Saw this posting on Facebook and decide to share with everyone.
– – – – –
Beware guys, do not aboard this “private taxi”
On 1st of March 2015, i was with my family (wife, 3 years old daughter & a newborn son) trying to hail a taxi at beach road area when this particular car stop by. The man in a car approached me & asked where am i going. So i told him i’m heading to woodlands. Immediately, He told me to aboard. I thought it was some private taxi as when i aboard, he used some iphone apps to record the meter fare. He then explain his from uber company & told us to search the net if we dont believe after that he then told us the meter fare was $3.90 upon boarding & $0.70 per km. He asked us if we’re fine with it. He claim that they(uber company) is slightly more expensive than normal taxi. But while i was trying to do some research about this company to roughly know how much we need to pay. In less than 30 mins of ride, i saw his meter shoot up to $50++. We were already on the highway. So i told him to alight us nearby where he can stop. Instead he stopped at some ulu destination around yio chu kang & told us to paid $97. Its less than 3 mins, the meter fare increase $40++. When i asked him why is the fare so expensive, he claimed that he did inform us that it $8/km. Who on earth will be so stupid, to allow someone to charge at $8/km. I didnt want to put my wife & kids in any danger as i’m afraid if i confront him longer & not pay him, he might do anything to harm them, i had no choice but to pay him the $97.
Please help to share around & create awareness to avoid anymore people being scam.
Firstly, I don’t think this driver is from Uber. UberX and UberExec drivers aren’t allow to pick up passengers by the road. They can only pick up passengers who booked for a Uber through the App. Without a valid booking, Uber drivers can’t start the charging meter. So this can’t be an Uber driver.
The rates is also wrong. UberX’s base fare is $3.50 and $0.50 per km. UberExec’s base fare is $7 and $1.95 per km. There’s nothing from Uber that charges base fare $3.90 and $0.70 per km.
Most importantly, Uber drivers aren’t allowed to pick up customers without booking.
So do be careful. Do not board this so called “private taxi”. All Taxi in Singapore uses a Taxi meter. Uber only pick up passengers via their app.
Update: The Land Transport Authority (LTA) had impounded the vehicle. The driver may face possible fines, imprisonment and forfeiture of the vehicle if he is found guilty of breaking the Road Traffic Act.
You might want to pay attention if you just bought a Lenovo laptop recently. Security researchers recently discovered that Lenovo laptop come ship with a software called Superfish Visual Discovery.
Superfish alters your search results to show you different ads than the ones you are supposed to see on your web browser. It also tempers with your computer’s security, allowing anyone on the same WIFI network to spy on that user’s online activities including ibanking transactions, passwords, emails, instant messages etc.
According to Lenovo, only Lenovo laptops sold between September 2014 and January 2015 come preinstalled with Superfish. No Thinkpads were shipped with the software.
If you purchased a Lenovo laptop between middle 2014 till now, it would be advisable for you to check out the Superfish removal instructions from Lenovo.
Lenovo is also working with McAfee and Microsoft to have Superfish software and certificate quarantined or removed.
The Singapore Police Force has issued a news release warning the public of a software phone scam after receiving several reports.
Victims first receive calls from unknown person claiming to be from the technical support sections of major software companies. The callers would inform the victims that their computers required security or software updates and victims would be asked to download and install one or more software from the Internet. The victims would also be asked to provide the software user account identification codes and passwords to the caller and in some instances, victims were instructed to enter some commands into their computers.
Some victims observed that their computers were remotely controlled or files were deleted after following the instructions of the callers. The callers would then convince the victims to buy additional software by making online payments or by providing their credit card details.
The police is advising the public to ignore such calls. Do not follow the instructions of the callers to install any software on your computer or enter any commands. Do not make any payment or divulge your credit card or bank account details to the caller.
If you had followed any of the caller’s instructions, immediately use another computer to change all your online banking, credit card, social media account and email account password. Scan your computer for virus and malware.
If you have any information related to this crime, call the Police hotline at 1800-255 0000, or dial ‘999’ for urgent Police assistance.
There is a Android malware circulating via SMS as we speak now. The SMS goes something like this “XXX Is this your photo? http://url7.me/NwVk1″ where XXX is the receiver’s name. DO NOT CLICK on the URL.
If you receive this SMS from your friend, that means your friend’s phone has been infected by the malware.
If you click on the URL, it will download and install an Android App call PhotoViewer.apk. This malware will go through your address book and send the SMS to all your contacts. To remove the malware, use F-Secure Mobile Security (30-day free trial) from the Google Play store. It will detect and prompt you to remove the Photo Viewer malware.
If I’m not mistaken, iPhone users are safe from this malware. For Android users, if you set your security settings to only allow apps from trusted sources, you are safe too.
Do not click on any URL if you are not sure where it leads to. If your friend suddenly send you a URL out of the blue, ask him/her what’s the URL first before clicking. Always check before clicking. You never know when your friend might be infected with a malware.
If you have a security webcam, you might want to check if you’ve changed the default password. Apparently a lot of people set up their webcam without changing their default password. This means that anyone can access and view the webcam.
Someone setup a website that pulls in all the unsecured webcam feeds. Surprisingly, there are more than 73,000 webcam out there that are using the default password. More than 600 of them are from Singapore. Some of the webcams are just pointing at corridors or doors. Those should be fine. But it is rather alarming to find some of the webcams in bedroom or living room. Imagine someone watching your every move. Now that’s creepy.
So if you have a webcam at home, please check to make sure you’ve changed your default password. Unless you don’t mind the whole world seeing your webcam feed.