Jump to content


  • Tweets

  • Posts

    • i dont think the reason why the defendant lost the case means anything at all in that case. it was a classic judge lottery example.
    • Hello, I will try to outline everything clearly. I am a British citizen and I live in Luxembourg (I think this may be relevant for potential claims). I hired a car from Heathrow in March for a 3-day visit to family in the UK. I was "upgraded" to an EV (Polestar 2). I had a 250-mile journey to my family's address. Upon attempting to charge the vehicle, there was a red error message on the dashboard, saying "Charging error". I attempted to charge at roughly 10 different locations and got the same error message. Sometimes there was also an error message on the charging station screen. The Hertz 0800 assistance/breakdown number provided on the set of keys did not work with non-UK mobiles. I googled and found a bunch of other numbers, none of which were normal geographical ones, and none of which worked from my Luxembourg mobile. It was getting late and I was very short on charge. Also, there was no USB socket in the car, so my phone ran out of battery, so I was unable to look for further help online. It became clear that I would not reach my destination (rural Devon), so I had no choice but to find a roadside hotel in Exeter and then go to the nearest Hertz branch the following day on my remaining 10 miles of charge. Of course, as soon as the Hertz employee in Exeter plugged it into their own charger, the charging worked immediately. I have driven EVs before, I know how to charge them, and it definitely did not work at about 10 different chargers between London and Exeter. I took photos on each occasion. Luckily they had another vehicle available and transferred me onto it. It was an identical Polestar 2 to the original car. 2 minutes down the road, to test it, I went to a charger and it worked immediately. I also charged with zero issues at 2 other chargers before returning the vehicle. I think this shows that it was a charging fault with the first car and not my inability to do it properly. I wrote to Hertz, sending the hotel, dinner, breakfast and hotel parking receipt and asking for a refund of these expenses caused by the charging failure in the original car. They replied saying they "could not issue a refund" and they issued me with a voucher for 50 US dollars to use within the next year. Obviously I have no real proof that the charging didn't work. My guess is they will say that the photos don't prove that I was charging correctly, just that it shows an error message and a picture of a charger plugged into a car, without being able to see the detail. Could you advise whether I have a case to go further? I am not after a refund or compensation, I just want my £200 back that I had to spend on expenses. I think I have two possibilities (or maybe one - see below). It looks like the UK is still part of the European Consumer Centre scheme:  File a complaint with ECC Luxembourg | ECC-Net digital forms ECCWEBFORMS.EU   Would this be a good point to start from? Alternatively, the gov.uk money claims service. But the big caveat is you need a "postal address in the UK". In practice, do I have to have my primary residence in the UK, or can I use e.g. a family member's address, presumably just as an address for service, where they can forward me any relevant mail? Do they check that the claimant genuinely lives in the UK? "Postal address" is not the same as "Residence" - anyone can get a postal address in the UK without living there. But I don't want to cheat the system or have a claim denied because of it. TIA for any help!  
    • Sars request sent on 16th March and also sent a complaint separately to Studio. Have received no response. Both letters were received and signed for.  I was also told by the financial ombudsman that studio were investigating but I've also had no response to that either.  The only thing Studio have sent me is a default notice.  Any ideas of what I can do from here please 
    • Thanks Bank - I shall tweak my draft and repost. And here's today's ridiculous email from the P2G 'Claims Dept' Good Morning,  Thank you for you email. Unfortunately we would be unable to pay the amount advised in your previous email.  When you placed the order, you were asked for the value of your parcel, you stated that the value was £265.00. At this stage the booking advised that you were covered to £20.00 and to enhance this to £260.00 you could pay an extra £13.99 + VAT to fully cover your item for loss or damage during transit, you declined to fully cover your item.  Towards the end of your booking on the confirmation page, you were then offered to take cover again, to which you declined again.  Unfortunately, we would be unable to offer you an enhanced payment on this occasion.  If I can assist further, please do let me know.  Kindest Regards Claims Team and my response Good Afternoon  Do you not understand the court cases of PENCHEV v P2G (225MC852) and SMIRNOVS v P2G (27MC729)? In both cases it was held by the courts that there was no need for additional ‘cover’ or ‘protection’ (or whatever you wish to call it) on top of the standard delivery charge, and P2G were required to pay up in full for both cases, which by then also included court costs and interest. I shall be including copies of both those judgements in the bundle I submit to the court next Wednesday 1 May, unless you settle my claim (£274.10) in full before then. Tick tock…..    
    • IMG_2820-IMG_2820-merged.pdfmerged.pdf Case management was this morning. Here is the Sheriff’s order. Moved case forward to 24/05.   He said there was no signed agreement and after a bit of “erm, erm, yeah but, erm” when he asked them, he allowed time for sol to contact claimant.  what is the next step now? thank you UCM  
  • Recommended Topics

  • Our picks

    • If you are buying a used car – you need to read this survival guide.
      • 1 reply
    • Hello,

      On 15/1/24 booked appointment with Big Motoring World (BMW) to view a mini on 17/1/24 at 8pm at their Enfield dealership.  

      Car was dirty and test drive was two circuits of roundabout on entry to the showroom.  Was p/x my car and rushed by sales exec and a manager into buying the mini and a 3yr warranty that night, sale all wrapped up by 10pm.  They strongly advised me taking warranty out on car that age (2017) and confirmed it was honoured at over 500 UK registered garages.

      The next day, 18/1/24 noticed amber engine warning light on dashboard , immediately phoned BMW aftercare team to ask for it to be investigated asap at nearest garage to me. After 15 mins on hold was told only their 5 service centres across the UK can deal with car issues with earliest date for inspection in March ! Said I’m not happy with that given what sales team advised or driving car. Told an amber warning light only advisory so to drive with caution and call back when light goes red.

      I’m not happy to do this, drive the car or with the after care experience (a sign of further stresses to come) so want a refund and to return the car asap.

      Please can you advise what I need to do today to get this done. 
       

      Many thanks 
      • 81 replies
    • Housing Association property flooding. https://www.consumeractiongroup.co.uk/topic/438641-housing-association-property-flooding/&do=findComment&comment=5124299
      • 161 replies
    • We have finally managed to obtain the transcript of this case.

      The judge's reasoning is very useful and will certainly be helpful in any other cases relating to third-party rights where the customer has contracted with the courier company by using a broker.
      This is generally speaking the problem with using PackLink who are domiciled in Spain and very conveniently out of reach of the British justice system.

      Frankly I don't think that is any accident.

      One of the points that the judge made was that the customers contract with the broker specifically refers to the courier – and it is clear that the courier knows that they are acting for a third party. There is no need to name the third party. They just have to be recognisably part of a class of person – such as a sender or a recipient of the parcel.

      Please note that a recent case against UPS failed on exactly the same issue with the judge held that the Contracts (Rights of Third Parties) Act 1999 did not apply.

      We will be getting that transcript very soon. We will look at it and we will understand how the judge made such catastrophic mistakes. It was a very poor judgement.
      We will be recommending that people do include this adverse judgement in their bundle so that when they go to county court the judge will see both sides and see the arguments against this adverse judgement.
      Also, we will be to demonstrate to the judge that we are fair-minded and that we don't mind bringing everything to the attention of the judge even if it is against our own interests.
      This is good ethical practice.

      It would be very nice if the parcel delivery companies – including EVRi – practised this kind of thing as well.

       

      OT APPROVED, 365MC637, FAROOQ, EVRi, 12.07.23 (BRENT) - J v4.pdf
        • Like
  • Recommended Topics

Bugs/Viruses/Malware etc


style="text-align: center;">  

Thread Locked

because no one has posted on it for the last 2540 days.

If you need to add something to this thread then

 

Please click the "Report " link

 

at the bottom of one of the posts.

 

If you want to post a new story then

Please

Start your own new thread

That way you will attract more attention to your story and get more visitors and more help 

 

Thanks

Recommended Posts

  • Replies 80
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Most viruses I find are via emails which come into my trash bin e.g Paypal, Various banks, failed delivery notice, court hearing notification. Banks don't send such emails with attachments. With the emails from banks, it says something like, NatWest failed credit and there is usually an attachment. I have forwarded these (unopen) to NatWest phishing email address and they have reported back that malware was found. You should never attempt to open attachments on emails you were not expecting.

 

Another thing worth doing is to instal a decent ad blocker. I have added the Firefox ad blocker, as well as the one that comes with my security software and it seems to stop a lot of viruses. Many ads/pop up screens seen to contain viruses/bugs. The ad blocker software stops the ads/pop up screens and may stop you getting viruses.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 Have we helped you ...?         Please Donate button to the Consumer Action Group

 

If you want advice on your thread please PM me a link to your thread

Link to post
Share on other sites

 

as others have said, the scams are not new, but have recently been 'shut down' by the 5 O. seems then the '2 weeks' is a 'nudge' to get/check your system clean and protected before it starts up again elsewhere.

 

 

New android phone 'nasty' ka 'android simplocker' ransomware

http://www.theregister.co.uk/2014/06/04/android_simplocker_file_scrambling_ransomware/

Link to post
Share on other sites

  • 2 weeks later...

'new' malware on the way?

http://www.theregister.co.uk/2014/06/13/pricey_ground_up_built_malware_constantly_infects_everything/

 

'Pandemiya is a new commercial Trojan malware application that has recently been promoted in underground forums as an alternative to more widely used Zeus Trojan and its variants..' RSA, link within.

Link to post
Share on other sites

'Yet another banking trojan ('similar to zeus') has appeared, using browser hooking to steal data from Internet Explorer, Chrome and Firefox users.....CSIS also warns that the payload's code suggests a future attack is planned, in which th phishing e-mail will purport to be a Flash Player update'

http://www.theregister.co.uk/2014/06/17/another_rat_crawls_out_of_the_malware_drain/

Link to post
Share on other sites

  • 3 months later...

I suspect that all computers can be hacked and subject to viruses. If you click on the wrong internet site or an email attachment, you may end up with malware.

 

I have online protection which I presume is OK and I update my system regularly, so I just hope that I am not infected. But you can take so many precautions.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 Have we helped you ...?         Please Donate button to the Consumer Action Group

 

If you want advice on your thread please PM me a link to your thread

Link to post
Share on other sites

Remember viruses that used to be spread via infected MBR sectors on floppies ?

 

Well, it looks like (some) USB devices are vulnerable to a hack that allows a payload to be invisibly carried around. http://www.theregister.co.uk/2014/07/31/black_hat_hackers_drive_truck_through_hole_in_usb_security/

PLEASE HELP US TO KEEP THIS SITE RUNNING

EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 

No... you can't eat my brain just yet. I need it a little while longer.

Link to post
Share on other sites

I suspect that all computers can be hacked and subject to viruses. If you click on the wrong internet site or an email attachment, you may end up with malware.

 

 

 

indeed. pretty much any system/site etc c/b hackable, depending on the ambitions/experience of the hacker. at least known bugs/viruses/exploits etc can be dealt with/prevented by AV's/cloud/user etc

 

for anyone looking to 'turn off' ssl 3, see second link post #10 (Internet Storm Centre link within)

ie https://isc.sans.edu/forums/diary/POODLE+Turning+off+SSLv3+for+various+servers+and+client+/18837

 

certain browsers 'fixed'/due to be fixed accordingly.

Link to post
Share on other sites

  • 4 weeks later...

hacker 'contest' exposes mob phone vulnerabilities :)

'The vulnerabilities were quietly shipped off to the respective vendors for patching while tens of thousands of dollars in prize money was handed out to successful hackers'

http://www.theregister.co.uk/2014/11/13/mobile_carnage_as_hackers_pop_your_favourite_phones/

 

 

re windows, ensure you are patched re '18 yr old' vuln etc

http://www.theregister.co.uk/2014/11/12/driveby_unicorn_0day_beats_emet_affects_all_windows_versions/

Link to post
Share on other sites

  • 3 weeks later...

'super malware' Regin, 'one of the most advanced pieces of spyware code yet found', 'appears to target people working in telecommunications, including internet backbone providers and cellular networks, plus the energy sector – where Yahoo! Messenger is apparently popular...'

intelligence agencies responsible? 'All in all, it seems to be the handiwork of an intelligence agency rather than a run-of-the-mill malware writer, infosec bods have concluded.'

 

http://www.theregister.co.uk/2014/11/24/regin_the_supersecret_spyware_the_security_industry_has_been_silent_about/

http://www.theregister.co.uk/2014/11/24/regin/

http://www.theregister.co.uk/2014/11/26/symantec_explains_why_regin_fingering_took_so_long_and_who_its_coming_for_next/

 

etc

Link to post
Share on other sites

  • 5 weeks later...

'Crooks behind Vawtrak, a dangerous banking Trojan, are ramping up its reach and sophistication, security firms have warned...........Vawtrak is typically delivered through one of three different method: as the payload of an exploit kit, through malicious spam email attachments or by getting downloaded onto already compromised systems as a secondary malware infection.....'

 

http://www.theregister.co.uk/2014/12/27/vawtrak_challenges_almighty_zeus_as_king_of_the_botnets/

Link to post
Share on other sites

  • 2 weeks later...

just some info :)

 

'Microsoft is facing fierce criticism over its decision to make pre-notification of upcoming patches available only to paid subscribers.....'

http://www.theregister.co.uk/2015/01/09/ms_restricts_security_pre_alerts/

 

'Some members of Anonymous have vowed to avenge the Charlie Hebdo killings in Paris by taking down jihadist websites...'

http://www.theregister.co.uk/2015/01/09/anon_op_charlie_hebdo/

Link to post
Share on other sites

  • 2 weeks later...

Adobe Issues Emergency Flash Patch

(January 22, 2015)

Adobe has released an emergency patch for Flash on Thursday, January 22 to address a vulnerability that is being actively exploited (see story below). The most current versions are now Flash Player 16.0.0.287 for Windows and Mac OS X, Flash Player 11.2.202.438 for Linux, and Flash Player Extended Support Release 13.0.0.262.

ISC: https://isc.sans.edu/forums/diary/OOB+Adobe+patch/19217/

http://krebsonsecurity.com/2015/01/flash-patch-targets-zero-day-exploit/

http://www.scmagazine.com/adobe-issues-emergency-fix-for-flash-player-vulnerability/article/393977/

http://www.computerworld.com/article/2873541/adobe-fixes-just-one-of-two-zero-day-flaw-in-flash-player.html

I work in IT and 50% of my time is around Cyber security I can advise around personal safety but would say this at some point you will be breached or hacked whether that is on your personal PC, Tablet or Smartphone.

Also any data you have provided to any financial, insurance, retail institution, etc will not be protected from a persistant, deliberate or mailcious hack.

If they are sensible enough, they will use segregation at a physical and logical layer for systems and user access, which may dilute the information but will not prevent some of it being hacked.

I just hope there is not enough out there to allow easy fraud and directly addressed phising.

I have seen hardware adapted like a USB mice with key logging techology inside and other trojans.Excel still has a vulnerability (will not be patched) that if using a macro enabled spreadsheet can give instant remote access to attacker with hidden calls to functions (it went through on Mac, Win 7 and Win 8 "PROTECTED" by Symantec, Windows Defender, AGV and MS Security Essentials all up to date.

Good site for news is SANS.Org

Link to post
Share on other sites

  • 2 weeks later...

thanks. further flash patches, update now.

'People still using Adobe Flash should update the plugin after the Photoshop giant patched 15 remote-code execution holes in its screen-door software.

If hackers aren't already exploiting all these holes in the wild, they soon will be. The remote-code exec bugs allow miscreants to hijack vulnerable Windows, OS X and Linux computers, simply by luring victims to websites booby-trapped with malicious Flash files......'

http://www.theregister.co.uk/2015/02/05/adobesighpatches_anothersighflash_zeroday_vulnerability/

Link to post
Share on other sites

thanks. further flash patches, update now.

'People still using Adobe Flash should update the plugin after the Photoshop giant patched 15 remote-code execution holes in its screen-door software.

If hackers aren't already exploiting all these holes in the wild, they soon will be. The remote-code exec bugs allow miscreants to hijack vulnerable Windows, OS X and Linux computers, simply by luring victims to websites booby-trapped with malicious Flash files......'

http://www.theregister.co.uk/2015/02/05/adobesighpatches_anothersighflash_zeroday_vulnerability/

 

 

Nasty, the Register gives the best cure Uninstall Flash.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

Have we helped you ...?         Please Donate button to the Consumer Action Group

If you want advice on your thread please PM me a link to your thread

The bailiff: A 12th Century solution re-branded as Enforcement Agents for the 21st Century to seize and sell debtors goods as before Oh so Dickensian!

Link to post
Share on other sites

I have had several alerts in the last week of attempted network attacks which have been blocked. These have originated from China and Russia, if the information provided is correct.

 

Make sure you have good firewall security in place, as there is apparently increased use of peoples routers to help with DDOS attacks.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 Have we helped you ...?         Please Donate button to the Consumer Action Group

 

If you want advice on your thread please PM me a link to your thread

Link to post
Share on other sites

., the Register gives the best cure Uninstall Flash.

 

 

sound advice.

but certain 'major' sites still use it eg bbc. and, went on tube and it still asked for flash before playing a vid. am sure my browser is html5 compat!

 

for ref, this is the registers comment re flash

'Flash has been around in one form or another for nearly 20 years, and it's time for those who are still supporting its use to accept the inevitable: it's time to take the software round the back of the shed and shoot it.........'

http://www.theregister.co.uk/2015/02/02/its_time_to_flush_flash_if_you_havent_already_enough_is_enough/

Link to post
Share on other sites

  • 2 weeks later...

'The world's biggest SIM card manufacturer, Gemalto, revealed (re Snowden leak) yesterday to have been hacked by the NSA and GCHQ...'

 

you guessed it, the register :)

http://www.theregister.co.uk/2015/02/20/gemalto_sim_surveillance_fallout/

http://www.theregister.co.uk/2015/02/19/nsa_and_gchq_hacked_worlds_largest_sim_card_company_to_steal_keys_to_kingdom/

Link to post
Share on other sites

  • Recently Browsing   0 Caggers

    • No registered users viewing this page.

  • Have we helped you ...?


×
×
  • Create New...