CallCom and Tech4Success is UNDERSIEGE!

The author of this page together with other people around the world would like to address the SECURITY issue that CallCom and Tech4Success has IGNORED for the past year and a half! We felt that it is time to tell the TRUTH! Any comments and suggestions please email me at cristoper.valdez@yahoo.com.ph



WHAT THEY SAY !?

On the latest newsletter issued by the company through its website u-gotcash.com, it says...

"We want you to know we took some very extreme database protections and it caused a few bugs that have been corrected on both U-GotCash.com. You may also now use credit cards and have them go through successfully on FPS and the UGC store. We have added a 2 layered encryption method for all your data on any of of our sites. This will assure you we have the most protections available. This extra security will only be found on bank sites and UGC. We apologize for any inconvenience this caused you but we always try to use the latest encryption available and in this case we needed to almost completely rebuild the data base to add this newest safety. The IT staff has worked almost 48 hours straight to protect us."

THE TRUTH

Today, the "extreme database protection" that they installed was a BIG LIE! Simply, because their site (U-GotCash.com) was HACKED again!!! And they said they have used "2 layered of encryption", well I guess that didn't worked either. Bottom line, your Personal, Bank and Credit Card information are so EXPOSED to all hackers all over the world. CallCom and Tech4Success is liable to all damages that will be made to all clients.

What will they say next now? I can't wait to hear their none sense explanations and excuses!


WHAT THEY SAY !?

On the email sent to me by Jeff and lately I found out that he is the Chief Technical Officer for the company with a lot of experience on the web as he claims to be. He says on his email to me...

"Probably, you did penetrated to SLAM and got a hold of this OTHER database which is possible. If thats the case, we will consider this as our major security hole and we are hoping that you can help us point what is the error so that we can fix is asap."

THE TRUTH

He(Jeff Bituin) doesn't have any idea what the problem was and he actually tries to lure me to tell him everything. What a TOTALLY BOGUS PERSON he is huh!?? Is this the kind of person that would lead a team or company, absolutely not. And you can view the entire email that he sent me by clicking on this link or by scrolling down below this page.

Oh, yes you can see his picture below and his so called " technical and research expertise".

Jeff Bituin 
( Chief Technical Officer  )

Jeff Bituin has been the Chief Technical Leader since the company's inception. His technical and research expertise has ensured the quality and innovation in our products that our members have come to expect.

He brings his many years in Information Technology in CallCom Inc. He has over 12 years of software development experience with an emphasis on high-reliability applications. He is experienced in many development environments and languages. With these years of experience on different platforms, he is a solid team leader for any project.

In the past, Jeff has professionaly worked as a Computer Instructor in AMA Computers, as a Senior Technical Consultant in AOL, as a Senior Software Engineer in American Quality Systems, and at CyberMetrics as a project manager. Additionally he has been a valued independent consultant as a technical adviser in the latest Internet and database technologies.

He graduated from the University of Angeles with a degree in Computer Science with major in Information Systems.


 
Email between me and Jeff Bituin (please read)
 

From: "Jeff Bituin" <jeff@24vipinc.com> Add to Address BookAdd to Address Book
To: "Cristoper Valdez" <cristoper.valdez@yahoo.com.ph>
CC: "Tom Green" <tom@callcominc.com>, Send an Instant Message "amor love" <ariesman2004@yahoo.com>, support@24vipinc.com, "Chris Marlon Panlaqui" <chris@24vipinc.com>, support@callcominc.com, denise@callcominc.com, support@u-gotcash.com
Subject: Re: Attention! Fwd: Company Security Issue
Date: Mon, 21 Jan 2008 17:41:01 +0800

Dear Mr. Cristoper,

How's going on? We are very fortunate of having you as one of our persistent critic on our projects. We are considering these positively and rest assured that we will do our best to find and fix these errors/holes that you found.

Unfortunately, we are being halted of our search because our SLAM and UGC databases do not have these sensitive informations. Perhaps, these informations where got on our other databases that our good friend James Bennet got a hold before he left in the office. Probably, you did penetrated to SLAM and got a hold of this OTHER database which is possible. If thats the case, we will consider this as our major security hole and we are hoping that you can help us point what is the error so that we can fix is asap. If you really want to help then you can help us finding out this error and we can consider you an offer for your consultation if you are really sincere of helping us.

Regards,

Jeff



----- Original Message -----

From: Jeff Bituin
To: rodel@24vipinc.com
Sent: Monday, January 21, 2008 5:00 PM
Subject: Fw: Attention! Fwd: Company Security Issue


----- Original Message -----
From: Cristoper Valdez
To: tom@24vipinc.com
Cc: ariesman2004@yahoo.com ; jeff@24vipinc.com ; support@24vipinc.com ; chris@24vipinc.com ; support@callcominc.com ; denise@callcominc.com ; jeff@callcominc.com ; support@u-gotcash.com
Sent: Monday, January 21, 2008 3:50 PM
Subject: Attention! Fwd: Company Security Issue

To: Green, Thomas
Techs4Success Inc
6150 East State Road 70
Bradenton, Florida 34203
United States
Email: tom@24vipinc.com
Tel no.: 888-518-1788
Fax no.: 561-892-5854

Dear Mr. Thomas Green,

Below are the persons that were HACKED using
your SLAM program(http://www.u-gotcash.com/slam/).
And their Credit Cards were already used and have
been BILLED as I write this email to you:

-----------------------------
Name: Noah Yoder
Email: 5050safe-mail.net
Credit Card: xxxxxxxxxxxx7320
-----------------------------
Name: Arthur Pierce
Email: arthur77@buzzirk.com
Credit Card: xxxxxxxxxxxx5989
-----------------------------

Note: You may expect that these people will
call you soon. And there will be more if you
don't fixed the problem on your program!

Regards,
Cristoper.Valdez

Cristoper Valdez <cristoper.valdez@yahoo.com.ph> wrote:

Date: Thu, 17 Jan 2008 03:16:37 -0800 (PST)
From: Cristoper Valdez <cristoper.valdez@yahoo.com.ph>
Subject: Company Security Issue
To: tom@24vipinc.com
CC: ariesman2004@yahoo.com, jeff@24vipinc.com, support@24vipinc.com

To: Green, Thomas
Techs4Success Inc
6150 East State Road 70
Bradenton, Florida 34203
United States
Email: tom@24vipinc.com
Tel no.: 888-518-1788
Fax no.: 561-892-5854

Dear Mr. Thomas Green,

How are you all doing? I hope you still remember me, Cristoper.
I was the one who told you about some problems with your websites
but it seems like that it was fixed by your developers "I HOPE".

PROBLEM:

Let me tell you that you have right now a BIG SECURITY ISSUE
with your Instant Messaging Program! We were able to penetrate
some of your clients sensitive information!

If you can just imagine what will your Clients or the United States
Internal Revenue Service(IRS) will say or do with your company!

To get your attention, below are some of the data we got
a hold on to:

-----------------------------
Name: Mr. Raymond Prince
Email: rayprince@att.net
Credit Card: xxxxxxxxxxxx8458
-----------------------------
Name: Mr. Rudy Chandros
Email: rudychan@msn.com
Bank Account: xxxxxxxxx2939
-----------------------------

SOLUTION:

If you will hire me, I will definitely help and assure you
to SECURE your program and others. Again, I am here to help
you out with sincerity. Don't think twice because every
minute counts, since there might be someone out there who
already knows this vulneribility on your system!

 

Regards,
Cristoper.Valdez

1