Now Playing Tracks

Python bridge Amsterdam

One of the most unusual bridges in Amsterdam as it’s red snake-like shape connects Sporenburg and Borneo Island. It’s built in 2001 and has won the International Footbridge Award in 2002. This bridge spans the 93-meter wide water of the rail-road basin, underneath which the Piet Heijn tunnel is located. The highest point of the bridge is about 10 meter above the surface. Standing on top allows visitors a remarkable view of the surrounding area.

I really love to climb the bridge early in the morning myself as well, just around sunrise so I can catch the first light of day.

Beware of new Phishing email scam regarding your iCloud ID

Dear contingent Apple-user,

I’ve received yet another troubling email today from a cherished friend asking me how to reset his ‘restricted’ iCloud-ID.

Since Apple will always refer to it as an AppleID I instantly got worried he might be dealing with a fears attempt from some devious party trying to fish his AppleID password from him! Probably betting he’s got some credit-card information all set-up in there to take advantage of.

Let me show you want-to-knows how I usually try to find proof of my bias gut-feelings and try and identify a fake from the real deal!
The overall look and feel of this mail is cleverly made to get you to trust it as fast as possible so it’s designed like something Apple would actually email you.

First look at the senders email-account.
Check the domain-extension to see if this is even coming from the ‘source’ they’re claiming to be. Be aware that this might seem to be so when it’s not; it’s not a clean yes or no answer just yet.
In this case however, it’s a nice smelly-sign to look before you leap (or click)!


As you can see; this address is not pointing to an email-address with extension - which Apple will always use - but to a different domain altogether. It’s set-up just to bamboozle you with the idea it’s coming straight from Silicon Valley when it’s not: secure @ | my | i | app | id | support | .com

Next step is to check the email-body for links.
The sender wants you to go to an environment they control, where they can get you to type your password so they can snatch it from you. Again they will have something nice-looking and trustworthy set-up for all the lucky-ones clicking-before-thinking.

Check the body-text for links and if you roll-over it with your mouse DON’T CLICK, it will show you the link before you click it. (Apple-users; You can also press CMD if the link needs a little help appearing)


As you can see, again this link is not pointing to but to a domain that when you look at it quickly enough, might give you the impression it’s apple-related: http:// | my | i | app | id | support |

How to validate a domain-name-owner?
If you ever have doubts on whether or not it’s a scam, you can find detailed information on the domain itself on numerous places on the web called “whois lookup tools”.
I chose today to see the whois record on this particular domain.


You can see this domain has only been purchased yesterday - April 19th, 2014 - probably for the sole purpose of getting you to hand-over your precious password aka financial-information and what-not.

Check to see who they want you to ‘believe’ it’s from
Usually, there are some links in an email, suggesting it’s from the-company-they-want-you-to-think-it’s-from like for example the last link in this make-believe-email.


With many questionable people all around the globe trying to get their hands on your cash the easy way, as people have been doing since the beginning of times; don’t blame your spam-filter for not being able to filter-out these pieces of tragedy fast enough.
Keep your own eyes wide-open and be a questioner rather bait.

What to do when your luck failed you?
Alert your family, friends and associates when you think you might be caught in the wrong web. Change your password ASAP and advise your connections to do the same if need-be. If there’s a chance your credit-card details or any other important documents might have been compromised, alert all parties regarding - check websites for info on how to alert them - and get them to do what needs to be done to keep you from further nuisance.

More information from Apple on how to identify fraudulent “phishing” email.

To Tumblr, Love Pixel Union