Economic And Financial Crimes Commision
No.5, Bill Clinton Crescent, Off Adetokunbo Ademola
Wuse II, Abuja, Nigeria.
ECONOMIC & FINANCIAL CRIMES COMMISSION (EFCC).in collaboration with United Nation, (UN) and United State GOVERNMENT.
Attention: Beneficiary
SCAMMED VICTIM/ $2.5million COMPENSATION FUND-REF/PAYMENTS CODE: 06654.
We were delegated by Economic and Financial Crimes Commission [EFCC] Nigeria in conjunction with the United Nations to pay 200 Americans, Asia, Europe countries etc, In view of this recommendations, I want you to know that during the last UN and EFCC meetings held in Abuja Nigeria, it was alarmed so much by the rest of the world in the meetings on the loose of funds by various foreigners to the scams artists operating in syndicates all over the world today.
In other to retain the good image of this great country, the president (Goodluck Jonathan) has instructed the immediate compensation payment of $2.5million each, to each scam victim through Guarantee Trust Bank, which is the approved Bank that will be responsible for your compensation fund transfer and issuance of International certified bank draft via under funding assistance by the Central Bank of Nigeria.
85 scam victims who were scammed by scam artists/perpetrators has been paid sum $2.5million each so far, and you are listed and approved for this payments as one of the scammed victims.
Kindly contact EFCC foreign operating assistant commissioner Mr. Mike Johnson for your compensation fund release.
Email: edujlgs@ig.com.br
Phone: +2348037165537
Option 1: Fund through Bank Transfer,
1 Your bank name:
2. Bank address:
3. Your account number:
4. Routing number:
5. Swift code/IBAN:
6. Beneficiary name:
7. Phone/Mobile no:
8. Address:
9. Nationality
10. Gender
11. Occupation
12. Age
OPTION 2: to receive fund through International Certified Bank delivery, fill in the listed details below:
(1) Full name:
(2) Delivery address:
(3) Direct mobile/ phone /fax:
(4) Occupation
(5)Gender
(6) Nationality
(7) Age
You are hereby warned not to communicate or duplicate this message to anybody in email exchange for any reason or whatsoever, EFCC in support of the US secret service is already tracing tracking the criminals for your own good make sure you stop dealing with scammer and imposter, and also make sure you forward the daily scams letter you received to us be warned.
Yours faithfully,
Danson Bowell, DE-factor Chief Compensation Officer
This Blog has Moved!
419 Scammers Target Victims of 419 Scammers...
The Bad Guys are Running Out of Places to Hide
Access to this database will allow the FBI to find all sorts of juicy incriminating data, such as drug deals, coordinated hacking, and even murders.
So for anyone out there who had incriminating evidence on Tor Mail, consider yourself on notice - the "Party Van" will be visiting your house soon.
Remember kiddies, the Internet is forever.
Space Weather Outlook January 27, 2014 at 01:07AM
ISC2 CISSP - Special Edition Practice Exam and Study Guide
The CISSP CramMaster will prepare you to pass the ISC2 CISSP exam. It contains 650+ questions, multiple-choice answers and detailed explanations along with selected content from the CISSP Sybex book. This CramMaster will test a candidate's knowledge of an international standard for information security and understanding of the ISC2' Common Body of Knowledge. The CISSP CramMaster covers ISC2 recommended domains such as Access Control, Application Security, and Cryptography. The ISC2 CISSP covers the following recommended objective categories:
Request Free! |
Microsoft 70-640 Windows Server 2008 - Special Edition Practice Exam and Study Guide
Use the Windows Server 2008 Active Directory, Configuring CramMaster to study for the Microsoft 70-640 exam. This CramMaster contains 450+ questions, multiple-choice answers, detailed explanations, and comes bundled with select content from the 70-640 Exam Cram book. Candidates for this exam typically have a minimum of one year of experience implementing and administering a network operating system in an environment of 250 to 5,000 or more users, three or more physical locations and three or more domain controllers. Microsoft 70-640 Windows Server 2008 covers the following recommended objective categories:
Request Free! |
Target Data Breach Outlines Need for Application Whitelisting, Flaws in PCI-DSS
Space Weather Outlook January 20, 2014 at 02:21AM
Non-Profit "Securing The Net" to Provide Free Network Security for Small Businesses
According to the website:
This project is taking a non-profit approach to fixing security issues of small businesses by offering free support to secure their websites that would otherwise remain insecure due to budgets or inexperience to do it themselves.There are two parts to the campaign. First and foremost, the non-profit will offer to secure the networks of small businesses at no charge. By doing so, the data of the consumers held by the small business will be kept safe.
The second part of the campaign involves deployment of multiple honeypots in an effort to track the attackers who would prey on small businesses.
As of this post, Securing The Net had recieved $270.00 of their initial $100,000 fundraising goal.
If you'd like to donate to Securing The Net, visit their WePay Donation Page.
Dissecting a World of Warcraft Phishing Attack
from: Blizzard Entertainment kang111329@gmail.com to: <removed>@gmail.com date: Thu, Jan 16, 2014 at 4:46 AM subject: Blizzard Entertainment - Account Investigation Notification mailed-by: gmail.com signed-by: gmail.com
Violates our policies for Battle.net
Dear customer,
Because you are involved in the trading of gold and equipment, legitimately means playing with an unaltered game client. Doing otherwise violates our policies for Battle.net, and it goes against the spirit of fair play that all of our games are based on. We strongly recommend that you avoid using any hacks, cheats, bots, or exploits. Suspensions and bans of players that have used or start using cheats and hacks.
You can confirm that you are the original owner of the account to this secure website with:
http://www.blizzardmory.com/login/login.aspx?ref=https%3A% 2F%2Fwww.worldofwarcraft.com% 2Faccount%2F&app=wamLogin to your account, In accordance following template to verify your account.
* Account Name and Password
* Secret Question and Answer
Show * Please enter the correct information
If you ignore this mail your account can and will be closed permanently.
If you wish to review our current Rules and Policies for World of Warcraft and Battle.net, they can be found at:
http://www.blizzardmory.com/login/login.aspx?ref=https%3A% 2F%2Fwww.worldofwarcraft.com% 2Faccount%2F&app=wamFor further security tips, please visit:
http://www.blizzardmory.comRegards,
Customer Services
Account Administration Team
Blizzard EntertainmentLet's take a look at the email in depth and analyze where this phish is coming from.
Free Certified Ethical Hacker v8 Exam Prep Study Guide
This comprehensive study guide helps you to prepare for the Certified Ethical Hacker (CEH) certification exam. This guide includes important must know topics, multiple choice practice and scenario questions which will help prepare for the rigorous exam created by the EC-Council. Request Free! |
Aberdeen Research Brief: Big Data for Marketing - Targeting Success
It’s hard to escape the hype around “Big Data” and the big promise that all that data can generate powerful and profitable intelligence. This research brief by Aberdeen provides some actionable insight regarding the potential for big data by looking at the strategies, processes, and technologies Best-in-Class firms are adopting around data analytics for marketing today. While adoption of “big data” per se is nascent, the transition to dynamic, behavior-based segmentation and targeting, and real-time management means companies are likely to see significant growth in the volume, velocity and variety of data. Request Free! |
The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
This review provides the first analysis of malware behavior that include not only analysis of how malware behaves on an infected host, but a full application level analysis of the infecting traffic as well as all traffic generated by the malware. Key Findings:
Request Free! |
10 Things Your Next Firewall Must Do
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. By downloading this offer, you'll find an insight and practical advice on:
Request Free! |
Solving Common Data Protection Challenges - Advice from the Trenches
Not only are they expected to protect every virtual machine and file in the datacenter but they must do it under the pressure of constant change. Find out how what smart admins are doing to make data protection, disaster recovery, data restoration, and server consolidation, easy in this white paper by vExpert, David Davis. Request Free! |
Achieving Best Practices for Virtual Machine Backup and Recovery
Download now to find out how each solution measured up against best practices in virtual data protection. Request Free! |
Aberdeen Research Brief: Big Data for Marketing - Targeting Success
It’s hard to escape the hype around “Big Data” and the big promise that all that data can generate powerful and profitable intelligence. This research brief by Aberdeen provides some actionable insight regarding the potential for big data by looking at the strategies, processes, and technologies Best-in-Class firms are adopting around data analytics for marketing today. While adoption of “big data” per se is nascent, the transition to dynamic, behavior-based segmentation and targeting, and real-time management means companies are likely to see significant growth in the volume, velocity and variety of data. Request Free! |
Space Weather Outlook January 13, 2014 at 02:58AM
Beginners Guide to SSL
Not only does it make you feel safer but it also protects people who visit your home, place of business or Web site. It is important to understand the potential risks and then to make sure you are fully protected against them. In the fast paced world of technology, it is not always easy to stay abreast of the latest advancements. Request Free! |
Website Security Threat Report
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online. Request Free! |
Understanding DNS Terminology
To help people who are new to the world of DNS, those looking to learn more, or even seasoned veterans who want a refresher, we’ve compiled a list of the need-to-know DNS terms along with their definitions. From A records to zones, this list will get you on the right track towards becoming a DNS pro. Request Free! |
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
Security threats against DNS infrastructure are both serious and growing. In fact, according to a 2013 Arbor Networks survey, the largest DDoS attack (60 Gbps) targeted DNS infrastructure. When it comes to keeping your DNS secure, do you know what you’re up against? In this white paper, we’ll review five of the most pervasive DNS threats that you need to be thinking about, and how to keep them from creating a performance or security nightmare. Request Free! |
Securing Multiple Domains with SSL
Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certificate. Read this white paper to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs. Request Free! |
SSL 101: A Guide to Fundamental Website Security
Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is Secure Sockets Layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online. Request Free! |
Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams
If you have a website and do business online, you are probably at risk. Fortunately, there is an effective way to protect your customers, your company and your brand from phishing: SSL and Extended Validation (EV) SSL. In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line. Request Free! |
Master List of DNS Terminology
In this eBook, you’ll find the most common DNS terms and their definitions to help you better understand DNS. From A records to zones, this list will get you on the right track towards becoming a DNS pro. Request Free! |
5 DNS Security Risks That Keep You Up At Night
Who knew that there were so many ways to threaten the security of your DNS? Find out all of the scary details about these attacks and what you can do to prevent them. Request Free! |
The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook
The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions. The following kit contents will help you get the most out of your Information Security research:
Request Free! |