www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-deception.html prop...


From: Amin Bandali
Subject: www/proprietary proprietary-deception.html prop...
Date: Sun, 14 Apr 2019 19:35:00 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     Amin Bandali <bandali>  19/04/14 19:35:00

Modified files:
        proprietary    : proprietary-deception.html proprietary.html 

Log message:
        OfficeMax rigged malware scans (www-discuss 2019-03-29)

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.111&r2=1.112

Patches:
Index: proprietary-deception.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-deception.html  20 Feb 2019 11:44:40 -0000      1.32
+++ proprietary-deception.html  14 Apr 2019 23:35:00 -0000      1.33
@@ -37,6 +37,15 @@
 <div class="column-limit" id="proprietary-deception"></div>
 
 <ul class="blurbs">
+  <li id="M201903280">
+    <p>OfficeMax cheated customers by <a
+      
href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/";>
+      using proprietary &ldquo;PC Health Check&rdquo; software</a> rigged
+      to give false results, deceiving the customer into thinking per
+      computer was infected and buy unneeded support services from the
+      company.</p>
+  </li>
+
   <li id="M201902041.2">
     <p>Twenty nine &ldquo;beauty camera&rdquo; apps that used to
     be on Google Play had one or more malicious functionalities, such as <a
@@ -164,7 +173,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/20 11:44:40 $
+$Date: 2019/04/14 23:35:00 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary.html    11 Apr 2019 06:46:34 -0000      1.111
+++ proprietary.html    14 Apr 2019 23:35:00 -0000      1.112
@@ -146,6 +146,15 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201903280">
+    <p>OfficeMax cheated customers by <a
+      
href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/";>
+      using proprietary &ldquo;PC Health Check&rdquo; software</a> rigged
+      to give false results, deceiving the customer into thinking per
+      computer was infected and buy unneeded support services from the
+      company.</p>
+  </li>
+
   <li id="M201903210">
     <p>The Medtronics Conexus Telemetry Protocol has <a
     
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
@@ -189,14 +198,6 @@
     when they go to a junkyard the driver's personal data goes with
     them</a>.</p>
   </li>
-
-  <li id="M201903250">
-    <p>The British supermarket Tesco sold tablets which were tethered
-    to Tesco's server for reinstalling default settings.  Tesco <a
-    
href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix";>
-    turned off the server for old models</a>, so now if you try to
-    reinstall the default settings, it bricks them instead.</p>
-  </li>
 </ul>
 
 
@@ -257,7 +258,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/11 06:46:34 $
+$Date: 2019/04/14 23:35:00 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]