Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

General

Phishing and whaling

Friday, February 5th, 2016

Recently we gave you some pointers on identifying phishing e-mails. So now that you know all the signs and how to outwit the criminals, there’s another variant – spear phishing. But don’t panic, it’s almost the same, with a bit of a twist.

Spear phishing is an e-mail that seems to be sent from an individual or business you know. Of course it’s really from hackers attempting to obtain you credit card, bank account numbers, passwords and financial information.

These types of attacks focus on a single user or department within an organisation and use another staff member from the organisation’s name to gain the victim’s trust. (Also see our recent article on the incident at Finance.)

They often appear to be from your company’s human resources or IT department, requesting staff to update information, for example passwords or account details. Alternatively the e-mail might contain a link, which will execute spyware when clicked on.

But wait, there are even more fishing comparisons.

When a phishing attack is directed specifically at senior executives, other high profile staff or seemingly wealthy people, it’s called whaling. By whaling cyber criminals are trying to catch the “big phish”, or whale.

phishing

[SOURCE: http://www.webopedia.com]

 
 
 
 

IT HUB – staff welcome

Monday, January 18th, 2016

IT-map

Why endure the heat to carry your PC to the IT main office on the other side of campus? Rather head straight to the IT HUB in Admin A, just off the Rooiplein where basic services will also be provided to staff.

All equipment will still be serviced at the main IT building, but minor adjustments, for example registering a personal device on the network, passwords, etc. can be done at the IT HUB.

Staff’s personal devices can also be handled at the IT HUB or IT Main building and staff can register 5 mac addresses (e.g. smart phones, tablets and laptops) on the network. These devices will receive limited support at the IT HUB.

CONTACT US

Tel:  021-808 4367
Skype: ITStellenUni
E-mail: helpinfo@sun.ac.za (for general enquiries) or help@sun.ac.za (to log an error)
Twitter: @itstellenuni

Full instructions on how to log an error are available here. Please supply the correct information otherwise the call will not register on the system.

All our services are listed on our Service Catalogue and if you are brave enough, you can consult our Self-help wiki.

 

2015 in numbers

Wednesday, December 2nd, 2015

Infographic3

IT HUB – your one-stop

Wednesday, December 2nd, 2015

IT-mapDid you know that you can drop your PC off at the IT HUB, on central campus, instead of dragging it all the way to the main IT building?

All equipment will still be serviced at the main IT building, but minor adjustments, for example registering a personal device on the network, passwords, etc. can be done at the IT HUB.

Staff’s personal devices will be handled at the IT HUB or IT Workshop and staff can register 5 mac addresses (e.g. smart phones, tablets and laptops) on the network. These devices will receive limited support at the IT HUB.

kaartCONTACT US

Tel:  021-808 4367
Skype: ITStellenUni
E-mail: helpinfo@sun.ac.za (for general enquiries) or help@sun.ac.za (to log an error)
Twitter: @itstellenuni

Google Maps

Full instructions on how to log an error are available here. Please supply the correct information otherwise the call will not register on the system.

All our services are listed on our Service Catalogue and if you are brave enough, you can consult our Self-help wiki.

The Internet of Things

Friday, November 20th, 2015

“The internet of things” — a rather unimaginative way to describe something vast.  What did Kevin Ashton mean when he used the phrase for the first time in 1995?

What is it?

The Internet of Things (IoT) refers to connected devices communicating with each another and using machine-to-machine (M2M) communication via virtual, mobile or instantaneous connections.

This network of physical objects is embedded with electronics, software, sensors, and network connectivity, enabling the objects to collect and exchange data.

They can include any object fitted with the right technology and the ability to connect to the internet. For example, home appliances, most forms of transport, shops and machines used for manufacturing, farming, healthcare, etc. Existing M2M applications include smart metering, patient monitoring, CCTV surveillance, vehicle tracking, secure ATMs and digital signage.

network-782707_640What can it be used for?
 
The main advantages of The Internet of Things is increased productivity, efficiency and better organisation of tools, machines and people.
 
One area where IoT can be most beneficial, is healthcare. Diseases can be monitored and analysed to create new treatments and also prevented in the long run.
 
In farming, sensors are connected to crops and cattle to increase production and track herds.
 
In the home environment security systems and household appliances can be monitored and controlled. In future your fridge will be able to let you know when you are out of milk and possibly even order it online for you. You will be able to activate your coffee machine from your cell phone to have a cup of hot coffee waiting when you get home.
 
LG recently introduced LG Homechat which enables you to SMS any of your LG home appliances. And yes, they answer back. Unfortunately this functionality isn’t available in South Africa yet, but it’s out there and being used.
 
These are simple examples, but the possibilities are vast. For more ideas, have at this interactive web application.
 
Is it safe?
 
IoT has many advantages, but the biggest concern, especially in its early stages, is security and privacy. To function optimally these devices need your personal data and since everything will be connected, in the cloud or on companies’ databases, it will also be available for if proper security is not in place.
 
Healthcare is most at risk if data is tampered with or leaked. Deleting sensitive medical information, such blood group info, could have fatal repercussions. (More in the Guardian)
 
According to experts IoT is relatively safe, but there’s no guarantee.
 
 
 
 

 

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.