%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 14 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250727183529+00'00') /ModDate (D:20250727183529+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 1420 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 547.016 521.469 199.718 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 547.391 520.719 198.968 re S 0.773 0.773 0.773 rg 61.016 562.766 m 550.984 562.766 l 550.984 563.516 l 61.016 563.516 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(SUN-E-HR SYSTEM NOT AVAILABLE)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Please take note that as a result of critical system upgrades and maintenance, the )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(sun-e-HR system will not be available )] TJ ET BT 213.557 626.431 Td /F1 9.0 Tf [(from Thursday 16:30, 15 December 2021 )] TJ ET BT 61.016 615.442 Td /F1 9.0 Tf [(to Monday 08:00, 20 December 2021.)] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(Should you have any queries, please contact )] TJ ET 0.373 0.169 0.255 rg BT 242.618 595.453 Td /F4 9.0 Tf [(Wessel Nolte.)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 242.618 594.302 m 298.130 594.302 l S 0.400 0.400 0.400 rg BT 61.016 576.964 Td /F2 9.0 Tf [(Posted in:News,Notices | | With 0 comments)] TJ ET q 159.750 0 0 225.000 391.234 421.211 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 242.6177 594.6202 298.1297 603.7777 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (mailto:nolte@sun.ac.za) >> endobj 14 0 obj << /Type /XObject /Subtype /Image /Width 213 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 8339>> stream JFIFC    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,">!1A"Q2aqB#Rr$3Cb%D-!1AQ"aq2BR ?D@DLT@U2PL" """ """ 꾖3QZSomLvKvNII4-owj͒9᳔a bUuIhsgrXX;QT>IO1G=ǸwUe95k4"ՐkK_g 7tR3H`O+A%&#kufY|=x& NA'~V0Q>dTsT:H >.윾T&Y?jXK}c+k#OMzk$i^Iܜ|e+Hdc/a'@2( bw_C" """ qGZXYQ%G2scCZI8hZ_hjSY`0;#d}..vv]F-}e4SpzHsoogyjz7-::$r#H؁ۮӅ>5k ˆb-{Z.؁Fxfdu !u492ǻ쏮|{Ѳj;-MO r&\^ F+S^ER39FLӓ=yu +5`K4n:%U6ljw )/iL(Sߑ5(ދM7.&k H* v3S|/q*Ia?> ×'#ߺ sH-p#RTVuUqM^=GҶGKQ44|$-:|T[zyeE#Av9?S늓eF-P 'G=^$R'HӃj2.oG %Ls'5zD l$ܯzn j>,˾'`&h#ӪNTm3-y?kulv@Lgt1SeU}5J4<ԮU<ֺ̻:*g WFq L,MnR۴eϝ26FƆ0G]ה➵LDa*f"~οqVTGQM3C3+ѺNEةsL>̬x/5'".D@DD##uEtp\䓒rz-Nͨ,5+%3>8[=QS:Ѩ;LPLvp>!nך/Pz721p ,:fjdn&.}С{&YkԖ9.nHkG?U8Nm+x~%~I'F,Z 5ฟ@ ~0\5SMRTԺ]+9fp$sw5TVIw s,WD9p8=z]$=Ӻ\arr5To t=DQ=  9rq54` EiٴTW]$ nj8gZL 6πbxfrrGN\CqnOe>3:1nl46Ni7nKpvc=SSknp._z~ڮRDvs@;f'-?fsy|RNr\"9(ʴZO 3굵ݍ/topɎ&?E|Vkil֐LԵğY MW;-cĝ-6u.?)W| ׶ Al #X`=A]e.[:YdfCtޗcto5-V7Dq'TUZzrNp6 3P0hIm)sj`|cjyrr{n2HEϭtTUO 8vqݸi8;ζYh7@̸VzdUŝyl^:޿ѪŽb X[uCidg{ 4TxmCN@~79PTf˧#tme#&!%= ʚڶϦm5lp.4w\,씔|G_ȶq1PV6;=Or*v|AW^m mD\D@DDD@Pm]4yYvMT ϒ,_>QSuqCuJֲHOGQ Wt!zRv/8J/2/{WerȣϢ_[q,FۦXYEX#݂0>%E}EQlh%燻>s_TU^A-D+a8\.ڂK6><]6Qn**Prѣ :!dk,BO-'U<<и PViKK0c^i}+W5ausVǒM- ûROlPٝ- /5j*#p m<w(NU 9 ˓ .Em5{]U> ֥ϟhֵ]M/|79a@F ai4Zs~Yk6˕4TS1tϽ=O] ÄZWYOsha >]Ԍ 8]_+p.\zbIolZ~Pm p=MC,FpAnYW,Ԗ}){Gc,jGhc`䬥-m=ŸƥFIhsNFAYYe՛ . mXX\7uSlmLux>_\䤩,vkOOusӂHM>>Bg5 nyF-!OS.ټ{Gw5}jmo2=+f?Yz2"s(jS 8cٴBw?lw9XY2ʟ2N:Ll *(z'ѽ̣w|VrnW^5o+fo'fj鯴Xg/g? 1-fd}5oEPrP}ӴbgY6g8W.T",(ܗ".`" """ ) ijifec1W9{;">ޙ+W-b,fcJJXHu: {_h9:s;]XFFiltCv$SI dvpC3g:g;&kCWT"O& ;PBeu/֞Z_Mo%WPi褚J܀lu( 4O"F^bI41ֲL\NppvEzTkUsZѸjC`dViGXF9ytiVhnMViQ yhhq';S97.LVY J~xޗ^Qe)>>ŠuPUS=;ȥ H') E5*Y31F Wb<d>'O矿dY{Oy""" """ ""Xis=OHl3OE>ϊjTiL":esw5cɊ n$a.7F}>Woԟ2%u-SG᚝[]?HC+`U޾L?z&X?,ڢǴ\`o w0w -&I'!D@DDD@DT;ւIu>/I-L*[IXϣG#X2JIM\%p\{~ U3=W=nW:[.5RT?+^UʜM|˕9W gܯGS>tN]ewG*r9)*:uijG<׍pQ>:zP,sC.T F>T|x$cΗ_mW*t ӷӼ+G'rtcIMѶ=>胢/S""" ""иݤ롤 vb}? |$ r5{_OHfl7Ju|yd,*0I$T^2 'ߖf+ECSqTJFǣMUe5f6| dwavWVKCyԭ_aF+Y}9eNY-<(U1qT>E.4Yi/Ft֡¶LV!kr$bOx~j|+Ѽ(bjŮ8yFqUR8zj^NiT{*'E4.,{Ob"=OL8g6;%P؇w{| ,a}0: FBt޿i[/R73[Z\aXO%*rPq+@?w4ZH@[,_*HYTTwZ;-$u Q;z(ƘMi]>'QuS:(iDݣgɿԨ*9dl\.X\A "wS'|O_ӑgVKF~%d e.CM9L?s=-j=*v܇K'hٝtOk8a`cZ=xR_Xw)|.DE4D@DDD@B >e\ѵ\@*'F=#B-_Tө{M5^0'`VoO_}~JΟ>g=[^N9>jo@-kPNVd*oRZecE4zNh|b<;zaP *!G>  " """ ""zv*2GI5$~i`b慓Bhs H=^`##lds*r5A2ӻOد;E{ vI~dg#=guES'aŻz/Y?P\~uwgYQS068'pp+kQ btL"L""" """ ""FB "/YLUthۆ<H+DLxce]47QVF$> +bl16ִC8QYg舊q8""" """ """ a0""" """ """ """ """ "" endstream endobj xref 0 15 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000589 00000 n 0000002061 00000 n 0000002173 00000 n 0000002288 00000 n 0000002408 00000 n 0000002516 00000 n 0000002644 00000 n 0000002718 00000 n trailer << /Size 15 /Root 1 0 R /Info 5 0 R >> startxref 11225 %%EOF Notices « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Notices

Phishing scam from a forged email

Thursday, May 14th, 2020

We are almost all in lock down and less careful with cyber security. The scammers know this and are launching numerous attacks taking advantage of the “work-from-home” situation we find ourselves in. A number of personnel have reported getting e-mails from “Prof. Jimmy Volmink” asking for assistance and are not spotting the tell-tale signs of a phishing scam.

Here is the mail:

  1. Notice that although it looks like Prof Volmink sent it, the email address is not correct.
  2.  Secondly Prof Jimmy is a very approachable person, but he is always professional in his communication so he would never say “Are you free for now”. Nor would he say something like this: (if you did respond to his mail)
    “I am currently in a meeting and I don’t know when the meeting will round off. I would have called you but phone is not allowed. I will want you to handle something for me right away and I will be glad if you can do that for me as soon as possible”.

This is a spear-phishing attack where an institution is directly attacked by impersonating prominent or public figures within the university (like the Dean) to gain access to the university network. This is an especially effective means of attack with everybody at home in lock down, where our guard is down and we are more relaxed. There was a very similar attack in September 2019, using the same tactics.  

Prof Volmink’s account has not been compromised. Phishers are just trying to fool us into thinking that prominent members in our leadership are emailing us asking for assistance, but they are not. It is a scam.

Over the next few days be on the lookout for similar mails that look like they coming from other people within the university.

If you do get mail like this be sure to report it to IT ASAP so they can block the attack and help people who have become victims.

Please immediately report such phishing scams and spam by reporting it on the ICT Partner Portal.​​

Go to https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115.​​

Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.​​

If you have accidentally clicked on the link and already given any personal details to the phishers it is vitally important that you immediately go to the USERADM page (either http://www.sun.ac.za/password  or www.sun.ac.za/useradm ) and change your password immediately. Make sure the new password is completely different, and is a strong password that will not be easily guessed, as well as changing the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts.

 

Sun email for personal purposes

Tuesday, May 12th, 2020

Recently some staff have been caught off-guard by emails from cyber criminals trying to exploit them by threatening to release sensitive video material. The sender of this email does not have any video material, but tries to be psychologically manipulative and convince the receiver that he does. Unfortunately he also refers to the email receiver’s sun email address and a password they used at some stage.

This is not because the university’s network has been compromised. It happens because staff and students also use their sun address in a personal capacity. We highly discourage you to do this. In this case someone used their sun address on a website, for example Ster Kinekor, whose database was, at some stage, compromised. Subsequently cyber criminals gained access to the username and password. This gave them access to the person’s Ster Kinekor’s (or whichever site it was) information, but also – and this is more dangerous – to the person’s potential information everywhere he reused the email address and specific password. This includes Stellenbosch University sites and applications, including the financial and HR system. Of course, it the password has been changed over time, it will be useless. However, this remains an enormous risk.

Please note the following: 

  1. Never use your sun email address for anything except for University applications. If you need to send personal emails, rather consider getting a free email account, for example, Gmail. Separating your business and personal activities is better security practice in the long run and will protect you and the University network.
  2. Keep in mind that according to the Electronic Communication Policy which all staff and students agree to when they register their usernames each year, you’re not allowed to use your sun address for personal communication and that the University owns any communication sent via email. If needed, University management has the right to access any material in your email or on your computer.  
  3. If you receive an email as mentioned above, for safety sake, go and change your login details and passwords on any sites where you are registered with your @sun address.

Illegal software on SU devices

Tuesday, May 12th, 2020

Stellenbosch University devices are equipped with the necessary software for our staff to perform their work effectively. This includes the latest operating system; all the Microsoft applications (Office 365, including Word, Excel, PowerPoint, etc.), Adobe Acrobat Professional, TeraTerm and the necessary Antivirus software. Licenses for specialist software can also be purchased through the IT department, will fall under the University’s educational license and therefore be less expensive than a license bought in a personal capacity. These include Adobe Creative Cloud; MatLab and Statistica, among others.

Installing and using this software is essential for staff, however some of our staff use their SU devices for their own personal use and subsequently download and install non-supported as well as illegal software on their PCs.  This includes games and illegal series or movies.

Not only does this put the University’s network at a high risk security-wise, it also puts the University at risk legally. Even if Information Technology does not install the software, we are still being held responsible for it if it’s an SU asset and it runs on our network. 

The fight against illegal software and piracy is mainly fought by the BSA. The Business Software Alliance (BSA) confronts companies that use or distribute illegal
software. Read BSA’s statement on illegal software. 

Therefore we kindly request that you ensure that if you install software, it’s safe and legal to use. Otherwise it might have implications for you and the University.

Zoom not recommended for meetings

Friday, May 8th, 2020

Over the past few weeks we’ve had to find new ways of connecting with people. Zoom has become the popular choice for anything from online exercise classes to quizzes. While it is perfectly fine for personal use, we do not recommend Zoom for your official meetings with colleagues or students. Although it’s simple to set up and free, there are multiple security risks.

Why take the risk if Microsoft Teams can do the same safely?

To help you make an informed decision we prepared a comparison table of Adobe Connect, Teams and Zoom. The comparison table shows the strengths and weaknesses of each product and the areas marked in red are serious weaknesses. Do not use a product if any area is marked red. 

SUNStream is based on Adobe Connect and runs on a server on campus which is fully integrated with SUNLearn. It will be zero-rated to allow students to access the system without data costs. This is the preferred streaming platform for lecture use and is particularly suited for larger classed as it uses a very structured approach. Adobe Connect is also fully integrated with SUNLearn.  

Teams has become the University standard for meetings and is also suitable for classes of up to 250 participants. Teams is not just a streaming service; it is an excellent collaboration platform. Teams has also been integrated into SUNLearn, allowing lecturers to use class groups within Teams. Unfortunately it will not be zero-rated soon, since it is running on the Microsoft commercial cloud. 

*  NB. If you record your meetings in teams, keep in mind that the recording will be available to everyone who attended the meeting – even if just for a short while as a guest. Don’t use your current meeting to continue a different meeting, for example with a smaller group. If you do this everyone who attended the initial meeting will be able to listen to your recording.  Rather create a separate one. More on privacy and security in Microsoft Teams.

Zoom has become very popular largely due to its ease of use – but therein lies the risk: security and ease of use are on the opposites of the scale. Zoom places the burden on the users to protect themselves. Two South African ministers have found themselves in trouble when using Zoom, the latest being reported 6 May 2020 in a so-called “Zoombombing” incident. (also see below what “Zoombombing” is) The University regards Zoom as a risk, and will not support its use.  

Also read security expert, Basie von Solms’, article on protecting your video calls on LitNet (unfortunately only available in Afrikaans) and Computerworld’s article on the do’s and don’ts of video conferencing security.

 

ZoombombingZoom-bombing or Zoom raiding[1] is the unwanted intrusion into a video conference call by an individual, causing disruption. The term became popularized in 2020, after the COVID-19 pandemic forced many people to stay at home and videoconferencing was used on a large scale by businesses, schools, and social groups. The term is associated with and derived from the name of the Zoom videoconferencing software program but it has also been used to refer to the phenomenon on other video conferencing platforms.[2][3][4]

SOURCE: Wikipedia

 

Phishing emails, SMS and WhatApp messages offering payment relief during lock down

Wednesday, April 1st, 2020

A new potential threat has emerged as we enter the 2nd week of the national lock down and facing the beginning of the new month with bills  to be paid.

Phishers are already targeting the South African public with so-called COVID-19 phishing scams, attaching malware infected attachments and encouraging victims to click on a link to download “important information about the COVID-19 pandemic”.

However this week’s scam involves emails, SMS and WhatsApp messages being sent with information about “Payment Relief” from South African banks.

While it is true that most major South African banks are offering payment relief measures to their customers, phishing scammers have grasped this opportunity and adapted their tactics to send emails with content like the following:

“Dear Valued Customer,

“At ABSA Bank, we realise that this is a difficult time for our customers and businesses whose financial means are being negatively affected. After careful consideration and engagements with The Minister of Finance the, Hon. Tito Titus Mboweni, we are pleased to offer you, as a valued customer, a once-off access to a comprehensive relief programme. Please click on the following link to see if you qualify for payment relief.

VERIFY YOUR ACCOUNT

This is a once-off offer made to selected customers and will close at midnight on 2 April 2020.”

This is one such e-mail, but similar scams with forged identities from other South African banks, as well as Whatsapp and SMS messages will also surface. Note the specific deadline and the call to verify your account. Your bank won’t ever ask you to verify your account by email and certainly won’t give you a day to make such a decision. 

If you need to make use of a relief programme, rather contact your bank directly than reply to an online message. 

Here is a collection of the current verified details for payment relief from South Africa’s 4 major banks:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 [ARTICLE BY DAVID WILES]

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.