Category Archives: Uncategorized

“Attiyah Saad”


Subject: Capital investment
From: “Attiyah Saad” <>

Thanks for your attention;

We are seeking the attention of investors, project owners and general business facilitators.

Mubadala development company (Mubadala), is a project development and investment organization
based in Abu dhabi – UAE. At the core of our strategy, Mubadala makes long term capital intensive
investments to deliver strong financial returns and economic diversification. Mubadala focuses on
number of areas in which it has developed significant competitive advantage, including acquisitions,
aerospace/aviation, telecommunication, technology, energy, industry, healthcare, infrastructure,
real estate and service ventures.

Mubadala Development Company (Mubadala) is a catalyst for the economic diversification of Abu
Dhabi. Established and owned by the Government of UAE, the organization’s strategy is built on the
management of Long-term capital-intensive investments that deliver strong financial returns and
tangible social benefits for the Emirates.

Mubadala brings together and manages a multi-billion dollar portfolio of local, regional and international
investments, which we wish to re-invest through project funding in investment loan to third party
investors, project owners and general business facilitators on a 3.5% interest rate per annum on long
term investment projects that can generate up to 10% ROI within the period.

We invite all interested project owners, entrepreneurs and investors – UAE or non- UAE to contact the
undersigned for further information on procedures for consideration.

Sincere regards,
Attiyah Saad
Regional Representative
Mubadala Development Company
Telfax: +971 2413 0002

Return-Path: <>
Received-SPF: none (domain of does not designate permitted sender hosts)
X-Originating-IP: []
Received: from (EHLO (
by with SMTP; Fri, 05 Apr 2013 09:19:02 +0000
Received: from User ( [])
by (Postfix) with ESMTP id B4CA2FC80C;
From: Attiyah Saad
Subject: Capital investment
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000


Leave a comment

Posted by on 06/17/2013 in Uncategorized


Tags: , , , , , , , ,

Secure Your Inbox; Protecting your (Yahoo) Mail account from phishing scams and hackers

internet_abuse_spamSign-in Seal

Sign-in seals are a safeguard from Yahoo! Mail. They help you fight online phishing scams (people trying to trick you into giving up your password or personal information by spoofing legitimate web sites).

Here’s how your sign-in seal works: You provide us with an image (such as a personal photo) or a secret message. Whenever we ask you to sign into Yahoo! Mail, we’ll display your image or message. If it’s not displayed, you may have landed on a “spoofed” site. It only takes a minute to create your sign-in seal.

Note: Your sign-in seal is saved on the computer that you create it on, not on Yahoo! Mail’s servers. So if you use more than one computer or browser, you’ll want to create a sign-in seal for each one. Also, don’t create a sign-in seal on a computer you share with strangers, such as those in libraries, Internet cafés, and other public places

Phishing Tips

Avoiding phishing scams is tough. Phishers know every trick in the book, and they’re dreaming up new ones as we speak. So here are some things to keep in mind while you’re online:

Don’t believe every warning you read—especially pop-up warnings that appear while you’re surfing the Web. Unscrupulous companies use pop-up ads to display false warnings about your computer. Ignore them.

Do NOT click any button in these pop-ups, such as a “Close” or “No” button, or the “Close” box that may appear in the upper-right corner of the pop-up. Doing this might install a virus or other malicious software on your computer. To safely close a pop-up ad, press Ctrl-W (if you’re using a Windows computer) or Command-W (on a Mac computer).

Be suspicious of “free” advice.You may receive an email that claims to be from a computer expert, warning you of a virus. These are usually hoaxes. Do not follow the steps described in any email unless you’re sure the threat is real.

There is no Yahoo! Lottery. Don’t be fooled by people pretending to be Yahoo! and offering cash prizes. We would never send you information about a contest you never entered. If you’ve received a message like “Final Notification: Yahoo! Mail Winner!” or “Your Email Address Has Won $XX million,” it’s a scam. Don’t reply to the email, don’t click any links in it, and never divulge any personal information. Instead, click the “Spam” button.


Phishing is the act of creating legitimate looking messages, masquerading as a trusted entity to lure you into clicking on emails that are designed to steal vital personal information like your password and financial data. To prevent such email forgery and spoofing we use DomainKeys Identified Mail (DKIM) which allows senders to digitally sign their emails so that Yahoo! Mail can then verify the authenticity of the sender. In addition, Yahoo! Mailsupports Domain-based Message Authentication, Reporting and Conformance (DMARC), a specification spearheaded by major technology providers and email senders to collectively fight spam and phishing scams.


Leave a comment

Posted by on 03/29/2013 in Uncategorized


Tags: , , ,

As Online Users Become More Adapt To Internet Scams; Scammers Find New Tactics To Exploit

Greetings to you, my friend.
I know this will come as a surprise to you, because you do not know me. My name is Abdul Al-Shallah and I am the son of a deposed government official in Nigeria.

Sound familiar? It’s a boilerplate opening for one of the most common scams in the known world — the Nigerian scam, also known as the “419 scam” or the advance fee scheme. The elements are always the same: someone (preferably royalty or some sort of official) has come into a lot of money, but needs another person outside of the country to use their money for a bribe (or to pay legal fees among other means) to spring the money free. The result is also predictable, with a wire transfer to a con artist’s account and a fake check that confirms a scam has taken place.

imagesThis scam is a hallmark of the Internet, but it’s actually much older than that — the advance fee scheme in its modern incarnation dates back to the early 1980s, and various forms can be traced back to before the 20th century. The reason that it sticks around, unsurprisingly, is because it never ceases to swindle millions of dollars from duped victims. The scheme, and many others like it continue to flood inboxes daily, often hitting the Spam folder before you ever lay eyes on it, waiting for a more trusting person to make a trip to the Western Union.

But that’s not to say that Internet scammers are resting on their laurels and leaving their dirty work to these classic methods. As Internet users become more sophisticated (and laugh at the advances of the forlorn Nigerian prince or similarly befallen individual), the chances of finding a willing innocent victim slowly dwindles. Like any other industry, scammers are looking for smarter, more efficient ways to reach their big payouts and to keep their “businesses” running smoothly, so they are forced to adapt and reach new extremes to get their money.

Now, security experts are seeing disturbing trends among scammers that make the old schemes appear to be child’s play. Appealing to the emotional pull of a victim is now just part of the scheme, which now includes familiarity dupes and long-term schemes to raid a bank account. These cons are more targeted, more ruthless and can take out even large corporations and entire governmental programs. There’s a new evolution in Internet con artistry, and it’s putting everyone at risk.

Check out the four new and scary ways con artists are getting their money on the Internet, and real-life examples of how they work by clicking The Next Web – Four New Ways Online Scammers Are Taking Your Money.

Leave a comment

Posted by on 03/17/2013 in Uncategorized


Tags: , , , , , , ,

“Vickie Merrifield”



From: Vickie Merrifield <>
Subject: Shipment Update
Date: March 12, 2013 12:27:59 AM EDT

UPS World Headquarters
55 Glenlake Parkway NE
Atlanta , GA 30328
United States

As part of the 2013 UN-Habitat compensation payment reconciliation process, we have been advised to inform you that your compensation payment (US$2,811,071.00) has now been forwarded to the Diplomatic Courier Service under the supervision and directives of the U.S. Department of State, to convey your overdue compensation payment delivery to you in cash payment.

You are therefore advised to contact the U.S. Diplomatic Courier Service with your:-

Full Name:
Current Address:
Day Time Telephone Number:
Nearest Airport to your Resident/City:
Preferred date for your cash Delivery:

Please forward the above requirements to the U.S. Diplomatic Courier Service with their below contact.

Diplomatic Courier Service
c/o U.S. Department of State
123 William Street,
New York, NY 10038-3804.USA

Thanks for your patient.

Vickie Merrifield
Chief Operating Officer
United Parcel Service (UPS)

Leave a comment

Posted by on 03/14/2013 in Uncategorized


Tags: , , , ,

Internet Fraud Resources

Internet fraud is an issue that many people experience. The best way to fight fraud is to learn how to detect and avoid becoming a victim. If you have already been victimized then there IS help available. Below is a link which will lead you to a list of official Government web resources provided by USA.GOV to help you learn and report online fraud.

Click here for the link of resources.

Clicking the link provided will bring you to a list of different resources which I’ve posted below. (However, you need to go to the website to actually click on the different links.)

Reporting Internet Fraud:

Child Pornography on the Internet
Complaints about Foreign Companies
Consumer Complaint Form
Further Ways to Report Internet Fraud from
Identity Theft
Internet Crime Complaint Center
Internet Investment Fraud

Learning about Internet Fraud:

Avoiding Internet Investment Fraud
Cyber Crime Information
FBI Kids’ Page – Internet Safety Tips
FBI Warning about False FBI E-mails
Financial Crimes (International) (PDF)
Identity Theft: Trends and Issues
Identity Theft Information
Internet Do’s and Don’ts for Kids
Internet Protection Information for Consumers and Businesses
Kids’ Privacy and the Internet
Personal Information and Computer Security
Phishing Scams
Statistical Data and Reports on Internet Fraud


Leave a comment

Posted by on 03/05/2013 in Uncategorized


Tags: , , , , , ,

Mystery (Secret) Shopper Scam & How It Works

There’s been an increase in employment scams pertaining to mystery/secret shopper positions, according to the Internet Crime Complaint Center (IC3). The reason the secret shopper scam is so believable is because many retail and service corporations do hire evaluators to perform secret or random checks on their competitors. Scammers know this and capitalize on the opportunity.


Victims have reported to the IC3 they were contacted via e-mail and U.S. mail to apply to be a mystery shopper. Applicants send a resume and are told that they will be subject to an extensive background check before being accepted as a mystery shopper. The employees are sent a check with instructions to shop at a specified retailer for a specific length of time and spend a specific amount on merchandise from the store. The employees receive instructions to take note of the store’s environment, color, payment procedures, gift items, and shopping/carrier bags and report back to the employer. The second evaluation is the ease and accuracy of wiring money from the retail location. The money to be wired is also included in the check sent to the employee. The remaining balance is the employee’s payment for the completion of the assignment. After merchandise is purchased and money is wired, the employees are advised by the bank the check cashed was counterfeit, and they are responsible for the money lost in addition to bank fees incurred.

In other versions of the scheme, applicants are requested to provide bank account information to have money directly deposited into their accounts. The criminal then has acquired access to these victims’ accounts and can withdraw money, which makes the applicant a victim of identity theft.


The article above published by Scam Prevention – The Ladders — For a list of other types of scams by SPTL, Click here.


Tags: , , , , , , ,

Suspicious Spam – Scrappers Attic



Your friend : YOU’ve Been Selected (Free Private Training) has recommended this great product from Scrappers Attic

Hi …!

Your friend, : YOU’ve Been Selected (Free Private Training), thought that
you would be interested in Hooked on Fishing-Fishing Title accessory sheet
from Scrappers Attic.

: YOU’ve Been Selected (Free Private Training) sent a note saying:

Our computer has randomly selected 100 people to
qualify for exclusive access today.

The spots are limited so please click the link below to see if you qualified to access the product today, before everyone else.

Your special invitation is below…



PS : Remember positions are available on a strictly first come first serve basis.

Your link will only allow 1 person to join, so please
do not pass it on to others.



List Marketers,

Theresa M. Langford
864 Henry Ford Avenue
New York, NY 10016


To view the product, click on the link below or copy and paste the link into
your web browser:


Scrappers Attic

IMPORTANT: For your protection and to prevent malicious use, all emails sent
via this web site are logged and the contents recorded and available to the
store owner. If you feel that you have received this email in error, please
send an email to

This email address was given to us by you or by one of our customers. If you
feel that you have received this email in error, please send an email to
This email is sent in accordance with the US CAN-SPAM Law in effect
01/01/2004. Removal requests can be sent to this address and will be honored
and respected.


Return-Path: <>
Received-SPF: none (domain of does not designate permitted sender hosts)
X-YMailISG: CuuLYm0WLDsQh_nHM5WHCzP0f7_Mj.VKI6eWJQh1YZpCUKQU 5SAFelkhH2lHx1pB00UDVEzBtsRUb1DL7BGZS.tf8XZRPltztoODR1HG6Khm AngxUNqCJlprCdmpXYX2k0p2Adzyjy1ke0G_amoyMeBPxXqYu1IR9bX8cFTg tGGc9tWOjoGw7AC2c1yFfLhKkE4LaClAOIAAjyD1OdGFZBF5aijcKQ42ElZ8 1ZcbkbwGyMZXywW8H9iNxv7TpYD3PaaW14AUPewJE68buX52x7ithwTBuno7 RtAsYh7TPhgWn5hU3bmp90FuTTLu.vbdgRVYrR9ncpXyDIRJIa4Co6Qgj7E5 NnUH_kYirB.y8LQVuHNpGLhpsjL1KrSpWqqFTkRSDFinCTZPRT57U8fj1VJr eGICh2WdDqVJaqp1ZP08zMbE1CBMplm1eFPWu.jUj3xz1cJ2ABv6M3GO16fo NmqT5aldpdzAmp85IGyDC719ZSgCmIUfzjXzawGC_gq9qbucOZpceO6EA4v6 PaeTllQwCd2bfG48ZJb30JmOnsY9OS3pm9NsrJa8QeQVZOVnx_eCWkPUhKCk ZgCra_ORBqn7VLPbaigN8VwiL7NCL_vN2lrMMppQnUm9W7BudVdWfFcGKMnT ruo7Ydw_df_Y3tx.fFlPw_XmSY4PquJFRjGfcbYKLmbPWlTVwlHwsxelvt4m VwIj6PDnTzAb99xwbViUV4r7Ams8m3doHtcNy.gVriI359g0SxklbKQRCO9. 5eGQ3lyqIRNv2hspuoLcXbCdXCX9Npe54YeauRb7PRU5WB53_VoIt6gZowiC e9WYWlo_772FESIc7Qoz.ULWKgyPv7VtlhhECqPY9Ngb_5hzW9RzCltYTuD7 fW8VOTMwdHhjCgsfeAN2Q0l1uzOr54dwXuV9H3PXOl9b_eKvQBO7.SZV9z2v aBHDR8g.ZjPVjkP9Th31a1GAiYmdfoFGqV7gg_DiUIHM.W7kHuMgg34by9Mj SmxMCPpqeFO_vBLgFOuj8zz6SyeDq0R3AGsFC34HiqLP2q8_klenAY74FsjA fOaiyW0tqabfep43pgteG17ZDrurUy7tfdCwI.z6_Aq1Rl_Q.Q3zc8xrgX3D S5IOF2cwbfm5ziWlB1PtV3tZtSUzDzUHOniWf72KwTmkJOEuAkkzDtihfkoX DEShz3G_XZ1UdnP9xNOsYUelyl.fo4JMGGlwm8heS89x_Fk8CuLGFJK.2yHE UaarVQ–
X-Originating-IP: []
Received: from (EHLO ( by with SMTP; Wed, 30 Jan 2013 03:41:38 -0800
Subject: Your friend : YOU’ve Been Selected (Free Private Training) has recommended this great product from Scrappers Attic
From: “: YOU’ve Been Selected \(Free Private Training\)” <>
Reply-to: “: YOU’ve Been Selected \(Free Private Training\)” <>
Message-ID: <> RECEIVED_IP:


Posted by on 01/30/2013 in Uncategorized


Tags: , , , , , , , ,

%d bloggers like this: