SEARCH
  • [:en]Recent Posts[:af]Onlangse bydraes

  • [:en]Categories[:af]Kategorieë

  • [:en]Archives[:af]Argiewe

E-mail

[:en]New spam e-mail distributed on campus

Friday, July 8th, 2016

[:en]

New spam e-mail distributed on campus asking you to validate your account, otherwise it will be deleted. Please ignore and delete this. IT will never ask you to validate your account in this way.

Also take note that the contact details are incorrect, the e-mail is vaguely addressed to “Dear Student/Member” and not personalised and there’s no reference to IT itself. All our e-mails are sent on a specific template and in both languages.

If in doubt, rather call us at x4367 to check if an e-mail is legitimate.

 

——– Original message ——–
From: “Espina, Juliette” <jae16c@my.fsu.edu>
Date:06/07/2016 12:38 (GMT+02:00)
To:
Cc:
Subject: NOTICE

Dear Student/Member,

Please note that we are canceling unused sun.ac.za email account to create more space for new accounts.

Kindly follow the link below to validate your account: 

http://bit.ly/2925RgV 

 

Thank you

Support Team.

Administration B building, 

Victoria Street, Stellenbosch

18° 51′ 47.536″ East 33° 56′ 1.327″

[:en]Phishing scam disguised as an Outsurance R400 premium claim

Wednesday, May 25th, 2016

[:en]

This week a phishing scam is in the disguise of an alleged payout by Outsurance of a R400 premium, is circulating. Now if you are an Outsurance member, then this scam can fool you, but there are a number of telltale points that will reveal this mail to be a scam:

  1. So-called branding (with an Outsurance Logo and a Sender that looks like it comes from Outsurance) are easily counterfeited.
  2. Outsurance has most of your details if you are a client and the salutation will always be your name and never just “Dear Client”.
  3. Outsurance does not use Dropbox to deliver ANY documents. They will always use their own systems and usually send PDF documents after informing you via e-mail AFTER calling you personally and confirming some personal details.
  4. Outsurance will have a registered contact e-mail address on their system, but they will never ask for your e-mail password. Hopefully, you do not use your University of Stellenbosch e-mail address for as your personal contact address.
  5. This e-mail’s grammar is terrible. It is very unprofessional and the use of threats such as “PAYOUT will be denied if details are inconsistent/wrong” is usually a typical tactic of phishers.
  6. Scammers are wanting personal details and your signature. Why? So they can use it to gain access to your other accounts that have money, like bank accounts, or use your signature (that you sent them) to sign forged cheques etc.

Standard Bank South Africa recently lost R300 million in ATM fraud in Japan this week. The criminals used forged credit cards. No doubt the details on those cards were obtained using names and details that they obtained from phishing scams such as this Outsurance scam. Crime syndicates often exchange and share data they obtain amongst their fellow syndicates and use it to commit fraud.

Here is an example of the Outsurance scam mail that is circulating at the moment. We removed the “DropBox” link and the attached file for your safety. 

~~~

From: OUTsurance [mailto:premium@OUTsurance.co.za]
Sent: 24 May 2016 08:45 AM
To: Recipients <premium@OUTsurance.co.za>
Subject: Claim your Outsurance R400 premium

Dear Client,

Your monthly R400 premium PAYOUT is ready. Please log in to our DropBox document file with correct Email address and Email Password registered with us to confirm details. PAYOUT will be denied if details are inconsistent/wrong. Download, print and sign the forms, attach and email back to us for payment to be effected.

OUTsurance premium PAYOUT

Thank you.

© 2015 OUTsurance Insurance Company Limited and OUTsurance Life Insurance Company Limited A Member of the Rand Merchant Insurance Holdings (RMI) Group and an Authorised Financial Services Provider FSP (896)

 

[ARTICLE BY DAVID WILES]

[:en]How safe is information on your device?[:af]Hoe veilig is inligting op jou toestel?

Wednesday, May 25th, 2016

[:en]

Smartphones frequently act as the control centres where we schedule meetings, send e-mails and socialise. To satisfy these needs, they require personal information.

Our lives are documented and stored in e-mails, social networks and the apps we install on our phones. All this information syncs seamlessly with your work PC or your tablet. And after initial  set up, it might not even prompt you for a password again. Wonderful news if you are terrible at remembering passwords. Also, wonderful news if you are the thief who steals a smartphone.

What information would a clever criminal get his hands on if you lose your smartphone now? Banking information? A copy of your ID or passport saved somewhere in your e-mail? All your holiday photos on Dropbox? 

Here are a few tips to ensure he won’t be able to get to it:

  1. Always enable the password option on your phone to lock your screen. Most phones have various options – typing in a password, a pin code or even swiping a sequence of dots. This is your first line of defence.
  2.  Don’t select “remember password” on any of your apps or your e-mail applications. Yes, it is a nuisance to type in your password, but do you really want someone else to read your e-mails? 
  3. Turn off cookies and autofill. This prevents your device from remembering your username and possibly even your password at websites you regularly visit.
  4. If you need to access sensitive information, e.g. banking, rather go to the website, via a web browser, than using an app.
  5. Set up your phone to be tracked if you do lose it. (Read our previous instructions on locating lost or stolen devices here.) A device can also be wiped remotely in some cases, which at least ensures that your information doesn’t end up being used, even though your actual device is.

Remember that you also need to remove ALL personal data (for example e-mails, SMS’s and telephone numbers) and anything which could connect you to the phone when you sell or dispose of it. 

[:af]

Slimfone is dikwels die beheersentrum waar vergaderings geskeduleer, e-posse gestuur en sosiale aktiwiteite beplan word. Om dié funksie te vervul, vereis dit ons persoonlike inligting.

Ons doen en late word dokumenteer en gebêre in e-posse, sosiale netwerke en toepassings. Al hierdie informasie word vervolgens ook soomloos integreer met jou werkrekenaar en tablet. Na die eerste opstelling, is dit, in sommige gevalle, nie eers nodig om `n wagwoord in te tik nie. Wonderlike nuus as jy hopeloos is met wagwoorde onthou. Ook wonderlike nuus as jy `n opportunistiese skelm is wat slimfone steel.

Watter inligting sal `n slim misdadiger tot sy beskikking hê as hy vandag jou slimfoon in die hande kry? Bankinligting? `n Kopie van jou ID of paspoort wat erens gestoor is op e-pos? Al jou vakansiefotos op Dropbox?

Hier is `n paar wenke om seker te maak hy kry dit nie in die hande nie:

  1. Aktiveer altyd die wagwoord opsie om jou foon te skerm te sluit. Die meeste fone het verskeie opsies, byvoorbeeld om `n wagwoord in te tik, `n PIN-kode of selfs om in `n spesifieke volgorde `n patroon te vee. Hierdie is jou eerste en belangrikste afskrikmiddel.
  2. Moenie remember password op jou e-pos of ander toepassings kies nie. Ja, dit is irriterend om elke keer `n wagwoord in te tik, maar wil jy regtig hê iemand anders moet jou e-pos lees?
  3. Skakel cookies en autofill af. Dit keer dat jou toestel jou gebruikersnaam en wagwoord onthou en invul op webwerwe wat jy gereeld besoek.
  4. As jy toegang tot sensitiewe inligting moet kry, byvoorbeeld bankinligting, gaan eerder na die webwerf d.m.v. `n webblaaier in plaas van die installeerde toepassing.
  5. Stel jou foon op dat dit opgespoor kan word as jy dit verloor. (Lees ons vorige artikel oor die opsporing van verlore of gesteelde toestelle hier.) `n Toestel kan ook vanaf `n afstand skoongevee word om seker te maak jou inligting word nie misbruik nie, selfs al is jou toestel in die verkeerde hande.

Onthou dat jy ook, wanneer jy jou selfoon verkoop of daarvan ontslae raak, seker moet maak dat AL jou data daarvan verwyder is (bv. e-posse, foonnommers, SMSe, ens.) of enige inligting wat jou kan verbind tot die foon.

[:en]Phishing scammmers change tactics [:af]Phishing-knoeiers pas hul planne aan

Tuesday, May 10th, 2016

[:en] Earlier this week Tygerberg was subjected to a particularly pervasive attempt by phishing fraudsters to obtain usernames and passwords from users by fooling them to “Activating” their Outlook 2016 account.

Although mostly unsuccessful due to the fact that most personnel are wide awake and sensitive to phishing attacks, this does not stop the attempts. The fraudsters merely change their tactics. Stealing data and gaining access to personal details such as usernames and passwords is very, very profitable!

Today’s phishing scam uses a different method by hiding behind an educational institution’s name and adding a “throw-away” website address at the end.

——————————————————————

Dear Account User,

We are shutting down your Bulk SMS, Cellfindportal today in a course to activate Microsoft Outlook Web access 2016. You need to upgrade your Bulk SMS, Cellfindportal immediately otherwise it will be deactivated. 

To activate go to http://bulk-sms-cellfindportal-sun.ac.za.webeden.co.uk 

The Information Technology department encourages you to take the following measures to protect your account.

Sincerely

IT Customer Support Center© 2016 CELL FIND LLC. All Rights Reserved

The University of Stellenbosch is a charitable body, registered in

Republic of South Africa, with registration number ZA005336.

——————————————————————

We’ve removed the dangerous part of the mail, but you hopefully can see how we can be fooled if we see the “sun.ac.za” address and see the “disclaimer” at the end, and think that it is from the University.

Information Technology will never send you mail like this and if they do mail you, it will always be branded and linked to a sun.ac.za site, and the grammar will be a lot better than this example, and will be bilingual at least!

[ARTICLE BY DAVID WILES]

[:af]

Tygerberg-kampus is vroeër die week blootgestel aan `n besondere deurdringende poging deur phishing kuberkriminele. Hulle doel was om gebruikersname en wagwoorde te bekom deur gebruikers te oortuig dat hulle hul Outlook 2016 rekeninge moet “heraktiveer”.

Gelukkig was dit grotendeels onsuksesvol omdat die meeste personeel wakker en oplettend vir phishing-aanvalle. Dit stop hulle egter nie. Die kriminele verander bloot hulle taktiek. Datadiefstal en toegang tot persoonlike inligting soos gebruikersname en wagwoorde is baie, baie winsgewend!

Vandag se phishing-poging gebruik `n ander metode deur weg te kruip agter `n akademiese instansie se naam en dan `n “weggee” webwerf aan die einde.

——————————————————————

Dear Account User,

We are shutting down your Bulk sms, Cellfindportal today in a course to activate Microsoft Outlook Web access 2016. You need to upgrade your Bulk sms, Cellfindportal immediately otherwise it will be deactivated. 

To activate go to:  http://bulk-sms-cellfindportal-sun.ac.za.webeden.co.uk 

The Information Technology department encourages you to take the following measures to protect your account.

Sincerely

IT Customer Support Center© 2016 CELL FIND LLC. All Rights Reserved

The University of Stellenbosch is a charitable body, registered in

Republic of South Africa, with registration number ZA005336.

——————————————————————

Ons het die gevaarlike gedeelte van die e-pos verwyder, maar dis steeds maklik om te sien hoe ons, deur te kyk na die “sun.ac.za” en die “disclaimer”, mislei sou kon word om te dink dat dit deur die Universiteit gestuur is.

 

Informasietegnologie sal nooit `n e-pos soos hier bo vir jou stuur nie. Indien jy `n e-pos van IT kry, sal dit duidelike kenmerke en `n US logo bevat; die taalgebruik sal hopelik beter wees en dit sal waarskynlik tweetalig wees.

[ARTIKEL DEUR DAVID WILES]

 

[:en]272 million e-mail addresses hacked [:af]272 miljoen e-posadresse gekaap

Monday, May 9th, 2016

[:en]

On Wednesday the Internet was abuzz with news of a Wisconsin security firm obtaining a database of 272 million e-mail addresses, with their associated passwords, from a Russian fraudster.

How did a cyber criminal get his hands on the e-mail addresses and passwords?

Easily, by using the same phishing tricks that we regularly warn you about – using an e-mail, warning you about upgrades to Outlook and that you must “CLICK” on the link to activate the upgrades or your account. Victims literally give their e-mail address and password to the fraudster.

Several of our colleagues were fooled by the mail and did actually go to the site and unwittingly gave their details to the scammers. Luckily, we were able to help them quickly to undo the damage.

However, in retrospect, a deeper problem was picked up:

The stolen passwords and email addresses from the Russian database, which included Gmail, Yahoo and Russia’s mail.ru accounts, were not hacked directly from GMail or Yahoo but they had been taken from various smaller, less secure websites where people use their email addresses along with the SAME password to log in.

Those people who tend to use the same password for multiple sites as well as their email are at risk and should change their email password and avoid using “one password for everything”. It is like having a master key for every lock on your house. If that key is stolen then burglars can get access to every locked door in your house using one key!

Secondly, if you suspect your e-mail password has been compromised and you change your password, it should always be changed to something COMPLETELY different. In other words if your password is for instance “Christopher123”, then changing your password to “Christopher124” is not good enough that change is easily guessed.

If you have a Gmail or Yahoo account and are concerned that your e-mail address is possibly on the Russian database, then you can go to the following links: (they are safe as they do not ask for passwords)

http://securityalert.knowem.com/
https://haveibeenpwned.com/

[ARTICLE BY DAVID WILES]

 

[:af]

`n Wisconsin sekuriteitsmaatskappy het `n databasis van 272 miljoen e-posadresse, met hul wagwoorde, by `n Russiese kuberkraker gekry en die internet is behoorlik aan’t gons daaroor.

Hoe het die kuberkraker die e-posse en wagwoorde in die hande gekry?

Maklik. Deur al die skelmstreke te gebruik waarteen ons julle gereeld waarsku – deur `n e-pos te stuur wat jou in kennis stel van Outlookopgradering en dat jy moet kliek op `n skakel om die opgraderings te aktiveer. Slagoffers gee letterlik hul e-posadresse en wagwoord vir die kraker.

Etlike van ons kollegas is reeds om die bos gelei deur die e-pos en het inderwaarheid na die webwerf gegaan en hul inligting vir die swendelaars gegee. Gelukkig kon ons hulle vinnig help om die skade ongedaan te maak.

`n Dieperliggende probleem is egter, terugblikkend, opgemerk:

Die gesteelde wagwoorde en e-posadresse van die Russiese databasis, wat Gmail, Yahoo en Rusland se mail.ru ingesluit het, is nie direk van GMail of Yahoo verkry nie. Dit blyk of dit eerder vanaf kleiner, minder sekure webwerwe, waar persone hul e-posadresse en DIESELFDE wagwoord gebruik het om aan te teken. 

As jy dieselfde wagwoord vir meer as een webwerf en jou e-pos gebruik, is jou risiko die hoogste. Verander jou e-pos wagwoord en probeer om nie een wagwoord vir alles te gebruik nie. Dis gelykstaande aan `n loper vir elke slot in jou huis. Indien die sleutel gesteel word, het inbrekers toegang tot elke geslote deur in jou huis met net een sleutel!

As jy vermoed jou e-pos wagwoord is een van die wat blootgestel is, verander dit dadelik. En as jy dit verander, verander dit na iets HEELTEMAL anders. Byvoorbeeld, as jou wagwoord  “Christopher123” was, gaan dit nie help jy verander dit na “Christopher124” nie, aangesien dit ewe maklik geraai kan word.

Indien jy `n GMail of Yahoo rekening het en bekommerd is dat jou adres moontlik op die Russiese databasis, kan jy by die onderstaande skakels gaan kyk: (hulle is veilig, omdat hulle nie vra vir jou wagwoord nie)

http://securityalert.knowem.com/
https://haveibeenpwned.com/

[ARTIKEL DEUR DAVID WILES]