Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

News

Get rid of your e-waste

Monday, October 4th, 2021

Do you have old computers, monitors, cell phones or batteries lying around or clogging up cupboards? Are you concerned enough to dispose of them responsibly and not simply consign them to the dump?

There is a responsible campus solution. Facilities Management implemented e-waste bins on campus where e-waste can be disposed of and will then be picked up by contractors who specialise in the refurbishment, reuse and safe disposal of e-waste.

Electronic waste (e-waste) or Waste Electrical and Electronic Equipment (WEEE) are the terms used to describe old, end-of-life or discarded appliances using electricity. It includes computers, consumer electronics, etc. which have been disposed of by their original users. It can also include batteries.

E-waste is of concern largely due to the toxicity of some of the substances such as lead, mercury, cadmium and a number of other substances which are harmful to human health and ecosystems if not disposed of properly. The unsustainably rapid turnover of discarded electronics and computer technology is another reason for the need to recycle – or even better, re-use – e-waste.

What will happen to the e-Waste?

The contractors will separate the waste into items that

  • can be refurbished,
  • can be recycled and
  • must be safely disposed of.

Refurbishment of appliances and computers provides jobs and these items are then reused in needy schools and communities. Useful, scarce and valuable metals and other substances are extracted by recycling, while toxic e-waste is disposed of at special hazardous waste facilities. Examples of potentially toxic items include the old type of computer screens (CRT) and fluorescent tubes.

The procedure is as follows:

  1. Ensure that the items have been properly written off and dealt with in line with the University’s policy regarding the handling of redundant assets.
  2. Remove all your data, private and work related, from the devices. IT does not take responsibility for deleting or backing up any data or for any risk that your data might be accessible after disposal. Your device should be completely devoid of data.
  3. Dispose of e-waste in the yellow bins at the IT HUB (at the entrance) and IT Main Buiding (inside the service entrance on the right-hand side of the main entrance)
  4. For any further enquiries contact Clive Layman at Stellenbosch campus, Le Roux Franken at Belpark campus or Kevin Vermaak at Tygerberg. 

More information: www.ewasa.org

 

Spear phishing attack using a staff email

Monday, September 20th, 2021

If you receive an e-mail from Prof. Wolfgang Preiser – Head of the Department of Virology asking about a “PAYMENT”, you might be tempted to quickly answer and offer your assistance.

However, this was a spear-phishing scam designed to fool its victims into thinking the mail was sent out by someone like Prof Preiser.

We are getting several reports from personnel within his department saying that they are getting e-mail from Prof. Preiser and were concerned if his e-mail account has been compromised and if this is a phishing attack.

Here is what the phishing scam looks like.

An example of the spear phishing email using Prof Preiser's details

Click for a larger image.

Please note that the name, has been forged and that a “throwaway” execs.com e-mail address has been used with forged details inserted. The Professor’s account has not been compromised. 

The message below also serves as a warning and should give you an indication that this is not an email from an @sun address. Do not click links or open attachments unless you recognise the sender and know the content is safe.

CAUTION: This email originated from outside of the University. 

Additionally there is a standard warning from Microsoft to also warn you.

This is a spear-phishing attack where an institution is attacked by impersonating prominent or public figures within the enterprise to gain access to the enterprise. The targets in this method of attack are usually subordinates of high-ranking personnel, to fool them into sending money or obtaining personal details of these personnel members.

Keep an eye open for this scam, and please report it to IT Cyber Security if you find it in your inbox by logging it on the ICT Partner Portal. Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.​​

If you accidentally clicked on the link and already gave any personal details to the scammers it is vitally important that you immediately go to the USERADM page (either http://www.sun.ac.za/password or www.sun.ac.za/useradm) and change your password immediately.

Make sure the new password is completely different and a strong password that will not be easily guessed. Also change the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts.

Contact the IT Service Desk if you are still unsure.

[ARTICLE BY DAVID WILES]

Phishing scam: “Proof of Payment”

Friday, August 27th, 2021

Over 2 billion people worldwide have purchased goods or services online during the pandemic. The danger of all this convenient shopping with Takealot, Checkers or any online store is that people provide their credit card number without diligence.

One of the most prevalent scams NOW is called POP or Proof of Payment Receipt. There are a number of new phishing scams with the subject “Proof of Payment” or “Suspicious Bank transaction” at the moment. 

Here is one such scam that is currently being reported by personnel and students at Tygerberg. 

Click for larger image

Click for larger image

The way that this scam works is that the scammers are trying to get their victims to click on the link and go to a specially engineered site to steal passwords and login credentials. Often bank account details and cell phone numbers are asked for, and this is how the scammers get access to bank accounts and can do SIM swaps, to steal money and personal details.

Notice how the mail details have been forged to make the sender and the recipient the same. This is to disguise the true sender and to bypass the mail filters which would normally accept mail from within an organisation. In this case this sender used a “throw-away” Outlook.com e-mail address and then forged the headers to change the sender. In this case there is a possibility that the government address has been compromised.

If you get one of these e-mails or one similar looking (scammers change tactics very quickly) please report it to IT on the ICT Partner Portal. Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.​​

Secondly blacklist the sender under Junk mail, and perhaps even block the entire domain. You can do this by using the Report Message add-in on Outlook (available on your toolbar on the far right) More about the add-in on our blog or you can find the instructions on this .PDF

 

[ARTICLE BY DAVID WILES]

Extra layer of security added to campus computers

Monday, August 2nd, 2021

Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it’s essential to stay informed of the various risks that exist on the internet if you want to stay safe online. Here’s a breakdown of the basics: 

Malware, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most common type of online threat.

Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.

You’ve probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop (Figure 1). Don’t worry, this isn’t a brand-new type of malware. Stellenbosch University’s IT department has added an extra layer of security to campus computers.

Figure 1

Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart (Figure 2).

Figure 2

This is because the malware will sync to your browsers profile and will be synced back to your device after it has been removed.  If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on the ICT Partner Portal for a technician to assist with further remediation.

[ARTICLE BY BRADLEY VAN DER VENTER]

Why is my new PC taking so long?

Thursday, July 8th, 2021

If you have been waiting for a computer or other hardware you have ordered, you would have noticed that delivery is taking much longer than usual. This is undoubtedly a big inconvenience and cause much frustration.  

The reason for these delays is a worldwide supply shortage of semiconductors effecting 169 industries, ranging from car manufacturing, steel production, consumer electronics and even soap manufacturing just to name a few.

What caused these shortages? Apart from Covid-19 pandemic causing an increase on the number of people working remotely and requiring equipment, a number of other factors also played a role such as the tech war between the U.S. and China.

It is also not expected that the chip industry will be back to its healthy supply-demand situation until 2023.

The two companies that the university appointed as suppliers for laptops and desktops, Dell and Lenovo also notified us of the severe component shortages, and they are doing their best to shorten delivery periods under these severe circumstances.  The shortages include LCD screens, CPUs, audio cards and network cards resulting in extended lead times.

A more detailed explanation is provided here.

We appreciate your patience. Unfortunately, we are dealing with unusual circumstances beyond our control, but please know that we are trying our best to ensure your orders reach you as soon as possible.

 

 

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.