%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> /XObject << /I1 13 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240521233159+00'00') /ModDate (D:20240521233159+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 2621 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 310.750 521.469 435.984 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 311.125 520.719 435.234 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(NEW WARNING BANNER FOR YOUR EMAIL)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(The nature of cyber-attacks is always evolving and Information Technology, with the help of staff and students, has to do )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(everything within our power to try and prevent them.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(In an attempt to tighten cyber security on campus, we will soon provide a new warning which can identify the origin of an )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(email. By establishing the origin of email, it's easier to protect against cyber security risks such as malware, spoofing and )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(phishing.)] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(From now on, every time you receive email from outside campus a yellow banner will be displayed at the top of your email:)] TJ ET BT 61.016 471.099 Td /F3 9.0 Tf [()] TJ ET BT 61.016 451.110 Td /F3 9.0 Tf [(Click for a larger version)] TJ ET BT 61.016 431.121 Td /F3 9.0 Tf [(When staff or students receive a potentially dangerous email which seems to have been sent from a colleague with a )] TJ ET BT 61.016 420.132 Td /F3 9.0 Tf [(sun.ac.za address, they will immediately be able to see that it is, in fact, not from their colleague, but from an address )] TJ ET BT 61.016 409.143 Td /F3 9.0 Tf [(outside the university.)] TJ ET BT 61.016 389.154 Td /F3 9.0 Tf [(Just keep in mind that the banner does not indicate that the email is necessarily a security risk, but that the possibility )] TJ ET BT 61.016 378.165 Td /F3 9.0 Tf [(exists and that you need to be extra careful when responding to it.)] TJ ET BT 61.016 358.176 Td /F3 9.0 Tf [(We will continuously assess the effectiveness of this decision and reconsider if necessary. For any additional enquiries, )] TJ ET BT 61.016 347.187 Td /F3 9.0 Tf [(please send an email to help@sun.ac.za.)] TJ ET BT 61.016 328.698 Td /F3 9.0 Tf [(Posted in:E-mail,General,Notices,Students | | With 0 comments)] TJ ET q 450.000 0 0 24.750 61.016 455.140 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 455.1403 511.0157 479.8903 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/Admin/Infoteg/nuusbrief/2020/images/phishingbanner-large.jpg) >> endobj 13 0 obj << /Type /XObject /Subtype /Image /Width 600 /Height 33 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 19011>> stream ExifMM*bj(1"r2i ' 'Adobe Photoshop CC 2019 (Windows)2020:02:03 15:40:34X!"*(2HH Adobe_CMAdobed             " ?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?'Yפ쪈OOuRFńCvni$\o]TI0G%u}GKŦrsMr}նDi1KflXA.\ZI%+W,[Dn:&F*I"DMO]? h\g])|~kpw8ۨ3ܴRKWg׻O9@j36VKI$k_&{[׋I=-v n7WZi%+W;[jϹީ.}nQE3cZi%+W4j&N6iw~Fι>夒_zj5ٛFpH;kw%9~.VC_S# LPhotoshop 3.08BIM%8BIM:/ printOutputPstSboolInteenumInteClrmprintSixteenBitbool printerNameTEXT&\\stbsc01.stb.sun.ac.za\stb_print_q01printProofSetupObjc Proof Setup proofSetupBltnenum builtinProof proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd doub@oGrn doub@oBl doub@oBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlong cropRectLeftlong cropRectRightlong cropRectToplong8BIMHH8BIM&?8BIM 8BIM8BIM 8BIM' 8BIMH/fflff/ff2Z5-8BIMp8BIM8BIM8BIM08BIM-8BIM@@8BIM8BIMQ!XphishingbannerX!nullboundsObjcRct1Top longLeftlongBtomlong!RghtlongXslicesVlLsObjcslicesliceIDlonggroupIDlongoriginenum ESliceOrigin autoGeneratedTypeenum ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlong!RghtlongXurlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT horzAlignenumESliceHorzAligndefault vertAlignenumESliceVertAligndefault bgColorTypeenumESliceBGColorTypeNone topOutsetlong leftOutsetlong bottomOutsetlong rightOutsetlong8BIM( ?8BIM8BIM   Adobe_CMAdobed             " ?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?'Yפ쪈OOuRFńCvni$\o]TI0G%u}GKŦrsMr}նDi1KflXA.\ZI%+W,[Dn:&F*I"DMO]? h\g])|~kpw8ۨ3ܴRKWg׻O9@j36VKI$k_&{[׋I=-v n7WZi%+W;[jϹީ.}nQE3cZi%+W4j&N6iw~Fι>夒_zj5ٛFpH;kw%9~.VC_S#8BIM!]Adobe PhotoshopAdobe Photoshop CC 20198BIMWhttp://ns.adobe.com/xap/1.0/ XICC_PROFILE HLinomntrRGB XYZ  1acspMSFTIEC sRGB-HP cprtP3desclwtptbkptrXYZgXYZ,bXYZ@dmndTpdmddvuedLview$lumimeas $tech0 rTRC< gTRC< bTRC< textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ QXYZ XYZ o8XYZ bXYZ $descIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view_. \XYZ L VPWmeassig CRT curv #(-27;@EJOTY^chmrw| %+28>ELRY`gnu| &/8AKT]gqz !-8COZfr~ -;HUcq~ +:IXgw'7HYj{+=Oat 2FZn  % : O d y  ' = T j " 9 Q i  * C \ u & @ Z t .Id %A^z &Ca~1Om&Ed#Cc'Ij4Vx&IlAe@e Ek*Qw;c*R{Gp@j>i  A l !!H!u!!!"'"U"""# #8#f###$$M$|$$% %8%h%%%&'&W&&&''I'z''( (?(q(())8)k))**5*h**++6+i++,,9,n,,- -A-v--..L.../$/Z///050l0011J1112*2c223 3F3334+4e4455M555676r667$7`7788P8899B999:6:t::;-;k;;<' >`>>?!?a??@#@d@@A)AjAAB0BrBBC:C}CDDGDDEEUEEF"FgFFG5G{GHHKHHIIcIIJ7J}JK KSKKL*LrLMMJMMN%NnNOOIOOP'PqPQQPQQR1R|RSS_SSTBTTU(UuUVV\VVWDWWX/X}XYYiYZZVZZ[E[[\5\\]']x]^^l^__a_``W``aOaabIbbcCccd@dde=eef=ffg=ggh?hhiCiijHjjkOkklWlmm`mnnknooxop+ppq:qqrKrss]sttptu(uuv>vvwVwxxnxy*yyzFz{{c{|!||}A}~~b~#G k͂0WGrׇ;iΉ3dʋ0cʍ1fΏ6n֑?zM _ɖ4 uL$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)KmAdobed         !XK  s!1AQa"q2B#R3b$r%C4Scs5D'6Tdt& EFVU(eufv7GWgw8HXhx)9IYiy*:JZjzm!1AQa"q2#BRbr3$4CS%cs5DT &6E'dtU7()󄔤euFVfvGWgw8HXhx9IYiy*:JZjz ?MG*U8XHMhXevGeXchܜqӃ^eי<Zc]ZƫqH%vU,גdc!*I۪>j\-[ܭŬ.?'zf\'&A6,/+; g&^E5>g-k_I0_Wɝ)G8\G*v-_#DddEhoTQTI|qrJ?uQJwaU@򽳭m1i$bGeyb3e=#v*^ieܲ۽0JC~@|nUVHdvE4FyCQ-flv@x"tL $ 2͔tT;ʄf֧܃k=8X@oP pir^&@,EȺLcA pGu1BX$KCP?7NO(L[YjZlzm'AR !Fn+xn?SyS_0!ͤW*9,D qٕV㏋?VyS>g1EhfI0y:ʠV7UY>%UU_Yb%RIRyPH5E9W[px{v(k?7/C<<|ļgÃz訿kɔmQ"ǚg^ycRx,>s5qHFkd6?Z4F:0Ҽ#|'O7,EGyT\T Vybe6G@ӔU*=Oُ OH] PlEZ;b¬d_䣓)5QJGyEG$:$Mtf[_^O]԰_Ñ9rG*v+5%Kq phȗ124i(8Iž/͔Jw.^[Q_6y5K E o_~KÖ/tҢǛW~nm$E̞<|J/~5_dzG*(ٵ-<0Eq7-/8b_Xٟ\ϒ;wOBO%_U-.Yy(V7q]gzG*P:?|ȑ*[[\\\\[XM?դhq~e#Q7>l.,n?tүwtdqx<˾$??ۏ]?Y!7>^2G*yŎQ5sU/7][ylFd<`^_kF\WAQbB*"ƪ~ӃH?irW\{Y *o'rbK)rI G[x5],i/-w6I.ݡhM$l?k3>eGI⑿(rNiB4X£q쁛~Gy8Vin<K{p=°$ q6\V?x>_}2Y'4沩''*/_ +}њ K-K p%T\P0Zq\,׈~)v/i3[iow[r1NU5-&YufCBļpKI4 _t6[R[xn'yUrr*\dQj?Uk5hP\3Ua~_/xK4XR2z5՝x#Y#CRE5 K5Wn+(E'@i2MIRSyua.ask5ͥ=dy$DnS/n>httA?g?"vmiklj]G=YpOUSW"tnx yvF5DwfVEJSQS?~>AU;t_HHp xt##~{Y"*huWV^[I R; "e+af)HK4 Y9qhgJgwR2/S\,c­/%V-isXmŪF"/Y'!4;~Ńn?;O򆍧[-~P;bX SxkZ\fGG oy-m!M"?vΕKrHp;D,u :?BUm'9AoO^X)b4Xp'A>%[mwwO8;0~?3f2 $7Ӄ:}f(qN?:'ykIoC?Gi:}f(E~7ӄvt|Q!N*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثN*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*Uث endstream endobj xref 0 14 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000321 00000 n 0000000358 00000 n 0000000493 00000 n 0000000575 00000 n 0000003248 00000 n 0000003360 00000 n 0000003467 00000 n 0000003583 00000 n 0000003710 00000 n 0000003845 00000 n trailer << /Size 14 /Root 1 0 R /Info 5 0 R >> startxref 23024 %%EOF E-mail « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

E-mail

“Sextortion” scams

Tuesday, April 28th, 2020

There has been a resurgence of “sextortion” phishing scams recently but with a slight twist.

“Extortion phishing” or “sextortion” is an aggressive form of a phishing attack that targets potential victims in an e-mail demanding bitcoin in exchange for a promise of non-disclosure of an alleged sexual offence.

The aim of these sextortion e-mails is clear – to force their intended victims to pay up for their silence, or the footage will be shared on social networks. Ultimately this is a typically insidious scam that could easily snare an unsuspecting user.

This variant however has an added twist, in that the phishing scammers are displaying a stolen password (from other websites) that their victims use, to grab their victim’s attention.

It is usually those other websites (e,g,. hotmail, Instagram, Paycity or Facebook) that hackers use to gain access to our data, so changing those passwords are very important.

As in the example below we received earlier this week:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Several students and personnel say that they have also received similar phishing e-mails, and that password that they had used were displayed in the subject line. They were all concerned that their network account was under attack.

If you receive such a mail, there is little danger to you UNLESS you

  1. respond to the sender
  2. still use that same password for other non-university accounts and use a variation of that password.

If it is an old password that they are displaying, then the danger to you is relatively small, but if you are still using it on a different website or application please change and update immediately.

[ARTICLE BY DAVID WILES]

Phishing emails, SMS and WhatApp messages offering payment relief during lock down

Wednesday, April 1st, 2020

A new potential threat has emerged as we enter the 2nd week of the national lock down and facing the beginning of the new month with bills  to be paid.

Phishers are already targeting the South African public with so-called COVID-19 phishing scams, attaching malware infected attachments and encouraging victims to click on a link to download “important information about the COVID-19 pandemic”.

However this week’s scam involves emails, SMS and WhatsApp messages being sent with information about “Payment Relief” from South African banks.

While it is true that most major South African banks are offering payment relief measures to their customers, phishing scammers have grasped this opportunity and adapted their tactics to send emails with content like the following:

“Dear Valued Customer,

“At ABSA Bank, we realise that this is a difficult time for our customers and businesses whose financial means are being negatively affected. After careful consideration and engagements with The Minister of Finance the, Hon. Tito Titus Mboweni, we are pleased to offer you, as a valued customer, a once-off access to a comprehensive relief programme. Please click on the following link to see if you qualify for payment relief.

VERIFY YOUR ACCOUNT

This is a once-off offer made to selected customers and will close at midnight on 2 April 2020.”

This is one such e-mail, but similar scams with forged identities from other South African banks, as well as Whatsapp and SMS messages will also surface. Note the specific deadline and the call to verify your account. Your bank won’t ever ask you to verify your account by email and certainly won’t give you a day to make such a decision. 

If you need to make use of a relief programme, rather contact your bank directly than reply to an online message. 

Here is a collection of the current verified details for payment relief from South Africa’s 4 major banks:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 [ARTICLE BY DAVID WILES]

Sending emails to large groups

Monday, March 2nd, 2020

Occasionally it is necessary to send emails to external students or other large groups of people who are not part of the sun domain. If you are currently using Outlook distribution lists we recommend that you switch to the much more user-friendly and functional Sympa mailing list management platform.

The reason for this is that Microsoft has started to limit the number of emails a sun email address can send to to 30 external email addresses per minute. Therefore, if you send to more recipients, Microsoft automatically blocks your account as their attempt to prevent spam. More detailed information on Microsoft’s policies regarding email limits, can be found on their website.

For many years the university has been using Sympa as mass mailing solution successfully. In fact, many of our staff and students use it to administer their lists. 

Sympa is a mailing list management (MLM) software and has its roots in the academic computing community in France. Its name, which is an acronym for Système de Multi-Postage Automatique (i.e. Automatic Mailing System), also means “nice” or “friendly” in French. We’re not sure exactly why the French decided to call their mailing list system “nice”, but we can confirm that it is “friendly” to use.

By using Sympa as a platform for your group emails, you will have better control over your emails and access to handy functions such as:

  • appoint one or several moderators;
  • manage subscriptions and unsubscriptions;
  • add a shared document web space at the subscribers’ disposal;
  • answer questions from subscribers and potential subscribers about the list
  • read the list archive;
  • search in the message archive;
  • review members of the list;

As you can see, Sympa offers much more functionality than your normal Outlook distribution list. Any staff member can use Sympa, simply go to https://sympa.sun.ac.za/sympa.
If you need any assistance in setting up your Sympa distribution list, please log a request for assistance on the ICT Partner Portal.

New warning banner for your email

Tuesday, February 4th, 2020

The nature of cyber-attacks is always evolving and Information Technology, with the help of staff and students, has to do everything within our power to try and prevent them.

In an attempt to tighten cyber security on campus, we will soon provide a new warning which can identify the origin of an email. By establishing the origin of email, it’s easier to protect against cyber security risks such as malware, spoofing and phishing. 

From now on, every time you receive email from outside campus a yellow banner will be displayed at the top of your email:

Click for a larger image

 

Click for a larger version

When staff or students receive a potentially dangerous email which seems to have been sent from a colleague with a sun.ac.za address, they will immediately be able to see that it is, in fact, not from their colleague, but from an address outside the university.

Just keep in mind that the banner does not indicate that the email is necessarily a security risk, but that the possibility exists and that you need to be extra careful when responding to it.

We will continuously assess the effectiveness of this decision and reconsider if necessary. For any additional enquiries, please send an email to help@sun.ac.za.

Phishing from staff email

Monday, October 14th, 2019

An email with the subject “Purchase Order 98474” has been sent from a sun email address to staff and students. The email ask you to click on a link to open your purchase order information (also see image below)

This is not a legitimate email, but a phishing attempt from a compromised university account.

By clicking on links and providing your information, you give criminals access to your personal information and your accounts. If you think your account or device has been compromised or you notice suspicious activity:

Immediately change your password on www.sun.ac.za/password.

Contact the IT Service Desk by logging a request or calling 808 4367. 

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.