<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Impersonation &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/impersonation/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Thu, 10 Jun 2021 00:49:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Warning to usurp the right to use the phone SIM, steal money</title>
		<link>https://en.spress.net/warning-to-usurp-the-right-to-use-the-phone-sim-steal-money/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 00:49:13 +0000</pubDate>
				<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[be entitled]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[Fraudster]]></category>
		<category><![CDATA[Goverment]]></category>
		<category><![CDATA[Ho Chi Minh City Law]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Khai]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[OTP]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Sim]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[The right]]></category>
		<category><![CDATA[usurp]]></category>
		<category><![CDATA[Vinaphone]]></category>
		<category><![CDATA[VNPT HCMC]]></category>
		<category><![CDATA[Vo Do Thang]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[Withdrawal]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-to-usurp-the-right-to-use-the-phone-sim-steal-money/</guid>

					<description><![CDATA[After hijacking the right to use the SIM, the crooks will take the victim&#8217;s credit card number to make online payments or withdraw money. Last time, Ho Chi Minh City Law received many feedbacks from readers about the situation where the phone SIM was taken by someone else leading to the money in the credit [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>After hijacking the right to use the SIM, the crooks will take the victim&#8217;s credit card number to make online payments or withdraw money.</strong><br />
<span id="more-21956"></span> Last time, <em> Ho Chi Minh City Law</em> received many feedbacks from readers about the situation where the phone SIM was taken by someone else leading to the money in the credit card being lost.</p>
<p> <strong> Original SIM card but still occupied by others </strong> Ms. ATH (in Binh Duong) reflected on 2-3 days, she discovered that her phone displayed a message that could not be called, so she went to VNPT Binh Duong Business Center to ask for a check. Here, the technical staff said that the SIM card is not damaged, still works two-way. On March 4, she went to the center to ask for a new SIM card. After that, the phone works normally. On March 12, Ms. H. logged into her credit card account to check and found that the money in the account had been withdrawn in the form of payment for purchases. Suspecting that her SIM information was exposed during the SIM rework, Ms. H. went to VNPT Binh Duong Business Center to find out. Only now did she know that on 2-3 days there was a transaction to replace her SIM at a VNPT center in Ho Chi Minh City. Ms. H. said that this SIM phone number has been registered by her owner before. Now suddenly my SIM was declared and appropriated by someone else, leading to the loss of her credit card more than 58 million dong. “During the settlement process, the representative of VNPT HCMC (where the SIM exchange happened) said he would support me with a scratch card worth 2 million VND, but I did not accept it. The main reason for losing money is because the network operator re-issued the SIM in the wrong process, not because of me, &#8220;- Ms. H. shared. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_114_39132000/8d8db290bed2578c0ec3.jpg" width="625" height="416"> <em> Ms. ATH was upset because someone else took control of her phone SIM, so her credit account lost more than 58 million dong. Photo: DANG LE</em> Another case is Mr. Trieu Duc Khai (in Thai Binh) also said on April 21, he made a complaint to VNPT Center in Thai Thuy district, Thai Binh. The content of the complaint about his VinaPhone SIM, although registered by the owner, was still controlled by others, leading to the loss of 35 million VND in his credit card. Through working with VNPT in Thai Thuy district, it was determined that someone had impersonated him to carry out the procedure to lose the SIM and make a new SIM with the subscriber number that Mr. Khai was using. This person only declared five phone numbers to call out, come to the nearest, and then be given a new SIM. <strong> Occupying SIM is a trick to appropriate money</strong> Exchange with <em> Ho Chi Minh City Law</em> Vo Do Thang, Director of Athena International Security and Network Administration Training Center, said that through the two cases above, it shows that if anyone reports the loss of SIM and only needs to provide five phone numbers to call. going, calling recently, committing to subscriber owner rights to be re-issued with a new SIM is not good at all. This has created a loophole for crooks to steal other people&#8217;s SIMs, to the detriment of genuine SIM users. According to Mr. Thang, most of the victims in the SIM loss cases were taken by fraudsters by making online payments. To pay for online purchases, there are three factors: The first is a mobile phone number. The credit card holder must register this phone number with the bank to authenticate transactions and receive bank notifications. The second is the card number (a series of numbers printed on the front of the credit card). The third is the OTP (one-time password) verification code sent to the phone number registered with the bank. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_114_39132000/155b22462e04c75a9e15.jpg" width="625" height="416"> <em> In the working minutes and written responses to Ms. H. and Mr. Khai, the network operator confirmed that re-issuing SIM cards to others was not in accordance with the process. Photo: DANG LE.</em> After hijacking the right to use the SIM, the crooks will take the victim&#8217;s credit card number to pay online, then use the newly issued SIM to receive the OTP code and complete the payment. The victim&#8217;s credit card number has been stolen by the crooks before, appropriating the phone SIM is only the last step to perform the act of appropriating money. According to Mr. Thang, not everyone who loses their phone SIM will lose money in their credit cards and bank accounts. Only when they have had their credit card or account information exposed before can crooks steal money. The victim&#8217;s credit card information may be exposed during previous online transactions. The cause is usually because the victim has filled out information on fraudulent websites, installed malicious code on the phone to steal card information, opened attachments of unknown origin or it can also be due to credit institutions. does not guarantee safety in terms of security,&#8221; Thang shared. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_114_39132000/70cc43d14f93a6cdff82.jpg" width="625" height="416"> <em> In the working minutes and written responses to Ms. H. and Mr. Khai, the network operator confirmed that re-issuing SIM cards to others was not in accordance with the process. Photo: DANG LE</em> <strong> The network operator did the wrong process</strong> In both cases mentioned above, in the process of working with customers, the operator has confirmed that the teller when carrying out the SIM reissuance procedure only requires the customer to provide five outgoing and incoming phone numbers. subscriber ownership is not the correct procedure. In response to the recent complaint of VNPT Center in Thai Thuy district, Thai Binh province against Mr. Trieu Duc Khai, it is clear that because of this unfortunate incident, VNPT Center of Thai Thuy district has apologized to customers. The material damage that the impostor causes to the customer, the center will fix and compensate for the loss. As for the case of Ms. ATH, VNPT HCMC said that it will accompany the customer to provide necessary information to serve the investigation agency.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21956</post-id>	</item>
		<item>
		<title>6 malicious Android apps users need to remove urgently from their phones</title>
		<link>https://en.spress.net/6-malicious-android-apps-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 23:57:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Bitdefender]]></category>
		<category><![CDATA[Careful]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[Google Android]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Keyloggers]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Third party]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Virus removal]]></category>
		<guid isPermaLink="false">https://en.spress.net/6-malicious-android-apps-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[In case your phone has 1 of the 6 applications below, quickly remove them immediately. Security researchers at Bitdefender recently said that the hacker gang used fake versions of famous Android apps to spread malware. (Artwork: Presse-citron) Specifically, the Teabot (or Anatsa) malware, which can allow hackers to take over the victim&#8217;s Android device completely; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In case your phone has 1 of the 6 applications below, quickly remove them immediately.</strong><br />
<span id="more-21921"></span> Security researchers at Bitdefender recently said that the hacker gang used fake versions of famous Android apps to spread malware.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/880527933cd1d58f8cc0.jpg" width="625" height="415"> <em> (Artwork: Presse-citron)</em> Specifically, the Teabot (or Anatsa) malware, which can allow hackers to take over the victim&#8217;s Android device completely; steal their banking and other important personal information through tools like keyloggers. The analysis report from Bitdefender researchers said that Teabot malware can perform attacks through Android Accessibility Services, view private messages, steal banking information, steal authentication codes. of Google,&#8230; and even take full remote control of the victim&#8217;s devices. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/eb8fa8e1b7a35efd07b2.jpg" width="625" height="416"> <em> (Artwork: Unsplash)</em> Distributing malware directly from app stores would be difficult, so hackers use the method of impersonating top-rated apps distributed on third-party websites. . According to research by Bitdefender, fake Android apps include antivirus, media player, health, etc. To deceive users, the fake app&#8217;s name and logo will be copied. copy almost or exactly like the real application. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/732d887b9a3973672a28.jpg" width="625" height="468"> <em> (Artwork: Panda Security)</em> Here are 6 malicious apps impersonating famous apps to scam users. If you are using Android devices, please check all the applications on the device. In case your phone has 1 of the 6 applications below, quickly remove them immediately. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/08f4f0a2e2e00bbe52f1.jpg" width="625" height="441"> <em> The main app icon (right) and the fake app (left) have some differences in the 5th and 6th apps. (Image: Bitdefender)</em> Bitdefender emphasizes that the campaign against these malicious applications is still active. For this reason, Android users need to be careful about downloading apps, especially apps from third parties, that aren&#8217;t part of the Google app market; Don&#8217;t click on strange links and always look carefully at the permission requests of Android apps.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21921</post-id>	</item>
		<item>
		<title>Again the trick of tagging Facebook account robbers</title>
		<link>https://en.spress.net/again-the-trick-of-tagging-facebook-account-robbers/</link>
		
		<dc:creator><![CDATA[Trọng Đạt]]></dc:creator>
		<pubDate>Mon, 17 May 2021 01:45:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Bandit]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phan Vinh]]></category>
		<category><![CDATA[Post it]]></category>
		<category><![CDATA[Robbers]]></category>
		<category><![CDATA[Scammers]]></category>
		<category><![CDATA[Stranger]]></category>
		<category><![CDATA[suspect]]></category>
		<category><![CDATA[TAG]]></category>
		<category><![CDATA[tagging]]></category>
		<category><![CDATA[trick]]></category>
		<category><![CDATA[Tricks]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[You underlined in the questionnaire]]></category>
		<guid isPermaLink="false">https://en.spress.net/again-the-trick-of-tagging-facebook-account-robbers/</guid>

					<description><![CDATA[If being tagged by a stranger on Facebook, users need to be very careful, absolutely do not access the link posted by the suspicious object. After a while of silence, the name tag trick on Facebook seems to be showing signs of returning. Any social media user can fall victim to this scam. According to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>If being tagged by a stranger on Facebook, users need to be very careful, absolutely do not access the link posted by the suspicious object.</strong><br />
<span id="more-15208"></span> After a while of silence, the name tag trick on Facebook seems to be showing signs of returning. Any social media user can fall victim to this scam.</p>
<p> According to Mr. Phan Vinh (Linh Nam, Hanoi), about a week ago, he was constantly tagged (marked) on posts on the social network Facebook. All of these posts have the same content related to an accident. In addition to information about the victim&#8217;s name, the article also includes a link for users to verify for themselves. “I know many people with the same name as the victim, the post is not full, so I can&#8217;t be sure who it is. Moreover, I didn&#8217;t know who the person tagged me, so I ignored those posts,&#8221; Vinh said. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_23_38818201/0a1f661e785c9102c84d.jpg" width="625" height="416"> <em> Users need to be wary of being tagged in Facebook posts by strangers. Photo: Trong Dat</em> Vinh made a correct decision because if he clicked on the link, he would most likely be turned into a victim of scammers. This is not a new trick when many crooks intentionally create a fake website and trick users into accessing it. Once you click on the link attached to the article, you will be asked to log in (usually with a Facebook or Google account) to continue viewing the content. At this time, the bad guys will have their account passwords in hand to use them for impure purposes. In addition to the risk of losing the account, the victim also has the risk of revealing personal information, sensitive images, &#8230; Not only that, the bad guy can also cheat through the victim&#8217;s account Island borrow money from their friends. Usually, phishing posts have a familiar motif, with content that piqued the user&#8217;s curiosity. These posts are often accompanied by a link to another website. This is the first feature that users need to pay attention to. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_23_38818201/1e1573146d568408dd47.jpg" width="625" height="416"> <em> Bad guys often use links impersonating news agencies to trick users into accessing fake websites. Photo: Trong Dat</em> Users also need to be wary of being tagged by strange accounts. If you see a post tagged with a large number of users (usually 99 people), absolutely do not click on the link because it is definitely a scam content. In addition, if you accidentally visit a strange link, users should not log in to their Facebook, Google, bank accounts, etc. when they receive a request, no matter what website. In fact, bad guys often use a fake website with a realistic interface to steal information, especially passwords for Facebook accounts, banks, &#8230; Therefore, users should only log in. sensitive accounts when actively accessing the websites of those services themselves. To be more careful, with websites related to financial and banking services, users should star (bookmark) these websites on the bookmarks bar of the browser. When someone asks you to borrow money on Facebook, don&#8217;t trust it, call that person directly (or through another app) to verify this information. Only with such vigilance, can users escape the &#8220;claw&#8221; of online scammers.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15208</post-id>	</item>
		<item>
		<title>Warning scams appropriating assets through bank messages</title>
		<link>https://en.spress.net/warning-scams-appropriating-assets-through-bank-messages/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sun, 16 May 2021 23:35:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Appropriating]]></category>
		<category><![CDATA[Appropriation of property]]></category>
		<category><![CDATA[assets]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[entice]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Financial institutions]]></category>
		<category><![CDATA[Hai Duong Police]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[messages]]></category>
		<category><![CDATA[Mobile subscription]]></category>
		<category><![CDATA[OTP]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Telecommunications business]]></category>
		<category><![CDATA[Telecommunications network]]></category>
		<category><![CDATA[Through verification]]></category>
		<category><![CDATA[usurp]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-scams-appropriating-assets-through-bank-messages/</guid>

					<description><![CDATA[Hai Duong police have issued a warning about the method of fraud and appropriation of assets through bank messages. Illustration. According to Hai Duong Police, recently, many mobile subscribers have received messages impersonating financial institutions and banks, sending fake and fraudulent content in order to appropriate people&#8217;s money. Through verification and evaluation, the authorities found [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Hai Duong police have issued a warning about the method of fraud and appropriation of assets through bank messages.</strong><br />
<span id="more-15154"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_181_38817834/e4f90dfd13bffae1a3ae.jpg" width="625" height="398"> </p>
<p> <em> Illustration.</em> According to Hai Duong Police, recently, many mobile subscribers have received messages impersonating financial institutions and banks, sending fake and fraudulent content in order to appropriate people&#8217;s money. Through verification and evaluation, the authorities found that these fake messages did not come from the systems of financial institutions, banks and telecommunications businesses, but were distributed through transmitters. fake mobile signal. These are devices of foreign origin, which are illegally traded and used by objects for the purpose of carrying out attacks to spread spam messages to deceive users, especially users in remote areas. urban area. Fraudsters often use fake broadcast devices to send spam messages directly to the phone without going through the mobile telecommunications network. These messages are sent by objects that change source information in order to create trust and deceive users. The message content is often advertising, instructions or contains links to fake websites like official websites of financial institutions, banks to lure and steal users&#8217; information such as accounts, password, OTP code. Many users do not recognize the fake website, so they provide personal information to access the bank account such as entering the account name and password. After the user provides the information, the fake website will redirect to another website or notify the user to wait. The subject uses the user&#8217;s personal information to log in to the official website of financial institutions and banks to get the OTP authentication code (if necessary).</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15154</post-id>	</item>
		<item>
		<title>Lost money unjustly because of fake Google Chrome app</title>
		<link>https://en.spress.net/lost-money-unjustly-because-of-fake-google-chrome-app/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Fri, 14 May 2021 22:45:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[crooks]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Hundred thousand]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Infection]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Lost money]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Miscarriage of justice]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[Parcels]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[unjustly]]></category>
		<category><![CDATA[update]]></category>
		<guid isPermaLink="false">https://en.spress.net/lost-money-unjustly-because-of-fake-google-chrome-app/</guid>

					<description><![CDATA[Recently, researchers at cybersecurity firm Pradeo discovered a new type of malware that impersonates the Google Chrome app and infects hundreds of thousands of devices. The fake Google Chrome app is part of a mobile attack campaign that uses phishing methods to steal credit card information. Researchers have identified this threat and named it &#8220;Trojan [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, researchers at cybersecurity firm Pradeo discovered a new type of malware that impersonates the Google Chrome app and infects hundreds of thousands of devices.</strong><br />
<span id="more-14426"></span> The fake Google Chrome app is part of a mobile attack campaign that uses phishing methods to steal credit card information. Researchers have identified this threat and named it &#8220;Trojan Smishing&#8221;.</p>
<p> <strong> How the fake Google Chrome app infiltrates the phone</strong> Specifically, the crook will initially send you an SMS and ask to pay a small fee to receive the parcel. When the user clicks on the attached link, the screen will display a message asking to update the Google Chrome browser (actually fake software) and pay 1-2 USD fee to receive the goods via credit card. use. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_331_38825582/f42897fc88be61e038af.jpg" width="625" height="427"> If you do, the crooks will instantly get your credit card information and take your money. In addition, the malware also uses the device to send about 2,000 phishing SMS messages per week to random phone numbers. According to the researchers, the malware&#8217;s propagation speed is relatively fast, able to target hundreds of thousands of users in a short time. <strong> How to limit?</strong> The researchers recommend that users absolutely do not give out credit card information to strangers. Also only update apps directly through Google Play or the App Store, do not click on suspicious links, even if they are sent by friends or relatives. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_331_38825582/dd86a852b7105e4e0701.jpg" width="625" height="328"></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14426</post-id>	</item>
		<item>
		<title>Losing money when &#8216;accepting donations&#8217; from former billionaire Jeff Bezos&#8217; wife</title>
		<link>https://en.spress.net/losing-money-when-accepting-donations-from-former-billionaire-jeff-bezos-wife/</link>
		
		<dc:creator><![CDATA[An Chi]]></dc:creator>
		<pubDate>Tue, 04 May 2021 07:20:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[accepting]]></category>
		<category><![CDATA[Bezos]]></category>
		<category><![CDATA[billionaire]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Charity]]></category>
		<category><![CDATA[Charity organization]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Copy]]></category>
		<category><![CDATA[donations]]></category>
		<category><![CDATA[Ex wife]]></category>
		<category><![CDATA[GOFUNDME]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Jeff]]></category>
		<category><![CDATA[Jeff Bezos]]></category>
		<category><![CDATA[losing]]></category>
		<category><![CDATA[Lost money]]></category>
		<category><![CDATA[MacKenzie Scott]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[NYTIMES]]></category>
		<category><![CDATA[Proclaimed title]]></category>
		<category><![CDATA[Profits]]></category>
		<category><![CDATA[Receive money]]></category>
		<category><![CDATA[Scammers]]></category>
		<category><![CDATA[SCOTT]]></category>
		<category><![CDATA[Twin Cities]]></category>
		<category><![CDATA[Wife]]></category>
		<category><![CDATA[Winston Churchill]]></category>
		<guid isPermaLink="false">https://en.spress.net/losing-money-when-accepting-donations-from-former-billionaire-jeff-bezos-wife/</guid>

					<description><![CDATA[When he announced to spend billions of dollars to charity, billionaire MacKenzie Scott is being impersonated to deceive difficult victims. The ex-wife of the Amazon boss caught the attention of her unique charitable manner. However, NYTimes claims that many scammers have copied her volunteering to target victims of assistance. A mother of five, named Danielle [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>When he announced to spend billions of dollars to charity, billionaire MacKenzie Scott is being impersonated to deceive difficult victims.</strong><br />
<span id="more-11454"></span> The ex-wife of the Amazon boss caught the attention of her unique charitable manner. However, <em> NYTimes </em> claims that many scammers have copied her volunteering to target victims of assistance.</p>
<p> A mother of five, named Danielle Churchill, from southern Sydney was one of them. Struggling with raising five children, along with the hefty expenses for an autistic child, Churchill tried to apply for support through GoFundMe but was not as satisfactory. In that situation, Churchill received a text message from a person calling himself MacKenzie Scott late last year, offering to assist her every problem. According to the announcement, the ex-wife of the Amazon boss was then deciding to give away half of her fortune, and Churchill was lucky enough to be eligible to receive the money. To verify it, Churchill typed in Scott&#8217;s name and the phrase &#8220;phishing&#8221; on Google. But what she found was that billionaire Scott was actually making the move to spend money on hundreds of nonprofit groups. According to the process, to receive the money, Ms. Churchill must fill out a &#8220;membership form&#8221; from the charity claiming to be the MacKenzie Scott Foundation, then set up an online account at the Investor Bank and Trust Company. . At that time, a notice said $ 250,000 had been deposited into the account, and asked Churchill to register for a tax identification number and pay a fee to receive the money. Just like that, Churchill was subtly pickpocketed. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_25_119_38630124/d20e4d0e6b4c8212db5d.jpg" width="625" height="757"> <em> A series of sites and organizations impersonate former billionaire Jeff Bezos&#8217; wife to make a profit. Photo: Chris Koehler </em> Although Churchill was cautious and actively investigated, the opponent quickly gave convincing evidence to all questions. In fact, throughout 2020, billionaire Scott claims to have charitable with nearly $ 6 billion in his fortune. Her unique dedication model is praised by many for its quickness and directness. However, this makes the female billionaire easy to be impersonated by scammers. Unbeknownst to Churchill then, there was no MacKenzie Scott Foundation. And the Investor Bank and Trust Company, once headquartered in Boston, transformed into the State Street Corporation more than a decade ago. She thought she was dealing with billionaire Scott and his team of assistants, but in reality Churchill was dealing with a sophisticated, adept group of scammers hunting for difficult subjects. In Churchill&#8217;s case, the banking channel provided, and Facebook or WhatsApp pages were fake. The use of cryptocurrency applications Bitcoin is also exploited to profit up to about 7,900 USD. This makes the victim unable to get the claim back through the bank or card company as usual. An Israeli-based email security company, Ironscales, said messages impersonating Scott&#8217;s billionaire representative were released and sent to more than 190,000 customer email accounts. The incident arose right after the ex-wife of billionaire Jeff Bezos announced the charity amount reached nearly $ 4.2 billion on December 15 last year. As for the victim, it was only after opening a bank account that did not exist did Churchill learn of the other victims. Marti DeLiema, a professor at the School of Social Work at the University of Minnesota, Twin Cities, said scam tricks via text messaging announcing charity payments are being exploited by bad actors. &#8220;Scott&#8217;s huge fundraiser has created a hole for the bad guys to take advantage of.&#8221; Even people who have actually received donations are even using their names to scam. Or the websites of the US Small Business Administration being copied, impersonating the Federal Trade Commission &#8230; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_25_119_38630124/45d2dfd2f99010ce4981.jpg" width="625" height="405"> <em> Websites and facebook impersonating the billionaire philanthropist MacKenzie Scott sprung up to seduce and deceive victims. Photo: NYtimes. </em> In fact, billionaire Scott has donated most of his wealth to organizations, universities, food banks and frontline charities, rather than giving money to individuals. Besides, the former writer also does not have an official Facebook and Instagram social network account, apart from the Medium page and an authenticated Twitter account. And all fees to receive funding are unwarranted. Scott&#8217;s representative declined to comment on fraudulent activities on behalf of billionaire ex-wife Jeff Bezos.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11454</post-id>	</item>
	</channel>
</rss>