it frustrating as a Nigerian because it ignores the “systemic failures that have led to brilliant Nigerian youths engaging in these scams”, in the country and abroad.
“They see it as an easy way out in a country that offers them limited options and, in many cases, no options at all,” she says.
“But there are also many brilliant Nigerians are represented in world stages from education to pop culture.”
How Nigeria suffers
Last month, the US Treasury Department blacklisted six Nigerians among 79 individuals and organisations in its Most Wanted cybercriminals list. It accused them of stealing more than $6m from American citizens through deceptive global threats like BEC and romance fraud.
You may also be interested in:
Tumblr media Tumblr media
Media playback is unsupported on your device
Media captionNigerian kids recreate Money Heist scene
Ayò Bánkólé, founder of a Nigeria-based firm Bootcamp, faults the international attention on Nigeria alone.
“A lot of Nigerians are doing fantastic things all over the world, but they don’t get as much media mileage as the guys doing bad things. It affects all the guys doing legitimate stuff especially in the tech space,” he said.
“A lot of foreign companies don’t ship to Nigeria, many payment platforms don’t accept payments from us because it has ruined our image.”
In its internet crime report for 2019, the FBI said it had received more than 460,000 complaints of suspected cyber fraud, with losses of more than $3.5bn reported. More than $300m was recovered, it said.
However, many online fraudsters don’t get caught and even fewer end up going to jail.
Mr Donath says the cases are challenging because they happen overseas and tend to be quite sophisticated.
“They’re time-consuming, highly document-intensive, and in many federal criminal cases, you have the difficulty of walking a jury through a chronology of relevant facts,” said the partner at law firm Clifford Chance.
If convicted, Mr Abbas and Mr Ponle could be locked up for up to 20 years.
0 notes
jennifersnyderca90 · 6 years
Text
How Do You Fight a $12B Fraud Problem? One Scammer at a Time
The fraudsters behind the often laughable Nigerian prince email scams have long since branched out into far more serious and lucrative forms of fraud, including account takeovers, phishing, dating scams, and malware deployment. Combating such a multifarious menace can seem daunting, and it calls for concerted efforts to tackle the problem from many different angles. This post examines the work of a large, private group of volunteers dedicated to doing just that.
According to the most recent statistics from the FBI‘s Internet Crime Complaint Center, the most costly form of cybercrime stems from a complex type of fraud known as the “Business Email Compromise” or BEC scam. A typical BEC scam involves phony e-mails in which the attacker spoofs a message from an executive at a company or a real estate escrow firm and tricks someone into wiring funds to the fraudsters.
The FBI says BEC scams netted thieves more than $12 billion between 2013 and 2018. However, BEC scams succeed thanks to help from a variety of seemingly unrelated types of online fraud — most especially dating scams. I recently interviewed Ronnie Tokazowski, a reverse engineer at New York City-based security firm Flashpoint and something of an expert on BEC fraud.
Tokazowski is an expert on the subject thanks to his founding in 2015 of the BEC Mailing List, a private discussion group comprising more than 530 experts from a cross section of security firms, Internet and email providers and law enforcement agents that is dedicated to making life more difficult for scammers who perpetrate these schemes.
Earlier this month, Tokazowski was given the JD Falk award by the Messaging Malware Mobile Anti-Abuse Working Group (M3AAWG) for his efforts in building and growing the BEC List (loyal readers here may recognize the M3AAWG name: KrebsOnSecurity received a different award from M3AAWG in 2014). M3AAWG presents its JD Falk Award annually to recognize “a project that helps protect the internet and embodies a spirit of volunteerism and community building.”
Here are some snippets from our conversation:
Brian Krebs (BK): You were given the award by M3AAWG in part for your role in starting the BEC mailing list, but more importantly for the list’s subsequent growth and impact on the BEC problem as a whole. Talk about why and how that got started and evolved.
Ronnie Tokazowski (RT): The why is that there’s a lot of money being lost to this type of fraud. If you just look at the financial losses across cybercrime — including ransomware, banking trojans and everything else — BEC is number one. Something like 63 percent of fraud losses reported to the FBI are related to it.
When we started the list around Christmas of 2015, it was just myself and one FBI agent. When we had our first conference in May 2016, there were about 20 people attending to try to figure out how to tackle all of the individual pieces of this type of fraud.
Fast forward to today, and the group now has about 530 people, we’ve now held three conferences, and collectively the group has directly or indirectly contributed to over 100 arrests for people involved in BEC scams.
BK: What did you discover as the group began to coalesce?
RT: As we started getting more and more people involved, we realized BEC was much broader than just phishing emails. These guys actually maintain vast networks of money mules, technical and logistical infrastructure, as well as tons of romance scam accounts that they have to maintain over time.
BK: I want to ask you more about the romance scam aspect of BEC fraud in just a moment, because that’s one of the most fascinating cogs in this enormous crime machine. But I’m curious about what short-term goals the group set in identifying the individuals behind these extremely lucrative scams?
RT: We wanted to start a collaboration group to fight BEC, and really a big part of that involved just trying to social engineer the actors and get them to click on links that we could use to find out more about them and where they’re coming from.
BK: And where are they coming from? When I’ve written about BEC scams previously and found most of them trace back to criminals in Nigeria, people often respond that this is just a stereotype, prejudice, or over-generalization. What’s been your experience?
RT: Right. A lot of people think Nigeria is just a scapegoat. However, when we trace back phone numbers, IP addresses and language usage, the vast majority of that is coming out of Nigeria.
BK: Why do you think so much of this type of fraud comes out of Nigeria?
RT: Well, corruption is a big problem there, but also there’s this subculture where doing this type of wire fraud isn’t seen as malicious exactly. There’s not only a lot of poverty there, but also a very strong subculture there to support this type of fraud, and a lot of times these actors justify their actions by seeing it as attacking organizations, and not the people behind those organizations. I think also because they rationalize that individuals who are victimized will ultimately get their money back. But of course in a lot of cases, they don’t.
BK: Is that why so many of these Nigerian prince, romance and BEC scams aren’t exactly worded in proper English and tend to read kind of funny sometimes?
RT: While a lot of the scammers are typically from Nigeria, the people doing the actual spamming side typically come from a mix of other countries in the region, including Algeria, Morocco and Tunisia. And it’s interesting looking at these scams from a language perspective, because you have them writing in English that’s also influenced by [people who speak] French and Arabic. So that explains why the emails often are written in poor English whereas to them it seems normal.
BK: Let’s talk about the romance scams. How does online dating fraud fit into the BEC scam?
RT: [The fraudsters] will impersonate both men and women who are single, divorced or widowed. But their primary target is female widows who are active on social media sites.
BK: And in most of these cases the object of the phony affection is what? To create a relationship so that the other person feels comfortable accepting money or moving money on behalf of their significant other, right?
RT: Yes, they end up being recruited as money mules. Or maybe they’re groomed in order to set up a bank account for their lovers. We’ve dealt with multiple cases where we see a money mule account coming through and then look that person up on social media and quickly able to see they were friends with a clearly fake profile or a profile that we’ve already identified as a BEC scammer. So there is a very strong tie between these BEC scams and romance scams.
BK: Are all of the romance scam victims truly unwitting, do you think?
RT: With the mules who don’t one hundred percent know what they’re doing, they might be [susceptible to the suggestion] hey, could you open this account for me. The second type of mule can be on the payroll [of the scam organization] and getting a cut of the money for assisting in the wiring of money [to the fraudsters’ accounts.]
BK: I saw in one of your tweets you mentioned personally interacting with some of these BEC scammers.
RT: Yeah, a few weeks ago I was running a romance scammer who reached out and added me as a friend on Facebook. The story they were telling was that this person was a single mom with a kid aged 43 looking for companionship. By day 4 [of back and forth conversations] they were asking me to send them iTunes gift cards.
BK: Hah! So what happened then?
RT: I went to my local grocery store, which was all too willing to help. When you’re trying to catch scammers, it doesn’t cost the store a dime to give you non-activated iTunes gift cards.
BK: That sounds like fun. Beyond scamming the scammers to learn more about their operations and who they are, can you talk about what you and other members of the BEC working group have been trying to accomplish to strategically fight this kind of fraud?
RT: What we found was with BEC fraud it’s really hard to find ownership, because there’s no one entity that’s responsible for shutting it down. There are a lot of moving parts to the BEC scam, including lots of romance scam social media accounts, multiple email providers, and bank accounts tied to money mules that get pulled into these scams.
The feds get a lot of flack for not making arrests, the private sector gets criticized for not doing more, and a lot of people are placing the blame on social media for not doing more. But the truth is that in order to address BEC as a whole we all have to work together on that. It’s like the old saying: How do you eat an elephant? One bite at a time.
BK: So the primary goal of the group was to figure out ways to get better and faster at shutting down the resources used by these fraudsters?
RT: Correct. The main [focus] we set when starting this group was the sheer length of time it takes for law enforcement to put together a subpoena, which can take up to 30 days to process and get the requested information back that allows you to see who was logged into what account, when and from where. At the same time, these bad actors can stand up a bunch of new accounts each day. So the question was how do we figure out a good way to start whacking the email accounts and moving much faster than the subpoena process allows.
The overall goal of the BEC group has been to put everyone in the same room, [including] social media and email providers and security companies, so that we can attack this problem from all sides at once.
BK: I see. In other words, making it easier for companies that have a role to play to be proactive in shutting down resources that are used by the BEC scammers.
RT: Exactly. And so far we have helped to close hundreds of accounts, helped contribute directly or indirectly to dozens of arrests, and prevented millions of dollars in fraud.
BK: At the same time, this work must feel like a somewhat Sisyphean task. I mean, it costs the bad guys almost nothing to set up new accounts, and there seem to be no limit to the number of people participating in various aspects of these scams.
RT: That’s true, and even with 530 people from dozens of companies and organizations in this BEC working group now it sometimes doesn’t feel like we’re making enough of an impact. But the way I look at it is for each account we get taken down, that’s someone’s father or mother who’s not being scammed and losing their inheritance to a Nigerian scammer.
The one thing I’m proud of is we’ve now operated for three years and have had very few snafus. It’s been very cool to watch the amount of trust that organizations have put into this group and to be along for the ride there in seeing so many competitors actually working together.
———————————————————————————————————————————————–
Anyone interested in helping in the fight against BEC fraud and related scams should check out the Web site 419eater.com, which includes a ton of helpful resources for learning more. My favorite section of the site is the Letters Archive, which features often hilarious email threads between the scammers and “scam baiters” — volunteers dedicated to stringing the scammers along and exposing them publicly.
Related reading:
Business Email Compromise: Putting a Wisconsin Case Under the Microscope
Spy Service Exposes Nigerian Yahoo Boys
Yahoo Boys Have 419 Facebook Friends
Deleted Facebook Cybercrime Groups Had 300,000 Members
Where Did That Scammer Get Your Email Address?
from https://krebsonsecurity.com/2018/10/how-do-you-fight-a-12b-fraud-problem-one-scammer-at-a-time/
0 notes
nedsvallesny · 6 years
Text
How Do You Fight a $12B Fraud Problem? One Scammer at a Time
The fraudsters behind the often laughable Nigerian prince email scams have long since branched out into far more serious and lucrative forms of fraud, including account takeovers, phishing, dating scams, and malware deployment. Combating such a multifarious menace can seem daunting, and it calls for concerted efforts to tackle the problem from many different angles. This post examines the work of a large, private group of volunteers dedicated to doing just that.
According to the most recent statistics from the FBI‘s Internet Crime Complaint Center, the most costly form of cybercrime stems from a complex type of fraud known as the “Business Email Compromise” or BEC scam. A typical BEC scam involves phony e-mails in which the attacker spoofs a message from an executive at a company or a real estate escrow firm and tricks someone into wiring funds to the fraudsters.
The FBI says BEC scams netted thieves more than $12 billion between 2013 and 2018. However, BEC scams succeed thanks to help from a variety of seemingly unrelated types of online fraud — most especially dating scams. I recently interviewed Ronnie Tokazowski, a reverse engineer at New York City-based security firm Flashpoint and something of an expert on BEC fraud.
Tokazowski is an expert on the subject thanks to his founding in 2015 of the BEC Mailing List, a private discussion group comprising more than 530 experts from a cross section of security firms, Internet and email providers and law enforcement agents that is dedicated to making life more difficult for scammers who perpetrate these schemes.
Earlier this month, Tokazowski was given the JD Falk award by the Messaging Malware Mobile Anti-Abuse Working Group (M3AAWG) for his efforts in building and growing the BEC List (loyal readers here may recognize the M3AAWG name: KrebsOnSecurity received a different award from M3AAWG in 2014). M3AAWG presents its JD Falk Award annually to recognize “a project that helps protect the internet and embodies a spirit of volunteerism and community building.”
Here are some snippets from our conversation:
Brian Krebs (BK): You were given the award by M3AAWG in part for your role in starting the BEC mailing list, but more importantly for the list’s subsequent growth and impact on the BEC problem as a whole. Talk about why and how that got started and evolved.
Ronnie Tokazowski (RT): The why is that there’s a lot of money being lost to this type of fraud. If you just look at the financial losses across cybercrime — including ransomware, banking trojans and everything else — BEC is number one. Something like 63 percent of fraud losses reported to the FBI are related to it.
When we started the list around Christmas of 2015, it was just myself and one FBI agent. When we had our first conference in May 2016, there were about 20 people attending to try to figure out how to tackle all of the individual pieces of this type of fraud.
Fast forward to today, and the group now has about 530 people, we’ve now held three conferences, and collectively the group has directly or indirectly contributed to over 100 arrests for people involved in BEC scams.
BK: What did you discover as the group began to coalesce?
RT: As we started getting more and more people involved, we realized BEC was much broader than just phishing emails. These guys actually maintain vast networks of money mules, technical and logistical infrastructure, as well as tons of romance scam accounts that they have to maintain over time.
BK: I want to ask you more about the romance scam aspect of BEC fraud in just a moment, because that’s one of the most fascinating cogs in this enormous crime machine. But I’m curious about what short-term goals the group set in identifying the individuals behind these extremely lucrative scams?
RT: We wanted to start a collaboration group to fight BEC, and really a big part of that involved just trying to social engineer the actors and get them to click on links that we could use to find out more about them and where they’re coming from.
BK: And where are they coming from? When I’ve written about BEC scams previously and found most of them trace back to criminals in Nigeria, people often respond that this is just a stereotype, prejudice, or over-generalization. What’s been your experience?
RT: Right. A lot of people think Nigeria is just a scapegoat. However, when we trace back phone numbers, IP addresses and language usage, the vast majority of that is coming out of Nigeria.
BK: Why do you think so much of this type of fraud comes out of Nigeria?
RT: Well, corruption is a big problem there, but also there’s this subculture where doing this type of wire fraud isn’t seen as malicious exactly. There’s not only a lot of poverty there, but also a very strong subculture there to support this type of fraud, and a lot of times these actors justify their actions by seeing it as attacking organizations, and not the people behind those organizations. I think also because they rationalize that individuals who are victimized will ultimately get their money back. But of course in a lot of cases, they don’t.
BK: Is that why so many of these Nigerian prince, romance and BEC scams aren’t exactly worded in proper English and tend to read kind of funny sometimes?
RT: While a lot of the scammers are typically from Nigeria, the people doing the actual spamming side typically come from a mix of other countries in the region, including Algeria, Morocco and Tunisia. And it’s interesting looking at these scams from a language perspective, because you have them writing in English that’s also influenced by [people who speak] French and Arabic. So that explains why the emails often are written in poor English whereas to them it seems normal.
BK: Let’s talk about the romance scams. How does online dating fraud fit into the BEC scam?
RT: [The fraudsters] will impersonate both men and women who are single, divorced or widowed. But their primary target is female widows who are active on social media sites.
BK: And in most of these cases the object of the phony affection is what? To create a relationship so that the other person feels comfortable accepting money or moving money on behalf of their significant other, right?
RT: Yes, they end up being recruited as money mules. Or maybe they’re groomed in order to set up a bank account for their lovers. We’ve dealt with multiple cases where we see a money mule account coming through and then look that person up on social media and quickly able to see they were friends with a clearly fake profile or a profile that we’ve already identified as a BEC scammer. So there is a very strong tie between these BEC scams and romance scams.
BK: Are all of the romance scam victims truly unwitting, do you think?
RT: With the mules who don’t one hundred percent know what they’re doing, they might be [susceptible to the suggestion] hey, could you open this account for me. The second type of mule can be on the payroll [of the scam organization] and getting a cut of the money for assisting in the wiring of money [to the fraudsters’ accounts.]
BK: I saw in one of your tweets you mentioned personally interacting with some of these BEC scammers.
RT: Yeah, a few weeks ago I was running a romance scammer who reached out and added me as a friend on Facebook. The story they were telling was that this person was a single mom with a kid aged 43 looking for companionship. By day 4 [of back and forth conversations] they were asking me to send them iTunes gift cards.
BK: Hah! So what happened then?
RT: I went to my local grocery store, which was all too willing to help. When you’re trying to catch scammers, it doesn’t cost the store a dime to give you non-activated iTunes gift cards.
BK: That sounds like fun. Beyond scamming the scammers to learn more about their operations and who they are, can you talk about what you and other members of the BEC working group have been trying to accomplish to strategically fight this kind of fraud?
RT: What we found was with BEC fraud it’s really hard to find ownership, because there’s no one entity that’s responsible for shutting it down. There are a lot of moving parts to the BEC scam, including lots of romance scam social media accounts, multiple email providers, and bank accounts tied to money mules that get pulled into these scams.
The feds get a lot of flack for not making arrests, the private sector gets criticized for not doing more, and a lot of people are placing the blame on social media for not doing more. But the truth is that in order to address BEC as a whole we all have to work together on that. It’s like the old saying: How do you eat an elephant? One bite at a time.
BK: So the primary goal of the group was to figure out ways to get better and faster at shutting down the resources used by these fraudsters?
RT: Correct. The main [focus] we set when starting this group was the sheer length of time it takes for law enforcement to put together a subpoena, which can take up to 30 days to process and get the requested information back that allows you to see who was logged into what account, when and from where. At the same time, these bad actors can stand up a bunch of new accounts each day. So the question was how do we figure out a good way to start whacking the email accounts and moving much faster than the subpoena process allows.
The overall goal of the BEC group has been to put everyone in the same room, [including] social media and email providers and security companies, so that we can attack this problem from all sides at once.
BK: I see. In other words, making it easier for companies that have a role to play to be proactive in shutting down resources that are used by the BEC scammers.
RT: Exactly. And so far we have helped to close hundreds of accounts, helped contribute directly or indirectly to dozens of arrests, and prevented millions of dollars in fraud.
BK: At the same time, this work must feel like a somewhat Sisyphean task. I mean, it costs the bad guys almost nothing to set up new accounts, and there seem to be no limit to the number of people participating in various aspects of these scams.
RT: That’s true, and even with 530 people from dozens of companies and organizations in this BEC working group now it sometimes doesn’t feel like we’re making enough of an impact. But the way I look at it is for each account we get taken down, that’s someone’s father or mother who’s not being scammed and losing their inheritance to a Nigerian scammer.
The one thing I’m proud of is we’ve now operated for three years and have had very few snafus. It’s been very cool to watch the amount of trust that organizations have put into this group and to be along for the ride there in seeing so many competitors actually working together.
———————————————————————————————————————————————–
Anyone interested in helping in the fight against BEC fraud and related scams should check out the Web site 419eater.com, which includes a ton of helpful resources for learning more. My favorite section of the site is the Letters Archive, which features often hilarious email threads between the scammers and “scam baiters” — volunteers dedicated to stringing the scammers along and exposing them publicly.
Related reading:
Business Email Compromise: Putting a Wisconsin Case Under the Microscope
Spy Service Exposes Nigerian Yahoo Boys
Yahoo Boys Have 419 Facebook Friends
Deleted Facebook Cybercrime Groups Had 300,000 Members
Where Did That Scammer Get Your Email Address?
from Technology News https://krebsonsecurity.com/2018/10/how-do-you-fight-a-12b-fraud-problem-one-scammer-at-a-time/
0 notes
amberdscott2 · 6 years
Text
How Do You Fight a $12B Fraud Problem? One Scammer at a Time
The fraudsters behind the often laughable Nigerian prince email scams have long since branched out into far more serious and lucrative forms of fraud, including account takeovers, phishing, dating scams, and malware deployment. Combating such a multifarious menace can seem daunting, and it calls for concerted efforts to tackle the problem from many different angles. This post examines the work of a large, private group of volunteers dedicated to doing just that.
According to the most recent statistics from the FBI‘s Internet Crime Complaint Center, the most costly form of cybercrime stems from a complex type of fraud known as the “Business Email Compromise” or BEC scam. A typical BEC scam involves phony e-mails in which the attacker spoofs a message from an executive at a company or a real estate escrow firm and tricks someone into wiring funds to the fraudsters.
The FBI says BEC scams netted thieves more than $12 billion between 2013 and 2018. However, BEC scams succeed thanks to help from a variety of seemingly unrelated types of online fraud — most especially dating scams. I recently interviewed Ronnie Tokazowski, a reverse engineer at New York City-based security firm Flashpoint and something of an expert on BEC fraud.
Tokazowski is an expert on the subject thanks to his founding in 2015 of the BEC Mailing List, a private discussion group comprising more than 530 experts from a cross section of security firms, Internet and email providers and law enforcement agents that is dedicated to making life more difficult for scammers who perpetrate these schemes.
Earlier this month, Tokazowski was given the JD Falk award by the Messaging Malware Mobile Anti-Abuse Working Group (M3AAWG) for his efforts in building and growing the BEC List (loyal readers here may recognize the M3AAWG name: KrebsOnSecurity received a different award from M3AAWG in 2014). M3AAWG presents its JD Falk Award annually to recognize “a project that helps protect the internet and embodies a spirit of volunteerism and community building.”
Here are some snippets from our conversation:
Brian Krebs (BK): You were given the award by M3AAWG in part for your role in starting the BEC mailing list, but more importantly for the list’s subsequent growth and impact on the BEC problem as a whole. Talk about why and how that got started and evolved.
Ronnie Tokazowski (RT): The why is that there’s a lot of money being lost to this type of fraud. If you just look at the financial losses across cybercrime — including ransomware, banking trojans and everything else — BEC is number one. Something like 63 percent of fraud losses reported to the FBI are related to it.
When we started the list around Christmas of 2015, it was just myself and one FBI agent. When we had our first conference in May 2016, there were about 20 people attending to try to figure out how to tackle all of the individual pieces of this type of fraud.
Fast forward to today, and the group now has about 530 people, we’ve now held three conferences, and collectively the group has directly or indirectly contributed to over 100 arrests for people involved in BEC scams.
BK: What did you discover as the group began to coalesce?
RT: As we started getting more and more people involved, we realized BEC was much broader than just phishing emails. These guys actually maintain vast networks of money mules, technical and logistical infrastructure, as well as tons of romance scam accounts that they have to maintain over time.
BK: I want to ask you more about the romance scam aspect of BEC fraud in just a moment, because that’s one of the most fascinating cogs in this enormous crime machine. But I’m curious about what short-term goals the group set in identifying the individuals behind these extremely lucrative scams?
RT: We wanted to start a collaboration group to fight BEC, and really a big part of that involved just trying to social engineer the actors and get them to click on links that we could use to find out more about them and where they’re coming from.
BK: And where are they coming from? When I’ve written about BEC scams previously and found most of them trace back to criminals in Nigeria, people often respond that this is just a stereotype, prejudice, or over-generalization. What’s been your experience?
RT: Right. A lot of people think Nigeria is just a scapegoat. However, when we trace back phone numbers, IP addresses and language usage, the vast majority of that is coming out of Nigeria.
BK: Why do you think so much of this type of fraud comes out of Nigeria?
RT: Well, corruption is a big problem there, but also there’s this subculture where doing this type of wire fraud isn’t seen as malicious exactly. There’s not only a lot of poverty there, but also a very strong subculture there to support this type of fraud, and a lot of times these actors justify their actions by seeing it as attacking organizations, and not the people behind those organizations. I think also because they rationalize that individuals who are victimized will ultimately get their money back. But of course in a lot of cases, they don’t.
BK: Is that why so many of these Nigerian prince, romance and BEC scams aren’t exactly worded in proper English and tend to read kind of funny sometimes?
RT: While a lot of the scammers are typically from Nigeria, the people doing the actual spamming side typically come from a mix of other countries in the region, including Algeria, Morocco and Tunisia. And it’s interesting looking at these scams from a language perspective, because you have them writing in English that’s also influenced by [people who speak] French and Arabic. So that explains why the emails often are written in poor English whereas to them it seems normal.
BK: Let’s talk about the romance scams. How does online dating fraud fit into the BEC scam?
RT: [The fraudsters] will impersonate both men and women who are single, divorced or widowed. But their primary target is female widows who are active on social media sites.
BK: And in most of these cases the object of the phony affection is what? To create a relationship so that the other person feels comfortable accepting money or moving money on behalf of their significant other, right?
RT: Yes, they end up being recruited as money mules. Or maybe they’re groomed in order to set up a bank account for their lovers. We’ve dealt with multiple cases where we see a money mule account coming through and then look that person up on social media and quickly able to see they were friends with a clearly fake profile or a profile that we’ve already identified as a BEC scammer. So there is a very strong tie between these BEC scams and romance scams.
BK: Are all of the romance scam victims truly unwitting, do you think?
RT: With the mules who don’t one hundred percent know what they’re doing, they might be [susceptible to the suggestion] hey, could you open this account for me. The second type of mule can be on the payroll [of the scam organization] and getting a cut of the money for assisting in the wiring of money [to the fraudsters’ accounts.]
BK: I saw in one of your tweets you mentioned personally interacting with some of these BEC scammers.
RT: Yeah, a few weeks ago I was running a romance scammer who reached out and added me as a friend on Facebook. The story they were telling was that this person was a single mom with a kid aged 43 looking for companionship. By day 4 [of back and forth conversations] they were asking me to send them iTunes gift cards.
BK: Hah! So what happened then?
RT: I went to my local grocery store, which was all too willing to help. When you’re trying to catch scammers, it doesn’t cost the store a dime to give you non-activated iTunes gift cards.
BK: That sounds like fun. Beyond scamming the scammers to learn more about their operations and who they are, can you talk about what you and other members of the BEC working group have been trying to accomplish to strategically fight this kind of fraud?
RT: What we found was with BEC fraud it’s really hard to find ownership, because there’s no one entity that’s responsible for shutting it down. There are a lot of moving parts to the BEC scam, including lots of romance scam social media accounts, multiple email providers, and bank accounts tied to money mules that get pulled into these scams.
The feds get a lot of flack for not making arrests, the private sector gets criticized for not doing more, and a lot of people are placing the blame on social media for not doing more. But the truth is that in order to address BEC as a whole we all have to work together on that. It’s like the old saying: How do you eat an elephant? One bite at a time.
BK: So the primary goal of the group was to figure out ways to get better and faster at shutting down the resources used by these fraudsters?
RT: Correct. The main [focus] we set when starting this group was the sheer length of time it takes for law enforcement to put together a subpoena, which can take up to 30 days to process and get the requested information back that allows you to see who was logged into what account, when and from where. At the same time, these bad actors can stand up a bunch of new accounts each day. So the question was how do we figure out a good way to start whacking the email accounts and moving much faster than the subpoena process allows.
The overall goal of the BEC group has been to put everyone in the same room, [including] social media and email providers and security companies, so that we can attack this problem from all sides at once.
BK: I see. In other words, making it easier for companies that have a role to play to be proactive in shutting down resources that are used by the BEC scammers.
RT: Exactly. And so far we have helped to close hundreds of accounts, helped contribute directly or indirectly to dozens of arrests, and prevented millions of dollars in fraud.
BK: At the same time, this work must feel like a somewhat Sisyphean task. I mean, it costs the bad guys almost nothing to set up new accounts, and there seem to be no limit to the number of people participating in various aspects of these scams.
RT: That’s true, and even with 530 people from dozens of companies and organizations in this BEC working group now it sometimes doesn’t feel like we’re making enough of an impact. But the way I look at it is for each account we get taken down, that’s someone’s father or mother who’s not being scammed and losing their inheritance to a Nigerian scammer.
The one thing I’m proud of is we’ve now operated for three years and have had very few snafus. It’s been very cool to watch the amount of trust that organizations have put into this group and to be along for the ride there in seeing so many competitors actually working together.
———————————————————————————————————————————————–
Anyone interested in helping in the fight against BEC fraud and related scams should check out the Web site 419eater.com, which includes a ton of helpful resources for learning more. My favorite section of the site is the Letters Archive, which features often hilarious email threads between the scammers and “scam baiters” — volunteers dedicated to stringing the scammers along and exposing them publicly.
Related reading:
Business Email Compromise: Putting a Wisconsin Case Under the Microscope
Spy Service Exposes Nigerian Yahoo Boys
Yahoo Boys Have 419 Facebook Friends
Deleted Facebook Cybercrime Groups Had 300,000 Members
Where Did That Scammer Get Your Email Address?
from Amber Scott Technology News https://krebsonsecurity.com/2018/10/how-do-you-fight-a-12b-fraud-problem-one-scammer-at-a-time/
0 notes
newssplashy · 6 years
Link
With ''Yung Denzel'', MI Abaga proves that he is human afterall, as he allows his listeners into a theraupetic session of his mind state.
MI Abaga has officially released his ''Yung Denzel'' album and here is our first listen take of the project.
There is so much excitement following the release of MI's eight studio project in the early hours of Friday, August 24. MI is debated as the greatest Nigerian rapper ever, but some argue that he no longer plays at the level he did when he released his first set of projects.
This album which he tags 'A Study on Self Worth' is supposed to be a defining one, one where he sheds his scales and allows his vulnerabilty as a human take center stage.
MI talks a big game and executive producing three projects in three weeks under the LAMB August tag is a move he believes will kickstart another glorious run in the history of Nigerian hip-hop
Yung Denzel boasts of 10 tracks and feature guest acts like Tay Iwar, Cina Soul, Niyola, Odunsi the Engine, Patricxxlee and Lady Donli.
Here is our track-by-track first listen take of the project.
'Do you know who you are'? ft Tay Iwar
The song opens with Tay Iwar's soothing vocals, this is enchanting, the drums are building slowly underneath as he asks where is your worth?
MI is rapping, he is philosophical, the second verse is asking intriguing questions, pointing a finger at the Black man.
A voice is speaking, touching on two major issues; an identity crisis and psychological hopelessness.
''Until we hate racism more than we hate each other, nothing is going to change'', the voice says. This is a therapy session, MI is talking, there is a female voice talking back.
He uses this 4minutes 54 seconds long first track to perfectly lay the template for the direction the project has been geared.
'Last Night I Had A Dream About A Hummingbird'
Next is the shortest song on the project.
Again there is a voice talking, this time touching on comparing yourself, 'I don't have anything to prove to anyone, he says' and that is where MI is at with his career.
MI is in the zone with his rhyming, the instrumentation takes a back seat, as he champions ignoring those who haven't done anything with their lives, then the beat kicks in, but just as you sit back to enjoy more, the song draws to a close. This one really needed the second verse.
The female voice is back.
 'Another Thing, Do Not Be A Groupie'
Ok, this sounds interesting, MI is shooting off the blocks, this time he is addressing the industry.
''For Niggas to get ahead, they giving cunning lings''. Already my favourite track, he is not just rapping, this is grown man rap, the beat is also doing something insane behind his voice, damn. I love this.
We get another verse, he is touching on those jumping from labels this time, oh he is boasting about the achievements of Chocolate City in the last ten years, even though I don't agree with some of the years he mentioned, how can you argue with a fire song man?
This is fine form MI, aka 'talk-the-talk MI', aka 'my-team-is-bigger-than-you MI', aka 'I-may-be-4-feet but imma-dunk-on you' MI, aka 'I am running out of akas to give to this fire joint', damn.
'Stop! Never Second Guess Yourself' featuring Cina Soul
This is the trappy MI that surfaced on Rendezvous, this time he is speaking on self-confidence, there is so much here to remind you of Kendrick Lamar, what in the world is Cina Soul doing?
Her vocals are working wonders to my ears. Therapy session continues, I kinda like this session, 'somewhere in your life, you have experienced abandonment'. Apt.
You Are Like Melody, My Heart Skips A Beat ft Lorraine Chia
This is his softer side, the lover boy side to his persona, but Lorraine Chia is the real star of this track.
'+-' featuring Odunsi x Lady Donli
MI teams up with two of the leading crop of new talents in Odunsi and Lady Donli, he had previously worked with the former on his Rendezvous playlist and the outcome definitely deserves an encore.
'Positive, Negative' is a journey from when he started rapping, the delivery is sharp, a few corny lines, but Odunsi is doing his thing especially when he switches to pidgin. The second verse is all about positive vibes as he dares you to skip to the next song if you don't like his flows. Odunsi is back, the hook sure bangs, Donli brings it home.
'I Believe In You, You Should Too, Believe In You'
The bubbly trap flow is back as he encourages you to believe in yourself, he is bragging again, talking about how he has been here for 10 years, the flow is switched up, he is name dropping himself among the greats.
There is aggression to his voice, finality to his words like he is trying to knock the full impact of what he is saying into your thoughts. Another heavy record.
'The Self Evaluation of Yxng Denzel' featuring Niyola
MI teams up with another OG, one who actually has been in the game longer than him in Niyola, as the former Da Trybe affiliate makes a return after a long absence.
The song starts with vocals from MI's mother, issuing words of advice to her son. Then MI follows with his 'dark, twisted, real fantasies' as all he wants to do is, 'drink, f***, smoke, chill, party all day'.
He admits his fanbase cannot afford to know about it, he is talking about depression, and emptiness despite the money and fame.
MI admits to so many things on this song and Niyola provides the right shoulders for him to lean on with her soothing voice.
'Love Never Fails...' featuring Tay Iwar x Patrickxxlee
Patrickxxlee first caught my attention with his impressive project, Disco Utopia released in 2016. He also featured on Ice Prince's C.O.L.D earlier in the year and has been earning his stripes on the scene.
MI allows the youngins flourish on this they talk about someone wanting to kill herself, is that MI singing? Yes MI is bringing the vocals on this one, Tay is killing this, as they bring the whole project to a full circle.
Final Take
MI bragged about it and he successfully delivered an upfront rap album worth its hype.
Yxng Denzel is unguarded music, there is clarity in what he aims to achieve and the mood is compared to something graceful and mind-blowing.
This is a filler-free album as every song earns its place on the project. The project's minor failings come in the form of the stretched dialogues on most of the songs, but if you can look at the project less as your regular album and more as a man allowing you into his world, then it makes it more understandable.
Looking at how MI has grown since his come up, seeing the hunger he exhibited on his first album, ''Talk About It'', his evolving in subsequent projects, and the position he now holds, not just as a matured rapper but an executive, it is fair to say this heartfelt project is arguably his best offering in a long while.
Yxng Denzel is a water tight project, a matured statement of his experiences,  and one that is well conceived, thoroughly executed and perfectly served to cater for both his young and old fans.
Rating: 4/5
Ratings
1-Dull 2-Boring 2.5-Average 3-Worth Checking Out 3.5-Hot 4-Smoking Hot 4.5-Amazing 5-Perfection
via Nigerian News ➨☆LATEST NIGERIAN NEWS ☆➨GHANA NEWS➨☆ENTERTAINMENT ☆➨Hot Posts ➨☆World News ☆➨News Sp
0 notes
tech-tonics · 6 years
Text
Five easy ways to recognize and dispose of malicious emails
By Pieter Arntz from the Malwarebytes Labs.
I suppose we all get our share of spam. Some more than others. But how do we differentiate between simple commercial spam and the types of emails that want to get us in trouble?
The unsolicited commercial spam email is generally easy to recognize, report, and discard, but what about more dangerous types of spam? How can you determine if an email contains a malicious link or attachment, or is trying to scam you out of money or your personal information?
And if you do discover you have malicious emails in your inbox, what then? Is reporting as spam and deleting the email enough?
Knowing what you are up against helps you determine what to do with all that spam—whether it’s simply a nuisance or a landmine waiting to detonate.
Five red flags for spotting malicious emails
Before we jump into determining what to do with a malicious email, there are a few general tricks users should learn to spot red flags for malicious activity. They are as follows:
1. The sender address isn’t correct.
Check if this address matches the name of the sender and whether the domain of the company is correct. To see this, you have to make sure your email client displays the sender’s email address and not just their display name. Sometimes you need to train hawk eyes at the address, since spammers have some convincing tricks up their sleeve. For example:
In this example sender’s address, the email domain does not match the actual bank’s domain, which is santander.co.uk.
2. The sender doesn’t seem to know the addressee.
Is the recipient name spelled out in the email, and are you being addressed as you would expect from the sender? Does the signature match how this sender would usually sign their mails to you? Your bank usually does not address you in generic ways like “Dear customer.” If the email is legit and clearly intended for you, then they will use your full name.
This one is not only in the wrong language, but it is addressed to no one in particular, and is not signed with an employee name you could contact for further information.
3. Embedded links have weird URLs.
Always hover first over the links in the email. Do not click immediately. Does the destination URL match the destination site you would expect? (Once again, train those eagle eyes.) Will it download a file? Are they using a link shortening service? When in doubt, if you have a shortcut to the site of the company sending you the email, use that method instead of clicking the link in the email.
When I hover over “Apply Now,” does that link look like something VISA would use?
4. The language, spelling, and grammar are “off.”
Is the email full of spelling errors, or does it look like someone used an online translation service to translate the mail to your language?
Does this look like it came from a native English speaker? In fact, it was a very intricate phishing attempt.
5. The content is bizarre or unbelievable.
If it is too good to be true, it probably isn’t true. People with lost relatives that leave you huge estates or suitcases full of dollars in some far-away country are not as common as these scammers would have us believe. You can recognize when email spam is trying to phish for money by its promises to deliver great gain in return for a small investment. For historical reasons, we call this type of spam “Nigerian prince” or “419” spam.
Part of a long and entertaining mail about how the FBI is investigating a Facebook promo where you won US$10,000,000.
So is it really malicious?
Please note that you need to weigh all the elements above if you want to rule them out as spam or malicious. Each of them is a red flag by itself—even if the other elements look legitimate. And, even if all of the above red flags have been cross-checked and determined as sound, that doesn’t rule out the possibility of the email still being malicious.
Sender addresses can be spoofed, signatures can be stolen or mimicked, domains can be typosquatted, accounts can be hacked, and the spelling and translation services among spammers are improving rapidly, as spammers have noticed that it improves their success rate. It’s also not always immediately clear from the content if the email is spam, scam, or bona fide truth. Some malspam authors have shown great creativity in coming up with believable stories to tell.
So when all else checks out but your gut tells you something is off, there are other edicts to keep in mind when determining whether an email could be misleading.
Companies just don’t do this.
Reputable banks do not send you unsolicited mails asking for credentials, they do not use link shortening services, and they will certainly not ask you to send your credit or debit card to them by (snail) mail. The IRS and Microsoft will not email you to tell you that you owe them money or that your computer has a virus. There are certain things that organizations just will not do—but threat actors like to fool users by seeming to come from a legitimate, scary company.
There are attachments.
First and foremost: do not, under any circumstances, open any attachments that you were not expecting. It’s as easy as that. If you receive an attachment without forewarning from a company or individual that you do not know, do not double-click on it. If it’s from a friend, acquaintance, or company that you do business with, it is necessary to check with the sender to see if it is safe to open the attachment.
There’s a call-to-action button.
Some dangerous spam emails do not come with malicious attachments but instead try to trick you into downloading a malicious file, courtesy of the call-to-action button. This button is simply a fancy embedded link that is meant to draw eyes and clicks. You can examine the call-to-action button in the same way you do links—by hovering over it. If you’re not sure, check with the sender and/or simply delete the email.
They are phishing for information.
Another type of dangerous spam is the type that phishes for information. This information does not necessarily have to concern you directly; it can be about the company you work for or someone you know well. Password credentials and credit card numbers aren’t the only data threat actors look to steal via malicious email. Always be cautious, always stay suspicious, until you can verify that the person requesting this information is who they say they are.
What to do with a suspected malicious email
The answer to this is quite simple: delete the email. You can ignore it and let it fester in your inbox or you can get rid of it and send it to trash, where it will be permanently dumped from your email client in a set amount of time. You may also want to report the email as spam before you delete—most email platforms have this functionality built in, and some are better than others are tracking and blocking these types of emails. Reporting the malicious email as spam will not hurt—if anything, it’s giving your email client important intel in the fight against malspam and can keep future similar emails coming to bother you again.
Finally, many banks and other financial companies have a special email address where you can send emails that you suspect to be phishing attempts. They will thank you if you are right about your suspicion. If you’re wrong and it is from them, they might consider changing their email practices to be less spammy.
Safe practices when receiving mail
If you want to be proactive against malicious emails, there are some tips and tools we recommend that will give you the opportunity to safely perform all the checks we have recommended earlier on. This includes changing some default settings in your email client (though yours may already have them in place by default.) Our recommendations are as follows:
“Disable HTML” or “Read in plain text”: This lessens the chance of malicious scripts being executed as soon as you open the email. If you don’t want to disable HTML, then we would recommend closing the preview window. That will allow you to delete suspect emails from your inbox before giving them a chance to do any harm.
Make sure you can see the full URL when you hover over a link in an email message. This is built into in most email clients by default. But if it’s not, we highly recommend enabling it.
Make sure you can see the full email address of the sender when you first look at it. This is one of the main indicators that something might be “phishy.”
If you have the option to use a spam filter, please use it. It will stop big waves of known spam. It does not make you completely safe, but it saves you a lot of work.
We have said this before, but it’s really important: Please do not open any attachments that you weren’t expecting. The old misconception that only executable attachments can harm you is not true. Documents, PDFs, and other attachments are just as potentially dangerous.
If you are still unsure whether an email is malicious or just regular spam after checking all the points we stipulated, simply delete the email and go about your day.
If the email contains information you think could be important if legitimate, however, contact the sender in any other way besides using the “reply” option. For example, if it’s your bank, give them a call and ask if they really sent you something and whether it’s safe to open. Chances are, they didn’t—and they’ll be glad you reported the scoundrels for using their name.
Credits
Thanks to My Online Security for providing me with examples and screenshots. You can find his blog with many, many examples of phishing mails at myonlinesecurity.co.uk.
0 notes
olaluwe · 7 years
Link
Comedian, Jephthah Bowoto, aka Akpororo, speaks with OLUSHOLA RICKETTS, about his rise from humble beginnings, marriage, Yung6ix, and other things. Was the turnout at your show, Akpororo vs Akpororo, what you expected? I had a sold-out show, and I was so happy. I am preparing for next year, which will be the fifth edition. We bless God for the turnout this year and for making it a success. I must confess that this year has been good for me and you can see that yourself too. You can see that I am moving forward. Do you have plans to venture into movies like some of your colleagues? I would love to go into acting fully, but the job has to be good. If the scripts I get are good and the money is okay, nothing stops me from acting. The truth is, many directors have approached me, but I am usually not okay with the money they offer. I wouldn’t take an acting job if it is not worth it. We all know that acting is time-consuming. You seem to be a good dancer; why did you settle for comedy? Yes, I dance quite well, but I have never thought of being a professional dancer. While growing up in Warri, Delta State, I went for competitions. I was very young then, my mother was always with me. I love dancing and it is even part of my craft as a comedian. You can see that I dance a lot on stage while performing. If I decide to take dance seriously now, I will still do well with it. My wife also dances well and it is certain that we must learn from each other. In the near future, I plan to dance with my wife on stage during my annual show. Did you ask your wife to stop dancing after you got married to her? Every man has what he wants or likes. Before we got married, we discussed how to live as husband and wife, and I don’t need to share what we agreed to with the public. How would you describe your marital experience so far? We have been married for two years and we are still growing. I am grateful to God for seeing us through. When I look back, it seems like it was just yesterday that we got married. As I pray for a happy home, my wife prays too because we all want the best. I am happy that I have a home now. When you cross the bridge with the right person, you will be very happy. For how long did you know your wife before you got married? We had known each other for many years. Before we started dating, I was already a friend to her family; I mean the Xplicit Dance Group. You know she is a dancer. Though I liked her from the outset, I didn’t show interest early because a colleague claimed they had something together. But three years ago, I knew I wanted to get married and I made my intention known to her. I let her know that I wanted her for marriage; I didn’t even know she was thinking of marriage too at that point. For someone who is into entertainment, I think the best thing is to marry a woman who can stay at home. I know some entertainers don’t mind getting married to someone in the same industry. Different things work for different people, but we should always pray to God for direction.  Is it true that your wife is an orphan? My wife’s father is still alive. But her mother handed my wife and her brother over to the founder of Xplicit Dance Group, Mr. David Abraham, when they were little. The mother did that because of certain things I am not at liberty to discuss. She is no more now, but the reason she asked Mr. David to be their guardian was more of a domestic issue and she felt they would do well with him. They were four children and she needed to keep them safe. When I first met them too, I thought they were all orphans. So, I don’t blame anyone who thinks she is an orphan. Why did you choose to build your house in the Okokomaiko area of Lagos? I have my privacy because I have my own house now. I tell people that if you like what you see in Lekki, Magodo or Victoria Island, you can recreate it wherever you stay. That is what I did. Okokomaiko is not a place you should be afraid of living. Even in Lekki that we think is a place for the rich alone, there are some parts of the area that are not nice.I was born on the streets, so I cannot be harassed. I walk freely without fear. I also go to the field to play football with friends in the evening. The reason bad things happen to people is that their minds are full of evil. My belief is that anything you think of would come to pass in your life. In anything I do in life, I always look at the positive side. Why don’t you want to live in Lekki or any other highbrow area? Okokomaiko is where I choose to live; it is my plan. If God asks me to move, I will surely move. For now, this is where I love and I believe being in the area gives hope to people. I organise a monthly programme tagged, Street Praise, where we come together to praise and thank God. We dance and encourage each other. I just love the place. I feel there is something about that area that makes people work hard. I am not interested in living in Lekki or Magodo for now. When the time comes, I will go there. Why didn’t you address the allegations that your wife was promiscuous while in the university? I am an entertainer, so I didn’t need to reply them. I am not normally a man to bear grudges. I have spoken about it in the form of a joke and I have moved on. Being silent has really helped me. If you followed the story well; at the end of the day, I won. Though I didn’t talk, my fans later replied them. Yung6ix is my friend, we are not fighting. The problem was that the so-called DJ wanted to take it to another level, which was not needed. That should tell you that I am a God-fearing person. If I like fighting, I would have taken it up with the DJ. But I don’t have that time. Have you made peace with Yung6ix? If you watch the second part of the video, you will know that I meant no harm to him. It was just a joke. When the second part was released, everyone calmed down. I believe the media also aggravated everything. If the media wants to scatter things, it costs them nothing. And if the media wants to arrange things, it costs nothing too. As an entertainer, you have to understand this. So, anytime they scatter it, you stand firm and whenever they build it again, you are there as well. A good name is better than riches and that is the legacy I am trying to maintain. I want to help the people around me. I understand that one cannot be good in the eyes of everyone, but I always try to give my best. How are your parents? They are fine. I don’t just fancy the idea of sharing certain things on social media. Yes, I am an entertainer, but I choose to keep some things about me private. My parents are based in Warri, Delta State. How many siblings do you have? I am the eldest of five children. I have a brother who is a DJ and rapper; he is doing well in Warri. My mother’s brother, known as Oga Prince, is a comedian too. He performed at my last show. He is funny, so people should get ready for him. Is it true that Nigerian comedians are divided? Is it true that Nigerian comedians are divided? I don’t belong to any caucus. I am on my own. Akpororo is a friend to all. I don’t think there are caucuses because everyone in the industry gives me jobs. What would you have ventured into if not comedy? I might have been a musician or footballer. If I didn’t do music, I would have pursued a career in football. I took football seriously before, but there was no one to sponsor me. I just had to leave it, but I still play football for fun. Source: Linda Ikeji’s blog
0 notes
allmyotps1 · 7 years
Text
darkcocosb:
empirestatesugar-deactivated201:
Invent fake facts about yourself. Create an email address specifically for sugaring and only email them there. Get the Google Voice App and create a phone number to text/call men from distinct from your own. Use a fake name for the first few dates. List the next town over as your location on your profile and never tell them the actual college that you go to — especially if it’s small! If they ask what your parents do for a living, make it up or be vague. Once you’re super comfortable with them, you can tell them “Oh my name’s actually Katherine, not Katelynn” or even give them your real phone number if you want to as I often snapchat with NASA. But he’s the only one of my SDs who knows it as Google Voice works flawlessly and the others don’t really need it.
On an opposite note, get as many details as possible about him from him or through background searching. If he tells you he’s the CEO of Apple, go to Apple’s website and confirm that. Also, invest in a Spokeo Account. Don’t be that annoying SB who begs girls to look men up for her. A lot of girls only buy the monthly plan which has a search quota so if these girls are kindly looking men up for you, that’s less POTs they can search for themselves. I think it’s like $49.95 per year and it’s well worth the money for the amount of information it gives you. You can reverse search his phone number, email, name, etc. to find out his address, income, family members — anything! I love to find their children’s names then look them up on Facebook to see how they live. Riding horses on vacation in Santorini as your cover photo? Okay, I’ll break bread with your dad tomorrow. Little Ashley’s making duck faces and wearing Abercrombie? Sorry, John, I’m actually no longer searching for an SD — best of luck!
Get as many photos as possible (5+) from a man you’re talking to so that you can reverse search them and find out company info, criminal history, or if he’s on any other sites to cross-check age, location, and other facts on the profile you first saw him on.
Before a first meet, Skype with him (for 5 to 30 minutes) to again make sure the photos he sent are of him and not some handsome model on JCrew’s website (guys on SD4M do this all the time — you’re not slick)! While you don’t want the skype date to replace the first date, it is a good way to keep and/or build up his interest and by revealing yourself in 3D and decreasing his chances of cancelling/flaking on you. New SDs in particular often get nervous by the whole process, especially if they’re married, so if he sees “Wow! She’s gorgeous/real/funny/witty/ and excited to see me Thursday!” he’ll be more at ease not only to go through with the meet, but to spend more chedda. Moreover, a Skype date can show you “Wow! He’s an asshole and begging me to slide the camera down to my boobs.” So you can know way before you spend hours on hair and make-up that the date will be a waste.
Need for discretion. If a man doesn’t tell you much about himself, his job, or his life, is using a GV number or a fake email, is going by a fake name, it does not matter at all. 9 times out of 10 I show up to POT dates knowing the results of their latest colonoscopy while they think I don’t even know their name. Focus on the steps above and let them think they’re slicker than you. Nigerian Prince never told me his real name. I knew it from 5 seconds after he emailed me, but I played along and feigned ignorance because I knew he was safe and rich and whatever other secrets he kept from me were irrelevant. After our first date, he revealed his real career, location, (still not his real name) etc. and I’d already known it all, but, like us, he was simply wary of giving too much info to the wrong person. My favorite is when a guy emails you from his real email using a fake name. “Inbox: New Email from Steve Jobs” “Hey it’s Mike!” lmfao Hey Mike! Whatever makes you comfortable enough to meet me for dinner and pay me. All this being said, sometimes a man’s “need for discretion” makes it fucking impossible to find out anything from him. In that case, I say “While I respect your need for discretion, it does not trump my need for safety and I would not feel comfortable meeting you for dinner without…(at least a skype date)(as many photos as I’ve sent you)(information about XYZ)(etc.).” If he refuses to accommodate, he’s blatantly disrespectful of your safety concerns and he’s not worth your time.
Asks for sexy photos. You really need to make sure your profile photos are serve their purpose and depict what you look like from head to toe. If you only include iPhoto face shots, that’s dandy but you need a full body shot of you in a cute outfit and I also always include a bikini shot. Nothing raunchy, just a fun day at the beach. If they’re asking for sexy photos and you already have full body shots on your profile, then kindly end it because they’re 12 year old horn dogs stuck in 45 year old bodies. But if your photos suck and they just want to confirm that you’re not Shrek, then you need to amp up your profile and oblige.
Asks your favorite position, kinkiest moment, sex history, what you’re into etc.There’s no space for immature, tacky, desperate rapid fire sex questions in the sugar bowl. At its core, sugaring is about companionship, chemistry, and fun times. If he needs a rap sheet of what you will and will not do in the bed room, then he should call up a pimp and ask for a very specific hooker. Even if you tell him this and he apologizes and stops, you still know that that’s his main incentive for joining this site so he’s probably looking for pay for play but has too much pride to admit to wanting a prostitute. If you’re fine with 4 hours a month with this man for however much you agree on, then boom! You just landed on easy money. But if you’re looking strictly for a sugar arrangement with outings, dinners, etc. then you need to move on. But be mindful that a lot of these men might be into BDSM, so if they ask specifically if you have interest in that then that’s not necessarily a red flag so much as them not wanting to waste either of your time. If you do say yes, however, and he presses you with sex questions, he’s equally guilty of the above offense.
Sleezy username/bad grammar. If “Hotsex69” messages you, you already know what he’s there for. He’s not a sugar daddy. He’s blatantly looking for pay for play.
Takes offense to your precautions. A lot of men will quickly realize that you both have iPhones and that your messages aren’t coming up blue. If he questions it, let him know straight up, “I’m using an app called Google Voice so that I don’t have to share my real phone number with strangers. Once I’m comfortable enough with you, I will give you my real number and you can reach me there.” 99% of guys completely get it and think “Damn, I wish I’d thought of that. She’s smart and safe and not full of shit! I can tell a lot of guys have wasted her time and I don’t want to be one, so I better step it up if I ever want the honor of using iMessage with this hottie!” The other 1% will cry like little bitches and be like “We’ve hit it off thus far! Don’t you trust me?!?” If he honestly thinks trust can be fostered after a few email messages, he’ll be equally pissy when you don’t have sex on the first date or when you reject his marriage proposal on the second date.
Insists on meeting for just drinks. 10:00pm drinks at the hotel bar so you can get drunk and then go upstairs? Um no. In a fun way, tell him you’d rather meet for dinner at this great restaurant you’re dying to try yada yada. I had this one guy come back at me with “How about we start with drinks and if we hit it off, then we can get dinner?” Lmfao why?! I literally see no incentive to that besides wanting to roofie me. If you’re that awkward and can’t be around a younger, more attractive woman without drinking then let’s drink at dinner. Have 10 glasses of wine with your food. I don’t care. But if I’m getting dolled up, I’m eating food. You are not skimping out on buying me dinner and you are not roofie-ing me and you are not getting me drunk so you can drag me back to your lair. I do too much damn cardio to drink my calories. Buy me dinner, you fuck.
Meet in a public place and STAY in a public place. Stroll in Central Park? Awesome! He wants to wander past the “DO NOT ENTER” sign and show you this ‘amazing view of the river’? Nope. Restaurants, coffee, theater — doesn’t matter as long as you’re surrounded by witnesses.
Have your own transportation to AND from a first meet. And from. And. From. AND FROM!!! Not “Oh I took a taxi here, but let me save $10 and go home with him — he was so funny and obviously legitimate!” Even if that’s true and he’s a sweetie and who he says he is, these men never need to know where you live. (Notice I did not say never should know. Doctor knows where I live and that’s fine. But he doesn’t need to.) If you ultimately decide you’re comfortable with having an SD over at your apartment, then that will come after several dates, not the first. Plus, the chase is half the fun for him. Don’t reveal all of yourself too quickly. For this same reason, never get into his car on the first date. Besides just safety reasons, you don’t want him to feel like (physically and mentally) that he has you 100%. Leave something to be desired.
Tell someone where you are and who you’re going with. If you’re close with a friend or relative who is non-judgmental, make sure they know where your date is and when you’ll be back. Otherwise, find a resource on here (I’ll gladly help you out)and text them (from your GV number) where you are going, when you get there, when you leave, and when you are home. Whenever I get in an SDs car for the first time, I always text my sugar friends his license number.
Some SBs insist on staying sober. I like to drink and I can handle it, so I do. But definitely don’t get drunk. It’s sloppy and unattractive but will also distract you from your goal of setting an allowance/arrangement in place and getting to know this man better. Plus, it will impair your judgment and prevent you from remembering the rest of these safety tips.
Doesn’t bring a gift or cash to the first date. Stop being so entitled. At this point, he owes you just as much as you owe him — nothing.
The car he drives. The $3000 allowance of a man who drives an Aston Martin is just as green as that of the man who drives a Jeep Grand Cherokee.
Offers you a ride there or back. He might genuinely want to save you the hassle of travelling. Most of these men are fathers and have that protective instinct. It’s 9pm, dark out, she’s waiting for a cab, this is nonsense, I’ll drive her. It’s not a redflag that he’s trying to be a gentleman, but either way, maintain your stance and politely decline.
Awkward behavior. Steve Jobs gave brilliant speeches, but outside of that, the dude was awkward as fuck. Nonetheless, he was richer than God. If a guy reaches to hold your hand on the first date and you don’t want him to, just say, “John, I’m having an absolute blast but I’m just not comfortable with that yet.” There’s no need to flip out and write a post saying OMG THIS GUY WAS SO CREEPY HE LIKE TRIED TO RAPE ME BLACKLIST!!!!! Doctor is the most awkward guy I’ve ever met in my entire life. Like him, many of these POTs were valedictorians of Harvard who went on to spend the next 8-12 years of their lives accumulating degrees in the dungeons of the Ivy Leagues. They lack sunlight and social skills. It’s okay. That doesn’t mean be wishy-washy when he tries to cop a feel. No. Be firm and put him in his place. If he makes you excessively uncomfortable, end the date and don’t pursue another. But if he stutters or can’t maintain eye contact or holds eye contact for too long or snorts or recites how beautiful you are or has a creepy smile, that doesn’t necessarily make him a potential serial killer.
Talks about hotel time, private time, intimate time, ‘getting away’. There will be no sex on the first date. There will be no sex on the first date. There will be NO SEX on the first date. If he thinks dinner and a few hundred dollars gets you two “alone time” at the Ritz Carlton, then send him packing. Be blunt and embarrass that loser. Literally say, “John, I’ve had a blast getting to know you thus far but I have zero interest in trading sex for lobster and a gas money. I’m a lady who is looking for a gentleman with the means to provide for her and support her. If you’re only interested in sex in exchange for money, then you’re looking for an escort, not a sugar baby, and a second date would be a waste of both of our time.” Scare the shit out of him and make him realize just how crass and pathetic he’s being. You wear the pants. He’ll straighten up very quickly, or realize that you’re right and head down to the corner of main street instead.
Cringes at the bill or what you’re ordering. If he can’t afford lobster, desert, or how many drinks you’re getting, he can’t afford you. This is an absolute no brainer. Even if he says he can afford your $3000 monthly allowance, if it means he’s going without food, laundry, or anything else just to afford it for you now, there WILL come a later when he leaves you hanging. A real SD loves to treat you and doesn’t care if you buy the bar!
Switches stories. It’s one thing from initially stating he’s in finance to getting more specific about which sector or region he works in, but if yesterday he was CEO of Apple and today he’s a professor, he’s probably full of shit. Don’t be afraid to call him out on it. “I thought you said —-?” Learn the dynamics of body language and be able to discern when someone is lying or hiding key information from you. He could very well be the manager of the local K-Mart hoping to spend as many free dates with you as possible before you catch him in his lie.
Insists on anything. If he’s choosing your meal for you, forcing you to ride home with him, or backing you into a corner in any way, ditch him. If he’s that pushy on the first date, he’ll be even more pushy on the second or on the third because you let him win this time.
Use a condom.
If you don’t use a condom, get tested regularly together and show each other the results.
Doesn’t meet allowance. If he owes you $500 per meet and misses a meet, he needs to bring it to the next meet, or else he’s breaking the terms of the arrangement. If it’s the end of the month and he shows up without allowance, he needs to send it to you/bring it to the next meet, or else he’s breaking the terms of the arrangement. Do not let him get comfortable and think of you as a friend or girlfriend. This is a SUGAR ARRANGEMENT. Do not let him treat you like something that you’re not and get sloppy with the reason why we’re here.
Wants to meet your family. Doctor still insists on introducing me to his sisters. Eck. Whatever. But he’s never meeting any of my family. I am not your girlfriend. This is not a relationship. We have no real future together. Read this haiku. It is the anthem of the bowl.
Insists on not using a condom, trying XYZ in bed that makes you uncomfortable. As always, don’t do anything you’re uncomfortable with and let them know. A real SD will put his desires aside for your safety and comcort. If he’s being pushy in bed or otherwise, he’s not there for your best interest.
Asks about your personal life. It’s not weird for a man to want to know what classes you’re taking or what’s new in your world. He’s not being creepy or nosy, he’s just curious about what makes you tick. He shouldn’t be prying into if you have a boyfriend or anything super specific, but don’t get weirded out if he asks a lot of things about you.
Asks for sexy pics or texts suggestively. After you’re intimate together, this really is fair game to ask. As always, you need not oblige, and if you do, play it safe and don’t include your face or use SnapChat. But just because he’s thinking of sex more doesn’t mean he’s still not invested in being a sugar daddy. If it makes you uncomfortable, say so. If he’s a true SD, he’ll respect your boundaries and get over it.
Is affectionate in public. Just because he likes to hold your hand and kiss you, doesn’t mean he’s thinking of you as a girlfriend and less of an SD and forgetting your arrangement. If PDA makes you uncomfortable and you need a bit more discretion, let him know. But just because he likes your soft skin doesn’t mean he’s going to propose and leave your arrangement in the dust. He might just like your soft skin.
Hates shopping. Not surprisingly, a lot of men hate shopping, especially for women or with women or in women’s stores. So just because he’s not buying you louboutins doesn’t mean he won’t give you the money to buy them yourself.
Your token line is: “I’m not comfortable with that (yet).” Don’t be wishy-washy! If he wants to have sex and you lie and say “Oh uh I’m on my period” he’ll just ask again the next time. Instead, be honest and be firm saying you’re not comfortable with sex, riding in his car, his hand on your leg, meeting his mom, etc. etc. etc. Drop this line WHENEVER you need to say no. It sets the tone that you are the one who sets the boundaries of the relationship and that those boundaries will not be crossed. If a man ever persists against something you’ve blatantly stated makes you uncomfortable, then you know it’s time to end things.
Never let the prospect of money trump the prospect of danger.
Great post. But Steve Jobbs is never richer than God.
0 notes
tragicbooks · 7 years
Text
How to protect yourself from phishing, from experts who deal with it every day.
Ever wonder what it's like to be hacked? Sarah Jeong did. So naturally, she decided to ask someone to hack her.
Jeong isn't just a random thrill-seeker — she's a respected technology journalist and lawyer, and she knew exactly what she was getting into when she recruited her friend Cooper Quintin of the Electronic Frontier Foundation to help her out. She wrote about her experience in GQ.
All it took was a couple of hours and some readily available tools, and Jeong joined the approximately 12% of the population who have fallen for a hack.
But even before she was successfully hacked — and don't worry, we'll get to that! — both Jeong and Quintin discovered some important truths about the world of online safety and what it takes to infiltrate it.
Here are just a few lessons from experts that we can all benefit from:
Photo by Blogtrepreneur/Flickr.
1. Most hacking isn't done by master "Matrix" coders.
For most people, "hacking" tends to evoke one of two images: a stereotypically out-of-shape nerd in their parents' basement or a sleek, leather-clad cyberpunk in a Guy Fawkes mask who moonlights as an extra on a Wachowski movie.
But in reality, most of what we call "hacking" is actually "phishing."  In fact, last year, then-Secretary of Homeland Security Jeh Johnson said that phishing is the threat his department fears most.
THIS IS NOT WHAT HACKERS LOOK LIKE. Except when they do, which is sometimes. Photo by Vincent Diamonte/Flickr.
2. Phishing is a type of scam that disguises itself as something trustworthy.
It can be an email, phone call, or text message, and it then tricks you into giving up your passwords, credit card numbers, and more. All it takes are some clever social skills plus some free online tools used by information security professionals that, technically, anyone can use. (A little coding knowledge doesn't hurt, though.)
3. Many hackers are savvier than you might think.
It doesn't matter if you have the best anti-virus software installed on your computer and run daily checks for malware along with Ghostery and ad block to keep your online browsing extra-safe. Don't get me wrong — viruses and malware are still dangerous. But phishing isn't about computers. It's about people. And that's a lot harder to protect against.
"Phishing isn’t (just) about finding a person who is technically naive," Cory Doctorow, a sci-fi author, journalist, and technology activist told Locus magazine.  As savvy as he is, even he fell for a phishing hack back in 2010. "It’s about attacking the seemingly impregnable defenses of the technically sophisticated until you find a single, incredibly unlikely, short-lived crack in the wall."
"It’s a matter of being caught out in a moment of distraction and of unlikely circumstance." In other words, it can happen to anyone.
Smile! I'm stealing your identity! Image via Pixnio.
4. The terrible typos and grammar in some phishing schemes are intentional.
You're probably familiar with the classic "Nigerian prince" phishing scheme, where some kind of foreign dignitary emails you and offers you a ton of money to help facilitate the transfer of their new bajillion-dollar inheritance. You also probably know that these emails are famously riddled with grammatical errors and totally implausible premises.
What you might not know, however, is that these "mistakes" are done on purpose in order to target the most gullible people. That way, reports Business Insider, the scammers don't have to waste their time trying to persuade rational skeptics to give up their bank account information.
Photo by Nate Grigg/Flickr.
5. To hack a specific person, all a hacker needs is social media.
You know those silly memes where you find your "porn star name" (or whatever) by using the name of your first pet and the street you grew up on?
Now think about those security questions you had to answer for your online bank account — things like, oh, the name of your first pet, the street you grew up on, or your mom's maiden name.
Yeah. See the connection there? If a hacker wants to social-engineer their way into your bank account, all they need to do is poke around your public accounts to find those little bits of information. These targeted attacks are called "spearphishing," and they're why Doctorow recommends that people "only use Facebook to convince your friends to communicate with you somewhere other than Facebook."
Image from Pixabay.
6. Be careful what you open — even when it's sent by someone you know.
Jeong was hacked after she clicked on a malicious link made to look like it was sent from someone she knew.
To hack her, Quintin just had to scour Jeong's online presence until he found an acquaintance who could plausibly email her. He made a fake email address — using that person's real-life profile picture and everything — and that was all it took to get Jeong to give up her information.
Fake Google Docs scams, like the one she fell for, are increasingly common. In these cases, the target receives a phishing email that looks like a standard invitation to Google Docs sent from a trustworthy source — except that both the sender and the link are actually malicious frauds. This link will bring you to a landing page that resembles the standard Google password screen or bank login page you thought you were clicking on, and the hacker can use that to capture whatever password or personal information you enter into the false form.
7. Double-check your URLs.
Always make sure you're really on the website that you think you are before you enter any sensitive information.
How do you tell the difference? Generally speaking, the domain name should look like "[blank].google.com" or "http://ift.tt/2tkU3Bs]." If it's something hyphenated like "accounts-drive-google.com" or "boa-accounts-login.com," well, you should probably think twice about it.
(Another helpful tip is to look for SSL certificates, which usually appear as a lock or green text in your browser bar — but even that's not totally reliable.)
What is real? What is fake? Image from Pixabay.
8. You should definitely use two-step authentication.
I hate to break it to you, but your p@$$w0rd probably isn't very safe. The least you can do, according to CNET, is turn on two-step authentication. That way, every time you log in to an unfamiliar device, you'll get a text message with a secret code just to make sure it's you — because even if someone gets your password, they probably don't have your phone, too.
Unless they, um, literally walked into the AT&T store and charmed a sales rep into changing your phone number over to their phone. Which happens.
9. And use a password manager.
If you want to be extra extra safe, use a password manager such as LastPass, then set up a DiceWare password like "correct horse battery staple" (or some of these other great ones recommended by the Intercept) that are incredibly easy to remember but next-to-impossible for hackers or computers to crack.
Image from Pixabay.
10. Remember the greatest flaw in your internet security is the trusting nature of other people.
A trusting customer service rep can easily compromise you without realizing it. Your friend who mentions you on Facebook can do the same.
Heck, my wife has a fairly gender-ambiguous name, and I can tell you from personal experience how easy it is to call up the bank and pretend I'm her — even when I have to charm my way around a security question about her high school mascot. Which, yes, I've done.
As Jeong wrote, "Successful social engineers are not just perfectly capable of interacting with human beings — they are talented manipulators who take advantage of our willingness to trust our colleagues, friends, and family."
"You can turn your digital life into Fort Knox and still be undone by an overly trusting salesperson behind a desk."
Basic rule: Always look over your shoulder. Photo by Arthur Harry Chaudary/Wikimedia Commons.
There's no way to protect yourself from every possible online vulnerability. But that doesn't mean you shouldn't try!
As we've seen, the power of the internet can used for good or evil. All it takes is one trusting click, and even the savviest security professionals can find themselves compromised.
The best you can do is be smart and pay attention. A tiny bit of paranoid skepticism will save you a lot of time, stress, and energy in the long run, and that'll free you up to enjoy all the wonderful things that the internet has to offer. Trust me.
0 notes
socialviralnews · 7 years
Text
How to protect yourself from phishing, from experts who deal with it every day.
Ever wonder what it's like to be hacked? Sarah Jeong did. So naturally, she decided to ask someone to hack her.
Jeong isn't just a random thrill-seeker — she's a respected technology journalist and lawyer, and she knew exactly what she was getting into when she recruited her friend Cooper Quintin of the Electronic Frontier Foundation to help her out. She wrote about her experience in GQ.
All it took was a couple of hours and some readily available tools, and Jeong joined the approximately 12% of the population who have fallen for a hack.
But even before she was successfully hacked — and don't worry, we'll get to that! — both Jeong and Quintin discovered some important truths about the world of online safety and what it takes to infiltrate it.
Here are just a few lessons from experts that we can all benefit from:
Photo by Blogtrepreneur/Flickr.
1. Most hacking isn't done by master "Matrix" coders.
For most people, "hacking" tends to evoke one of two images: a stereotypically out-of-shape nerd in their parents' basement or a sleek, leather-clad cyberpunk in a Guy Fawkes mask who moonlights as an extra on a Wachowski movie.
But in reality, most of what we call "hacking" is actually "phishing."  In fact, last year, then-Secretary of Homeland Security Jeh Johnson said that phishing is the threat his department fears most.
THIS IS NOT WHAT HACKERS LOOK LIKE. Except when they do, which is sometimes. Photo by Vincent Diamonte/Flickr.
2. Phishing is a type of scam that disguises itself as something trustworthy.
It can be an email, phone call, or text message, and it then tricks you into giving up your passwords, credit card numbers, and more. All it takes are some clever social skills plus some free online tools used by information security professionals that, technically, anyone can use. (A little coding knowledge doesn't hurt, though.)
3. Many hackers are savvier than you might think.
It doesn't matter if you have the best anti-virus software installed on your computer and run daily checks for malware along with Ghostery and ad block to keep your online browsing extra-safe. Don't get me wrong — viruses and malware are still dangerous. But phishing isn't about computers. It's about people. And that's a lot harder to protect against.
"Phishing isn’t (just) about finding a person who is technically naive," Cory Doctorow, a sci-fi author, journalist, and technology activist told Locus magazine.  As savvy as he is, even he fell for a phishing hack back in 2010. "It’s about attacking the seemingly impregnable defenses of the technically sophisticated until you find a single, incredibly unlikely, short-lived crack in the wall."
"It’s a matter of being caught out in a moment of distraction and of unlikely circumstance." In other words, it can happen to anyone.
Smile! I'm stealing your identity! Image via Pixnio.
4. The terrible typos and grammar in some phishing schemes are intentional.
You're probably familiar with the classic "Nigerian prince" phishing scheme, where some kind of foreign dignitary emails you and offers you a ton of money to help facilitate the transfer of their new bajillion-dollar inheritance. You also probably know that these emails are famously riddled with grammatical errors and totally implausible premises.
What you might not know, however, is that these "mistakes" are done on purpose in order to target the most gullible people. That way, reports Business Insider, the scammers don't have to waste their time trying to persuade rational skeptics to give up their bank account information.
Photo by Nate Grigg/Flickr.
5. To hack a specific person, all a hacker needs is social media.
You know those silly memes where you find your "porn star name" (or whatever) by using the name of your first pet and the street you grew up on?
Now think about those security questions you had to answer for your online bank account — things like, oh, the name of your first pet, the street you grew up on, or your mom's maiden name.
Yeah. See the connection there? If a hacker wants to social-engineer their way into your bank account, all they need to do is poke around your public accounts to find those little bits of information. These targeted attacks are called "spearphishing," and they're why Doctorow recommends that people "only use Facebook to convince your friends to communicate with you somewhere other than Facebook."
Image from Pixabay.
6. Be careful what you open — even when it's sent by someone you know.
Jeong was hacked after she clicked on a malicious link made to look like it was sent from someone she knew.
To hack her, Quintin just had to scour Jeong's online presence until he found an acquaintance who could plausibly email her. He made a fake email address — using that person's real-life profile picture and everything — and that was all it took to get Jeong to give up her information.
Fake Google Docs scams, like the one she fell for, are increasingly common. In these cases, the target receives a phishing email that looks like a standard invitation to Google Docs sent from a trustworthy source — except that both the sender and the link are actually malicious frauds. This link will bring you to a landing page that resembles the standard Google password screen or bank login page you thought you were clicking on, and the hacker can use that to capture whatever password or personal information you enter into the false form.
7. Double-check your URLs.
Always make sure you're really on the website that you think you are before you enter any sensitive information.
How do you tell the difference? Generally speaking, the domain name should look like "[blank].google.com" or "http://ift.tt/2tkU3Bs]." If it's something hyphenated like "accounts-drive-google.com" or "boa-accounts-login.com," well, you should probably think twice about it.
(Another helpful tip is to look for SSL certificates, which usually appear as a lock or green text in your browser bar — but even that's not totally reliable.)
What is real? What is fake? Image from Pixabay.
8. You should definitely use two-step authentication.
I hate to break it to you, but your p@$$w0rd probably isn't very safe. The least you can do, according to CNET, is turn on two-step authentication. That way, every time you log in to an unfamiliar device, you'll get a text message with a secret code just to make sure it's you — because even if someone gets your password, they probably don't have your phone, too.
Unless they, um, literally walked into the AT&T store and charmed a sales rep into changing your phone number over to their phone. Which happens.
9. And use a password manager.
If you want to be extra extra safe, use a password manager such as LastPass, then set up a DiceWare password like "correct horse battery staple" (or some of these other great ones recommended by the Intercept) that are incredibly easy to remember but next-to-impossible for hackers or computers to crack.
Image from Pixabay.
10. Remember the greatest flaw in your internet security is the trusting nature of other people.
A trusting customer service rep can easily compromise you without realizing it. Your friend who mentions you on Facebook can do the same.
Heck, my wife has a fairly gender-ambiguous name, and I can tell you from personal experience how easy it is to call up the bank and pretend I'm her — even when I have to charm my way around a security question about her high school mascot. Which, yes, I've done.
As Jeong wrote, "Successful social engineers are not just perfectly capable of interacting with human beings — they are talented manipulators who take advantage of our willingness to trust our colleagues, friends, and family."
"You can turn your digital life into Fort Knox and still be undone by an overly trusting salesperson behind a desk."
Basic rule: Always look over your shoulder. Photo by Arthur Harry Chaudary/Wikimedia Commons.
There's no way to protect yourself from every possible online vulnerability. But that doesn't mean you shouldn't try!
As we've seen, the power of the internet can used for good or evil. All it takes is one trusting click, and even the savviest security professionals can find themselves compromised.
The best you can do is be smart and pay attention. A tiny bit of paranoid skepticism will save you a lot of time, stress, and energy in the long run, and that'll free you up to enjoy all the wonderful things that the internet has to offer. Trust me.
from Upworthy http://ift.tt/2sPwOCj via cheap web hosting
0 notes
thecloudlight-blog · 7 years
Text
New Post has been published on Cloudlight
New Post has been published on https://cloudlight.biz/google-docs-phishing-scam-aims-to-steal-gmail-details/
Google Docs phishing scam aims to steal Gmail details
T seems there may be a new baddie in the city, trying to hack into the Gmail accounts of people using phishing emails. And in contrast to inside the past whilst the phishing emails were approximately the money that a Nigerian prince was supplying, this time the email comes from Google Docs. It additionally happens to be a genuine email that sends people to a real Google login page from where the scammers are stealing the username of passwords of customers. Google mentioned that there was a problem and said that it turned into now fixed.
Those attacks through Google Docs have been pretty state-of-the-art. This is the cause why Those incidents have caused quite a few panic. So simply what is going on? Is your Gmail account below risk? Have you ever already fallen sufferer of the Google Medical doctors phishing attack? Can you maintain your Gmail secure? Read on…
What’s Google Docs Phishing rip-off
It’s far quite easy. a whole lot of users have stated that they have received These odd emails from Google Medical doctors, asking them to click on on a Google Medical doctors link and then edit that document. Now that feels like a phishing email. But the atypical bit here is that once a user clicks on the link, a web page that could be a true Google page opens. On this web page, customers are requested to offer their electronic mail and passwords. Because It’s far a proper web page, the web browsers like Chrome and Firefox do not be aware the phishing attempt. Once a user elements the e-mail Id and password, that records are then stolen through a rogue app (or apps), already inside the Google systems and already related with the user account.
How Is Google Search Changing Us?
Typing in Google and searching for stuff has in no way been easier. Have you ever questioned how it is converting us? Study on for insights.
For example, we need to appearance up to the which means of a phrase or locate synonyms of that word. We can discover the answer within the relay of some clicks. inside the old days, while the net was no longer there, we had to show over the pages of a dictionary and locate the word we were trying to find matching the first few alphabets.
A seek on Google, for this be counted, certainly has made this less difficult. We’re too reluctant and lazy in recent times to seek advice from a solid dictionary whilst Google is so available.
We can also find facts relevant to investigate the area of interest We’re interested in
We are able to find new websites and bookmark them for destiny references. All these data may be retrieved on Google clicks.
But, no longer all data at the net corresponding to a Google seek can be one hundred% applicable and accurate. We may additionally, in that case, must purchase books and consult them. So for brief runs, it’s miles ok and We can take it. But if We are writing a thesis, studies paper, article or file, this is where solid books come into the picture.
no longer all of the searches on Google supply the solution We are looking for. Now and again we fall right into a loop, constantly clicking and losing our time when the facts can be rightly discovered in catalogs or at the library of our office.
Loose boards are available on the web and a Google seek on those can rightly let us find out them.
I think it is right to seek advice from the forums for the records you need badly. This can be related to programming troubles or other topics for that be counted. If they may be famous, you get good answers to your issues from gurus or professionals in those forums.
Fiction eBooks come in reachable as well on many Unfastened websites. As opposed to spending cash on fictions, you may just download correct fiction eBooks from the sites and these websites you could find on Googling.
The blessings of a Google seek have made our lives tons less complicated, less difficult and cozier by letting us get admission to the required facts at a quick pace. However for long time commitments which, I’ve explained before, Google searches virtually waste our time without giving us the records we want and in that case, it’s miles extra reliable for us to seek advice from a library.
Beware Of Online Phishing
Phishing is a sort of fraud perpetrated at the Net. It objectives at stealing the personal data of online customers inclusive of customer Id, PIN, Credit/Debit card facts, etc. by way of assuring sure favors in return. It is a sophisticated con act similar to catching the fish with a hanging bait. This hi-tech fraudulence is performed via emails and websites pretending to be proper. Gullible humans open those emails and websites ignorant of the risks involved in them. Of late, phishers hire the smartphone for voice phishing and SMS for smashing. A pal of mine attracted by means of the rewards assured by a smartphone name, he gave the consumer name and crucial information of his Credit card to lament later for buying an invoice for a big price that he didn’t incur.
Emails are the maximum not unusual technique used by the tricksters
Claiming as bank officials and ship fake emails to the customers asking them to affirm or update their account info or profile through clicking on the hyperlink supplied in those emails. The link takes the customers to a fake internet site that looks like the authentic financial institution website with a shape to fill in the purchaser’s information. The information so acquired might be used for fraudulent operations inside the purchaser’s account. Such phishing sites and emails quoting the names of even the Central banks of a few international locations have ended up common element these days. One can discover emails advising the receiver to offer their financial institution info that allows you to remit the prize money of a sweepstake draw.
Techniques to perceive the Phishing websites: If the URL
Of a website starts with ‘https’ as opposed to ‘HTTP’, it method the page is safe and secured with encryption. Most of the people of the faux net addresses do now not contain this ‘s.’ The second approach is to check for the padlock symbol in the higher proper or backside corner of a web page. This lock denotes the presence of a digital certificate for the security of the site. You could verify this certificate via double clicking the lock. The statistics shared by way of buddies and relatives about their studies with such phishing Strategies paperwork the third technique. Alerts from the Net service providers additionally help to understand the fake websites and spams.
Precautions towards Phishing: Carefully take a look at the internet cope with for its genuineness and safety with the aid of applying the above Techniques. Have the present day and widespread anti-virus, anti-spyware, firewall, and security patches hooked up for your systems. Do now not divulge any personal data to all and sundry or online queries along with smartphone calls or emails. Discard the emails from unknown sources.
Resolving Issues Via Gmail Customer Support
In April of 2004, the internet seeks massive Google launched Gmail, a loose net based totally electronic mail service designed to compete with the likes of Hotmail and Yahoo. Gmail presented almost a GB of storage web page as compared to two to 4 MB offered with the aid of the competitors. Apart from this, Gmail also allowed its customers to combine their account with different Gmail services along with Google Speak, Google Buzz, and many others.
These kinds of features have accelerated Gmail to one of the global’s largest email service vendors with thousands and thousands of humans logging in every day. Lamentably, this kind of functions can be too complex for a few to address and they will discover themselves needing Gmail aid. If you are one of those folks that confounded by way of the plethora of functions presented by way of Gmail, or a person going through a trouble together with your electronic mail, you should avail Gmail customer service as soon as possible. But earlier than you name for assistance, you should visit the official Gmail customer service page.
The professional Gmail help and help page have textual
Content publications that could offer step by step commands on a myriad of topics ranging from improving your password to organizing your emails. This form of aid for Gmail is completely freed from value. But, In case you are having the problem understanding the commands, or deem the hassle to be too inconsequential in order to be stricken with, you need to name up third celebration tech guide. At this factor, you’ll select between traditional tech aid and on-line help.
conventional tech helps a term used to denote technical support in that you would have to call a professional repair technician over to your private home. This allows you to resolve your trouble without the fear of making a mistake and aggravating a hassle you have already got. You may also in my view provide an explanation for to him the trouble you are going through and he or she can discern out the precise trouble with the aid of themselves.
0 notes