%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 13 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517065505+00'00') /ModDate (D:20240517065505+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 6011 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 63.253 521.469 683.481 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 63.253 l 565.984 63.253 l 565.984 745.984 l f 45.266 746.734 m 45.266 63.253 l 46.016 63.253 l 46.016 745.984 l f 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(PROTECTING YOURSELF FROM SPEARPHISHING ATTACKS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td 4.305 Tw /F3 9.0 Tf [(For a large enterprise like Stellenbosch University phishing )] TJ ET BT 61.016 553.044 Td 0.000 Tw /F3 9.0 Tf [(attacks are the most common cybercrime.)] TJ ET BT 61.016 533.055 Td 1.872 Tw /F3 9.0 Tf [(In the late 1990s and early 2000s, we were all inundated with )] TJ ET BT 61.016 522.066 Td 3.020 Tw /F3 9.0 Tf [(spam emails, selling everything from fake pharmaceuticals to )] TJ ET BT 61.016 511.077 Td 4.806 Tw /F3 9.0 Tf [(cheap perfumes. With spam, cybercriminals use a blanket )] TJ ET BT 61.016 500.088 Td 0.955 Tw /F3 9.0 Tf [(approach sending emails to as many people as possible, hoping )] TJ ET BT 61.016 489.099 Td 0.000 Tw /F3 9.0 Tf [(a few gullible customers will be funding further spam emails.)] TJ ET BT 61.016 469.110 Td 1.171 Tw /F3 9.0 Tf [(General "shotgun" phishing is still a problem today, but the past )] TJ ET BT 61.016 458.121 Td 4.739 Tw /F3 9.0 Tf [(18 months have seen a rise in a more sinister form of )] TJ ET BT 61.016 447.132 Td 1.514 Tw /F3 9.0 Tf [(cyberattack, spearphishing, which is much more targeted to an )] TJ ET BT 61.016 436.143 Td 0.000 Tw /F3 9.0 Tf [(individual or an enterprise's email system.)] TJ ET BT 61.016 416.154 Td 0.991 Tw /F3 9.0 Tf [(Spearphishing is similar to phishing, it's also a vector for identity )] TJ ET BT 61.016 405.165 Td 0.811 Tw /F3 9.0 Tf [(theft where cybercriminals try to get users to hand over personal )] TJ ET BT 61.016 394.176 Td 0.000 Tw /F3 9.0 Tf [(and sensitive information without their knowledge.)] TJ ET BT 61.016 374.187 Td 1.040 Tw /F3 9.0 Tf [(Cybercriminals view phishing attacks as a profitable and an easy way to gain access to an enterprise enabling them to )] TJ ET BT 61.016 363.198 Td 0.829 Tw /F3 9.0 Tf [(launch more sophisticated attacks, for example, spearphishing attacks. Humans are, after all, the weakest link and thus )] TJ ET BT 61.016 352.209 Td 0.000 Tw /F3 9.0 Tf [(the most effective target for criminals looking to infiltrate a network like the university.)] TJ ET BT 61.016 332.220 Td 0.416 Tw /F3 9.0 Tf [(Even though spearphishing is more focused than its less-sophisticated relative phishing, everyone can apply the following )] TJ ET BT 61.016 321.231 Td 0.000 Tw /F3 9.0 Tf [(principlesto protect yourself and the university against cybercriminal activity:)] TJ ET BT 61.016 301.242 Td /F4 9.0 Tf [(Use common sense when it comes to phishing attacks)] TJ ET BT 61.016 290.253 Td 1.766 Tw /F3 9.0 Tf [(Be sensible and smart while browsing online and checking your emails. Never click on links, download files or open )] TJ ET BT 61.016 279.264 Td 1.060 Tw /F3 9.0 Tf [(attachments in email or social media, even if it appears to be from a known, trusted source. You should never click on )] TJ ET BT 61.016 268.275 Td 1.001 Tw /F3 9.0 Tf [(links in an email to a website unless you are absolutely sure it's authentic. If you have any doubt, open a new browser )] TJ ET BT 61.016 257.286 Td 2.293 Tw /F3 9.0 Tf [(window and type the address into the address bar. Always be wary of emails asking for confidential information )] TJ ET BT 61.016 246.297 Td 0.821 Tw /F3 9.0 Tf [(especially if it asks for personal details or banking information. The university and your bank will never request sensitive )] TJ ET BT 61.016 235.308 Td 0.000 Tw /F3 9.0 Tf [(information via email. They do not need it. They have it all already.)] TJ ET BT 61.016 215.319 Td /F4 9.0 Tf [(Watch out for shortened links)] TJ ET BT 61.016 204.330 Td 0.353 Tw /F3 9.0 Tf [(Pay particularly close attention to shortened links, especially on social media. Cybercriminals often use Bit.ly, Tinyurl.com, )] TJ ET BT 61.016 193.341 Td 0.299 Tw /F3 9.0 Tf [(Goo.gl or Tr.im to trick you into thinking you are clicking a legitimate link when in fact, you are being inadvertently directed )] TJ ET BT 61.016 182.352 Td 0.135 Tw /F3 9.0 Tf [(to a fake site. Always place your mouse over a web link in an email )] TJ ET BT 332.144 182.352 Td 0.135 Tw /F3 9.0 Tf [(\(known as "hovering"\))] TJ ET BT 419.830 182.352 Td 0.135 Tw /F3 9.0 Tf [( to see if youre being sent to the )] TJ ET BT 61.016 171.363 Td 0.000 Tw /F3 9.0 Tf [(right website.)] TJ ET BT 61.016 151.374 Td /F4 9.0 Tf [(Does the email look suspicious? Read it again)] TJ ET BT 61.016 140.385 Td 0.519 Tw /F3 9.0 Tf [(Many phishing emails are obvious. They will be filled with plenty of spelling mistakes, CAPITALISATION and exclamation )] TJ ET BT 61.016 129.396 Td 0.959 Tw /F3 9.0 Tf [(marks. They will also have impersonal salutations e.g. Dear Valued Customer or Dear Sir/Madam salutations and )] TJ ET BT 61.016 118.407 Td 2.202 Tw /F3 9.0 Tf [(will have implausible and generally suspicious content. Cybercriminals will often intentionally make mistakes in their )] TJ ET BT 61.016 107.418 Td 0.000 Tw /F3 9.0 Tf [(emails bypass spam filters and improve responses.)] TJ ET BT 61.016 87.429 Td /F4 9.0 Tf [(Be wary of threats and urgent deadlines)] TJ ET BT 61.016 76.440 Td 1.625 Tw /F3 9.0 Tf [(Sometimes the university does need you to do something urgently, however, this is an exception rather the rule. For )] TJ ET q 225.750 0 0 159.000 325.234 413.824 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 500 /Height 352 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 40811>> stream         `" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ? RCh*ջsڴH*gpPxKy;wZVFSLiiՅZx^VO>Ʒ@Gjxm *X1G;b. J*&܎qMhx40icgk' U; CT4|:.X3yZ5S%jgb/qfRg)) qYQJ0HSjC 2?J@d!'5,Iv 8hjZ PwadحGsGn+koOZymMfCjrӯ5nاSk&+hC.=9[NInbIRę#=vjz\ ^?- P UrX?Jg:‹y>}(G5&^)drbb0uR:GZ2^A! k=XvYGk8:ƾRV+qoʬyͦi(ZxYT;t2j$W=U e[4sk^T^+[~1NC#$ԁ\U$Dkj[P2yfM.ES\ 058`KA"s@ }E qNe;=3@Sx Ԗm\͜mh^EPm@s+E6qLd jȌk|nx?vb?1uUKfqH-M?lx5$r%ŢmH`*LҚќUoIjJ544W Ba"&FWl,94v5֣kil+,]jEly'ڨOl.Fee@b$4żDHX$Aڀ.:&X{ՙ?8>]pLdiZI"i*/쥎NDhԬ:@Muv_ T' f!G2CM &Ԛt ݰg-uz\V(kvbu=mb_3J{n+T9#k1˩βAœC{'b٩H bkiD.10.F8Ia`iO|;jW`vI7q(^ OPǭoi4!%>[ =$2(*GZ(i}HZsӄQd?+dzU5ʑU=@*ԁ=h;J}EO%]- -OX!@Q2>Z|0)"x#4Vai:Fr FwZqptbZ9]f9$f#Xe[G%[ڱ䵾[t\ZKբClGRiZ]_U w#8<93%1{SZOV-D \\1)sQR. #mm>eH92)y";=oQڀ;}28vњ=vr vdʾ:U[I5=mNjp,\cԞ2.ڪJM ^II⡾L$`HJA!`yh43AJ`E2h3k|;ddW@k(埅Z0"Njdw'KP±5zP^Zݨ!#z$6y]7%eM+7-uToA\LvZ~=AEP{VCpBҞr*ŅNW[6qϨ_c0 Imi4RcS;VlCy޸8ښI0Yyli2(&1= qW.tƈ8>$^@ȀIe(>ޚV[ ݂B5uL,Y} vsHWH,qhgF\wZSwݩ &혩RlXSʵN|܊] 0D.v#F wβ99F*}*4n;s1_(aVR嗡ȠִJvS*E4\g8n)ָ{_dkr\`>aNf5=h&OmSq5xF dݮMPXejGk,BM 96]+apjMKZ6˕\|Yxe;7% =ETԮp1YQkWV- _ ۲a})nlZ5^ /D15. $AhT~*V(vUQbc^H5<˂U;&j¢ơT` @2uzri͎jhH&%uE%1\xtiXj){)ޣcyx5Z [Sџ !˜{ /%x[t,+[{֏KDu>S> ^;X9ZEf ujZBcZMחl_E$+E*)mV K=j@{wgƛGqS-ԶdU\D .3ӟH H[֞l 6hHE9Fp~ @W9`F67tph Azbc*Ƣon.nzkF`Ge>R0 VsW*`jW@URdjkGI}PQ@qJ;ź §PnTlP0 ݒ=kji&\Z2t5"#~S)ݡ5 jXu9x15iM>3$iiG6>aZ pwfiSM#1kH:U@3Ri lTYq*Ѷ>V?njEWq%#A~lOf1˂b |~Gu4.W8|jrLi ŞG֟(An!C$ iZ>m/_~/ $kwCfS'WQ.ⴎuG@L2ڧ~I3O\fOF/<ɟ=k?湩-o.&&2(=gRnw!o=)\v>wA?./_೶gNy}FFxXk䩶p =rJ {_P/ ojЌ ZڳjD$7k_ͧU> 8NɁ{ZPA-,TM+ڴe=g<71Đu~!OKnţfSm8 `ۑ&se8?>[l#Q aMsW3\jRbw?Z7 >%Q# *߉_Ix77 1^]>2S5'3/uZ_u%XG'B<6 mGIkJOk H9ۭ'*+Ү5vŮG]t}=Zz03%hslܹؤq>Β$ ,m]ecZ<6'*@T4,y|K5czWAx *) k7w4,Gj.=,SRzh ^`Te,|ڢ0piaS=jޙove6{A4@q:{[`>lr юzd$\2X4gCW(1q[sCռcV jSt@)+rz#֮w }qoXL GRm>ksڐ$ͭ*j= &v!Rl؂$9eTrߡ.(TuzR%e>Bz޵c 05WZRԙ\uSM[I&D,7*wf.m9C09@b }*oNń:M_+O{PA`xOp}k>!^ :v"4.=`7<#OSʳdVtWќs5Ӆ ?<Տe4"X!c LrsXU7[Nݳ|8&\^۳Uef `i /vUe Trޠg<.<ZwcsZ~ӑ&Qh'8wy"wEvKFjQN–Ac~[P/C|ſ 麌#+j yn OzW{Q^Z $ ۣv}'෱DzQ7&oEcI?M{>nz; BN cou]Zk+4st/W-s2fẸaNW1_K>f cnW.zo0WvΤ2[:ݮeE"y_ĒmVH;9>QQѵMCH![hEtCX;f=XZM^|]k J'un9-br0G݆sEj V>VYT%d'")%!/jp\fY#.B«[w )\V7d>ƫIq*zսC*( t2茑wU?+WnȌIYێGm#(!8i4ξѭoЉbSOUz9{) M]!9u?+oښW{NBp+zSnԌ_/qKsuKۿΝswK^ K[gr>tU,qU-wB *'֖ᑈ1TjJ[TpI98 L8?@[#ޖh>hOCN%}j &9=C d1Ҧ\0ʐڤK.#$7mr=ENz g'_֮G}@r)mQp?&$?֪K85  S8fCPGnE'N{Ӱ"Cv20.Ԍ6Ejdaº Bn . -Xlacs]^ ]JU\GܳzP#ׯZGQvv᫻[Ty[f'wdMZ3ۢ' }=+߾$iz &D\QL奧Û춛 O%Oy}֝-n$`5@^5a -ćccykL>Cq,Z2x Oz@op]YFkGuF%qЊo OPdi>kKVY;}>xijz>Π^)}uO2C -{&la(ȁ$B>`A< 6Ѭ "~ePr+ v@B'Ni\X|.vNGRXui-u8P3<?j78eR`Sdm~"V;H8E$.n%h̒x=iV4V8{EtY{юARvgg4* ~:ŸjxdI##wqk6>"R]nVzFfkŞ4`"#\g!3_Q޺/?|Fa,IWmhQ٨f=];gDdT9WR2BiλgZcz2%e݂"I?S,ĭmΞŒy ֚x9H38oX Kh"P1Kq謓噹$W2QLcۚ4 Yڲ(Ӡ~V/;}7ͷ 85BSn/dX}k~W,^q&LV'f.t!+O _%(uM,XbGUMrETu"$񽖝i+]  ZP4nTУvaޡ73qZgRN2=)E.ҷ_λSSޭVYqҺQ5QL@T{1F"!D~Vw|k! /UY>d\1N^WJ-4 Ϸj.e?u=0?FNPӢR>Ճs\ZAqԖQyG+ɬq,= HyXVh +-WjJf-=~E)ITvv~ S FOAv3F*i S4Dm6H++UQKVFbzR}=M[=vRYW#֧AJ! GPkBǪ( qޥkp>cGcJaS\ش[1j̣8ڶ ?!hZ 9mBY2oxuזbνϠ ]>\2oӒ?jhsV䭵jlqҰF%@dμ^'}KUk8bU3n[=~6\E$+#opű?7ᄢ ġ(due09PԵĞb #[p9h_g<̱Y@F?R=zsȦbx'ɬM/Qo[v-Xx Wo?*}qrxhviOX8x_U#ݍCVwg_E~D?>(~/"5ًQB-t2c=F{)$wi/hP,s=PA܍;EP85h>?0ֳ0ʜmjTT@EU9Lvރ\3UBhɍs3P)}U;EUo)ERK1=u7 fUsKcncSjk%̩ 1p 5$+󞂻/HLlc-LzR3m wA$؎JGe"\p)u^E{Dqa^gjw0Mة?ݿ“vg{ ;ٴgQ<S]%+N|m6x…WP`"=]|'oW8*sZηo[&Ox曤]KQf+F@ Ęn^I>\L[&g䧦M.zj s<˃?$9=OV*kz>{H>,vpyn!_{J hg^y^V:؛JW)-"b[c\Z]Q%_.!HȤ<@æE#,g17A-uud1w) nmҭEI:n_-V+yP2̸쟝F]y ڛq?:>08cn`x [eCSj _? U{-߼~W_|[y|dlG9?jrʑ':-_;\҉g(d\u":z] dzk֠MLE*H+ |Sþ4a[\T}k_İHa%n8?(qmzn K=C)6(sҪ};V aS <\ޢ~ڀV{BkXb2kZKw!l.F1__&).B-hI<8Jf=@-ռILfmzxv^c-GטhokB ,]3O:Ew{E V=3+eRk{{XY>QW-irgbx2߇hGN,7wWހ:KL[m?:om-O<uھgw|w:,c-> X_c<6Ln~&-(_٪YsL349=qGa_g ;Γ k&{JNm[vlDQ\.-1 dQH[;Zl㲄$jk/p5kmJvWQ㟉6~TCYBrݏ𯹧ukӞPFN(kL ŻUtUmifV~'wbǢ_z>ζ*•EK+(4(P"(TcQRZHQTZ"vZXyaT5 gY=Y v<¢0P@PqP;+]$+>w:k510<~=Ѵ)u7H+!JaE<1i7\CzNU:][簸u@-JU- kdVr%? Jy_> ڼjX^1Fz oǿ_lkKΣRU4 ݀i#Bn-9Yc]O"oO|i -)R|Gqs*rlȷΐdmS9,TY|pj#h0Sj0*Z =+<=ځ&z:F8cljz~@cSjp4b_%myz[}2g޻Uv:ޝ <%mqGzd?n:֫aıԟx(pR49Һ;hzts@:8&7dA\0Wii#|hO>h8ΚզUUAyZA$MU~^쑲)4n~ױt=7 I8 #5E߈քM/Ve9S5Xkj!ZjvڄBHeI*sN7/!Q[AXwjxqWmz]p)*W/ pq©x_vrv[_e5E&O1坎I>`+Z YZRr ߊ4%8gX%9AZ N>yxڄoj̩8)1JmҖA ȭ?V:>jM:c>q#(* !𮩥nmnI瘶'޺)QOЬcsε;O:.|W"2mRӵŴd8z-nERՓQ\=hSf<804@#(f1i9֢fJLhUJO3iFgޕD{14b-<(bp퇃T)Tfpn ^=#Vڜѳ9#BxFgNs>pٚ%Rus{'|}_CYjiذIGTrI]c%\6xF~/:|A\E 4\o0ΧxkW^&Y}E?IKcc8RNAj3b]k +mY)n05-$][}nA H è @@p== [9dz+JTbpO .XRǀ+м"iZU^Ȩ2[eR U#; %Rn<㚒UHbz )g"O=9gi`j/t\7S{RnہgŞ.}kQQ1;n_];_Krr/|SWa>+=5גI Г؛Ne]^I{4R'J=@=n&:`CiwAp=?@z^Xo*psT!:y5da!U#V<j;mR;7Ɋh9 gͷ+3{joTw g5AV]ޜ 񎴍L %KUۋ"g*zbibqS5ݳɢb RbzUnqVq@yR&TUdAQjɑ@O&7AOوX^@:f6\J/rB`]$V"U!z^m"5Xr4AܱB?t꤀z^X< }N:VY[1qjҦZHp,OJdq2FӦJ5˝$F)R9>Z hF4rq۾=+[mu8 j-nk!Cx;{&XH{ gĞ!Ҝ_Ar.7 q߽ih:Z]œ4m~=zч֌rz읝lvSni l *p>̃:~U&7J`~GRizvLG\#}kCFQ>'Үݛf xp?QG_Z dO.VZ5+zc(+o߶֯*ƺqV`՗< ?#H.;UWCKJyMd}>}Z?gG"iS_NDZ޺} 8-t](EXto&?AV5=NFxaRK#aTxJVsY@8ϰ>NvE6h6ݒ}lFw|{Mm3ɮ+6A/K? i[J#AŠhp[đ(U0zZ)X,%Ը~!yԯDG4«tz_JK{o;[8wAOIig #E9OxZ tocçaȮXi%Νuh YC=s 'ҥw8⭕_ 4frnWwgp={U ahgXTWxH|#{mi=E[&XO$d/\砩7]GCq\37e/42z,C;~'a{~߬\ 8'?GaG=Vʐƒ-$T{ҭ.qn/\Ԇjq5n- qko,uq7iyfUllTw1Z|8|!n@LJR3gOX(Ov>7ڮ*y9LmpV-Yޝ@wrV B=ph.dV\t7,@xm-cp=8pxyz+*⌲_<a=voGg0ĀF8k+_)pN: Oyo̜<>k^(LK~^gw⿈Mmo-q M嵼zMָMmcZ˾fsi6 x\psְFrkӵǏhnE~e!13_~{TotzjM#5œ4[}@|*n%j.`9$*? V 2@{,lՋ{UTU$eShYy' "ڸ(N$V8Ϩc*P3ցS3Ȩ9L+HO5uϷ5;E8 `Z{mmʑ$r˞:d8דک1>2[F—,Zym܄f  uEHu"၎<`89SָY4mn$R+kF\5H֣'E5O+tUUCYiz.4sZ6/CZ^ĺM3#7s9֓(=E|? G)C2_,IvzjFw_x­톭dn8/ZB<~o.Ōg3޿=gIy Qm*/,k[:A$t5ӆ*keo_߆8]=Wp=emg_uxE?*(nk[p(+_L԰$(cy58>ZF=kּA{Am|XN+o9ғvO].q˹?!Ckx6`s'3\ސA*΅OXkEcId9y1jbaԟAI+j ܆+ Ygb†G`d9?r׺>SZh c-^JԂAOm$ldMیAwCmg'uN{o k47 _q6TKdXGZӣ#4Ɔ镟*Xp09We5 6M>y8L`39짥TMKwZI6xzL* /׎Ƌ gsyb.F=k;SŤKp2bV7c=|C`o0 ぎ\V3>Rw tzŠe!d)qxq߱EcĠ+3UKm#o N9}i81d1\c^R 5ܷ͆Vϴ#!ǯzտ4TS"P JN9U{F^eJF" ,?K7W4K(DS#K/ozlOp{Lںq_gC̮Y~G >*_zW RJkxVOr8બPi|oQYӤ7vݎ OiyLfIU~W<z:7l?o-UO1Ǘ1HppxvI xq/xO>~ӫϥֿy39gFSE$Е$~ wt3JC^+K%)F{1mtir^W Zg˒ZG0*\闩{Mgx+ql9:5~/įj4AkXxan.W@ l &/uÏ>^x^s6aCס&wYBܱt玱3ةX{x&RdA\eE㶑 |uHv?AOAچ|@Ԏe۶ٮG"?U_H!һ #HЬ#E %z{Rue+K#N[: ۴N8Uұ-][\Ӵ(Q9dӸ]z(S3K7nZ[6N?urEqiƚuŘ_ 'ݱg@_I}!U|p@vȫy<fxe$ķPkoBiX" 0 KvWvwב*b6GfhEF[Osiu}ĶO&-qS!-1WnuK ]^k;+im2 r8AIݿ:B\ڧ/4K$e1rYE/i 74ٴ'N2#.PPjiN5Z!1 rrEA!]rGm"]_r*yQ:!m3WoMCI GZ.$2:)4kHC zy?M|1|'O)a"-ȿ'A#73꿔_Ejܛy? ( (4Nޔ-W +p =(gkieRߊȖs]EXFP[=jŲK(=+2?SSnx=<<&}Z<56# '{LJ>$S>rSciFI,KQ"W>-}&G7x_:^(K&|1Hv>o[xOˋVs"6x5xH퐪鴟L %݂:|A{Տz-C$ͱbGRޤ,2/RI_ɯ_ĭ&D.zzv߮ R{ [y$و* W[bRy I6&jeK' ;c5C{i㉌F˒z(JǸ[kOtt &fc4WFiS>ν&ĖCڮO}hυ0+4iɃO\7pX(xTpqך k11Cry{fYv}^[Y[KGdQS6n籴,DHwPMz߁>x~DVԵ? 3xXϖ陆"2KJG$.+D{ɭY Jn7=+1¢h{_ xs,qUzʤ߭^Iw]k%vgJuu.cǓ[j cx77M[Z5 >&}g!gDp̀xW]TٮM#,dãi:%n Es g $qyZ85Z_afYd':mˣvw٦yN*Z[@’Oup|#; I?d+ SpA!/ Zkχn+<67GO?Cg~(.ysaDf砀8Q2}g<\{נU +kkݷ\ͥ.j=w vK;J[I0T΁\޼<.R"'ݜdisp3<X|B\ h%IKPpr9W9XK_\Y"ż\S2#8& 7%}w{Ό^I洡2\Qy[cѷZ͵"^jͮTK˟i";h|~ Dn~{mw6Jdw\v-rT]엧E \cRRw-}"D$IG5NJ4ҺL4ijCYʛd)5sma$A$MeL q$ê/Wa犩+m2<Z%oWKVuO,>!/:?/p~`{o)&'%C*>^DTDԗ:l19-N]jmIFk|A-Ahr\\x}2rH.~UL*pHl>Fo#5V'|h`xYWZ.X["6׽|D# rrH›8Gw0LoWaJW*kl.%ɒEy햦"x+bH1ÓO^4VduGih89;d[ 3Z¾ztm m-*BJ[,ev˜MsV~!gb IՃ=:8R8y^;GPgg;A=h8=C|D,?Ƿ2u)nn~W,ykJ,dtFZ#0rE[I mQԒxz=|+πWZo5aw?<“v{Z}uN⨅IwH挊o&m#WV4G|/&xEٱkU ^,=Xc?\~46+09M}wKFxq?+ľ(x ޥi\W77d3DydO6꣊κ!,zҼWc׵Zw AFܞ-o5ķё Q[{ f]8ڄ.~וg᪡Bz=+uWlD"^Quih"$;z^[?ٛ]^udhP2Nxwv$/u>J?@1Y2ywOS'೗ͽ%n3~Y?k׀5%qNN#i0:Ѵ w}W.K SO,\=k$mc^./)M~_~þ y߾K~hx{RkfVIԢ5zį]mKj_ْ}IKWI9hWŖVg7 f2>bp?{Co(R%g%]%T}ZTҧ-`[}+Ѿ|Xo{]r{~GHvDǕ>lgiz(>pzs[\c*Ups0ʨ(׎[۳+hCl40j.W:{'pU sbSq\vI-m5h~EIDRmP@N?,>->CP"pO{nz+[{>u{vgg..,!}^Ei'O jl$z5ʞ zp[+N9'5j:8aR`m%$( ǥI-^$ӴoXׯPދk:[rHDb=Ч5Ue԰Ǭ.fcϮqJUíK$\[\yPHn5= tG(U@yWSm#lj[Mi=H%SE;%l<&) #4Wz23"qrq?%fKK?ET[BFy9uLcTnu3,+eyGO٥ĺ]_ioqnXq˅}>NO]MhT5{ƨ,yg.cc DH>-xU^f2ZI#gǵ$:eԼKv8 #p1Бʐ$.Ojkn~w^-fn9zJT_ }3xSVjv\u.Fq ylb*{VdEsԁTo)&mko,u?]G j^8 dx}KXΗOTvAM] }⫗ >sc&.#ÚVk]F;[$2r@ҏS~Z ?hCW~W jż[ HU6#$1iotB$WWHW/+W9q[|itsw{Tmo gT~(8p=okg.rOZˇ Õ H}mBa GUIS_tGZ\7v^Ochǵ1E i *r1}kSTrHG8Z|>=&߯h`rvUOZi W@#tmˌg5zku{(SklﵫDCl~ա1teY<^C@ '2ň()mWl; y-+VV,FUּFRLj䚓5e#iƗ}ukAӅL]lpk5vl(Q?g/58d#vX嚀qGlq^$+Txbh$}E}9&Xl&@{zҸ|: j*wyPʓvmx[V`QYp2FFkt3Df.xVj_Ax ÿdզ>!i$DdM!p0qߴ:z?"9c w8ݏ'TݽnW7㖽1JpuAKkR^پ`* k*YU;޽%@$RO ܷ{ Bd.'X<\OuJ-jV\"!tyW ISM JkeL)$)c Ο3 4+mEHvF)5=BthĄeņwMKFgi3k?A.lL.׍%w~4Z4m].Z&>c_f'F{8bz᳦#(.rxOJAaZWh_[nGaǓ05ٺ·]V٤Ɍcjdԯl&[z˖8GuL kbbr aS5z#PA& ѾƬ{fCDqc=a`9??^i :v{6`8'pӧk<3 D.w+kJУBЃ9L6)]%x?}Lӧ+4M|LKt $C3\h4"ʘT(cTl`(sJ۶ҁZ⟇GtSO&I~M5eF1NӺ>! )%{67,tmMKW^Y>{[^y.@ci0*O~m˵9?gCOԬ&Iky"=H=>cּ,VOBOݗqC>oZ%zK%DVWYк'l4yo5;XB7UG$Kͫ\αG = zVذXqG;o95]GXS;_)#y<?)/ wڧSL𦭉39\QoԌRK߄.;n6% ct 1+_0h֩;5˙^6Ĵb1E $kMLZ;oOŗ5YyL.*K[[S[zMK+(kŴb1zsKk1$eΣ%R9 @c P6owU}0 ;S.olpHui.:V Q]`pY6[o=(\ְox{TyRs.olinwz'Tpq. d OQXt|;]\Zj ww!cԮ6R”2;~./N# gҙ ?Ip+_5qX+_2Ԣ'>q-mS_B9?◈_*|]y'-qшcGeXEu܂ki4Cm5݊鴯nr5lq&E[*4ǯ[Fyxiv=Oqڙvgw8/j7 [sVַ$!'\:7lyF0jIeObVUl)?tv#.4?c#ֻ+zU x/0%,&(Ok.X |BWc"Aݎke."I' A?Z7xG/6*k\?FsT^Mh(,I)}kڴ6ɨ?iw_N?8Vǃ`baO%vӴrzԎɗ<'{Q; ZjMq36Hx-r6mVA݀z#d}A=Po'%$Xvsd:ֲ呷s!1+\c_ cf.O%fI_ЎQ]׉f 4^7Q[\q]7Ou[L%~Z~՞)*m鶏WkN;"i,uWm`NopkF)4vkInki$9.$xQBܵG?|Ӏr}\/꺼Z̶j1"B2qQ^[o~I㰭+km$ʂx#煵(Io"RI$|wmO=qzςi uO_DR;h 0'O&bx0ݫyK(eW)8\QZnmeY|_߲ 4x?xznU$4CU zOr ?|I&BnW3Б~*( `ڒ(&4GᗈʂN=Fc>&euIMzcos]1n3|?|'2xk;l=*zjSreY?.zϚP ^MeBp~3 q̈ HN;̚45 jZͼom5 qJyU랪E%LJ]䨏CҚM͢mڄq$6I{54nJ3QX$,0J>]?[[[EwV1FZd}#wuto,G^hZ1"0>d\@6^#1>wxwMc|ܙʖ{e`2|Hrx3t([,#~HcmrI27~:΋CakB(v3.FI{/|]sޮCݸ$i+߄<k+yXHך :I5lVO? ^J/{p|ǖSI5~Okxsēhzfx"MQpJLm\^UBJkLMũo1DrKI9z S&PcGS sjFC Gr{(en-,N[t kB<}gK{5; ngDF$ >,>mI!g]?Yj*&\.qОxwg/mn/!\7>QO YjRDiz\t㰦^iGy;Ix"Kk g8 ;^ou+⻽OZ8>zqQ=xW9uoGկ.5 k3ZQ`88Fh_ Jˡ/՟1LzVdžP?ެY Z91]!=j>qrxNH1ߚUˣk~^<HIC^[GxS>) -k 6O"s\$'eI'St%r=;֨"a(yQELN kn;cѢ[K%!A{֝γ&n?qˮ,n,3T5~YEM#/Y5oןjK3ǯJ|ɕ"=# -IL\.5ٽS<:NU] pi<\Ug}m pAq^WsT8$D5=ų'O¬]2Ypb 9xڻ~ K}gIfT\`m~z+~&_6yll,&y*B䑄A4kI~^qlVK]r$Fk握|ͮ.3;goL}+Dz'O, q^EeL}YOޮɋaYn.%23f9&-,\sU푡nNkJpV#g1U-ַg$r -KzlOy[<~zg_6Nr zynqtۮ[u͓$NO'g'zPX('qQ}ޝ,WPM eҴ!85FS6-`r\S[=;ڠWX.= l|FKN?ӆicaϏo~ 0?,"o@ >L6z;9oaPVJѤ5w1(zAl|5 w<~uf=+b b¶-ifˋns8QR)0pHV`9fxOZ:#zEԒQΈp8=G9V}Oi[jz촫{&X~؊!v`''~"мOa-Eydw\=q]o&hI^F.@2X7Xu+0&Lyl L}#XZXvՓE!Br N}z_ Z]%|4MXl/D[!"9'r K&%߇e{5Miu' Fm\{g'5 2xQihv vڕЄ\*匂[hWZkw?%𽾎E 2ks) x]>FH/n @A}A%4ּCsz4{kdz گ KAψQ<9v=sX't "0VŌaOnjom%xRK_ _A3\:}ĖǏzJ7oeiᆋ:>wvk~٘1` qq֣hVV>lzջ\l)nq08[{{m$d~#]ׂR p'|Ƿ}߁OL<[F_T @{f.n+~7as8p3ڄv7<=eu@eX;|Ŷ 7inK Z ?%51XA=>;$~} Z3['y&~ٴ rgׄΩx {mcAic3F sx ݭr8퓚t?WqJד9q]1} &s5^.hn GV|auMD4: I%QW<@\)Ko}qGOh[u $=8%6zj0YlԠ߮Q80xN O,cmRڱKx\.:aKBgӭբѴ-K!DK@?3|v׮1ҟu#E/I,Iykc9q u:Qs 'z";4'^[x(^xhz歪RFe'gh БZb Ki߾ki/$7z*͌pLS?L7T_ .5;ۛMxRKשO+KN u*Nj暥d2j*ւ pq7Ƒip\J~j711^HOz/p>)0Nw6E;? l2!vE$##ؓ5ڜ 9&*,+ឣ0\W PGAq+"tGP9 $vT̛dzVFgD?6y<:?s)]li\,~:)$6nrgi^3"`~VlyTWK{=d4NIcZ9{dGC-9i]XqN{K](ǂ8EQ#ih>ޢ"*4\ hP Lu5$֜1o+H>; 7p1<=Iƛ|'u߉xE}OD=oOmsxO5/|q픺+]i?j2͜_❕߇!(0j:^ua=#I_Z}&Cӭ,-APBQtFԗHҬ=: tmH'$I䓓VmRWlvB&[ofXڬKH6OqQe_mJq+ ;Cm,APLJw^P8 ojqZ{o [ahoO%P5 _~}/öZOky ࢏CQO ռ=#zMh/#Q³dqiǐO\ZkC<3>֨0 )CBj (nt=wQm[%O*P בHO?4_ x}2ʿil y꣘~aSbķZmDŽo4 MRBuXN]|n}oHsHxG4yueh.7!^A:ǂ$h0s/åqkh>_ G)HDl4lUxtm$ hz֛Ifk&"$Ķ?J IE^ỻ Mi&FG,;_zFJ]&VM_i)9 Jl?> i ZŦghj;(9Xmf tg翵|KM!w-%e4ٵ|%M/>80T隵=Ml%;6|ńy ]G;N@ԼF&5-,@ߩO߄>wޫj2YL=rxS^),][Mdך; 7*F^|^[V3,,壗oy=+kM;u|\/vُȼ'RY6~^'5fc3>{gh pOc*X]&Vٛ(cC@nAwwPǚŜj aFp*/W!<SoV~6[[)̂*7򐁅9?G}_EVhC~g endstream endobj 13 0 obj << /Type /Page /Parent 3 0 R /Contents 14 0 R >> endobj 14 0 obj << /Length 2293 >> stream 0.400 0.400 0.400 rg 0.773 0.773 0.773 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 575.866 521.469 182.118 re f 0.773 0.773 0.773 rg 45.266 575.866 m 566.734 575.866 l 565.984 576.616 l 46.016 576.616 l f 566.734 757.984 m 566.734 575.866 l 565.984 576.616 l 565.984 757.984 l f 45.266 757.984 m 45.266 575.866 l 46.016 576.616 l 46.016 757.984 l f 0.400 0.400 0.400 rg BT 61.016 749.193 Td 1.875 Tw /F3 9.0 Tf [(example, you all have been getting reminders to reactivate your network account by the end of March. Threats and )] TJ ET BT 61.016 738.204 Td 0.435 Tw /F3 9.0 Tf [(urgency, especially coming from what claims to be a legitimate company, are a giveaway sign of phishing. Some of these )] TJ ET BT 61.016 727.215 Td 1.178 Tw /F3 9.0 Tf [(threats may include notices of a fine or advising you to take action to stop your account from being closed. Ignore the )] TJ ET BT 61.016 716.226 Td 0.000 Tw /F3 9.0 Tf [(scare tactics and rather contact the company via phone.)] TJ ET BT 61.016 696.237 Td /F4 9.0 Tf [(Browse securely with HTTPS)] TJ ET BT 61.016 685.248 Td 0.570 Tw /F3 9.0 Tf [(You should always, where possible, use a secure website,indicated by https:// and a security lock icon in the browsers )] TJ ET BT 61.016 674.259 Td 1.312 Tw /F3 9.0 Tf [(address bar)] TJ ET BT 109.848 674.259 Td 1.312 Tw /F3 9.0 Tf [(,)] TJ ET BT 112.350 674.259 Td 1.312 Tw /F3 9.0 Tf [( to browse. This is particularly important when submitting sensitive information online, such as credit card )] TJ ET BT 61.016 663.270 Td 0.000 Tw /F3 9.0 Tf [(details.)] TJ ET BT 61.016 643.281 Td 1.274 Tw /F3 9.0 Tf [(Never use public, unsecured Wi-Fi,including MatiesWiFi,for banking, shopping or entering personal information online. )] TJ ET BT 61.016 632.292 Td 0.000 Tw /F3 9.0 Tf [(Convenience should never be more important than safety)] TJ ET BT 289.625 632.292 Td /F3 9.0 Tf [(.)] TJ ET BT 292.127 632.292 Td /F3 9.0 Tf [(When in doubt, use your mobiles 3/4G or LTE connection.)] TJ ET BT 445.963 612.303 Td /F3 9.0 Tf [([ARTICLE by)] TJ ET BT 500.980 612.303 Td /F3 9.0 Tf [(David Wiles])] TJ ET BT 61.016 593.814 Td /F3 9.0 Tf [(Posted in:Phishing,Security,Tips | Tagged:Phishing,Spear Phishing | With 0 comments)] TJ ET endstream endobj xref 0 15 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000339 00000 n 0000000376 00000 n 0000000511 00000 n 0000000574 00000 n 0000006637 00000 n 0000006749 00000 n 0000006856 00000 n 0000006972 00000 n 0000007092 00000 n 0000048072 00000 n 0000048137 00000 n trailer << /Size 15 /Root 1 0 R /Info 5 0 R >> startxref 50483 %%EOF Protecting yourself from spearphishing attacks « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Protecting yourself from spearphishing attacks

For a large enterprise like Stellenbosch University phishing attacks are the most common cybercrime.

In the late 1990s and early 2000s, we were all inundated with spam emails, selling everything from fake pharmaceuticals to cheap perfumes. With spam, cybercriminals use a blanket approach sending emails to as many people as possible, hoping a few gullible customers will be funding further spam emails.

General “shotgun” phishing is still a problem today, but the past 18 months have seen a rise in a more sinister form of cyberattack,  spearphishing, which is much more targeted to an individual or an enterprise’s email system.

Spearphishing is similar to phishing, it’s also a vector for identity theft where cybercriminals try to get users to hand over personal and sensitive information without their knowledge.

Cybercriminals view phishing attacks as a profitable and an easy way to gain access to an enterprise enabling them to launch more sophisticated attacks, for example, spearphishing attacks. Humans are, after all,  the weakest link and thus the most effective target for criminals looking to infiltrate a network like the university.

Even though spearphishing is more focused than its less-sophisticated relative phishing, everyone can apply the following principles to protect yourself and the university against cybercriminal activity:

Use common sense when it comes to phishing attacks
Be sensible and smart while browsing online and checking your emails. Never click on links, download files or open attachments in email or social media, even if it appears to be from a known, trusted source. You should never click on links in an email to a website unless you are absolutely sure it’s authentic. If you have any doubt, open a new browser window and type the address into the address bar. Always be wary of emails asking for confidential information – especially if it asks for personal details or banking information. The university and your bank will never request sensitive information via email. They do not need it. They have it all already.

Watch out for shortened links
Pay particularly close attention to shortened links, especially on social media. Cybercriminals often use Bit.ly, Tinyurl.com, Goo.gl or Tr.im to trick you into thinking you are clicking a legitimate link when in fact, you are being inadvertently directed to a fake site. Always place your mouse over a web link in an email (known as “hovering”) to see if you’re being sent to the right website.

Does the email look suspicious? Read it again
Many phishing emails are obvious. They will be filled with plenty of spelling mistakes, CAPITALISATION and exclamation marks. They will also have impersonal salutations – e.g. ‘Dear Valued Customer’ or ‘Dear Sir/Madam’ salutations – and will have implausible and generally suspicious content. Cybercriminals will often intentionally make mistakes in their emails bypass spam filters and improve responses. 

Be wary of threats and urgent deadlines
Sometimes the university does need you to do something urgently, however, this is an exception rather the rule. For example, you all have been getting reminders to reactivate your network account by the end of March. Threats and urgency, especially coming from what claims to be a legitimate company, are a giveaway sign of phishing. Some of these threats may include notices of a fine or advising you to take action to stop your account from being closed. Ignore the scare tactics and rather contact the company via phone.

Browse securely with HTTPS
You should always, where possible, use a secure website, indicated by https:// and a security “lock” icon in the browser’s address bar, to browse. This is particularly important when submitting sensitive information online, such as credit card details.

Never use public, unsecured Wi-Fi, including MatiesWiFi, for banking, shopping or entering personal information online. Convenience should never be more important than safety. When in doubt, use your mobile’s 3/4G or LTE connection.

[ARTICLE by David Wiles]

Tags: ,

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.