Jump to content


  • Tweets

  • Posts

  • Recommended Topics

  • Our picks

    • If you are buying a used car – you need to read this survival guide.
        • Like
      • 1 reply
    • Hello,

      On 15/1/24 booked appointment with Big Motoring World (BMW) to view a mini on 17/1/24 at 8pm at their Enfield dealership.  

      Car was dirty and test drive was two circuits of roundabout on entry to the showroom.  Was p/x my car and rushed by sales exec and a manager into buying the mini and a 3yr warranty that night, sale all wrapped up by 10pm.  They strongly advised me taking warranty out on car that age (2017) and confirmed it was honoured at over 500 UK registered garages.

      The next day, 18/1/24 noticed amber engine warning light on dashboard , immediately phoned BMW aftercare team to ask for it to be investigated asap at nearest garage to me. After 15 mins on hold was told only their 5 service centres across the UK can deal with car issues with earliest date for inspection in March ! Said I’m not happy with that given what sales team advised or driving car. Told an amber warning light only advisory so to drive with caution and call back when light goes red.

      I’m not happy to do this, drive the car or with the after care experience (a sign of further stresses to come) so want a refund and to return the car asap.

      Please can you advise what I need to do today to get this done. 
       

      Many thanks 
      • 81 replies
    • Housing Association property flooding. https://www.consumeractiongroup.co.uk/topic/438641-housing-association-property-flooding/&do=findComment&comment=5124299
        • Like
      • 160 replies
    • We have finally managed to obtain the transcript of this case.

      The judge's reasoning is very useful and will certainly be helpful in any other cases relating to third-party rights where the customer has contracted with the courier company by using a broker.
      This is generally speaking the problem with using PackLink who are domiciled in Spain and very conveniently out of reach of the British justice system.

      Frankly I don't think that is any accident.

      One of the points that the judge made was that the customers contract with the broker specifically refers to the courier – and it is clear that the courier knows that they are acting for a third party. There is no need to name the third party. They just have to be recognisably part of a class of person – such as a sender or a recipient of the parcel.

      Please note that a recent case against UPS failed on exactly the same issue with the judge held that the Contracts (Rights of Third Parties) Act 1999 did not apply.

      We will be getting that transcript very soon. We will look at it and we will understand how the judge made such catastrophic mistakes. It was a very poor judgement.
      We will be recommending that people do include this adverse judgement in their bundle so that when they go to county court the judge will see both sides and see the arguments against this adverse judgement.
      Also, we will be to demonstrate to the judge that we are fair-minded and that we don't mind bringing everything to the attention of the judge even if it is against our own interests.
      This is good ethical practice.

      It would be very nice if the parcel delivery companies – including EVRi – practised this kind of thing as well.

       

      OT APPROVED, 365MC637, FAROOQ, EVRi, 12.07.23 (BRENT) - J v4.pdf
        • Like
  • Recommended Topics

Bugs/Viruses/Malware etc


style="text-align: center;">  

Thread Locked

because no one has posted on it for the last 2511 days.

If you need to add something to this thread then

 

Please click the "Report " link

 

at the bottom of one of the posts.

 

If you want to post a new story then

Please

Start your own new thread

That way you will attract more attention to your story and get more visitors and more help 

 

Thanks

Recommended Posts

  • Replies 80
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Most viruses I find are via emails which come into my trash bin e.g Paypal, Various banks, failed delivery notice, court hearing notification. Banks don't send such emails with attachments. With the emails from banks, it says something like, NatWest failed credit and there is usually an attachment. I have forwarded these (unopen) to NatWest phishing email address and they have reported back that malware was found. You should never attempt to open attachments on emails you were not expecting.

 

Another thing worth doing is to instal a decent ad blocker. I have added the Firefox ad blocker, as well as the one that comes with my security software and it seems to stop a lot of viruses. Many ads/pop up screens seen to contain viruses/bugs. The ad blocker software stops the ads/pop up screens and may stop you getting viruses.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 Have we helped you ...?         Please Donate button to the Consumer Action Group

 

If you want advice on your thread please PM me a link to your thread

Link to post
Share on other sites

 

as others have said, the scams are not new, but have recently been 'shut down' by the 5 O. seems then the '2 weeks' is a 'nudge' to get/check your system clean and protected before it starts up again elsewhere.

 

 

New android phone 'nasty' ka 'android simplocker' ransomware

http://www.theregister.co.uk/2014/06/04/android_simplocker_file_scrambling_ransomware/

Link to post
Share on other sites

  • 2 weeks later...

'new' malware on the way?

http://www.theregister.co.uk/2014/06/13/pricey_ground_up_built_malware_constantly_infects_everything/

 

'Pandemiya is a new commercial Trojan malware application that has recently been promoted in underground forums as an alternative to more widely used Zeus Trojan and its variants..' RSA, link within.

Link to post
Share on other sites

'Yet another banking trojan ('similar to zeus') has appeared, using browser hooking to steal data from Internet Explorer, Chrome and Firefox users.....CSIS also warns that the payload's code suggests a future attack is planned, in which th phishing e-mail will purport to be a Flash Player update'

http://www.theregister.co.uk/2014/06/17/another_rat_crawls_out_of_the_malware_drain/

Link to post
Share on other sites

  • 3 months later...

I suspect that all computers can be hacked and subject to viruses. If you click on the wrong internet site or an email attachment, you may end up with malware.

 

I have online protection which I presume is OK and I update my system regularly, so I just hope that I am not infected. But you can take so many precautions.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 Have we helped you ...?         Please Donate button to the Consumer Action Group

 

If you want advice on your thread please PM me a link to your thread

Link to post
Share on other sites

Remember viruses that used to be spread via infected MBR sectors on floppies ?

 

Well, it looks like (some) USB devices are vulnerable to a hack that allows a payload to be invisibly carried around. http://www.theregister.co.uk/2014/07/31/black_hat_hackers_drive_truck_through_hole_in_usb_security/

PLEASE HELP US TO KEEP THIS SITE RUNNING

EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 

No... you can't eat my brain just yet. I need it a little while longer.

Link to post
Share on other sites

I suspect that all computers can be hacked and subject to viruses. If you click on the wrong internet site or an email attachment, you may end up with malware.

 

 

 

indeed. pretty much any system/site etc c/b hackable, depending on the ambitions/experience of the hacker. at least known bugs/viruses/exploits etc can be dealt with/prevented by AV's/cloud/user etc

 

for anyone looking to 'turn off' ssl 3, see second link post #10 (Internet Storm Centre link within)

ie https://isc.sans.edu/forums/diary/POODLE+Turning+off+SSLv3+for+various+servers+and+client+/18837

 

certain browsers 'fixed'/due to be fixed accordingly.

Link to post
Share on other sites

  • 4 weeks later...

hacker 'contest' exposes mob phone vulnerabilities :)

'The vulnerabilities were quietly shipped off to the respective vendors for patching while tens of thousands of dollars in prize money was handed out to successful hackers'

http://www.theregister.co.uk/2014/11/13/mobile_carnage_as_hackers_pop_your_favourite_phones/

 

 

re windows, ensure you are patched re '18 yr old' vuln etc

http://www.theregister.co.uk/2014/11/12/driveby_unicorn_0day_beats_emet_affects_all_windows_versions/

Link to post
Share on other sites

  • 3 weeks later...

'super malware' Regin, 'one of the most advanced pieces of spyware code yet found', 'appears to target people working in telecommunications, including internet backbone providers and cellular networks, plus the energy sector – where Yahoo! Messenger is apparently popular...'

intelligence agencies responsible? 'All in all, it seems to be the handiwork of an intelligence agency rather than a run-of-the-mill malware writer, infosec bods have concluded.'

 

http://www.theregister.co.uk/2014/11/24/regin_the_supersecret_spyware_the_security_industry_has_been_silent_about/

http://www.theregister.co.uk/2014/11/24/regin/

http://www.theregister.co.uk/2014/11/26/symantec_explains_why_regin_fingering_took_so_long_and_who_its_coming_for_next/

 

etc

Link to post
Share on other sites

  • 5 weeks later...

'Crooks behind Vawtrak, a dangerous banking Trojan, are ramping up its reach and sophistication, security firms have warned...........Vawtrak is typically delivered through one of three different method: as the payload of an exploit kit, through malicious spam email attachments or by getting downloaded onto already compromised systems as a secondary malware infection.....'

 

http://www.theregister.co.uk/2014/12/27/vawtrak_challenges_almighty_zeus_as_king_of_the_botnets/

Link to post
Share on other sites

  • 2 weeks later...

just some info :)

 

'Microsoft is facing fierce criticism over its decision to make pre-notification of upcoming patches available only to paid subscribers.....'

http://www.theregister.co.uk/2015/01/09/ms_restricts_security_pre_alerts/

 

'Some members of Anonymous have vowed to avenge the Charlie Hebdo killings in Paris by taking down jihadist websites...'

http://www.theregister.co.uk/2015/01/09/anon_op_charlie_hebdo/

Link to post
Share on other sites

  • 2 weeks later...

Adobe Issues Emergency Flash Patch

(January 22, 2015)

Adobe has released an emergency patch for Flash on Thursday, January 22 to address a vulnerability that is being actively exploited (see story below). The most current versions are now Flash Player 16.0.0.287 for Windows and Mac OS X, Flash Player 11.2.202.438 for Linux, and Flash Player Extended Support Release 13.0.0.262.

ISC: https://isc.sans.edu/forums/diary/OOB+Adobe+patch/19217/

http://krebsonsecurity.com/2015/01/flash-patch-targets-zero-day-exploit/

http://www.scmagazine.com/adobe-issues-emergency-fix-for-flash-player-vulnerability/article/393977/

http://www.computerworld.com/article/2873541/adobe-fixes-just-one-of-two-zero-day-flaw-in-flash-player.html

I work in IT and 50% of my time is around Cyber security I can advise around personal safety but would say this at some point you will be breached or hacked whether that is on your personal PC, Tablet or Smartphone.

Also any data you have provided to any financial, insurance, retail institution, etc will not be protected from a persistant, deliberate or mailcious hack.

If they are sensible enough, they will use segregation at a physical and logical layer for systems and user access, which may dilute the information but will not prevent some of it being hacked.

I just hope there is not enough out there to allow easy fraud and directly addressed phising.

I have seen hardware adapted like a USB mice with key logging techology inside and other trojans.Excel still has a vulnerability (will not be patched) that if using a macro enabled spreadsheet can give instant remote access to attacker with hidden calls to functions (it went through on Mac, Win 7 and Win 8 "PROTECTED" by Symantec, Windows Defender, AGV and MS Security Essentials all up to date.

Good site for news is SANS.Org

Link to post
Share on other sites

  • 2 weeks later...

thanks. further flash patches, update now.

'People still using Adobe Flash should update the plugin after the Photoshop giant patched 15 remote-code execution holes in its screen-door software.

If hackers aren't already exploiting all these holes in the wild, they soon will be. The remote-code exec bugs allow miscreants to hijack vulnerable Windows, OS X and Linux computers, simply by luring victims to websites booby-trapped with malicious Flash files......'

http://www.theregister.co.uk/2015/02/05/adobesighpatches_anothersighflash_zeroday_vulnerability/

Link to post
Share on other sites

thanks. further flash patches, update now.

'People still using Adobe Flash should update the plugin after the Photoshop giant patched 15 remote-code execution holes in its screen-door software.

If hackers aren't already exploiting all these holes in the wild, they soon will be. The remote-code exec bugs allow miscreants to hijack vulnerable Windows, OS X and Linux computers, simply by luring victims to websites booby-trapped with malicious Flash files......'

http://www.theregister.co.uk/2015/02/05/adobesighpatches_anothersighflash_zeroday_vulnerability/

 

 

Nasty, the Register gives the best cure Uninstall Flash.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

Have we helped you ...?         Please Donate button to the Consumer Action Group

If you want advice on your thread please PM me a link to your thread

The bailiff: A 12th Century solution re-branded as Enforcement Agents for the 21st Century to seize and sell debtors goods as before Oh so Dickensian!

Link to post
Share on other sites

I have had several alerts in the last week of attempted network attacks which have been blocked. These have originated from China and Russia, if the information provided is correct.

 

Make sure you have good firewall security in place, as there is apparently increased use of peoples routers to help with DDOS attacks.

We could do with some help from you.

PLEASE HELP US TO KEEP THIS SITE RUNNING EVERY POUND DONATED WILL HELP US TO KEEP HELPING OTHERS

 

 Have we helped you ...?         Please Donate button to the Consumer Action Group

 

If you want advice on your thread please PM me a link to your thread

Link to post
Share on other sites

., the Register gives the best cure Uninstall Flash.

 

 

sound advice.

but certain 'major' sites still use it eg bbc. and, went on tube and it still asked for flash before playing a vid. am sure my browser is html5 compat!

 

for ref, this is the registers comment re flash

'Flash has been around in one form or another for nearly 20 years, and it's time for those who are still supporting its use to accept the inevitable: it's time to take the software round the back of the shed and shoot it.........'

http://www.theregister.co.uk/2015/02/02/its_time_to_flush_flash_if_you_havent_already_enough_is_enough/

Link to post
Share on other sites

  • 2 weeks later...

'The world's biggest SIM card manufacturer, Gemalto, revealed (re Snowden leak) yesterday to have been hacked by the NSA and GCHQ...'

 

you guessed it, the register :)

http://www.theregister.co.uk/2015/02/20/gemalto_sim_surveillance_fallout/

http://www.theregister.co.uk/2015/02/19/nsa_and_gchq_hacked_worlds_largest_sim_card_company_to_steal_keys_to_kingdom/

Link to post
Share on other sites

  • Recently Browsing   0 Caggers

    • No registered users viewing this page.

  • Have we helped you ...?


×
×
  • Create New...