Informazioni personali

Cerca nel blog

Translate

martedì 26 marzo 2013

FW SPAM: Inquiry

Is this spam or not? 🙂

—–Original Message—–
From: Ms. Helen Papi [mailto:info@e-securetrust.com]
Sent: Monday 4 March 2013 07:02
To: nomestes.ingando@gmail.com
Cc: puchi.ierano@gmail.com
Subject: Inquiry

Hello Antonio Ieranò

Greetings and sincere apologies if this letter is against your moral ethics. I know you will be surprise to read my email. I got your contact from online business directory which prompted me to contact you in confidence. Apart from being surprise, you may be skeptical to reply back to me because based on what is going on in the internet world which has made it very difficult for people to believe anything that comes through the internet but this is a different case as proof would show as we proceed.

My name is Ms. Helen Papi. I am proposing a very high profiled business transaction to you with returns very lucrative.  I need a partner from your country who I can work with on this investment project and I want to ask for your partnership to re-profile funds valued over $13 million Dollars for investment in your country.

If you feel you can have this handled, please let me know, so that I can send you a comprehensive details on the source of fund for this proposed investment so we can discuss how to move forward.

Sincerely,

Helen Papi

FW SPAM: HELLO DEAR

Slightly different from the other one, but again if it is a matter of trust how come the same message comes first to me then to me again but usually spam comes with the recipient undisclosed so this must be real 🙂

 

—–Original Message—–
From: win Tep [mailto:tepsereya@gmail.com]
Sent: Monday 18 March 2013 10:41
To: nomestes.ingando@gmail.com
Subject: HELLO DEAR

 

HELLO DEAR

 

Please permit me to make your acquaintance in so informal a manner. This is necessitated by my urgent need to reach you. This request may seem strange and unsolicited but I will crave your indulgence and pray that you view it seriously.

 

I want you to partner with me in getting back the money left behind in a fixed deposit account in our bank by a citizen of your country. If this will endanger your position and reputation, I would not have contacted you. This is safe and beneficial. I am presently the Branch manager of our bank,here is South East Asia, please do not expose this transaction for any reason, I will give you more information of myself, our bank and the transaction itself once you write again.

 

I wait to hear from you,

 

Regards,

TEP SEREYA

FW SPAM: Dear friend

As usual I like to post some daily spam as reference, but of course you can always try to answer and, if you got all those million, would you please give me some? 🙂

—–Original Message—–
From: win Tep [mailto:tepsereya@gmail.com]
Sent: Tuesday 19 March 2013 02:48
To: nomestes.ingando@gmail.com
Subject: Dear friend

 

Dear friend

 

Please permit me to make your acquaintance in so informal a manner. This is necessitated by my urgent need to reach you. This request may seem strange and unsolicited but I will crave your indulgence and pray that you view it seriously.

 

I want you to partner with me in getting back the money left behind in a fixed deposit account in our bank by a citizen of your country. If this will endanger your position and reputation, I would not have contacted you. This is safe and beneficial. I am presently the Branch manager of our bank,here is South East Asia, please do not expose this transaction for any reason, I will give you more information of myself, our bank and the transaction itself once you write again.

 

I wait to hear from you,

 

Regards,

TEP SEREYA

FW SPAM: A BUSINESS PROPOSAL LETTER

Guys THIS is something I am really more comfortable, I mean this is something I know how to handle, ol’fashion email scam.

I recently experienced how it feel to be really scammed and it make you feel really dumb, believe me. J

 

 

From: mrwahid2 [mailto:mrwahid2@yeah.net]
Sent: Tuesday 26 March 2013 18:28
To: undisclosed-recipients:
Subject: A BUSINESS PROPOSAL LETTER

Dear Friend.

My name is Mr Traore Wahid. I got your contact email address from the internet Business directory and decided to contact you for this transaction that is based on trust. I need your urgent assistance in transferring the sum $19.300.000.00(Nineteen million three hundred thousand dollars) to your account. The transfer is risk free on both sides hence you are going to follow my instruction till the fund is transferred to your account.

Having gone through a methodical search, I decided to contact you hoping that you will find this proposal interesting. Please on your confirmation of this message and on indicating your interest, I will furnish you with more information as i get our reply.

If You Accept This Offer To Work With Me, And You Find This Proposal Suitable For You Do Furnish Me With The Following Information.

Your Full Name……………….
Your Country…………….
Your Private Telephone……………
Your Age and Sex………………..
Your Occupation……………

I Will Appreciate It Very Much, If This Proposal Is Acceptable By You, Do Not Make Undue Advantage Of The Trust I Have Bestowed On You, And I Assure You We Can Achieve It Successfully.You can reply me on my yahoo address.(traorewahid5).

Respectfully
Mr.Traore Wahid,
Bill and Exchange Manager

giovedì 21 marzo 2013

Security Summit :: Rapporto Clusit 2013

Security Summit :: Rapporto Clusit 2013

Rapporto Clusit 2013
Nel 2012 abbiamo dato vita al primo “Rapporto sulla sicurezza Ict in Italia”, un volume di 148 pagine che, attraverso il lavoro di oltre un centinaio di professionisti, ed il coinvolgimeto di più di 150 aziende, ha tracciato un profilo neutrale e approfondito della situazione sulla sicurezza Ict nel nostro Paese. Ora stiamo lavorando al Rapporto 2013, che sarà presentato il 12 marzo a Milano. Oltre alla consueta analisi dei fatti più significativi (cybercrime e incidenti informatici) del 2012 in Italia e nel mondo, il Rapporto conterrà le tendenze del mercato e degli investimenti in Italia e le tendenze del mercato del lavoro. Tra i Focus On, si farà il punto sulla tematiche di maggior interesse del momento, già affrontati nel Rapporto 2012 : la sicurezza nel Mobile, nei Socialmedia, nel Cloud. Si affronteranno anche due temi centrali per l’Agenda Digitale Europea ed Italiana : la sicurezza ICT in Sanità ; l’e-Commerce. Completeranno i Focus On del Rapporto 2013 :   cosa cambia, col passaggio al nuovo protocollo IPv6 ; Backup e ripristino dei dati.
Il Rapporto 2013 sarà presentato al Security Summit di Milano nel corso di una tavola rotonda al pomeriggio del 12 marzo. Tutti i presenti alla tavola rotonda potranno ritirare un esemplare del Rapporto, che sarà poi disponibile in formato elettronico a partire dal giorno successivo.

Se desideri ricevere per email il Rapporto Clusit 2013 (o i precedenti), scrivi a:

precisando: nome, cognome e azienda di appartenenza (e/o professione).

martedì 19 marzo 2013

Beppe Grillo, Internet, un blog e un post

Beppe Grillo
Beppe Grillo (Photo credit: Niccolò Caranti)

Ok, the question is “what is a internet democracy?” no the question is “who cares!!!???!!!”
Seems to see The Muppet Show when our poiticians talk about Beppe Grillo and its %star movement.

but actually the question is not so naive. Listening to this morning news review something pick my attention, not the usual fight of grillo againstthe world or the world against grillo, but a news about a comment deleted form Grillo’s Blog. It seems, accorting to “Il Corriere della Sera” that a comment against the latest Grillo statements has been deleted from his blog even if it was recieving a loto of “likes”.

This would be a very curious move from someone that claims to dream an “Internet direct democracy“, where people can express ideas directly. The whole idea of this movement start from this point, and they actually made something incredible in the italian history, they used internet to move a incredibly 25% of preferences at the last elections.
But is Grillo really trying to control the comment on his blog to avoid any different voice?
well could always tell that it was something written by someone working for the PDL or the PD but in any case this is a precedent that should make us wonder, who is checking the checker?

Lately Beppe is talking more like a pope than like a “primus inter pares” making his voice the only allowed voice of his movement. this does not means that he is wrong nor that he is right, just as a matter of fact, he consider himself as the ONLY voice of the 5 star movement. not really a direct democracy…

but may be it’s only a communication strategy with a clear plan in mind, may be we should ask ourself: “the question is What is his plan” or “the question is who cares”

Related articles

martedì 12 marzo 2013

(ISC)2 Italy Chapter Site » (ISC)2 Chapter Italy al Security Summit

(ISC)2 Italy Chapter Site » (ISC)2 Chapter Italy al Security Summit

(ISC)2 Chapter Italy al Security Summit

Domani 12 Marzo inizia a Milano il Security Summit, probabilmente la piu rilevante manifestazione di Sicurezza ICT nel panorama Italiano. Lo scorso anno il Capitolo Italiano di (ISC)2 ha annunciato la propria nascita proprio a questa manifestazione ed è naturale per tutti noi esserci affezionati e presenti anche per questo motivo.
Anche quest’anno dunque parteciperemo ed avremo uno spazio tutto per noi. L’appuntamento è quindi per il secondo giorno, ovvero il 13 marzo Mercoledi alle 16.30.
Pierluigi Sartori, socio (ISC)2 Italy Chapter, presenterà un orientamento fra l’approccio in-house e quello managed in ambito Sicurezza Informatica, un contenuto inedito basato sull’esperienza reale.

News Easycloud.it Newsletter

Easycloud.it è il Cloud Service Broker (CSB), che agisce come mediatore nel processo di selezione dei vari servizi forniti dai Cloud Service Provider ed i Cloud Service Integrator…

Is this email not displaying correctly?
View it in your browser.

Marzo 2013

Link di interesse

Presentazioni online
Company Profile 
Easy Cloud Blog

Easycloud Academy

Università libera online promossa da Easycloud, uno spazio collaborativo dove condividere esperienze, competenze, dare spazio a talenti, ai giovani e ai meno giovani.
Unisci a noi! clicca qui

Seguici sui Social

Facebook

Chi è Easycloud.it ?

Easycloud.it è un Cloud Service Broker (CSB), che agisce come mediatore nel processo di selezione dei vari servizi forniti dai Cloud Service Provider ed i Cloud Service Integrator. Partendo da un predefinito livello di servizio richiesto dal cliente, Easycloud.it è in grado di proporre le soluzioni e il team di supporto più adeguati. leggi il Company Profile!

Easycloud.it stringe accordo strategico con Dedanext

Easycloud.it stringe un accordo strategico con Dedanext per la progettazione, implementazione e gestione di infrastrutture Cloud di nuova generazione. Leggi la news cliccando qui!

Copyright © 2013 Easycloud.it, All rights reserved.

unsubscribe from this list | update subscription preferences 

 — why did I get this?
unsubscribe from this list | update subscription preferences
Easycloud.it · Via Cavour, 2 · Lomazzo, CO 22074

Email Marketing Powered by MailChimp
 

mercoledì 6 marzo 2013

Security Summit :: Il 12 marzo si apre l'edizione 2013: pronto il programma, definiti i contenuti

Steve Purser, Head of the Technical Department...
Steve Purser, Head of the Technical Department, ENISA (Photo credit: Security & Defence Agenda)

Security Summit :: Il 12 marzo si apre l’edizione 2013: pronto il programma, definiti i contenuti

Il 12 marzo si apre l’edizione 2013: pronto il programma, definiti i contenuti
E’ praticamente definito il programma della prima tappa del Security Summit 2013 che si aprirà la mattina del 12 marzo a Milano.
Si inizia infatti con un ospite d’eccezione, Steve Purser, Head of Technical Department, ENISA – European Network and Information Security Agency, che disegnerà il quadro dei progetti europei in tema di Ict security, tema di grande rilevanza perchè naturalmente coinvolge poi le politiche dei singoli Paesi.

sabato 2 marzo 2013

Cloud Security Alliance Releases First Guidelines for Cloud Service Providers Delivering Services in the European Union : Cloud Security Alliance

Cloud Security Alliance Releases First Guidelines for Cloud Service Providers Delivering Services in the European Union : Cloud Security Alliance

CLOUD SECURITY ALLIANCE RELEASES FIRST GUIDELINES FOR CLOUD SERVICE PROVIDERS DELIVERING SERVICES IN THE EUROPEAN UNION 

CSA Privacy Level Working Group Encourages Adoption Worldwide as a Powerful Self-regulatory Tool for Data Protection Transparency and accountability in the Cloud

RSA CONFERENCE –  San Francisco, CA – February 25, 2013 – The Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group today released the Privacy Level Agreement (PLA) Outline for Cloud Service Providers providing services in the European Union. The Outline provides a structure for Cloud Service Providers (CSP) to disclose, in a consistent matter, information about the privacy and data protection policies, procedures and practices used when processing personal data that customers upload or store in the CSP’s servers. Once a PLA outline is completed by a CSP, it will provide current and potential customers with a new tool to assess that CSP’s disclosure of its practices.

Dilbert comic strip for 02/12/2012 from the official Dilbert comic strips archive.

Dilbert_Jan21.gif
Dilbert_Jan21.gif (Photo credit: mrapplegate)

Dilbert comic strip for 02/12/2012 from the official Dilbert comic strips archive.