Make a blog


5 days ago

Japan Asia Group Limited - Consolidated Financial Results

Summary of Consolidated Financial Results for the Six Months Ended September 30, 2016

(Based on Japanese GAAP)


Company name: JAPAN ASIA GROUP LIMITED              


Stock exchange listing: Tokyo


Stock code: 3751 URL:


Representative: Tetsuo Yamashita          Chairman and CEO


Inquiries:  Kazunobu Watanabe Director         TEL: +81-3-4476-8000


Scheduled date to file Quarterly Securities Report: November 11, 2016


Scheduled date to commence dividend payments: –


Preparation of supplementary material on quarterly financial results: Yes


Holding of quarterly financial results meeting: Yes (for analysts)


(Amounts less than one million yen are rounded down)


1.       Consolidated financial results for the six months ended September 30, 2016 (from April 1, 2016 to September 30, 2016)


(1) Consolidated operating results (cumulative)          Percentages indicate year-on-year changes


Six months ended September 30, 2016


Six months ended September 30, 2015


Net sales

Millions of yen %




Operating income

Millions of yen         %

(750)               –

1,063              (17.7)


Ordinary income

Millions of yen         %

(1,379)                        –

254                  (50.4)


Profit attributable to owners of parent

Millions of yen         %

(1,737)                        –        

491                              –


2 weeks ago

Online Fraud Detection - Planning for Tomorrow’s Cyberattacks

As organisations think through their cybersecurity strategy for the coming year the challenge they face is how to plan for success, writes Peter Bauer, CEO and co-founder of Mimecast.


This past year we’ve seen how cybercriminals continue to become more sophisticated and insidious by constantly revising, updating and re-inventing their tactics and technologies to launch attacks. We’ve seen our share of DDoS attacks, key political figures emails hacked, and ransomware attacks. Recently, we saw cybercriminals target the San Francisco Municipal Transportation Authority with a ransomware attack. Free rides for all! And, that wasn’t San Francisco offering an early holiday gift to locals.


Knowing 100% protection against today’s cyber threats is not realistic – cyber resilience becomes the name of the game.  Building a cyber resilience strategy that layers state-of-the-art preventative systems, point-in-time recovery measures, and a means to maintain continuity during an attack can make a significant difference in fending off the myriad of sophisticated threats. We can’t predict all the attacks coming but we can build in cyber resilience and learn from what we have already seen.


Although we may not know all the answers of what’s to come, based on what we’ve seen over the year here are a few attacks that we, at Mimecast, think will rise up 2017:


* The Rise of Cyber Gangs – The past year has been rampant with attacks, and it’s only going to get worse. Not just in the number of attacks, but the sophistication. Attackers have been getting smarter, their data gathering techniques more sophisticated, and they’re becoming more organized. In 2017, we’ll likely see growing groups of attackers, as well as a network of shared information they’ve stolen. These groups will also likely clash, and we’ll see attackers going after each other as well as these virtual gangs grow, gain resources, and fight over territories in the digital landscape. As we all know everyone needs to protect against these threats, by taking a layered approach and ensure they have a proper cyber resilience strategy in place to combat these threats. But that can sometimes be out of reach for many organizations as they are always strapped for resources, budget and then management of said layers. Thus the massive shift of organizations moving to a cloud security strategy where you can get advanced security capabilities that would be out of reach to try and build on premise.


* Ransomware Continues to Evolve yet don’t take your eye off other threats – Ransomware will explode to become one of the biggest threats, fuelled by smaller ‘opportunist’ attackers using off-the-shelf kits to deploy malware. This is an easy and cheap attack method that produces fruitful results. Few organizations have effective defences against this type of malware and now with bitcoins enabling the perpetrators to increase distance from their victims further, it has never been so easy to get away with it. In the coming year, we should also expect more crypto-lockers and evolving forms of ransomware that deny access to desktops, network drives and cloud services. And just as you focus your attention on ransomware issues you can’t be caught off guard by adversaries impersonating the CEO to transfer thousands of dollars to an offshore account or by basic phishing attacks that will cause employees to launch attacks on your organisation.


* Focus on Data Mining – One theme that is still overlooked is that it’s not just about wire transfers. Attackers aren’t just focused on money, they’re focusing on data mining and will use the data they gather in more advanced attacks to gather important data to be either sold on the Dark Web, or used in future attacks.  (Remember the W-2 fraud uptick earlier this year? We’re heading into tax season, and can expect to see this again.)  While Wire Transfer fraud is, and will be an issue in the future, organizations need to also think about where else they’re susceptible and ensure they have the appropriate protective measures in place. Backups are essential, but the evolution of ransomware is staggering and organizations need to ensure their gateway, firewall, endpoint and other security solutions are consistently up-to-date.

1 month ago

Kaori Fuchi Advisors Tokyo Japan Newsroom

Kaori Fuchi Advisors Tokyo Japan Newsroom

News & Media


May, 2014

Lectured for tax accountants who want to start up their business.

“How to hire an ideal staffs for your firm.”


December 2013

Introduced as an Japanese tax professional who can communicate in English in “Japan Startup Guide 2013”


October 2013

Lectured in Tokyo on behalf of ESSAM KK for tax accountants.

“How to set up your business as an tax accountant.”


September 2013 – August 2014

Serialized an essay for readers who want to be an tax accountant.



Lectured in Osaka on behalf of ESSAM KK.

“Let’s become a winner as an tax accountant.”


September, 2013

Interviewed by Nikkei newspaper.

“Tax saving for investment of foreign real estate.”


August, 2013

Lectured in Sendai on behalf of ESSAM KK.

“Let’s become a winner as an tax accountant.”


July, 2013

Lectured in Tokyo on behalf of ESSAM KK.

“Let’s become a winner as an tax accountant.”


June, 2013

Lectured at Tokyo CPA Association’s Shibuya Block Conference.

“Tax Treatments for expats who Work Overseas.”


June, 2013

Interviewed by popular women’s magazine, “DRESS,” for their feature on Female Entrepreneurs in Japan.


January, 2013

Featured in Kansai University of Foreign Languages website.


December, 2012

DVD, produced by BIZUP SOKEN KK, goes on sale.

“Salaries for Expatriates.”


December, 2012

Lectured at ESSAM KK.

“Basics for International Tax Accounting.”


October, 2012

DVD, produced by ACCS Consulting Co. Ltd., goes on sale.

“International Tax for Tax Accountants.”


September 2012

Interviewed for issue 26 of Tax Accounting Industry News published by ACCS Consulting Co. Ltd.

“Tax Accountant specializing in international taxation matters”\


August 2012

The Tax Accountant Blog (written by Kaori Fuchi) was presented in Taxation Institute of Japan's website Zei-no-machi (Town taxation).


3 months ago

What’s Behind Google’s Secretive Ad-Blocking Policy by Online Security

What’s Behind Google’s Secretive Ad-Blocking Policy by Online Security

University of Maryland law professor Frank Pasquale says Google has tried to have it both ways: sometimes it portrays itself as a simple utility and a mere conduit of its customers’ ads, but other times it presents itself as a content provider that can and should exercise control over the ads it shows.


Whenever Google is accused of abetting or enabling copyright infringement or defamation, it says, ‘We’re just [connecting people] like the phone company does, and you wouldn’t sue the phone company over this,’” says Pasquale. “But when people say, ‘If you’re a common carrier [utility], you should take all ads,’ Google will say, ‘No, we’re like a newspaper and we should have carte blanche over what we publish.’”


With payday loan ads, Google is characterizing itself as the watchful online guardian. The company has said it banned the ads to protect its users because “research has shown that these loans can result in unaffordable payment and high default rates.” (Google declined to comment for this story beyond saying that it constantly reviews its AdWords policies and updates them ”when necessary.”)


Google also seems to have been influenced by advocacy from a large coalition of civil rights, digital rights, and financial reform organizations. In late 2015, the Leadership Conference on Civil and Human Rights and other groups sent Google reports detailing abuses that often accompany payday loans—among them fraud, unauthorized transactions, and long-term indebtedness. “We said, ‘This is a problem, and we want to talk to you about this,’” says Alvaro Bedoya, the executive director of Georgetown Law’s Center on Privacy & Technology, who participated in the outreach campaign. “There were long conversations with Google and a lot of bringing this research to their attention over the course of a couple of months.”

4 months ago

Oakmere Road: New phishing scam targets fans of popular television show

Oakmere Road: New phishing scam targets fans of popular television show

The hugely popular hit HBO show "Game of Thrones" was the most pirated program in 2015. It's been a constant problem for HBO and the company often has to send out warning emails to users and take down demands to torrent sites.


But now, even if you're not pirating "Game of Thrones" you could get one of these notices - but it's not what it seems. Scammers have started to send spoof warning emails from HBO in order to get victims to to send over some serious cash.


The spoof emails instruct the victim to pay a few hundred dollars as part of a settlement for being caught pirating Season 6, Episode 10 of "Game of Thrones." The email reads:


"On this regard, request is hereby made that you and all persons using this account immediately and permanently cease and desist the unauthorized copying and/or distribution of the Work listed in this notice. You may also be liable for monetary damages, including court costs and/or attorney fees if a lawsuit is commenced against you."


The email later says you only have 72 hours to complete your settlement, otherwise further legal action will be taken.


The email is very convincing and could fool nearly everyone. It is professionally-worded and has minimal typos. So in this case, the best defense might be knowing what HBO's real cease and desist letters look like:


It's important to note that the real cease and desist letter doesn't demand money and there's no time limit. It also specifically names the IP address, whereas the fake email doesn't.



Scammers are getting trickier by the day, so you'll have to stay one step ahead of them. One way to do this is to know the warning signs and red flags to look for before clicking on any links or sending out any sensitive information.


- Keep an eye out for typos and bad grammar.

- Be able to identify where the email is coming from.

- Hover your mouse over any links before you click to see where they are pointing.

- Click here to take the Phishing Email quiz to see if you can spot all the warning signs of a phishing scam.

- Be wary of email-only wire transfer requests and requests involving urgency.

- Be cautious of mimicked email addresses.

- Practice multi-level authentication.

- Protect yourself with online security software. We recommend our sponsor, Kaspersky Lab, which offers software that helps to filter out and warn you about phishing scams, so your odds of being tricked are slim. Kaspersky Total Security can recognize and block malicious links and Trojan programs, and covers up to five devices on one license. Buy it today and save 50%.

4 months ago

Oakmere Road: Top 5 social media scams to avoid

Oakmere Road: Top 5 social media scams to avoid

Scammers have been worming their way into giant social media networks to trick people into giving over their personal and financial information.


Over the past year, the number of phishing attempts on social media networks like Facebook (FB, Tech60), Twitter (TWTR, Tech60), Instagram and LinkedIn (LNKD, Tech60) has exploded 150%, experts at security firm Proofpoint (PFPT) say.


That's because fraudsters can use social media to target hundreds of thousands of people at once, but also blend in with the crowd. They mimic users and their activities, and they take advantage of the way people use social media to deal with business problems.


Here are five of the most cleverly cloaked scams on social media right now, according to Proofpoint:


1. Fake customer service accounts on Twitter

Online criminals set up fake customer service accounts to phish for bank login and password information and other sensitive data. These imposter accounts look very similar to that of real businesses, but are often one character off -- or they include an extra underscore or other keyboard character.

When someone tweets at their bank or example, scam artists will intercept the conversation, and reply to that message with what seems like an authentic answer.


2. Fake comments on popular posts

A popular news story or social media post might generate a lot of comments. Fraudsters like to take advantage of that large audience by adding their own comments with links to other buzzy headlines that lead to credit card phishing scams.


3. Fake live-stream videos

As more media companies start streaming their shows and movies online, scammers are jumping on the bandwagon.

They do things like comment on the Facebook page of a sports team with a link that leads people to believe they can watch a free live stream of a game. But the links lead to a fake website that asks for personal information in order to start the video, which very often doesn't exist.


4. Fake online discounts

Fake online discounts work similarly to fake customer service accounts. Schemers will set up social media accounts that look like legit businesses, then pretend to offer a real promotion. In reality, they want to trick people into giving up their personal information.


5. Fake online surveys and contests

These tactics have been around for years and are designed to get answers to personal questions that fraudsters can mine and sell later. But criminals embed them into social media posts that often look legit because there's a normal looking profile picture and link, thanks to URL shorteners.

5 months ago

Oakmere Road: How first-year college students can avoid being victims of scammers

Oakmere Road: How first-year college students can avoid being victims of scammers

First-year college students go through a lot of growing pains as they face new challenges and opportunities. As they figure out which major to choose, learn how to juggle work and school and just live on their own for the first time, scam artists lie in wait hoping the students make a mistake.


First-year college students are exposed to all kinds of new possibilities, which make them vulnerable to scam artists who make attempts to take advantage of their lack of life experiences.


BBB sheds some light on the following scams, which target those attending college:


Accommodation scams: Rental owners are supposedly governed by strict controls over the conditions in which they maintain their properties. However, there are unscrupulous landlords who don’t play by the rules. You want to make sure you actually go to the property before putting any money down, and make sure you’re getting what you expected.


Non-existent rentals: They take your downpayment, and when you arrive, the person you gave the money to doesn’t even own the property, or the property doesn’t exist. Before providing any form of payment, visit the property and research the property management company by going to


Finding a place to work: If the job you’re looking at involves door-to-door selling, such as selling magazines, cleaning supplies, handyman work or even raising money for charity, you want to make sure you check the company out before you begin working for them. In some cases, the product doesn’t exist, the charity is bogus or the handyman really doesn’t do the work you’re selling, which means you’re not likely going to get paid.



Fake initial checks: Steer clear from any job that sends you a check to deposit, then wants you to wire funds or put funds to a prepaid card. The problem is, the check is fake or it might be a forged check from an actual bank account (but not from the company on the check), and you could be charged with money laundering if you cash it.


Paying for school: Be on the lookout for phony scholarships and grants. These people are just trying to get your account information to wipe it out, not to deposit money for school as they claim.


Paying for anything: Some identity thieves set up fake credit card application booths luring students to give away very personal information in exchange for a T-shirt or an umbrella or something like that. It’s basically an easy way to steal information. If you want to get a credit card, go to the bank and apply for one.


Unsecured Wi-Fi hotspot: Using Wi-Fi on an unsecured network puts you at risk for identity theft. A lot of students use public places to study. Make sure you use encryption software and password protection to block identity thieves when doing homework in these Wi-Fi hotspots, and do not log onto your bank account or other sites that contain personal information.


For more tips on how to be a savvy consumer, go to To report fraudulent activity or unscrupulous business practices, please call the BBB Hotline: 903-581-8373 or use BBB Scam Tracker.