Jump to content


  • Tweets

  • Posts

    • I'm still pondering/ trying to find docs re the above issue. Moving on - same saga; different issue I'm trying to understand what I can do: The lender/ mortgagee-in-possession has a claim v me for alleged debt. But the debt has only been incurred due to them failing to sell property in >5y. I'm fighting them on this.   I've been trying to get an order for sale for 2y.  I got it legally added into my counterclaim - but that will only be dealt with at trial.  This is really frustrating. The otherside's lawyers made an application to adjourn trial for a few more months - allegedly wanting to try sort some kind of settlement with me and to use the stay to sell.  At the hearing I asked Judge to expedite the order for sale. I pointed out they need a court-imposed deadline or this adjournment is just another time wasting tactic (with interest still accruing) as they have no buyer.  But the judge said he could legally only deal with the order at trial. The otherside don't want to be forced to sell the property.. Disclosure has presented so many emails which prove they want to keep it. I raised some points with the judge including misconduct of the receiver. The judge suggested I may have a separate claim against the receiver?   On this point - earlier paid-for lawyers said my counterclaim should be directed at the lender for interference with the receiver and the lender should be held responsible for the receiver's actions/ inactions.   I don't clearly understand that, but their legal advice was something to do with the role a receiver has acting as an agent for a borrower which makes it hard for a borrower to make a claim against a receiver ???.  However the judge's comment has got me thinking.  He made it clear the current claim is lender v me - it's not receiver v me.  Yet it is the receiver who is appointed to sell the property. (The receiver is mentioned/ involved in my counterclaim only from the lender collusion/ interference perspective).  So would I be able to make a separate application for an order for sale against the receiver?  Disclosure shows receiver has constantly rejected offers. He gave a contract to one buyer 4y ago. But colluded with the lender's lawyer to withdraw the contract after 2w to instead give it to the ceo of the lender (his own ltd co) (using same lawyer).  Emails show it was their joint strategy for lender/ ceo to keep the property.  The receiver didn't put the ceo under any pressure to exchange quickly.  After 1 month they all colluded again to follow a very destructive path - to gut the property.  My account was apparently switched into a "different fund" to "enable them to do works" (probably something to do with the ceo as he switched his ltd co accountant to in-house).   Interestingly the receiver told lender not to incur significant works costs and to hold interest.  The costs were huge (added to my account) and interest was not held.   The receiver rejected a good offer put forward by me 1.5y ago.  And he rejected a high offer 1y ago - to the dismay of the agent.  Would reasons like this be good enough to make a separate application to the court against the receiver for an order for sale ??  Or due to the main proceedings and/or the weird relationship a borrower has with a receiver I cannot ?
    • so a new powerless B2B debt DCA set up less than a month ago with a 99% success rate... operating on a NWNF basis , but charging £30 to set up your use of them. that's gonna last 5mins.... = SPAMMERS AND SCAMMERS. a DCA is NOT a BAILIFF and have  ZERO legal powers on ANY debt - no matter WHAT its type. dx      
    • Migrants are caught in China's manufacturing battles with the West, as Beijing tries to save its economy.View the full article
    • You could send an SAR to DCbl on the pretext that you are going for a breach of your GDPR . They should then send the purported letter of discontinuance which may show why it ended up in Gloucester and see if you can get your  costs back on the day. It obviously won't be much but  at least perhaps a small recompense for your wasted day. Not exactly wasted since you had a great win  albeit much sweeter if you had beat them in Court. But a win is a win so well done. We will miss you as it has been almost two years since you first started out on this mission. { I would n't be surprised if the wrong Court was down to DCBL}. I see you said "till the next time" but I am guessing you will be avoiding private patrolled car parks for a while.🙂
    • It is extremely disappointing that you haven't told us anything about the result of the hearing. You came here at the very last minute and the regulars - all unpaid volunteers - sweated blood trying to get an acceptable Witness Statement prepared in an extremely short time. The least you could have done is tell us how the hearing went, information invaluable for future users. Evidently not.
  • Recommended Topics

  • Our picks

    • If you are buying a used car – you need to read this survival guide.
      • 1 reply
    • Hello,

      On 15/1/24 booked appointment with Big Motoring World (BMW) to view a mini on 17/1/24 at 8pm at their Enfield dealership.  

      Car was dirty and test drive was two circuits of roundabout on entry to the showroom.  Was p/x my car and rushed by sales exec and a manager into buying the mini and a 3yr warranty that night, sale all wrapped up by 10pm.  They strongly advised me taking warranty out on car that age (2017) and confirmed it was honoured at over 500 UK registered garages.

      The next day, 18/1/24 noticed amber engine warning light on dashboard , immediately phoned BMW aftercare team to ask for it to be investigated asap at nearest garage to me. After 15 mins on hold was told only their 5 service centres across the UK can deal with car issues with earliest date for inspection in March ! Said I’m not happy with that given what sales team advised or driving car. Told an amber warning light only advisory so to drive with caution and call back when light goes red.

      I’m not happy to do this, drive the car or with the after care experience (a sign of further stresses to come) so want a refund and to return the car asap.

      Please can you advise what I need to do today to get this done. 
       

      Many thanks 
      • 81 replies
    • Housing Association property flooding. https://www.consumeractiongroup.co.uk/topic/438641-housing-association-property-flooding/&do=findComment&comment=5124299
      • 161 replies
    • We have finally managed to obtain the transcript of this case.

      The judge's reasoning is very useful and will certainly be helpful in any other cases relating to third-party rights where the customer has contracted with the courier company by using a broker.
      This is generally speaking the problem with using PackLink who are domiciled in Spain and very conveniently out of reach of the British justice system.

      Frankly I don't think that is any accident.

      One of the points that the judge made was that the customers contract with the broker specifically refers to the courier – and it is clear that the courier knows that they are acting for a third party. There is no need to name the third party. They just have to be recognisably part of a class of person – such as a sender or a recipient of the parcel.

      Please note that a recent case against UPS failed on exactly the same issue with the judge held that the Contracts (Rights of Third Parties) Act 1999 did not apply.

      We will be getting that transcript very soon. We will look at it and we will understand how the judge made such catastrophic mistakes. It was a very poor judgement.
      We will be recommending that people do include this adverse judgement in their bundle so that when they go to county court the judge will see both sides and see the arguments against this adverse judgement.
      Also, we will be to demonstrate to the judge that we are fair-minded and that we don't mind bringing everything to the attention of the judge even if it is against our own interests.
      This is good ethical practice.

      It would be very nice if the parcel delivery companies – including EVRi – practised this kind of thing as well.

       

      OT APPROVED, 365MC637, FAROOQ, EVRi, 12.07.23 (BRENT) - J v4.pdf
        • Like
  • Recommended Topics

Bugs/Viruses/Malware etc


style="text-align: center;">  

Thread Locked

because no one has posted on it for the last 2532 days.

If you need to add something to this thread then

 

Please click the "Report " link

 

at the bottom of one of the posts.

 

If you want to post a new story then

Please

Start your own new thread

That way you will attract more attention to your story and get more visitors and more help 

 

Thanks

Recommended Posts

  • Replies 80
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Most viruses I find are via emails which come into my trash bin e.g Paypal, Various banks, failed delivery notice, court hearing notification. Banks don't send such emails with attachments. With the emails from banks, it says something like, NatWest failed credit and there is usually an attachment. I have forwarded these (unopen) to NatWest phishing email address and they have reported back that malware was found. You should never attempt to open attachments on emails you were not expecting.

 

Another thing worth doing is to instal a decent ad blocker. I have added the Firefox ad blocker, as well as the one that comes with my security software and it seems to stop a lot of viruses. Many ads/pop up screens seen to contain viruses/bugs. The ad blocker software stops the ads/pop up screens and may stop you getting viruses.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 Have we helped you ...?         Please Donate button to the Consumer Action Group

 

If you want advice on your thread please PM me a link to your thread

Link to post
Share on other sites

 

as others have said, the scams are not new, but have recently been 'shut down' by the 5 O. seems then the '2 weeks' is a 'nudge' to get/check your system clean and protected before it starts up again elsewhere.

 

 

New android phone 'nasty' ka 'android simplocker' ransomware

http://www.theregister.co.uk/2014/06/04/android_simplocker_file_scrambling_ransomware/

Link to post
Share on other sites

  • 2 weeks later...

'new' malware on the way?

http://www.theregister.co.uk/2014/06/13/pricey_ground_up_built_malware_constantly_infects_everything/

 

'Pandemiya is a new commercial Trojan malware application that has recently been promoted in underground forums as an alternative to more widely used Zeus Trojan and its variants..' RSA, link within.

Link to post
Share on other sites

'Yet another banking trojan ('similar to zeus') has appeared, using browser hooking to steal data from Internet Explorer, Chrome and Firefox users.....CSIS also warns that the payload's code suggests a future attack is planned, in which th phishing e-mail will purport to be a Flash Player update'

http://www.theregister.co.uk/2014/06/17/another_rat_crawls_out_of_the_malware_drain/

Link to post
Share on other sites

  • 3 months later...

I suspect that all computers can be hacked and subject to viruses. If you click on the wrong internet site or an email attachment, you may end up with malware.

 

I have online protection which I presume is OK and I update my system regularly, so I just hope that I am not infected. But you can take so many precautions.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 Have we helped you ...?         Please Donate button to the Consumer Action Group

 

If you want advice on your thread please PM me a link to your thread

Link to post
Share on other sites

Remember viruses that used to be spread via infected MBR sectors on floppies ?

 

Well, it looks like (some) USB devices are vulnerable to a hack that allows a payload to be invisibly carried around. http://www.theregister.co.uk/2014/07/31/black_hat_hackers_drive_truck_through_hole_in_usb_security/

PLEASE HELP US TO KEEP THIS SITE RUNNING

EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 

No... you can't eat my brain just yet. I need it a little while longer.

Link to post
Share on other sites

I suspect that all computers can be hacked and subject to viruses. If you click on the wrong internet site or an email attachment, you may end up with malware.

 

 

 

indeed. pretty much any system/site etc c/b hackable, depending on the ambitions/experience of the hacker. at least known bugs/viruses/exploits etc can be dealt with/prevented by AV's/cloud/user etc

 

for anyone looking to 'turn off' ssl 3, see second link post #10 (Internet Storm Centre link within)

ie https://isc.sans.edu/forums/diary/POODLE+Turning+off+SSLv3+for+various+servers+and+client+/18837

 

certain browsers 'fixed'/due to be fixed accordingly.

Link to post
Share on other sites

  • 4 weeks later...

hacker 'contest' exposes mob phone vulnerabilities :)

'The vulnerabilities were quietly shipped off to the respective vendors for patching while tens of thousands of dollars in prize money was handed out to successful hackers'

http://www.theregister.co.uk/2014/11/13/mobile_carnage_as_hackers_pop_your_favourite_phones/

 

 

re windows, ensure you are patched re '18 yr old' vuln etc

http://www.theregister.co.uk/2014/11/12/driveby_unicorn_0day_beats_emet_affects_all_windows_versions/

Link to post
Share on other sites

  • 3 weeks later...

'super malware' Regin, 'one of the most advanced pieces of spyware code yet found', 'appears to target people working in telecommunications, including internet backbone providers and cellular networks, plus the energy sector – where Yahoo! Messenger is apparently popular...'

intelligence agencies responsible? 'All in all, it seems to be the handiwork of an intelligence agency rather than a run-of-the-mill malware writer, infosec bods have concluded.'

 

http://www.theregister.co.uk/2014/11/24/regin_the_supersecret_spyware_the_security_industry_has_been_silent_about/

http://www.theregister.co.uk/2014/11/24/regin/

http://www.theregister.co.uk/2014/11/26/symantec_explains_why_regin_fingering_took_so_long_and_who_its_coming_for_next/

 

etc

Link to post
Share on other sites

  • 5 weeks later...

'Crooks behind Vawtrak, a dangerous banking Trojan, are ramping up its reach and sophistication, security firms have warned...........Vawtrak is typically delivered through one of three different method: as the payload of an exploit kit, through malicious spam email attachments or by getting downloaded onto already compromised systems as a secondary malware infection.....'

 

http://www.theregister.co.uk/2014/12/27/vawtrak_challenges_almighty_zeus_as_king_of_the_botnets/

Link to post
Share on other sites

  • 2 weeks later...

just some info :)

 

'Microsoft is facing fierce criticism over its decision to make pre-notification of upcoming patches available only to paid subscribers.....'

http://www.theregister.co.uk/2015/01/09/ms_restricts_security_pre_alerts/

 

'Some members of Anonymous have vowed to avenge the Charlie Hebdo killings in Paris by taking down jihadist websites...'

http://www.theregister.co.uk/2015/01/09/anon_op_charlie_hebdo/

Link to post
Share on other sites

  • 2 weeks later...

Adobe Issues Emergency Flash Patch

(January 22, 2015)

Adobe has released an emergency patch for Flash on Thursday, January 22 to address a vulnerability that is being actively exploited (see story below). The most current versions are now Flash Player 16.0.0.287 for Windows and Mac OS X, Flash Player 11.2.202.438 for Linux, and Flash Player Extended Support Release 13.0.0.262.

ISC: https://isc.sans.edu/forums/diary/OOB+Adobe+patch/19217/

http://krebsonsecurity.com/2015/01/flash-patch-targets-zero-day-exploit/

http://www.scmagazine.com/adobe-issues-emergency-fix-for-flash-player-vulnerability/article/393977/

http://www.computerworld.com/article/2873541/adobe-fixes-just-one-of-two-zero-day-flaw-in-flash-player.html

I work in IT and 50% of my time is around Cyber security I can advise around personal safety but would say this at some point you will be breached or hacked whether that is on your personal PC, Tablet or Smartphone.

Also any data you have provided to any financial, insurance, retail institution, etc will not be protected from a persistant, deliberate or mailcious hack.

If they are sensible enough, they will use segregation at a physical and logical layer for systems and user access, which may dilute the information but will not prevent some of it being hacked.

I just hope there is not enough out there to allow easy fraud and directly addressed phising.

I have seen hardware adapted like a USB mice with key logging techology inside and other trojans.Excel still has a vulnerability (will not be patched) that if using a macro enabled spreadsheet can give instant remote access to attacker with hidden calls to functions (it went through on Mac, Win 7 and Win 8 "PROTECTED" by Symantec, Windows Defender, AGV and MS Security Essentials all up to date.

Good site for news is SANS.Org

Link to post
Share on other sites

  • 2 weeks later...

thanks. further flash patches, update now.

'People still using Adobe Flash should update the plugin after the Photoshop giant patched 15 remote-code execution holes in its screen-door software.

If hackers aren't already exploiting all these holes in the wild, they soon will be. The remote-code exec bugs allow miscreants to hijack vulnerable Windows, OS X and Linux computers, simply by luring victims to websites booby-trapped with malicious Flash files......'

http://www.theregister.co.uk/2015/02/05/adobesighpatches_anothersighflash_zeroday_vulnerability/

Link to post
Share on other sites

thanks. further flash patches, update now.

'People still using Adobe Flash should update the plugin after the Photoshop giant patched 15 remote-code execution holes in its screen-door software.

If hackers aren't already exploiting all these holes in the wild, they soon will be. The remote-code exec bugs allow miscreants to hijack vulnerable Windows, OS X and Linux computers, simply by luring victims to websites booby-trapped with malicious Flash files......'

http://www.theregister.co.uk/2015/02/05/adobesighpatches_anothersighflash_zeroday_vulnerability/

 

 

Nasty, the Register gives the best cure Uninstall Flash.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

Have we helped you ...?         Please Donate button to the Consumer Action Group

If you want advice on your thread please PM me a link to your thread

The bailiff: A 12th Century solution re-branded as Enforcement Agents for the 21st Century to seize and sell debtors goods as before Oh so Dickensian!

Link to post
Share on other sites

I have had several alerts in the last week of attempted network attacks which have been blocked. These have originated from China and Russia, if the information provided is correct.

 

Make sure you have good firewall security in place, as there is apparently increased use of peoples routers to help with DDOS attacks.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 Have we helped you ...?         Please Donate button to the Consumer Action Group

 

If you want advice on your thread please PM me a link to your thread

Link to post
Share on other sites

., the Register gives the best cure Uninstall Flash.

 

 

sound advice.

but certain 'major' sites still use it eg bbc. and, went on tube and it still asked for flash before playing a vid. am sure my browser is html5 compat!

 

for ref, this is the registers comment re flash

'Flash has been around in one form or another for nearly 20 years, and it's time for those who are still supporting its use to accept the inevitable: it's time to take the software round the back of the shed and shoot it.........'

http://www.theregister.co.uk/2015/02/02/its_time_to_flush_flash_if_you_havent_already_enough_is_enough/

Link to post
Share on other sites

  • 2 weeks later...

'The world's biggest SIM card manufacturer, Gemalto, revealed (re Snowden leak) yesterday to have been hacked by the NSA and GCHQ...'

 

you guessed it, the register :)

http://www.theregister.co.uk/2015/02/20/gemalto_sim_surveillance_fallout/

http://www.theregister.co.uk/2015/02/19/nsa_and_gchq_hacked_worlds_largest_sim_card_company_to_steal_keys_to_kingdom/

Link to post
Share on other sites

  • Recently Browsing   0 Caggers

    • No registered users viewing this page.

  • Have we helped you ...?


×
×
  • Create New...