%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250717075448+00'00') /ModDate (D:20250717075448+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 3194 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 270.203 521.469 476.531 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 270.578 520.719 475.781 re S 0.773 0.773 0.773 rg 61.016 285.953 m 550.984 285.953 l 550.984 286.703 l 61.016 286.703 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(SUNLEARN LATEST UPDATE)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F1 9.0 Tf [(LATEST UPDATE 22/02 16:47)] TJ ET BT 61.016 617.431 Td /F4 9.0 Tf [(In an effort to ensure that all students have access to their )] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(registered modules, a decision was taken to urgently do manual )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(uploading of all registered students into their respective modules.)] TJ ET BT 61.016 575.464 Td /F1 9.0 Tf [(For this to be executed as speedily as possible, we need to )] TJ ET BT 61.016 564.475 Td /F1 9.0 Tf [(restrict access for all users between 19:00 and 22:00 tonight )] TJ ET BT 61.016 553.486 Td /F1 9.0 Tf [(\(Tuesday, 22 February\))] TJ ET BT 61.016 533.497 Td /F4 9.0 Tf [(We sincerely apologise for the inconvenience.)] TJ ET BT 61.016 513.508 Td /F4 9.0 Tf [(--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------)] TJ ET BT 61.016 493.519 Td /F1 9.0 Tf [(UPDATE 16/02)] TJ ET BT 61.016 473.530 Td /F4 9.0 Tf [(We have been experiencing severe problems with SUNLearn since Monday, 14 February. This includes database access )] TJ ET BT 61.016 462.541 Td /F4 9.0 Tf [(issues, as well as incomplete or erroneous student module registration information.)] TJ ET BT 61.016 442.552 Td /F4 9.0 Tf [(This is treated as a high priority incident. However, to resolve these problems )] TJ ET BT 370.634 442.552 Td /F1 9.0 Tf [(we need to switch off the feed of student )] TJ ET BT 61.016 431.563 Td /F1 9.0 Tf [(module information from the student system and will also stop manual module registrations on SUNLearn until )] TJ ET BT 61.016 420.574 Td /F1 9.0 Tf [(tomorrow \(17 February 2022\) afternoon at 14h00.)] TJ ET BT 61.016 400.585 Td /F4 9.0 Tf [(This will allow the technical team to analyse the problem in-depth without new registrations putting additional strain on the )] TJ ET BT 61.016 389.596 Td /F4 9.0 Tf [(system.)] TJ ET BT 61.016 369.607 Td /F4 9.0 Tf [(We apologise for the inconvenience. We are aware of the impact the situation is having on students and staff and are )] TJ ET BT 61.016 358.618 Td /F4 9.0 Tf [(doing our utmost to ensure that the system is entirely functional as soon as possible)] TJ ET BT 61.016 338.629 Td /F4 9.0 Tf [()] TJ ET BT 61.016 318.640 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 300.151 Td /F2 9.0 Tf [(Posted in:Academic IT,News,Notices,Students | | With 0 comments)] TJ ET q 225.000 0 0 96.750 325.984 549.461 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 129 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 9447>> stream JFIF,,ExifMM*C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,"E !1AQa"2q#3BR4bcr56st+1!A2Qqa ?MjY@ VGJh b+: @ح@PkQB\BEp-ZWBBD7W! C݄Ix<+H i޾8N>JQ$Ф #'P'~RN|k5xdl5!WU" T e!ɧn"+Q\ː47. Ҳ*§4%})ft>Mc19Q.A™|: ^!2!u X*Yev;zr͚Km9[%#VW)ih`␬BYZ7XzVZR$tl,ͨ)Aͥaøx{4 zǸy*H>U:*ZKMʈ'^ߧ5ސd8ɠl!PQ!ppv|'MAJS`JO# q)mHp((Rs_OҚ-m0d) @Y"TJIZֈYO~4rI᎟ʀ4˅jq ٽ[O:-zTFe):-j$ ?S^eI >Wh;ᮒTfD(bCY*$V$hŵ1Za+GPP\*:NjKc E8l(>#5HRv6qmzv/*Sc9,4k+ĭ{w 5:MZU1"E @z|  iq$~ V(y)Cn}*aNzU{tFzeߒ׹Nw'|&f7/r]M Nv1r1sV.{ f iG'hAr=sI''=bn"Ҡ/C1)L?LU R=ϗN6x8>X3vq x~x29Ğs+~F\} e,wLcʈIG]YVpOv>u9l # s4'Ǻr~'3AYWtvϲ I xTTf^@A){FQuݔ: 8kD[*? O'$iQ{|Z-}L ??3TrqϝN#)v,Jac) }qI{ :VsYR<ֳUT/LʐĦ76 Ɋmą(*ɡ[%!l8<I𩒴"??:H ,@P>"ó[g Z܄$DIN8E#ZS_{ڮCb+ҋ*)Rp2(kQ&-X\)A`s)>UvW*m.(#lLǕyGD@'F/ݹE?1Q+2ˎ8pd_/JJvGI :CMcHK>ۉH<$xʫnvPc帇K`i|FOdވ~k# y? ◖¶6gϧʫ'm;V#bpzxa7oBЉQ2)IZ>!4&dYT$q!G/\j(vQ$39cAʓNl7W.p"2'rh/r\ޅ294]gS 5mC!nz>-?gMQ~p.4KJCA'=9=Q[ixv[N8,!P:Ҩ7[zrP#Ax{IP"4DgrgPi΋-';01|=:(jnuK DIV0H硨&!nyb\$''0i"Z8k&mLg**`*I͘J1ڌ9SG5 MDW[/Q$$|&֙[\kms -,lp9gtT3+uUjqАen܂N8GB>Tl~KNOx 0Z-~k)ere)I) NzJ!XzwVVcg|s |؊5L9OO7;](EJ))*$`P1+}oHSgd(f$Ȉ18Wj"mFoq{h݉.**h$`.u(cK,! *"}g$aN/%V[+L/ka1 \3$)J< gJʏJx[G"p6!s } (*r9b3󩸳mBGThL}crIxe#O^%%ydZVi$uNG&4{vDp-L>]*D(^fghLiq*OνMQZڸt 8 VeWs-@ AOzpd":jVV[;|mL]PWipÈva#HU2  S%Te:bM01E 2^-QRIZQ i"+;Ta8mOW%Z\+GzB} HͲ]jmw^7 MGO95/hKgRZʘJϐ0~t?e+՞;HXgf9<Оz%#߼$S%.2 HC3yAj8;61$x(j?!%) ((-(r895ڬdڻF]a4prH^O>Tq=4ۥ'ڥ5%; A8* usLH55<%l 9s{Pu8nDfqœϐW7}Iu"dߖ.)C(sF̜ p9@{ K>E5L M&c?'$!G3i1 S˅ m<`NxSf'h$VfQqY(TPHϯ@9`j6G &lfB-dg$zХ 7G-p5ԷrqJز)&uVMSP v R9ۜ4+i%LG#8d3X8I?"l%dk;%sR\#pNscA΁o~צiNIF6g>ѮZ\EWkćG'?cBd~h512dd0Ts5Qd~4lK^Y`xL)/gKtGeZ,x*H<F2<(6;d~g% I ShQ,DDN,Ԗ[P1y)}hwcJRERd4 iHW {FAYJJ|NI=MbR!\8 + ^Rf!oMCmnn/ERv|@?iq3Q};A+t8]"^6$tGLH3`ђ.n4g&5)) zg}g5>h +0xC2n .nW9~r1/XZ]t224+o&Za-*kR(NJ1~8ϥ]1}ꏴ̍$.(.wMm0j!x/5\?"'sZ $c\.0hyzeOc (q"sa <#LUeqэs)pq#EpWCC>tɗ2CQc{,!#̓E׍ B)^ĝO̓qCtK&ŤDGDǔ8syS_KHpJʈZxBx$RPZH ~uYwgmaUE9;N-Jr4b`GM{*ISe*#hqᔓ9n8cn'Ep=1Qr'% d֗RGʆyBdhjW[9w##QRp<F%@X= .rB@%)n8˵U!&Wݤ%# x'%I'ek):TFI[MpŽDS pT3oZB D)cqNjOSYex1Z=8UqE9zpFWyKȆ%mn7G[_q.m !%j. >sN[<.*K-l;B9ͭD,pˀyTd$Xa=%+Ohњۄޱx J=zY=WuѝFy}-ce@q >ϑ9SGdJy\A^]zܭHA} jO{󨘑j11tI PRyP"\6%%n쌜tYk}ե"31Or|*iYz$ث UBVE";n'P !UilsPGMh_ʶnCŖؾ=ؕOǞ+8T57K=]=g/s͕5ېOUg~ȟ5b3+9K!Bx4#kvg4t8 f,t%1ܥ'Ä L-ޏRkt>z㢯j )ezg!v.C}J$V+6:J|(鼍1^DK}Dv+]$7XF_ygL+Cd,|EN g +ӛBJg\tya [ʣr+=G)K+m\ܢ@C&oI*V|)g.2$VwIp  g[Ԟ- 8U 5UGλ#\{N-;6;b_%ʶDOJ\tͩa8N@ֽh[b#!: dHå}'ۣZ!]c|2Oz7Nυ N* -Q!ֲ3좫-)^= gƏHyBӗ#*]$9r#[: Vݣe(Ӳe ʁ>Y( XNR@>q𖈮% mNmOZM7_5K$8|mbaYQ%)%'ʣ$r#WͥpR*pɧ%.+,m*0-ƚIV5 X{+ ᰜbtϛM)AjңM -}fiWjAsOqT'9֤4 :tS;^Z}g?Pb O^>DyE0c82~'IsUS҆r@X}Iώ z1NTg85/ST.У'DbDpvj Bj:w8Yp>QE-[/&+jإ4ˊ6^ISix"uwS]9N;ka[{*La^̌Gb4DUdʣ!B ǡ9;h[aɗ.Y꓏ҋX]̈́\!Mg&BvT<3UMM}Y[kh yTe } +y+W bj*.Sy9P D0GGySK,zyxeзv܉;͎jm*8P"n yE9b I%a]9AK]BfVNC::ipB $$4VCI-y5#QGy%7rb*siZ؋ EXIr=sVR|vP}Zz&ZǁD $ۀk9N[S1}_^TjӒI>EWnLA -fYe޹(3SMIJ7#gmA\YLKtLX JӌM@Z'DZ]R@|gX = }H#?vʙ˱O>Ȣ덊K]m$њ^ kHڞzZůIm?2A[y"nV)d[ k΢͜=q OC]C/G9ZѾӲV))uth(ֈ6r^^ G۝pSҘFSiak`9F oQZc&9_P!AOJnVז{E9]6ⅵ^v1Ysv)c٦rHA撠sR5R@ڏjFEI% E;g2BTe dR vNoٴ3",{?[iƄNi[d<*')49)R'rvDK u@dyqcWGҐ#9})Ê$zR,#BZ..+?=m*hZzN!D*OEFD#%Rp-@{qQ:Qx-#A#S[(66P% pR5c> ߜTN@J$dK"qKO++*_#\+* G—kVVU͋5J pHxǺ>qpluBi}YYSYYMpK5)/&VVWCf1 ~͊2'Wjk+))~U dCsYYL4Us򬬤$E5?LzEZ'gC>ʱ} eeAb u?Tt endstream endobj xref 0 13 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000570 00000 n 0000003816 00000 n 0000003928 00000 n 0000004043 00000 n 0000004163 00000 n 0000004271 00000 n trailer << /Size 13 /Root 1 0 R /Info 5 0 R >> startxref 13886 %%EOF News « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

News

New e-waste bins at IT

Monday, October 4th, 2021

 As part of the campus “Going Green” project Facilities Management will be placing e-waste bins at selected spots on campus. We encourage staff and students to use these bins for any non-asset e-waste.

Two of these yellow bins (see example right) will also be located at IT. A bin will be placed at the IT HUB by the entrance and a second one will be placed at the IT Main building in Hammanshand Rd at the service entrance (facing IT the door on your right) Both bins will be just inside the buildings by the doors. 

WHAT IS E-WASTE?

Electronic waste (e-waste) or Waste Electrical and Electronic Equipment (WEEE) are the terms used to describe old, end-of-life or discarded appliances using electricity. It includes computers, consumer electronics, batteries etc. which have been disposed of by their original users.  More on e-waste.

We encourage all staff and students to use these bins for any non-asset e-waste. Bins will be serviced by Wasteplan and weekly inspections will be made by the university’s Wasteplan site supervisor to assess when a collection is needed.

For assistance and enquiries please email fmhelpdesk@sun.ac.za.

 

Get rid of your e-waste

Monday, October 4th, 2021

Do you have old computers, monitors, cell phones or batteries lying around or clogging up cupboards? Are you concerned enough to dispose of them responsibly and not simply consign them to the dump?

There is a responsible campus solution. Facilities Management implemented e-waste bins on campus where e-waste can be disposed of and will then be picked up by contractors who specialise in the refurbishment, reuse and safe disposal of e-waste.

Electronic waste (e-waste) or Waste Electrical and Electronic Equipment (WEEE) are the terms used to describe old, end-of-life or discarded appliances using electricity. It includes computers, consumer electronics, etc. which have been disposed of by their original users. It can also include batteries.

E-waste is of concern largely due to the toxicity of some of the substances such as lead, mercury, cadmium and a number of other substances which are harmful to human health and ecosystems if not disposed of properly. The unsustainably rapid turnover of discarded electronics and computer technology is another reason for the need to recycle – or even better, re-use – e-waste.

What will happen to the e-Waste?

The contractors will separate the waste into items that

  • can be refurbished,
  • can be recycled and
  • must be safely disposed of.

Refurbishment of appliances and computers provides jobs and these items are then reused in needy schools and communities. Useful, scarce and valuable metals and other substances are extracted by recycling, while toxic e-waste is disposed of at special hazardous waste facilities. Examples of potentially toxic items include the old type of computer screens (CRT) and fluorescent tubes.

The procedure is as follows:

  1. Ensure that the items have been properly written off and dealt with in line with the University’s policy regarding the handling of redundant assets.
  2. Remove all your data, private and work related, from the devices. IT does not take responsibility for deleting or backing up any data or for any risk that your data might be accessible after disposal. Your device should be completely devoid of data.
  3. Dispose of e-waste in the yellow bins at the IT HUB (at the entrance) and IT Main Buiding (inside the service entrance on the right-hand side of the main entrance)
  4. For any further enquiries contact Clive Layman at Stellenbosch campus, Le Roux Franken at Belpark campus or Kevin Vermaak at Tygerberg. 

More information: www.ewasa.org

 

Spear phishing attack using a staff email

Monday, September 20th, 2021

If you receive an e-mail from Prof. Wolfgang Preiser – Head of the Department of Virology asking about a “PAYMENT”, you might be tempted to quickly answer and offer your assistance.

However, this was a spear-phishing scam designed to fool its victims into thinking the mail was sent out by someone like Prof Preiser.

We are getting several reports from personnel within his department saying that they are getting e-mail from Prof. Preiser and were concerned if his e-mail account has been compromised and if this is a phishing attack.

Here is what the phishing scam looks like.

An example of the spear phishing email using Prof Preiser's details

Click for a larger image.

Please note that the name, has been forged and that a “throwaway” execs.com e-mail address has been used with forged details inserted. The Professor’s account has not been compromised. 

The message below also serves as a warning and should give you an indication that this is not an email from an @sun address. Do not click links or open attachments unless you recognise the sender and know the content is safe.

CAUTION: This email originated from outside of the University. 

Additionally there is a standard warning from Microsoft to also warn you.

This is a spear-phishing attack where an institution is attacked by impersonating prominent or public figures within the enterprise to gain access to the enterprise. The targets in this method of attack are usually subordinates of high-ranking personnel, to fool them into sending money or obtaining personal details of these personnel members.

Keep an eye open for this scam, and please report it to IT Cyber Security if you find it in your inbox by logging it on the ICT Partner Portal. Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.​​

If you accidentally clicked on the link and already gave any personal details to the scammers it is vitally important that you immediately go to the USERADM page (either http://www.sun.ac.za/password or www.sun.ac.za/useradm) and change your password immediately.

Make sure the new password is completely different and a strong password that will not be easily guessed. Also change the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts.

Contact the IT Service Desk if you are still unsure.

[ARTICLE BY DAVID WILES]

Phishing scam: “Proof of Payment”

Friday, August 27th, 2021

Over 2 billion people worldwide have purchased goods or services online during the pandemic. The danger of all this convenient shopping with Takealot, Checkers or any online store is that people provide their credit card number without diligence.

One of the most prevalent scams NOW is called POP or Proof of Payment Receipt. There are a number of new phishing scams with the subject “Proof of Payment” or “Suspicious Bank transaction” at the moment. 

Here is one such scam that is currently being reported by personnel and students at Tygerberg. 

Click for larger image

Click for larger image

The way that this scam works is that the scammers are trying to get their victims to click on the link and go to a specially engineered site to steal passwords and login credentials. Often bank account details and cell phone numbers are asked for, and this is how the scammers get access to bank accounts and can do SIM swaps, to steal money and personal details.

Notice how the mail details have been forged to make the sender and the recipient the same. This is to disguise the true sender and to bypass the mail filters which would normally accept mail from within an organisation. In this case this sender used a “throw-away” Outlook.com e-mail address and then forged the headers to change the sender. In this case there is a possibility that the government address has been compromised.

If you get one of these e-mails or one similar looking (scammers change tactics very quickly) please report it to IT on the ICT Partner Portal. Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.​​

Secondly blacklist the sender under Junk mail, and perhaps even block the entire domain. You can do this by using the Report Message add-in on Outlook (available on your toolbar on the far right) More about the add-in on our blog or you can find the instructions on this .PDF

 

[ARTICLE BY DAVID WILES]

Extra layer of security added to campus computers

Monday, August 2nd, 2021

Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it’s essential to stay informed of the various risks that exist on the internet if you want to stay safe online. Here’s a breakdown of the basics: 

Malware, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most common type of online threat.

Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.

You’ve probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop (Figure 1). Don’t worry, this isn’t a brand-new type of malware. Stellenbosch University’s IT department has added an extra layer of security to campus computers.

Figure 1

Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart (Figure 2).

Figure 2

This is because the malware will sync to your browsers profile and will be synced back to your device after it has been removed.  If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on the ICT Partner Portal for a technician to assist with further remediation.

[ARTICLE BY BRADLEY VAN DER VENTER]

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.