Lil Wayne’s house on La Gorce Island in Miami Beach is for sale -- that is what has been all over the internet today, on blog after blog. Is it true? No it’s not.
The latest rumor was started by an erroneous April 7th report by AOL Real Estate, stating that Lil Wayne put his La Gorce Island home up for sale due to tax problems.
Lil Wayne doesn’t own a house on Miami Beach, but it he reportedly rents a home on La Gorce Island. 94 La Gorce Circle is a 15,000 square feet home which was built in 2004, and except for the relatively small lot on which it is situated, could well be considered a Miami Beach mansion.
The home is advertised as an architectural masterpiece with “rich woods, expanses of glass, steel & select marble, lavished throughout this ultra-modern residence that features sky terraces with incredible views”.
In actuality, the property has been on the market for sale for quite some time. It was listed for sale in 2006 for $13.9 million, and has been on the market for most of the time since then. In November 2010 the price was dropped to $12.9 million, where it stands today.
2 Mayıs 2012 Çarşamba
Lil Wayne's House In Miami Beach For Sale
Willy's Beach Club Hotel

Willy's Beach Club Hotel is in Boat Station 1. It is absolutely Beach-Front Hotel and located across Willy's Rock – the most photograph spot and landmark in the island. It's in the quiet area of the white beach, yet accessible to the main road for your day-to-day itinerary and walking distance to famous beach front bars for your night life as distance well. Thus they guarantee privacy, serenity an fun at the same time.
The resort has 36 newly renovated spacious rooms; a multi-purpose air conditioned hall with maximum capacity of 180 persons with complete audio-visual conference equipment, perfect for in-door events, caters seminars and special occasions. Everything is arranged from your choice of motif to your selected food to meet your budget.

My Friend's Been Hacked!
Subject: RE: URGENT RESPOND NEEDED
Hello,
I am sorry I didn't inform you about my traveling to Europe for a program called Empowering Youth to Fight Racism,HIV/AIDS,and Lack of Education,the program is taking place in three major countries in Europe which are Dublin,Scotland and England,I am persently in England,London.
I misplaced my wallet on my way to the hotel where my money,and other valuable things were kept.I will like you to assist me with a soft loan urgently with the sum of $2,800 US Dollars to sort-out my hotel bills and get myself back home.
I will appreciate whatever you can afford to send the money today.i'll pay you back as soon as i return,Let me know if you can assist. please use this information to send the money to me.I wait your quickly respond
I posted a copy of that email on my blog in February of 2009 (See: Traveler Scams: Email Phishers Newest Scam). Since that time ALMOST EVERY DAY I receive an email from someone thanking me for my post and telling me that one of their friends seems to have fallen victim. Then they say "What do I do next?"
Normally I tell them they need to contact their friend and have their friend report to their email provider that they have had their password stolen.
Please note that this is DIFFERENT than just getting a weird email that says it came from a friend. In this traveler scam, if you reply to the email, the bad guy will often reply with personal information about you "that only your friend could know." That's because they are actually in your friend's email account reading emails from you to try to find a way to convince you to wire them money.
Another indicator that someone may have had their email hacked is when there are several people on the "To:" or "CC:" line that you know your friend knows. When spammers randomly forge a "from" address, it doesn't necessarily mean they have stolen your friend's password, but when SEVERAL of your friend's acquaintances are in the "To:" line, it means the criminal has access to your friend's address book or email messages.
Hotmail: My Friend's Been Hacked!
Microsoft has just announced this week a new way that you can help your friend (if both of you use hotmail.) Dick Craddock writes in the "Inside Windows Live" blog on July 14th, Hey! My Friend's Account Was Hacked! about a new feature that is being offered to hotmail and live.com customers.
With the new feature, when you are reading the offending email, you can pull down the "Mark As" menu and choose "My Friend's Been Hacked!:
When you take the time to mark the message like that, it sends a high priority request to Microsoft to put this account "on hold." Now, there has to be some OTHER circumstances true as well, you can't use this to just cause trouble for people who annoy you, but when your report is combined with other factors about your friend's email usage -- such as sending an unusually high number of messages, or logging in from an IP in another country -- the account will be placed on hold.
That immediately stops the criminal from being able to use the account to send spam, AND let's your friend begin an Account Recovery Process the next time they try to log in.
Yahoo! and Gmail?
What if your friend doesn't use Hotmail?
Microsoft has now begun pushing the "My Friend's Been Hacked!" reports to Yahoo! and Gmail as well. So if YOU are a hotmail user, and your hacked friend is using Yahoo! or Gmail using the reporting mechanism on hotmail will still send an alert to Yahoo! or Google and let them know of the suspicious email you've received.
Hopefully this will become a new industry standard practice and we'll be able to send reports from any of our mail clients!
Here's some advice from other providers on what to do if a Friend seems to be compromised:
- Gmail: Report A Security Problem
- Google: How to Recover Your Email Account
- Facebook Security
- Yahoo! Account Helper
(If you have a suggestion of a better link, please let me know . . .)
Duqu: You're safe unless you use TrueType Fonts?
Let's be thankful for that! The big news in the malware world yesterday came when Microsoft announced a work around for Duqu, named by researchers in the CrySyS Lab (the Laboratory for Cryptography and System Security at Budapest University of Technology and Economics) because it prefixes some created filenames with the letters "~DQ".
On October 14, 2011, CrySyS contacted Symantec to get some help analyzing the malware, and Symantec released an extremely informative 67 page PDF report called W32.Duqu: The Precursor to the next Stuxnet. (The link is to version 1.3 of the report, updated on November 1, 2011).
There have been two IP addresses confirmed to be associated with Duqu and serving as Command & Control. The first IP was in India - 206.183.111.97. The second was in Hungary - 77.241.93.160. Traffic flow to either of these IP addresses would be a strong positive indicator of a Duqu infection! Both sites are down now.
The first server was announced to be down on October 31st in stories such as this one -- India Shuts Server Linked to Duqu Computer Virus that shares some details of a server located at 200 employee data center Web Werks.
The second server was at Combell in Belgium -- as described in stories such as this one -- Duqu Hackers Shift to Belgium After India Raid.
Duqu is a data stealing program that shares several blocks of code with Stuxnet. In fact, one of the two pieces of malware we've seen that is described as being Duqu is also detected as Stuxnet by some AV vendors.
Here's a VirusTotal report of the better detected of those pieces of code, which had the MD5 value e1e00c2d5815e4129d8ac503f6fac095. This file is not "Duqu" but is rather "an .exe file related to Duqu" which is a much larger program (this one is only 9k in size).
(Click for VirusTotal Report)
Non "generic" definitions for this malware included:
Avast: Win32:Duqu-F
Emsisoft: Trojan.Win32.Stuxnet!IK
Ikarus: Trojan.Win32.Stuxnet
Microsoft: Trojan:Win32/Duqu.E
NOD32: probably a variant of Win32/Duqu.A
TrendMicro: TROJ_DUQU.AJ
Symantec mentioned MD5s
9749d38ae9b9ddd81b50aad679ee87ec
Wed Jun 01, 03:25:18 2011
Stealing information
4c804ef67168e90da2c3da58b60c3d16
Mon Oct 17 17:07:47 2011
Reconnaissance module
856a13fcae0407d83499fc9c3dd791ba
Mon Oct 17 16:26:09 2011
Lifespan extender
92aa68425401ffedcfba4235584ad487
Tue Aug 09 21:37:39 2011
Stealing information
In each of those above, the link on the MD5 will show you the VirusTotal report. I find it interesting that TrendMicro consistently names these files "TROJ_SHADOW.AG" which makes me wonder if they had independently discovered this malware family prior to the naming as Duqu by the CrySyS team.
Symantec calls attention to the fact that several of these files show compile dates AFTER the public disclosure of the existence of Duqu.
Delivery Mechanism
Symantec disclosed in their report that one of the infections they were analyzing had been infected via a Word Document that exploited the system using a previously unknown 0-day attack.
We now know from Microsoft more about this exploit. On November 3, 2011, Microsoft released this Microsoft Security Advisory (2639658)
Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege. The advisory starts with an executive summary which says, in part:
Microsoft is investigating a vulnerability in a Microsoft Windows component, the Win32k TrueType font parsing engine. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. We are aware of targeted attacks that try to use the reported vulnerability; overall, we see low customer impact at this time. This vulnerability is related to the Duqu malware.
Microsoft has released a work around. The exploit is taking advantage of the fact that there is a problem in one of the DLL's called by TrueType in certain circumstances. If a system denies access to that .DLL, T2EMBED.DLL, then the exploit would fail to work.
The workaround can be executed like this, but Microsoft cautions that applications that rely on EMBEDDED TrueType fonts could then fail to display properly:
(For older Windows versions)
Echo y| cacls "%windir%\system32\t2embed.dll" /E /P everyone:N
(For newer Windows versions)
Takeown.exe /f "%windir%\system32\t2embed.dll"
For more details on the workaround, please see Microsoft Security Advisory: Vulnerability in TrueType font parsing could allow elevation of privileges which offers a "Fix It For Me" button to apply the work around for you.
Duqu Compared to Stuxnet
The Symantec report has 22 or so pages of original Symantec content, and then has as the majority of it's body the report by the CrySyS Lab, which has a section that compares the Duqu and Stuxnet code. In particular, the Decryption function seems to be nearly identical.
Paypal "You Just Sent a Payment" spam leads to malware
The criminals believe (and from what we've seen, correctly) that when presented with the news that you just sent $100 to someone from your Paypal account, you will have a panic reaction and click on the link in the email. This is what they are counting on!
As you can see we got quite a few of these this morning:
The destination is NOT going to be Paypal. Don't click on the link, and tell your friends not to click on the link either! If they do, a bad set of malicious actions are set into motion.
This particular version of the campaign just started about 2.5 hours ago. Here are the number of messages we have seen so far:
count | mbox -------+--------------------- 22 | 2012-05-01 04:00:00 22 | 2012-05-01 04:15:00 312 | 2012-05-01 04:30:00 41 | 2012-05-01 04:45:00 15 | 2012-05-01 05:00:00 78 | 2012-05-01 05:15:00 241 | 2012-05-01 05:30:00 1 | 2012-05-01 05:45:00 210 | 2012-05-01 06:00:00 91 | 2012-05-01 06:15:00(10 rows)There are many hundreds of links that may have been advertised in your copy of this email, but don't click on ANY of them!
In the example case that we checked, we followed a link to "globalsecurityservices.com" (yes, we like irony).
When the web page was visited, it immediately executed two remote javascript files (I've added spaces to "break" them):
script type="text/javascript" src="http:// laxana .org /1VxMC4Dy /js .js"
script type="text/javascript" src="http:// womaametw3 .com /CWTKosSw /js .js"
which redirected to an Exploit server that displayed this "Please Wait" sign while something more malicious was happening in the background.
The exploit kit dropped a Java "JAR" file that was launched in Java, taking advantage of a security hole, which then caused another executable file to download and install on the computer.
What was that executable? We're not sure yet, but your anti-virus product probably doesn't know either. At the time we submitted the malware to VirusTotal there were only 5 of 43 anti-virus products could label the malware as malicious. Although McAfee called it "Zbot" (PWS-Zbot.gen.ya, the anti-virus name for the Zeus Bot) Avast and one other vendor called it "Karagany" (Win32:Karagany-FS [Trj]).
The malware's MD5 was 4f58895af2b8f89bd90092f08fcbd54f and it was 33280 bytes in size.
Here's a link to the original VirusTotal report.
Previous Threats
This link is very closely linked to a "LinkedIn" spam campaign from yesterday. That campaign functioned in exactly the same manner, with the difference only in the spam campaign.All of the domains listed below have been compromised by an attacker. Most likely the criminals have stolen the FTP userid and password of the criminal, allowing them to change the webmaster's content without the webmaster's knowledge. If you control or know the owner of one of these websites, let them know they have been hacked. They need to remove the content, scan any computers they use to access their website for malware, and change their password AFTER they get the malware cleaned up.
machine | path -------------------------------+---------------------- cpaindia.net | /rHFbxKTn/index.html dealaddict.ch | /bp9ksV54/index.html dealaddict.ch | /N2rhmW5i/index.html dealaddict.ch | /r1kVYAfU/index.html dealaddict.ch | /vpW8hoZ6/index.html depilee.com | /BzJoVeo0/index.html depilee.com | /Lskx0Bew/index.html depilee.com | /NdHgm0gT/index.html depilee.com | /oZFZ0qJK/index.html depilee.com | /pD2zHbBB/index.html depilee.com | /vpW8hoZ6/index.html depilee.com | /wcE0aK0J/index.html depilee.com | /wjivLtgo/index.html dpsdurgapur.com | /4RcYf6gB/index.html dpsdurgapur.com | /7QLZuMme/index.html dpsdurgapur.com | /bp9ksV54/index.html dpsdurgapur.com | /BzJoVeo0/index.html dpsdurgapur.com | /ErmgUouT/index.html dpsdurgapur.com | /gj1W42Ee/index.html dpsdurgapur.com | /i8ztSS5H/index.html dpsdurgapur.com | /iaJ7FSBi/index.html dpsdurgapur.com | /mKvc8Mh7/index.html dpsdurgapur.com | /N2rhmW5i/index.html dpsdurgapur.com | /NdHgm0gT/index.html dpsdurgapur.com | /oZFZ0qJK/index.html dpsdurgapur.com | /pD2zHbBB/index.html dpsdurgapur.com | /rHFbxKTn/index.html dpsdurgapur.com | /rzDZAsw7/index.html dpsdurgapur.com | /t7xYVUJE/index.html dpsdurgapur.com | /tLnW6jJT/index.html dpsdurgapur.com | /UAtkgmot/index.html dpsdurgapur.com | /UcL29wrU/index.html dpsdurgapur.com | /vpW8hoZ6/index.html dpsdurgapur.com | /wtQ8G0Ku/index.html dpsdurgapur.com | /YhwvXGhk/index.html dpsdurgapur.com | /zvo8ioak/index.html enfoquescreativos.com | /4RcYf6gB/index.html enfoquescreativos.com | /7NEM56yQ/index.html enfoquescreativos.com | /7QLZuMme/index.html enfoquescreativos.com | /bp9ksV54/index.html enfoquescreativos.com | /BzJoVeo0/index.html enfoquescreativos.com | /ddLvpeMu/index.html enfoquescreativos.com | /DkM4v1PP/index.html enfoquescreativos.com | /gj1W42Ee/index.html enfoquescreativos.com | /N2rhmW5i/index.html enfoquescreativos.com | /oZFZ0qJK/index.html enfoquescreativos.com | /r1kVYAfU/index.html enfoquescreativos.com | /Re3BMGVG/index.html enfoquescreativos.com | /rHFbxKTn/index.html enfoquescreativos.com | /RoScD8aq/index.html enfoquescreativos.com | /rzDZAsw7/index.html enfoquescreativos.com | /UAtkgmot/index.html enfoquescreativos.com | /vpW8hoZ6/index.html enfoquescreativos.com | /wjivLtgo/index.html enfoquescreativos.com | /wtQ8G0Ku/index.html enfoquescreativos.com | /YhwvXGhk/index.html enfoquescreativos.com | /zvo8ioak/index.html ftp.neez.com.br | /4RcYf6gB/index.html ftp.neez.com.br | /7NEM56yQ/index.html ftp.neez.com.br | /7QLZuMme/index.html ftp.neez.com.br | /ErmgUouT/index.html ftp.neez.com.br | /gj1W42Ee/index.html ftp.neez.com.br | /mKvc8Mh7/index.html ftp.neez.com.br | /NdHgm0gT/index.html ftp.neez.com.br | /oZFZ0qJK/index.html ftp.neez.com.br | /pSG1s2xs/index.html ftp.neez.com.br | /Re3BMGVG/index.html ftp.neez.com.br | /rzDZAsw7/index.html ftp.neez.com.br | /t7xYVUJE/index.html ftp.neez.com.br | /tLnW6jJT/index.html ftp.neez.com.br | /UAtkgmot/index.html ftp.neez.com.br | /UcL29wrU/index.html ftp.neez.com.br | /wcE0aK0J/index.html ftp.neez.com.br | /xXr3khjG/index.html ftp.pousadaesmeralda.com.br | /4RcYf6gB/index.html ftp.pousadaesmeralda.com.br | /bp9ksV54/index.html ftp.pousadaesmeralda.com.br | /ddLvpeMu/index.html ftp.pousadaesmeralda.com.br | /DkM4v1PP/index.html ftp.pousadaesmeralda.com.br | /gj1W42Ee/index.html ftp.pousadaesmeralda.com.br | /i8ztSS5H/index.html ftp.pousadaesmeralda.com.br | /iaJ7FSBi/index.html ftp.pousadaesmeralda.com.br | /Lskx0Bew/index.html ftp.pousadaesmeralda.com.br | /mKvc8Mh7/index.html ftp.pousadaesmeralda.com.br | /N2rhmW5i/index.html ftp.pousadaesmeralda.com.br | /NdHgm0gT/index.html ftp.pousadaesmeralda.com.br | /oZFZ0qJK/index.html ftp.pousadaesmeralda.com.br | /pD2zHbBB/index.html ftp.pousadaesmeralda.com.br | /pSG1s2xs/index.html ftp.pousadaesmeralda.com.br | /r1kVYAfU/index.html ftp.pousadaesmeralda.com.br | /Re3BMGVG/index.html ftp.pousadaesmeralda.com.br | /rHFbxKTn/index.html ftp.pousadaesmeralda.com.br | /rzDZAsw7/index.html ftp.pousadaesmeralda.com.br | /UcL29wrU/index.html ftp.pousadaesmeralda.com.br | /wcE0aK0J/index.html ftp.pousadaesmeralda.com.br | /wjivLtgo/index.html ftp.pousadaesmeralda.com.br | /wtQ8G0Ku/index.html ftppousadaesmeralda.com.br | /ddLvpeMu/index.html ftppousadaesmeralda.com.br | /Lskx0Bew/index.html ftppousadaesmeralda.com.br | /oZFZ0qJK/index.html ftppousadaesmeralda.com.br | /pSG1s2xs/index.html ftppousadaesmeralda.com.br | /wjivLtgo/index.html globesecurityservices.com | /4RcYf6gB/index.html globesecurityservices.com | /6BrzkppT/index.html globesecurityservices.com | /7NEM56yQ/index.html globesecurityservices.com | /7QLZuMme/index.html globesecurityservices.com | /bp9ksV54/index.html globesecurityservices.com | /BzJoVeo0/index.html globesecurityservices.com | /ddLvpeMu/index.html globesecurityservices.com | /DkM4v1PP/index.html globesecurityservices.com | /ErmgUouT/index.html globesecurityservices.com | /gj1W42Ee/index.html globesecurityservices.com | /i8ztSS5H/index.html globesecurityservices.com | /iaJ7FSBi/index.html globesecurityservices.com | /Lskx0Bew/index.html globesecurityservices.com | /mKvc8Mh7/index.html globesecurityservices.com | /NdHgm0gT/index.html globesecurityservices.com | /oZFZ0qJK/index.html globesecurityservices.com | /pD2zHbBB/index.html globesecurityservices.com | /pSG1s2xs/index.html globesecurityservices.com | /rHFbxKTn/index.html globesecurityservices.com | /RoScD8aq/index.html globesecurityservices.com | /rzDZAsw7/index.html globesecurityservices.com | /t7xYVUJE/index.html globesecurityservices.com | /tLnW6jJT/index.html globesecurityservices.com | /UAtkgmot/index.html globesecurityservices.com | /UcL29wrU/index.html globesecurityservices.com | /vpW8hoZ6/index.html globesecurityservices.com | /wcE0aK0J/index.html globesecurityservices.com | /wjivLtgo/index.html globesecurityservices.com | /wtQ8G0Ku/index.html gpureappliances.com | /4RcYf6gB/index.html gpureappliances.com | /6BrzkppT/index.html gpureappliances.com | /7NEM56yQ/index.html gpureappliances.com | /7QLZuMme/index.html gpureappliances.com | /bp9ksV54/index.html gpureappliances.com | /ddLvpeMu/index.html gpureappliances.com | /DkM4v1PP/index.html gpureappliances.com | /ErmgUouT/index.html gpureappliances.com | /gj1W42Ee/index.html gpureappliances.com | /Lskx0Bew/index.html gpureappliances.com | /N2rhmW5i/index.html gpureappliances.com | /NdHgm0gT/index.html gpureappliances.com | /oZFZ0qJK/index.html gpureappliances.com | /pD2zHbBB/index.html gpureappliances.com | /r1kVYAfU/index.html gpureappliances.com | /rHFbxKTn/index.html gpureappliances.com | /RoScD8aq/index.html gpureappliances.com | /rzDZAsw7/index.html gpureappliances.com | /t7xYVUJE/index.html gpureappliances.com | /UAtkgmot/index.html gpureappliances.com | /vpW8hoZ6/index.html gpureappliances.com | /wcE0aK0J/index.html gpureappliances.com | /wtQ8G0Ku/index.html gpureappliances.com | /xXr3khjG/index.html gpureappliances.com | /YhwvXGhk/index.html gpureappliances.com | /zvo8ioak/index.html hitechsystems.org.in | /4RcYf6gB/index.html hitechsystems.org.in | /7NEM56yQ/index.html hitechsystems.org.in | /7QLZuMme/index.html hitechsystems.org.in | /ddLvpeMu/index.html hitechsystems.org.in | /DkM4v1PP/index.html hitechsystems.org.in | /gj1W42Ee/index.html hitechsystems.org.in | /Lskx0Bew/index.html hitechsystems.org.in | /mKvc8Mh7/index.html hitechsystems.org.in | /N2rhmW5i/index.html hitechsystems.org.in | /NdHgm0gT/index.html hitechsystems.org.in | /oZFZ0qJK/index.html hitechsystems.org.in | /pD2zHbBB/index.html hitechsystems.org.in | /pSG1s2xs/index.html hitechsystems.org.in | /r1kVYAfU/index.html hitechsystems.org.in | /Re3BMGVG/index.html hitechsystems.org.in | /rHFbxKTn/index.html hitechsystems.org.in | /RoScD8aq/index.html hitechsystems.org.in | /rzDZAsw7/index.html hitechsystems.org.in | /t7xYVUJE/index.html hitechsystems.org.in | /UAtkgmot/index.html hitechsystems.org.in | /UcL29wrU/index.html hitechsystems.org.in | /vpW8hoZ6/index.html hitechsystems.org.in | /wcE0aK0J/index.html hitechsystems.org.in | /wjivLtgo/index.html hitechsystems.org.in | /wtQ8G0Ku/index.html hitechsystems.org.in | /xXr3khjG/index.html hypernovamedia.com | /4RcYf6gB/index.html hypernovamedia.com | /6BrzkppT/index.html hypernovamedia.com | /7NEM56yQ/index.html hypernovamedia.com | /7QLZuMme/index.html hypernovamedia.com | /bp9ksV54/index.html hypernovamedia.com | /BzJoVeo0/index.html hypernovamedia.com | /DkM4v1PP/index.html hypernovamedia.com | /ErmgUouT/index.html hypernovamedia.com | /gj1W42Ee/index.html hypernovamedia.com | /i8ztSS5H/index.html hypernovamedia.com | /iaJ7FSBi/index.html hypernovamedia.com | /Lskx0Bew/index.html hypernovamedia.com | /mKvc8Mh7/index.html hypernovamedia.com | /N2rhmW5i/index.html hypernovamedia.com | /pD2zHbBB/index.html hypernovamedia.com | /pSG1s2xs/index.html hypernovamedia.com | /r1kVYAfU/index.html hypernovamedia.com | /Re3BMGVG/index.html hypernovamedia.com | /RoScD8aq/index.html hypernovamedia.com | /t7xYVUJE/index.html hypernovamedia.com | /tLnW6jJT/index.html hypernovamedia.com | /UAtkgmot/index.html hypernovamedia.com | /UcL29wrU/index.htm hypernovamedia.com | /UcL29wrU/index.html hypernovamedia.com | /vpW8hoZ6/index.html hypernovamedia.com | /wcE0aK0J/index.html hypernovamedia.com | /wjivLtgo/index.html hypernovamedia.com | /xXr3khjG/index.html hypernovamedia.com | /YhwvXGhk/index.html hypernovamedia.com | /zvo8ioak/index.html ilabph.com | /6BrzkppT/index.html ilabph.com | /7NEM56yQ/index.html ilabph.com | /BzJoVeo0/index.html ilabph.com | /ddLvpeMu/index.html ilabph.com | /ErmgUouT/index.html ilabph.com | /gj1W42Ee/index.html ilabph.com | /i8ztSS5H/index.html ilabph.com | /iaJ7FSBi/index.html ilabph.com | /Lskx0Bew/index.html ilabph.com | /mKvc8Mh7/index.html ilabph.com | /N2rhmW5i/index.html ilabph.com | /NdHgm0gT/index.html ilabph.com | /oZFZ0qJK/index.html ilabph.com | /pD2zHbBB/index.html ilabph.com | /pSG1s2xs/index.html ilabph.com | /r1kVYAfU/index.html ilabph.com | /Re3BMGVG/index.html ilabph.com | /rHFbxKTn/index.html ilabph.com | /RoScD8aq/index.html ilabph.com | /rzDZAsw7/index.html ilabph.com | /t7xYVUJE/index.html ilabph.com | /tLnW6jJT/index.html ilabph.com | /UAtkgmot/index.html ilabph.com | /UcL29wrU/index.html ilabph.com | /vpW8hoZ6/index.html ilabph.com | /wcE0aK0J/index.html ilabph.com | /wjivLtgo/index.html ilabph.com | /wtQ8G0Ku/index.html ilabph.com | /xXr3khjG/index.html ilabph.com | /YhwvXGhk/index.html jmexy.com | /4RcYf6gB/index.html jmexy.com | /7QLZuMme/index.html jmexy.com | /BzJoVeo0/index.html jmexy.com | /ddLvpeMu/index.html jmexy.com | /DkM4v1PP/index.html jmexy.com | /ErmgUouT/index.html jmexy.com | /gj1W42Ee/index.html jmexy.com | /Lskx0Bew/index.html jmexy.com | /mKvc8Mh7/index.html jmexy.com | /N2rhmW5i/index.html jmexy.com | /NdHgm0gT/index.html jmexy.com | /r1kVYAfU/index.html jmexy.com | /Re3BMGVG/index.html jmexy.com | /rHFbxKTn/index.html jmexy.com | /RoScD8aq/index.html jmexy.com | /rzDZAsw7/index.html jmexy.com | /tLnW6jJT/index.html jmexy.com | /UAtkgmot/index.html jmexy.com | /UcL29wrU/index.html jmexy.com | /vpW8hoZ6/index.html jmexy.com | /wcE0aK0J/index.html jmexy.com | /wjivLtgo/index.html jmexy.com | /wtQ8G0Ku/index.html jmexy.com | /xXr3khjG/index.html jmexy.com | /YhwvXGhk/index.html jmexy.com | /zvo8ioak/index.html justinbieber-fans.nixiweb.com | /6BrzkppT/index.html justinbieber-fans.nixiweb.com | /7NEM56yQ/index.html justinbieber-fans.nixiweb.com | /ddLvpeMu/index.html justinbieber-fans.nixiweb.com | /DkM4v1PP/index.html justinbieber-fans.nixiweb.com | /ErmgUouT/index.html justinbieber-fans.nixiweb.com | /gj1W42Ee/index.html justinbieber-fans.nixiweb.com | /iaJ7FSBi/index.html justinbieber-fans.nixiweb.com | /Lskx0Bew/index.html justinbieber-fans.nixiweb.com | /mKvc8Mh7/index.html justinbieber-fans.nixiweb.com | /oZFZ0qJK/index.html justinbieber-fans.nixiweb.com | /pD2zHbBB/index.html justinbieber-fans.nixiweb.com | /pSG1s2xs/index.html justinbieber-fans.nixiweb.com | /Re3BMGVG/index.html justinbieber-fans.nixiweb.com | /rHFbxKTn/index.html justinbieber-fans.nixiweb.com | /RoScD8aq/index.html justinbieber-fans.nixiweb.com | /rzDZAsw7/index.html justinbieber-fans.nixiweb.com | /t7xYVUJE/index.html justinbieber-fans.nixiweb.com | /UcL29wrU/index.html justinbieber-fans.nixiweb.com | /xXr3khjG/index.html justinbieber-fans.nixiweb.com | /YhwvXGhk/index.html justinbieber-fans.nixiweb.com | /zvo8ioak/index.html mangalamcorporation.in | /4RcYf6gB/index.html mangalamcorporation.in | /6BrzkppT/index.html mangalamcorporation.in | /bp9ksV54/index.html mangalamcorporation.in | /BzJoVeo0/index.html mangalamcorporation.in | /ddLvpeMu/index.html mangalamcorporation.in | /DkM4v1PP/index.html mangalamcorporation.in | /gj1W42Ee/index.html mangalamcorporation.in | /i8ztSS5H/index.html mangalamcorporation.in | /iaJ7FSBi/index.html mangalamcorporation.in | /mKvc8Mh7/index.html mangalamcorporation.in | /N2rhmW5i/index.html mangalamcorporation.in | /NdHgm0gT/index.html mangalamcorporation.in | /oZFZ0qJK/indexhtml mangalamcorporation.in | /oZFZ0qJK/index.html mangalamcorporation.in | /pD2zHbBB/index.html mangalamcorporation.in | /pSG1s2xs/index.html mangalamcorporation.in | /r1kVYAfU/index.html mangalamcorporation.in | /rHFbxKTn/index.html mangalamcorporation.in | /RoScD8aq/index.html mangalamcorporation.in | /rzDZAsw7/index.html mangalamcorporation.in | /UAtkgmot/index.html mangalamcorporation.in | /UcL29wrU/index.html mangalamcorporation.in | /vpW8hoZ6/index.html mangalamcorporation.in | /wcE0aK0J/index.html mangalamcorporation.in | /xXr3khjG/index.html mangalamcorporation.in | /YhwvXGhk/index.html mksteslaenergy.com | /4RcYf6gB/index.html mksteslaenergy.com | /6BrzkppT/index.html mksteslaenergy.com | /7NEM56yQ/index.html mksteslaenergy.com | /BzJoVeo0/index.html mksteslaenergy.com | /ddLvpeMu/index.html mksteslaenergy.com | /DkM4v1PP/index.html mksteslaenergy.com | /ErmgUouT/index.html mksteslaenergy.com | /gj1W42Ee/index.html mksteslaenergy.com | /i8ztSS5H/index.html mksteslaenergy.com | /iaJ7FSBi/index.html mksteslaenergy.com | /mKvc8Mh7/index.html mksteslaenergy.com | /N2rhmW5i/index.html mksteslaenergy.com | /NdHgm0gT/index.html mksteslaenergy.com | /oZFZ0qJK/index.html mksteslaenergy.com | /pD2zHbBB/index.html mksteslaenergy.com | /pSG1s2xs/index.html mksteslaenergy.com | /r1kVYAfU/index.html mksteslaenergy.com | /rzDZAsw7/indexhtml mksteslaenergy.com | /rzDZAsw7/index.html mksteslaenergy.com | /tLnW6jJT/index.html mksteslaenergy.com | /UAtkgmot/index.html mksteslaenergy.com | /UcL29wrU/index.html mksteslaenergy.com | /wcE0aK0J/index.html mksteslaenergy.com | /wjivLtgo/index.html mksteslaenergy.com | /xXr3khjG/index.html mksteslaenergy.com | /YhwvXGhk/index.html mpralos.gr | /6BrzkppT/index.html mpralos.gr | /7NEM56yQ/index.html mpralos.gr | /7QLZuMme/index.html mpralos.gr | /bp9ksV54/index.html mpralos.gr | /BzJoVeo0/index.html mpralos.gr | /ErmgUouT/index.html mpralos.gr | /gj1W42Ee/index.html mpralos.gr | /i8ztSS5H/index.html mpralos.gr | /iaJ7FSBi/index.html mpralos.gr | /Lskx0Bew/index.html mpralos.gr | /mKvc8Mh7/index.html mpralos.gr | /N2rhmW5i/index.html mpralos.gr | /NdHgm0gT/index.html mpralos.gr | /oZFZ0qJK/index.html mpralos.gr | /pD2zHbBB/index.html mpralos.gr | /pSG1s2xs/index.html mpralos.gr | /r1kVYAfU/index.html mpralos.gr | /rHFbxKTn/index.html mpralos.gr | /rzDZAsw7/index.html mpralos.gr | /t7xYVUJE/index.html mpralos.gr | /tLnW6jJT/index.html mpralos.gr | /UAtkgmot/index.html mpralos.gr | /UcL29wrU/index.html mpralos.gr | /wcE0aK0J/index.html mpralos.gr | /wjivLtgo/index.html mpralos.gr | /wtQ8G0Ku/index.html mpralos.gr | /zvo8ioak/index.html njsksansthan.com | /6BrzkppT/index.html njsksansthan.com | /7NEM56yQ/index.html njsksansthan.com | /7QLZuMme/index.html njsksansthan.com | /bp9ksV54/index.html njsksansthan.com | /ddLvpeMu/index.html njsksansthan.com | /DkM4v1PP/index.html njsksansthan.com | /ErmgUouT/index.html njsksansthan.com | /iaJ7FSBi/index.html njsksansthan.com | /Lskx0Bew/index.html njsksansthan.com | /N2rhmW5i/index.html njsksansthan.com | /pD2zHbBB/index.html njsksansthan.com | /Re3BMGVG/index.html njsksansthan.com | /RoScD8aq/index.html njsksansthan.com | /rzDZAsw7/index.html njsksansthan.com | /UcL29wrU/index.html njsksansthan.com | /wtQ8G0Ku/index.html njsksansthan.com | /xXr3khjG/index.html njsksansthan.com | /YhwvXGhk/index.html njsksansthan.com | /zvo8ioak/index.html pakwestind.com | /6BrzkppT/index.html pakwestind.com | /ErmgUouT/index.html pakwestind.com | /i8ztSS5H/index.html pakwestind.com | /NdHgm0gT/index.html pakwestind.com | /oZFZ0qJK/index.html pakwestind.com | /pD2zHbBB/index.html pakwestind.com | /rHFbxKTn/index.html pakwestind.com | /t7xYVUJE/index.html pakwestind.com | /tLnW6jJT/index.html pakwestind.com | /UAtkgmot/index.html pakwestind.com | /UcL29wrU/index.html pakwestind.com | /wcE0aK0J/index.html pakwestind.com | /wtQ8G0Ku/index.html punial.com | /4RcYf6gB/index.html punial.com | /7NEM56yQ/index.html punial.com | /7QLZuMme/index.html punial.com | /bp9ksV54/index.html punial.com | /BzJoVeo0/index.html punial.com | /ErmgUouT/index.html punial.com | /i8ztSS5H/index.html punial.com | /NdHgm0gT/index.html punial.com | /r1kVYAfU/index.html punial.com | /rHFbxKTn/index.html punial.com | /RoScD8aq/index.html punial.com | /t7xYVUJE/index.html punial.com | /UcL29wrU/index.html punial.com | /vpW8hoZ6/index.html punial.com | /xXr3khjG/index.html punial.com | /zvo8ioak/index.html rsons.in | /6BrzkppT/index.html rsons.in | /bp9ksV54/index.html rsons.in | /DkM4v1PP/index.html rsons.in | /gj1W42Ee/index.html rsons.in | /i8ztSS5H/index.html rsons.in | /mKvc8Mh7/index.html rsons.in | /r1kVYAfU/index.html rsons.in | /Re3BMGVG/index.html rsons.in | /tLnW6jJT/index.html rsons.in | /UAtkgmot/index.html rsons.in | /vpW8hoZ6/index.html rsons.in | /wcE0aK0J/index.html rsons.in | /wtQ8G0Ku/index.html rsons.in | /xXr3khjG/index.html siniflar.net | /4RcYf6gB/index.html siniflar.net | /ddLvpeMu/index.html siniflar.net | /ErmgUouT/index.html siniflar.net | /wjivLtgo/index.html
28 Nisan 2012 Cumartesi
Miami Makes Forbes List Of America's Most Expensive Communities
Fisher Island, Miami Beach, just ranked by Forbes as #37 of America's most expensive zip codes, boasts a not too shabby median home price of $2,295,291. Forbes just published it's new list, with 4 Miami zip codes earning a spot as one of America's highest priced places to buy a home or condo, including aforementioned Fisher Island (33109), Key Biscayne (33149), Coral Gables (33146), and 2 small communities just north of Miami Beach -- Bal Harbour and Indian Creek (33154).
The report stated that these 4 zip codes make Miami one of the most expensive places to buy property in the United States, in spite of the fact that home prices have plummeted sharply in recent years, and that foreclosures have continued to mount. Hi-end luxury home prices have seen a slowing slide, according to Mike Simonsen, CEO of Altos Research, a Mountain View, Calif., firm that tracks housing market data.
"We have yet to see mortgage defaults climb aggressively into higher-priced homes, but there are some signs that those could hit in next twelve months" Simonsen said. "If those mortgage resets drive inventory at the higher end, that would cause major problems."
Although it does seem as if the luxury real estate market in Miami has all but slowed to a halt, a number of luxury realtors are reporting that foreign buyers are re-entering the market place to pick up those hi-end bargains which may no longer be as available in a year from now.
Al Capone's House in Miami Beach For Sale $6.85 Million
Al Capone's house in Miami Beach on Palm Island is for sale. Advertised as an opportunity to make a piece of Miami Beach history your own, the house once belonging to the infamous gangster Al Capone, comes replete with City of Miami Beach approved plans for rebuilding.
The Palm Island home, located at 93 Palm Ave, Miami Beach, FL, was previously listed in 2006, for $6.8 million, and went through 2 pending sales since that time, with no closing ever taking place. It was relisted for sale this month for $50,000 more than the original asking price.
The historical 6,103 square feet house, is situated on a 3 quarters acre lot, with 100 linear feet of frontage facing neighboring Hibiscus Island and Biscayne Bay. Built in 1922, the Capone house is one of the oldest homes in Miami Beach. Henry Morrison, who still owns the house, according to the Miami Dade property records, purchased it in 1971 for $56,000.