Turns out the phone calls from +61 3 9415 5000 I’ve been receiving is from Georgesons, a Computershare subsidiary who are using the same outbound number and probably utilizing the same call centre staff as Computershare. While my view may certainly be debatable, I feel personally this impacts on Computershare’s reputation of impartiality as a share registry and Administrative service.
“Georgesons” acting on behalf of APVG (wishing to take over MetLife Care) have repeatedly called me on my number stating the directors of APVG are encouraging MetLife Care shareholders like me to vote yes to the take over offer.
They also wanted me to advise right there and then on the spot which way I would be voting. I repeatedly replied saying that “I have yet to review the information and I am unable to provide you an answer right at this point in time”. I suspect that Georgeson staff are given incentives.
Have finally got around to reviewing the documentation and will personally be voting ‘No’ to the take over offer. In a high level (superficial) nutshell…
- Offer I feel is a little bit too low for the potential future gain I will be leaving on the table.
- (To be direct) Tired of losing access to an ever diminishing range of investment opportunities, given the global liquidity glut courtesy of central bank endless money pump.
NZ Shareholder’s association have also provided their views to their members with the view of voting against the take over offer.
Update – 2020-09-11T06:55:00+12:00: Looks like as quietly Facebook snuck this in, they have since reversed this.
Alright, this makes me pretty unsettled. I’ve noticed today that If I now try to view any Facebook page of any given business, I’m now met with a login wall.
Its unsettling because more and more businesses recently seem to be moving exclusively to running a Faceborg business page as their only web presence.
Yeah, I have to admit, I don’t agree with a few of the things that Ben Felix of PWL Capital (based in in Ottawa) says in his YouTube video series. More his assertion that the stockmarket is efficient, is forward looking, etc.
The naming of Ben’s channel “Common sense investing” and the style of his presentation would naturally give off the impression that Ben Felix is the man who knows what he is talking about. I would however caution people against settling into any sense of security so to speak, especially when it comes to finance and economics.
Certainly, look at his videos, but apply it with a healthy pinch of salt. A healthy dose of scepticism as with anything in the financial sector wouldn’t go amiss. Seeing comments such as “I got clicked baited into this video and I’m not disappointed” is a red flag in my mind for Astroturfing activity (Fake grassroots praise).
To be honest, apart from the purposes of imparting Ben’s view, I think the video series may be primarily more of an advertising mechanism to get PWL’s name “out there” so to speak.
Investigations so far suggest that there is some type of conditional redirect exploit/hijack being planted on many WordPress websites redirecting search engine referred visitors to fake award/survey sites such as “applefacetook”, “hurryexpectsugar”, “mouthtroubleask”, “ondiesmall”, “thendownmeat”, “makemodernfive”, “sayhitome”, “whateyeweight” among several others typically ending in a “.live” address. While this Hijack, as far as I have seen appear to predominantly affect WordPress websites, I wouldn’t be surprised to learn that this possibly affects other types of websites as well.
In my experience, for sites that are affected, to replicate…
(These most certainly could differ depending on the site affected)
- Needs to be done from an IP address that has yet to access the site in question. (e.g Mobile Data Connection, activate and deactivate airplane mode to get a new IP address)
- Chrome or Firefox browser (Win 10 or Android) in Incognito Mode (No plugins). Reportedly in other variations of the exploit, it only occurs on Safari under iOS
- Search for your site in Google search
- Click on the search result that points to your website. Instead of loading up your website as expected, you get redirected to a hijack site.
The hijack will not fire If you access your site directly. This appears to be some conditional exploit based on visitors coming from Search Engines. (e.g by typing the site URL directly into the Address bar, you won’t get redirected) and it looks like it will only fire once per IP Address.
I probably should add that many so called WordPress vulnerability scanners online I’ve discovered aren’t even set up to detected this sort of hijack. The scanners based on “Securi” certainly will not detect this exploit, I’ve found.
Original Post (Old):
Noticing some apparent weird intermittent redirect hijack on the general web where some sites are allegedly redirecting to some dodgy website with names such as “mouthtroubleask”
Update – 2020-09-11T06:55:00+12:00: Added steps to replicate (from my own experience)
Update – 2020-09-12T18:20:00+12:00: Added note to mention that all of the online WordPress malware scanners I’ve tried won’t detect this sort of hijack.