<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Email and Web Scams - SAJE</title>
	<atom:link href="https://saje.nz/category/email-and-web-scams/feed/" rel="self" type="application/rss+xml" />
	<link>https://saje.nz</link>
	<description>Web Gardners</description>
	<lastBuildDate>Sat, 07 Feb 2026 04:48:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://saje.nz/wp-content/uploads/2023/05/cropped-logov1-32x32.png</url>
	<title>Email and Web Scams - SAJE</title>
	<link>https://saje.nz</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Gmail Email Changes Coming in 2026: What Small Businesses Need to Know</title>
		<link>https://saje.nz/2026/02/07/gmail-email-changes-coming-in-2026-what-small-businesses-need-to-know/</link>
					<comments>https://saje.nz/2026/02/07/gmail-email-changes-coming-in-2026-what-small-businesses-need-to-know/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 07 Feb 2026 04:17:15 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<guid isPermaLink="false">https://saje.nz/?p=4772</guid>

					<description><![CDATA[<p>Email systems often fall into the “set and forget” category for many small businesses. Once they’re working, they tend not to be revisited unless something goes wrong. However, Google has announced a change that makes now a good time to review how your business email is set up. From sometime in January 2026, Gmail will stop [&#8230;]</p>
<p>The post <a href="https://saje.nz/2026/02/07/gmail-email-changes-coming-in-2026-what-small-businesses-need-to-know/">Gmail Email Changes Coming in 2026: What Small Businesses Need to Know</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="4772" class="elementor elementor-4772" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-4aadb682 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="4aadb682" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b577a5e" data-id="3b577a5e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-73a4b45a elementor-widget elementor-widget-text-editor" data-id="73a4b45a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Email systems often fall into the “set and forget” category for many small businesses. Once they’re working, they tend not to be revisited unless something goes wrong. However, Google has announced a change that makes now a good time to review how your business email is set up.</p><p>From sometime in <strong>January 2026</strong>, Gmail will stop supporting an older email method called <strong>POP3</strong>, which some businesses still rely on to collect emails from multiple accounts into one inbox in Gmail.</p><p>This change won’t affect everyone — but if you use the Gmail website on your computer, it’s worth taking a closer look.</p><h2>What is POP3, and why does it matter?</h2><p>POP3 is an older way of retrieving email. It allows Gmail to “pull” messages from another email account (such as an Outlook or hosting-based email address) into your Gmail inbox.</p><p>For years, this has been a convenient way for business owners to manage everything in one place, especially if you like Gmail&#8217;s interface. However, POP3 has limitations and doesn’t meet modern security standards. For that reason, Google has confirmed it will be retired in early 2026.</p><p>Once this happens, you will not be able to retrieve any new emails in the desktop version of Gmail. Any emails already received will remain, but new messages will stop appearing unless your setup is updated.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-a1a5e5c elementor-widget elementor-widget-image" data-id="a1a5e5c" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img fetchpriority="high" decoding="async" width="1024" height="585" src="https://saje.nz/wp-content/uploads/2026/02/gmailpop2-1024x585.jpg" class="attachment-large size-large wp-image-4787" alt="" srcset="https://saje.nz/wp-content/uploads/2026/02/gmailpop2-1024x585.jpg 1024w, https://saje.nz/wp-content/uploads/2026/02/gmailpop2-300x171.jpg 300w, https://saje.nz/wp-content/uploads/2026/02/gmailpop2-768x439.jpg 768w, https://saje.nz/wp-content/uploads/2026/02/gmailpop2-1536x878.jpg 1536w, https://saje.nz/wp-content/uploads/2026/02/gmailpop2-2048x1170.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" />															</div>
				</div>
				<div class="elementor-element elementor-element-5c34ee2 elementor-widget elementor-widget-text-editor" data-id="5c34ee2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h2>What is not changing?</h2><p>The good news is that many modern email setups will <strong>not be affected</strong>.</p><p>If your business uses:</p><ul><li>Other email clients (software) such as Outlook, Thunderbird or Apple Mail</li><li>Native Google Workspace email accounts being accessed via the Gmail website</li><li>The Gmail app if it receives your emails using IMAP</li></ul><p>then no action is required.</p><p>IMAP is more secure, keeps emails synchronised across devices, and is the recommended approach going forward.</p><h2>What should businesses do now?</h2><p>A lot of the considerations about this change comes down to whether you like to use Gmail on your computer or laptop as the way you access your emails.</p><h3>1. I want to continue to use Gmail on my computer</h3><p>If Gmail is currently pulling emails from other accounts automatically, it may be using POP3. This is especially common in older or customised setups.</p><p>In this case you will need to move your emails to Google Workspace. This is a paid service from Google. There are transfer tools available to help with moving your emails into Google Workspace.</p><p>It can be a relatively complicated process as it also includes updates to your domain name, so you may need some help with that.</p><h3>2. I am happy to move to another email program.</h3><p>Once you choose your email program to use, (some common ones include Outlook, Thunderbird, BlueMail, Apple Mail), then you will need to load your emails into the new program. It is better to add it using IMAP rather than POP to future proof your email set up. You may want to talk to an IT person to help with this process as just adding the email to your new email program may not bring across all of your existing emails.</p><h2>Some other things to think about</h2><h3>1. Move to IMAP where possible</h3><p>IMAP provides better reliability and security and works across desktops, laptops, and mobile devices. Most email providers support it by default.</p><h3>2. Use email forwarding if a single inbox is required</h3><p>If you prefer everything to land in one Gmail inbox, email forwarding is a reliable alternative. Messages are sent directly from one mailbox to another, without relying on outdated protocols.</p><h3>3. Take the opportunity to simplify</h3><p>This change is also a chance to clean up old addresses, unused inboxes, and confusing workflows — improving efficiency and reducing the risk of missed emails.</p><h2 class="wp-block-heading">Why Google is making this change</h2><p>Google has not published extensive technical detail, but the reasoning is widely understood to be security-driven. POP3 is an older protocol that lacks the protections and flexibility of modern email standards.</p><p>By retiring the POP3 option helps reduce risk and aligns Gmail with current best practices for business communication.</p><h2>The bottom line for New Zealand businesses</h2><p>This is not a reason to panic — but it <em>is</em> a reminder that technology changes, even when things appear to be working fine.</p><p>If your email setup hasn’t been reviewed in several years, taking action now can prevent disruption later and ensure your business email remains secure, reliable, and future-proof.</p><p>If you’re unsure where to start, a quick review can often identify whether changes are needed and what the best next step is.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://saje.nz/2026/02/07/gmail-email-changes-coming-in-2026-what-small-businesses-need-to-know/">Gmail Email Changes Coming in 2026: What Small Businesses Need to Know</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2026/02/07/gmail-email-changes-coming-in-2026-what-small-businesses-need-to-know/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Another Spam Email Example</title>
		<link>https://saje.nz/2021/05/13/another-spam-email-example/</link>
					<comments>https://saje.nz/2021/05/13/another-spam-email-example/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 13 May 2021 01:53:51 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2021/05/13/another-spam-email-example/</guid>

					<description><![CDATA[<p>Email scams are all around us, I thought I would publish some in a series to give examples of the current crop of scams. These are real emails I have received so you can see the style and tone of the emails with some commentary from me. Our first one is a phishing scam trying [&#8230;]</p>
<p>The post <a href="https://saje.nz/2021/05/13/another-spam-email-example/">Another Spam Email Example</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Email scams are all around us, I thought I would publish some in a series to give examples of the current crop of scams. These are real emails I have received so you can see the style and tone of the emails with some commentary from me.</p>
<p>Our first one is a phishing scam trying to get email login details so they can then use your account to either access and control your account, or to use the email address to send out spam. Most use fear as their overriding emotion, putting errors and the threat of account deletion as a way of compelling people to click their links</p>
<p> </p>
<h2>The Email:</h2>
<p>Dear <a href=\"mailto:webmaster@deepweb.co.nz\">webmaster@deepweb.co.nz</a></p>
<p><strong>Some Incoming Messages were Undelivered to Inbox</strong></p>
<p>You have some important email messages that were undelivered to your inbox since 10th  May. 2021.</p>
<p>This is due to a IMAP and POP settings error on your e-mail, <a href=\"mailto:webmaster@deepweb.co.nz\">webmaster@deepweb.co.nz</a> incoming messages were delayed.</p>
<p>Log on to deepweb.co.nz Portal to recover your delay messages.</p>
<p>[ Proceed Here to Fix Errors ]</p>
<p>Find some of the errors being detected by the mail server for  deepweb.co.nz listed below:</p>
<ul>
<li><strong>Underlivered to inbox</strong></li>
<li><strong>Undelivered to inbox</strong></li>
<li><strong>Underlivered to inbox</strong></li>
<li><strong>Pending delivery</strong></li>
</ul>
<p style=\"text-align: center;\">Copyrights© 2021<br /><a href=\"https://deepweb.co.nz\">Help &amp; Contact &#8211; Fees &#8211; Security &#8211; Features </a></p>
<p style=\"text-align: center;\">This message link is secured and encrypted by Avast. <br /><a href=\"https://www.avast.com/antivirus\">www.avast.com</a></p>
<h2>The Analysis:</h2>
<p>The scammer uses a mix of valid links pointing to both the targets domain name (footer links plus portal link) and a single link (the Proceed Here to Fix Errors] to the scammer login page where they would scrape the entered login details</p>
<p>They even use a fake footer to refer to Avast antivirus to give the impression that the email has been scanned and verified as safe to open and click links.</p>
<p>With all of these kind of emails be very wary of anything threatening to shut down services or disable access. If you are unsure contact the provider directly to verify the information.</p><p>The post <a href="https://saje.nz/2021/05/13/another-spam-email-example/">Another Spam Email Example</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2021/05/13/another-spam-email-example/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Those SEO Emails you get</title>
		<link>https://saje.nz/2016/08/24/those-seo-emails-you-get/</link>
					<comments>https://saje.nz/2016/08/24/those-seo-emails-you-get/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 24 Aug 2016 05:29:52 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[Search Engines]]></category>
		<category><![CDATA[Soapbox]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2016/08/24/those-seo-emails-you-get/</guid>

					<description><![CDATA[<p>SEO, both an important part of running a website and also a magnet for unscrupulous individuals and businesses trying to make a fast buck. We get lots of calls from clients who have received emails from people claiming to be SEO experts. These emails state that the clients website is riddled with errors and that [&#8230;]</p>
<p>The post <a href="https://saje.nz/2016/08/24/those-seo-emails-you-get/">Those SEO Emails you get</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>SEO, both an important part of running a website and also a magnet for unscrupulous individuals and businesses trying to make a fast buck.</p>
<p>We get lots of calls from clients who have received emails from people claiming to be SEO experts. These emails state that the clients website is riddled with errors and that they can help correct these problems and improve search rankings</p>
<p>Here is a copy of one such email I received</p>
<blockquote><p>Hi,</p>
<p>My name is Anil kumar, and I am Online Marketing Manager at a leading Digital marketing company/SEO and Web Designing Company.</p>
<p>I was analyzing your site and it seems that some of your website rankings have dropped. It is due to non optimized techniques/errors</p>
<p>And Google guidelines not being followed properly. As you know that Google’s crawler is software and work on coding basis only.</p>
<p>That’s why site coding portion should be strong for better results.</p>
<p>I would like to present a detailed analysis of your website along with errors that your website and ways to improve your Google rankings.</p>
<p>It would be a detailed report and would be explained as well on phone once we send this over to you.</p>
<p>Please let me know if we can discuss this.</p>
<p>Thanks,<br />
Anil kumar<br />
Online Marketing Manager</p></blockquote>
<p>Now, improving your rankings is important. It is something that you should be looking at. However, these emails are problematic for a number of reasons</p>
<ol>
<li>Despite stating they have analyzed the website, I expect that in 99% of cases this is not true.</li>
<li>These are untargeted spam emails.</li>
<li>Their skill level is unknown, with no website for reference and only using a gmail address for email.</li>
<li>In some cases the lack of skill in writing emails in English may cause concern if your website is in English.</li>
</ol>
<p>All in all, you are better to talk with your current web designer about SEO and how they can help you. They know your website, know what has been done in the past and are in the best position to either help you out or give advice on how you could get exert help for this.</p>
<p>Don\&#8217;t fall prey to the SEO scammers</p><p>The post <a href="https://saje.nz/2016/08/24/those-seo-emails-you-get/">Those SEO Emails you get</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2016/08/24/those-seo-emails-you-get/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Trustwave Vulnerability Scan Scam</title>
		<link>https://saje.nz/2013/05/15/trustwave-vulnerability-scan-scam/</link>
					<comments>https://saje.nz/2013/05/15/trustwave-vulnerability-scan-scam/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 15 May 2013 02:35:26 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2013/05/15/trustwave-vulnerability-scan-scam/</guid>

					<description><![CDATA[<p>This one is potentially a better attempt at a phishing scam than most. Supposedly from TrustWave, it tells of a failed vulnerability scan on my network and to view the results online. Visiting this site potentially loads Malware, or tries phishing techniques to get access to your systems. One interesting aspect of this is it [&#8230;]</p>
<p>The post <a href="https://saje.nz/2013/05/15/trustwave-vulnerability-scan-scam/">Trustwave Vulnerability Scan Scam</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>This one is potentially a better attempt at a phishing scam than most.</p>
<p>Supposedly from TrustWave, it tells of a failed vulnerability scan on my network and to view the results online.</p>
<p>Visiting this site potentially loads Malware, or tries phishing techniques to get access to your systems.</p>
<p>One interesting aspect of this is it predicts IP ranges that will attempt to access your network, which makes me lean toward a malware attack.</p>
<blockquote><p>This is an automated email message to prevent you that the scheduled TrustKeeper vulnerability scan of YOUR NETWORK SYSTEMS has completed and is not compliant.</p>
<p>IMPORTANT: During the scan, TrustKeeper Discovered several Unsecure systems. Trustwave strongly recommends you review these findings as your overall PCI DSS compliance status may be affected.</p>
<p>TrustKeeper generated a vulnerability scan report. You may view these results by accessing TrustKeeper at:</p>
<p>https://login.trustwave.com<br />
User Name:webmaster@deepweb.co.nz</p>
<p>You will receive an e-mail confirmation when the scan completes and your results are available. Please note that this can take up to three days.</p>
<p>Note: If you monitor your network for activity, note that the TrustKeeper scan may originate from IP addresses in these ranges:</p>
<p>200.16.208.0/24<br />
61.37.230.0/24</p>
<p>TrustKeeper is a certified remote assessment and compliance solution created by Trustwave and designed to help merchants meet the PCI DSS and achieve compliance with the associated programs of VisaŽ, MasterCardŽ, American ExpressŽ, DiscoverŽ, and other credit card associations. The TrustKeeper solution is an integrated easy-to-use tool that removes the challenge of navigating the complex PCI DSS requirements and provides a \&#8221;one stop shop\&#8221; for merchants to certify compliance.</p>
<p>DO NOT REPLY TO THIS MESSAGE VIA EMAIL.</p>
<p>This mail is sent by an automated message system and the reply will not be received. Thank you for using TrustKeeper.<br />
This email was sent to: webmaster@deepweb.co.nz<br />
This email was sent by: Trustwave<br />
80 West Madison Street, Suite 1080, Chicago, IL, 60408, USA</p>
<p>We respect your right to privacy &#8211; view our policy</p></blockquote>
<p>So a new attack method, using fear to cause people to click the link and open themselves up for the real attack.</p><p>The post <a href="https://saje.nz/2013/05/15/trustwave-vulnerability-scan-scam/">Trustwave Vulnerability Scan Scam</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2013/05/15/trustwave-vulnerability-scan-scam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Scam email from ADP Netsecure</title>
		<link>https://saje.nz/2012/07/26/new-scam-email-from-adp-netsecure/</link>
					<comments>https://saje.nz/2012/07/26/new-scam-email-from-adp-netsecure/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 25 Jul 2012 22:30:36 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2012/07/26/new-scam-email-from-adp-netsecure/</guid>

					<description><![CDATA[<p>A new scam arrived today, this time about a Digital Certificate. A client also had the same email (2 actually) so it must be a wave going around. Is is purportedly from ADP, a payroll system, but includes links to obviously hacked sites for phishing They are looking for ADP logins, to then access personal information of [&#8230;]</p>
<p>The post <a href="https://saje.nz/2012/07/26/new-scam-email-from-adp-netsecure/">New Scam email from ADP Netsecure</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>A new scam arrived today, this time about a Digital Certificate. A client also had the same email (2 actually) so it must be a wave going around.</p>
<p>Is is purportedly from ADP, a payroll system, but includes links to obviously hacked sites for phishing</p>
<p>They are looking for ADP logins, to then access personal information of companies employees.</p>
<p>Here are the two emails</p>
<blockquote><p>Subject: ADP Generated Message: First Notice &#8211; Digital Certificate Expiration</p>
<p>This e-mail has been sent from an automated system. PLEASE DO NOT REPLY. If you have any questions, please contact your administrator for assistance.</p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br />
Digital Certificate About to Expire<br />
&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br />
The digital certificate you use to access ADP\&#8217;s Internet services is about to expire. If you do not renew your certificate by the expiration date below, you will not be able to access ADP\&#8217;s Internet services.</p>
<p>Days left before expiration: 2<br />
Expiration date: Jul 11 23:59:59 GMT-03:59 2012</p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br />
Renewing Your Digital Certificate<br />
&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br />
1. Go to this URL: https://netsecure.adp.com/pages/cert/register2.jsp</p>
<p>2. Follow the instructions on the screen.</p>
<p>3. Also you can download new digital certificate at https://netsecure.adp.com/pages/cert/pickUpCert.faces.</p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br />
Deleting Your Old Digital Certificate<br />
&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br />
After you renew your digital certificate, be sure to delete the old certificate. Follow the instructions at the end of the renewal process.</p></blockquote>
<p>&nbsp;</p>
<p>and&#8230;</p>
<p>&nbsp;</p>
<blockquote><p>Subject: ADP Security Management Update</p>
<p>ADP Security Management Update</p>
<p align=\"right\"><strong>Reference ID: 68760</strong></p>
<div>
<p>Dear ADP Client July 2012</p>
</div>
<div>
<p>This message is to inform you of the upcoming ?Phase 2? enhancement to <strong>ADP Security Management </strong>(formally ADP Netsecure)<strong>. </strong>This is where you manage your users? access to ADP?s Internet services, and includes the self-service registration process.</p>
</div>
<div>
<p><strong>Effective July 25<sup>th</sup>,</strong> ADP Security Management will reflect a new user interface. This will include tasks such as Account Maintenance, User Maintenance, and Company Maintenance within Security Management.</p>
</div>
<div>
<p>Please review the following information:</p>
</div>
<div>
<p><strong>? </strong> Click {link} to view more details of the enhancements in Phase 2</p>
</div>
<div>
<p><strong>? </strong> Complete the What?s New in Security Management Service {link} (Expected to take about 15 minutes)</p>
</div>
<div>
<p><strong>?</strong> View the Supported Browsers and Operating Systems, listed. {link} These are updated to reflect more current versions to ensure proper presentation of the updated user interface. It is important to note that the new ADP Security Management is best accessed using Microsoft Internet Explorer Version 8 or Mozilla Firefox Version 3.6, at minimum.</p>
</div>
<div>
<p><em>This email was sent to active users in your company that access ADP Netsecure with a security role of ?security master? or ?security admin?. You may have other users that also access ADP Netsecure with other security roles. Please inform those users of these enhancements, noting that the above resources will have some functionality that does not apply to their role.</em></p>
</div>
<div>
<p>As always, thank you for choosing ADP as your business partner! If you have any questions, please contact your ADP Technical Support organization.</p>
</div>
</blockquote>
<div>
<blockquote><p>Ref: 0725 MSAMALONIS1@TWNSHP</p></blockquote>
</div>
<p>It is important to look at the status bar at the bottom of your email client, as this will display the underlying link that you would be taken to if you click it. If it looks anyway suspicions, do not click the link</p><p>The post <a href="https://saje.nz/2012/07/26/new-scam-email-from-adp-netsecure/">New Scam email from ADP Netsecure</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2012/07/26/new-scam-email-from-adp-netsecure/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
		<item>
		<title>Twitter DM Spam / Virus / Phishing</title>
		<link>https://saje.nz/2012/05/22/twitter-dm-spam-virus-phishing/</link>
					<comments>https://saje.nz/2012/05/22/twitter-dm-spam-virus-phishing/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 21 May 2012 23:10:56 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[NZ Industry News]]></category>
		<category><![CDATA[Social]]></category>
		<category><![CDATA[Twitter Series]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2012/05/22/twitter-dm-spam-virus-phishing/</guid>

					<description><![CDATA[<p>Whoops, it\&#8217;s a good thing this was not one of those dodgy sites! &#160; Please, please please do not click on those \&#8221;OMG see what someone is writing about you\&#8221; kind of tweets. Or you will be hacked and your account will be used to send horrible stuff to all of your friends. &#160; Yours [&#8230;]</p>
<p>The post <a href="https://saje.nz/2012/05/22/twitter-dm-spam-virus-phishing/">Twitter DM Spam / Virus / Phishing</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<h1>Whoops, it\&#8217;s a good thing this was not one of those dodgy sites!</h1>
<p>&nbsp;</p>
<p>Please, please please do not click on those \&#8221;OMG see what someone is writing about you\&#8221; kind of tweets. Or you will be hacked and your account will be used to send horrible stuff to all of your friends.</p>
<p>&nbsp;</p>
<p>Yours sincerely,</p>
<p>The Twitterverse (The good ones anyway)</p>
<p>&nbsp;</p>
<p>PS: If you got here by clicking on the link in a tweet, retweet it, so we can warn more people 🙂</p><p>The post <a href="https://saje.nz/2012/05/22/twitter-dm-spam-virus-phishing/">Twitter DM Spam / Virus / Phishing</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2012/05/22/twitter-dm-spam-virus-phishing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IRD Refund&#8230;Oh Goody</title>
		<link>https://saje.nz/2012/02/08/ird-refund-oh-goody/</link>
					<comments>https://saje.nz/2012/02/08/ird-refund-oh-goody/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 08 Feb 2012 01:37:34 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2012/02/08/ird-refund-oh-goody/</guid>

					<description><![CDATA[<p>Sorry, it\&#8217;s another phishing attempt, this time pretending to be from the NZ IRD (Inland Revenue Department) Here is the email From: ir3refundfiles@ird.govt.nz Subject Due to our latest update you are eligible for a refund Dear Sir/Madam, You are receiving this e-mail with reference to our latest database update on February 5, 2012. Due to [&#8230;]</p>
<p>The post <a href="https://saje.nz/2012/02/08/ird-refund-oh-goody/">IRD Refund…Oh Goody</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Sorry, it\&#8217;s another phishing attempt, this time pretending to be from the NZ IRD (Inland Revenue Department)</p>
<p>Here is the email</p>
<blockquote><p>From: ir3refundfiles@ird.govt.nz</p>
<p>Subject Due to our latest update you are eligible for a refund</p>
<p>Dear Sir/Madam,</p>
<p>You are receiving this e-mail with reference to our latest database update on February 5, 2012.</p>
<p>Due to our most up-to-date calculations, Inland Revenue updated his database system to a more accurate structure. As a result, you are eligible to get a refund of 184,56 $NZD.</p>
<p>Please download IR3-e-file_FORM-759784123157 attached to this e-mail, complete the form with your personal information in less than 48 hours and allow up to 24 hours to update the data into our database.</p>
<p>Your records are securely encrypted through a secure 128 bit socket to our servers and will NOT be shared.</p>
<p>Reference number: 76178256192/2012nzr.</p>
<p>E-mail officially sent by Ross Hughson.</p>
<p>Inland Revenue &#8211; IR3_e-file refund form . html</p></blockquote>
<p>&nbsp;</p>
<p>As you can see it is \&#8221;from\&#8221; an IRD email address, ir3refundfiles@ird.govt.nz, to make it look more legitimate. It also give a real sounding name and a refernce number.</p>
<p>What could go wrong?</p>
<p>Well the HTML file that is attached will be the bit that bites. It will either redirect you to a phishing website or gather your data then and there and report it back.</p>
<p>Don\&#8217;t open these kinds of things, if in doubt, give them a ring.</p>
<p>&nbsp;</p>
<p>&nbsp;</p><p>The post <a href="https://saje.nz/2012/02/08/ird-refund-oh-goody/">IRD Refund…Oh Goody</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2012/02/08/ird-refund-oh-goody/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Scam &#8211; Better Business Bureau</title>
		<link>https://saje.nz/2011/12/21/new-scam-better-business-bureau/</link>
					<comments>https://saje.nz/2011/12/21/new-scam-better-business-bureau/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 20 Dec 2011 21:53:33 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[better business bureau]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2011/12/21/new-scam-better-business-bureau/</guid>

					<description><![CDATA[<p>The Better Business Bureau have been targeted as the latest providers of a \&#8221;trusted source\&#8221; for email phishing attempts. Not that the BBB are actually doing something wrong, but have been targeted by the spammers as a face for their campaign due to their trustworthiness, and in this case, the concern that happens when you [&#8230;]</p>
<p>The post <a href="https://saje.nz/2011/12/21/new-scam-better-business-bureau/">New Scam – Better Business Bureau</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The Better Business Bureau have been targeted as the latest providers of a \&#8221;trusted source\&#8221; for email phishing attempts. Not that the BBB are actually doing something wrong, but have been targeted by the spammers as a face for their campaign due to their trustworthiness, and in this case, the concern that happens when you get an email from them saying something is wrong.</p>
<p>With this latest email (I received 2 today, even though I am not in the US) they use the threat of a complaint against your company to get you to click on a link in the email.</p>
<p>Here is a copy of the email</p>
<blockquote><p>RE: Case # 18558568<br />
2011/12/20</p>
<p>Hello,</p>
<p>The Better Business Bureau has been filed the above-referenced complaint from one of your clients on the subject of their dealings with you.<br />
The detailed information about the consumer\&#8217;s concern is presented in enclosed document.<br />
Please give attention to this matter and let us know about your opinion.<br />
We encourage you to open the <strong>ATTACHED REPORT</strong> to reply this complaint.</p>
<p>We look forward to your prompt response.</p>
<p>Sincerely yours,</p>
<p>Louis Gerald</p>
<p>Dispute Counselor<br />
Better Business Bureau</p></blockquote>
<p>So again, it is a case of being careful when something like this appears in your mailbox. Don\&#8217;t panic and click the link to see what the issue is, if in doubt hover over the link and it will tell you in the status bar of your email program the real link that it will take you to.</p>
<p>If it looks in any way suspicious, leave it alone.</p><p>The post <a href="https://saje.nz/2011/12/21/new-scam-better-business-bureau/">New Scam – Better Business Bureau</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2011/12/21/new-scam-better-business-bureau/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malware/Phishing Attempt About declined Payment</title>
		<link>https://saje.nz/2011/12/15/malwarephishing-attempt-about-declined-payment/</link>
					<comments>https://saje.nz/2011/12/15/malwarephishing-attempt-about-declined-payment/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 14 Dec 2011 11:39:29 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[eft scam]]></category>
		<category><![CDATA[nacha]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2011/12/15/malwarephishing-attempt-about-declined-payment/</guid>

					<description><![CDATA[<p>I have received an email saying that a payment has been declined, as with many of these things, I have nothing to do with the service or vendor concerned and so I automatically think it is a scam. In this instance it appears to be a phishing scam by trying to trick you to click [&#8230;]</p>
<p>The post <a href="https://saje.nz/2011/12/15/malwarephishing-attempt-about-declined-payment/">Malware/Phishing Attempt About declined Payment</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>I have received an email saying that a payment has been declined, as with many of these things, I have nothing to do with the service or vendor concerned and so I automatically think it is a scam.</p>
<p>In this instance it appears to be a phishing scam by trying to trick you to click on an apparent document link that takes to to a webpage.</p>
<p>Other known reports of this (<a href=\"http://www.hoax-slayer.com/aca-payment-cancelled-malware.shtml\" target=\"_blank\">here</a>) talk of zip files being delivered to entice people to run the included .exe file (similar to the UPS scams)</p>
<p>This appears to a bit cleverer as it takes you to a website rather than the hassle of unzipping and running the executable.</p>
<p>The organisation mentioned does not send out these emails and so you can delete with impunity.</p>
<p>Here is the message:</p>
<div>
<div id=\"internalright\">
<blockquote><p>The ACH transaction (ID: 5061740263570), recently sent from your bank account (by you or any other person), was canceled by the other financial institution.</p>
<h2>Canceled transaction</h2>
<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">
<tbody>
<tr>
<td><strong>Transaction ID:</strong></td>
<td>5061740263570</td>
</tr>
<tr>
<td><strong> Reason for rejection</strong></td>
<td>See details in the report below</td>
</tr>
<tr>
<td><strong>Transaction Report</strong></td>
<td><strong>report_5061740263570.doc</strong> (Microsoft Word Document)</td>
</tr>
</tbody>
</table>
</blockquote>
</div>
<div id=\"pagefooter\">
<blockquote><p><strong>13450 Sunrise Valley Drive, Suite 100 Herndon, VA 20171 (703) 561-1100</strong></p>
<p>© 2011 NACHA &#8211; The Electronic Payments Association</p></blockquote>
</div>
</div><p>The post <a href="https://saje.nz/2011/12/15/malwarephishing-attempt-about-declined-payment/">Malware/Phishing Attempt About declined Payment</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2011/12/15/malwarephishing-attempt-about-declined-payment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ANZ Bank Phishing Target Again</title>
		<link>https://saje.nz/2011/12/05/anz-bank-phishing-target-again/</link>
					<comments>https://saje.nz/2011/12/05/anz-bank-phishing-target-again/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 05 Dec 2011 04:06:13 +0000</pubDate>
				<category><![CDATA[Email and Web Scams]]></category>
		<category><![CDATA[NZ Industry News]]></category>
		<category><![CDATA[anz]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://braveweb.nz/rebuild22/index.php/2011/12/05/anz-bank-phishing-target-again/</guid>

					<description><![CDATA[<p>These phishing attempts are usually found by my virus scanner, but this one got through. Anz Bank We\&#8217;d like to inform you that your Secure Messages Center has 1 new message. Please login to your Online Banking and visit the Secure Message Center section in order to read the message. Log On to Online Banking. [&#8230;]</p>
<p>The post <a href="https://saje.nz/2011/12/05/anz-bank-phishing-target-again/">ANZ Bank Phishing Target Again</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>These phishing attempts are usually found by my virus scanner, but this one got through.</p>
<blockquote><p>Anz Bank</p>
<p>We\&#8217;d like to inform you that your Secure Messages Center has <strong>1 new message</strong>.</p>
<p>Please login to your Online Banking and visit the Secure Message Center section in order to<br />
read the message.</p>
<p><strong>Log On</strong> to Online Banking.</p>
<p>(The Message Center contains only important information about your account and online banking.)</p>
<p>Copyright Australia and New Zealand Banking Group Limited ABN 11 005 357 522, 1996-2011.<br />
ANZ\&#8217;s colour blue is a trade mark of ANZ.</p></blockquote>
<p>&nbsp;</p>
<p>The log on link goes to http:// nogueirametalurgica . com . br/www . anz . com/index . php</p>
<p>This is a typical ploy where they hide the link to a hacked website. Here they have placed a site that looks the same as the target (This time ANZ) and hope that you do not look at the link that appears in the URL section of your browser.</p>
<p>Whenever you get a dodgy email, you can often just hover over the link in the email, and the email program will show you the link that you will be taken to.</p>
<p>If it is anything like this, then stay away</p><p>The post <a href="https://saje.nz/2011/12/05/anz-bank-phishing-target-again/">ANZ Bank Phishing Target Again</a> first appeared on <a href="https://saje.nz">SAJE</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://saje.nz/2011/12/05/anz-bank-phishing-target-again/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
