%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 13 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R /I2 15 0 R /I3 16 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517053133+00'00') /ModDate (D:20240517053133+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 3342 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 13.783 521.469 732.951 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 13.783 l 565.984 13.783 l 565.984 745.984 l f 45.266 746.734 m 45.266 13.783 l 46.016 13.783 l 46.016 745.984 l f 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(EXTRA LAYER OF SECURITY ADDED TO CAMPUS COMPUTERS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it's essential to stay )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(informed of the various risks that exist on the internet if you want to stay safe online. Here's a breakdown of the basics:)] TJ ET BT 61.016 533.055 Td /F4 9.0 Tf [(Malware)] TJ ET BT 96.530 533.055 Td /F3 9.0 Tf [(, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(common type of online threat.)] TJ ET BT 61.016 502.077 Td /F4 9.0 Tf [(Ransomware)] TJ ET BT 117.032 502.077 Td /F3 9.0 Tf [( is an emerging form of malware that locks the user out of their files or their device, then demands an )] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(anonymous online payment to restore access.)] TJ ET BT 61.016 471.099 Td /F4 9.0 Tf [(Adware)] TJ ET BT 93.524 471.099 Td /F3 9.0 Tf [( is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your )] TJ ET BT 61.016 460.110 Td /F3 9.0 Tf [(behaviour online so it can target you with specific ads.)] TJ ET BT 61.016 440.121 Td /F4 9.0 Tf [(Spyware)] TJ ET BT 98.033 440.121 Td /F3 9.0 Tf [( is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank )] TJ ET BT 61.016 429.132 Td /F3 9.0 Tf [(details and passwords.)] TJ ET BT 61.016 409.143 Td /F3 9.0 Tf [(The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.)] TJ ET BT 61.016 389.154 Td /F3 9.0 Tf [(You've probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop \(Figure 1\). Don't worry, this isn't a )] TJ ET BT 61.016 378.165 Td /F3 9.0 Tf [(brand-new type of malware. Stellenbosch University's IT department has added an extra layer of security to campus )] TJ ET BT 61.016 367.176 Td /F3 9.0 Tf [(computers.)] TJ ET BT 61.016 347.187 Td /F3 9.0 Tf [(Figure 1)] TJ ET q 57.000 0 0 69.000 61.016 266.989 cm /I1 Do Q BT 61.016 249.198 Td /F3 9.0 Tf [(Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the )] TJ ET BT 61.016 238.209 Td /F3 9.0 Tf [(current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart \(Figure )] TJ ET BT 61.016 227.220 Td /F3 9.0 Tf [(2\).)] TJ ET BT 61.016 207.231 Td /F3 9.0 Tf [(Figure 2)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 76 /Height 92 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 3 /Columns 76 /BitsPerComponent 8>> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 5185>> stream x\ktSǵF/ےmɶdlW` !Y-)I [+5Y -mr聾N&8i5$-4ʦI'8i`2`C#[3[XG6v[gyIsf={{F&uI$ Pp䶒\5jWi@B*- tO oi0G&yb^:HP!1Ji2t49_\ `N-S7$ܨ&_BBB+/z5=%oo)$ @BX844$WBV ~63;Z#~IL %#-l+~BBEzNJT"MK$ݓa͕8^}ڝϪX*qGfDmA1]H;b9%8R(7g4{d4CGFud”rN#ҧʋ0ҲYgtag7,.LONە̒XR27Ǽ[H`F,}pм +Id D+ՊېKʒu0LxM$^z2BG _ b$ԗ 0ⳋi1%9)&NS3$gV/glJIʍSsf'4_LDZd}n?1gMXi"BI]-H_)wҢNK2'-AQRX~cK/ydFi+I'pVkO:6^v;thP:4(jzިڬ '~Q$BS2w o2zu,]-, kj;lK+#Eܼ! p,^̟| A њ4H} ~w֝ ]9a9KRuNX 9xo=hvh_dU9" zc+|cKK q._3;b夾Ǽd J˩p/g- 4n;pS Pb/[38c^i`CDJ3U{23.!B`Lÿ yhv`KBiO%Υ`Y/REfDH %äX!. v+Ҍa!yy Z*lqWw.Iі^Z=sftЃLU29< q,_'?zWD_]DB9T"_udB9TJ]ۋ̞ cg N;4aXF!^4g%Aʲl)eYJYJ)Rʲl\_韟CĜ^&.N`Ǚˑ|)0h5lIp¼3|1:sLӇ@PշGC vNR.\q>Bzn\.gGw={`;iꫣs҄ v8sYʔR<(,YէBǛ9[5J F%)FJA6kdHU_q3GF*BP6Ɏks1QM&'N?4V vZvyk7?FU9C A!)&d>u1> -T,JcC?zdy)U4IVeѣӯ;pC C))sPEʫ.&q sL^}˩<~Tyť3ڎAeN`BI eӆ%եޑA&7' !O?;)B)e6v-\Z}Wd.˻%ސB _JUa8$RRtΔ/~?xV&M&q*WO0n^KДLYeYR69lO3C-H_ ycqL/{K\A F;_IҌE=ۤV4` 9 q4*54P+W *J5=oF&샍?Ku mWe7wZa9a5n* Xhw'8RE ijaYmrw7@H^zZA{3_fcp?z0؁!\hC\;!k[*m-J lt*#lp9IE,R*ƞySVزIͨPjӁ^=Gu}O~a]ຮSljP-Zni.{n-O2-YmdfC۪K7ͥ[n5qql cݲnYDVwBqkGv]OYgCߺ\ԊzltF"}*ηAU$I4sJm)C'3*gmG0>孚x?q .R_G­f[|ӹ-ƭ9}W`5pY6 /, եc~GX-~kZ~!m=J $_Ye|4PiZcg`~4QjҼkJ歷6>ZE}We. 9T um tr)dejRJʬ1, Z(5pM+a~TNa <5G^:Iw%)ң5ͿL^@ NJ5؟7l贄mG[+:s a:Tgs*+PizGҷA ӡNftzCLsRO A듊h5 YHgK(%l_ͥ0C*5 9z4b[? Gw]k>ኚh 0:$q@C'2_.D0N0NIvR f@ErPKƫf00(c#_x>)J J5tz U dswI$gWҤRQ@*2MHxrKT/gzqIq%jt?n\$Pr-K/X?y^Q1)ܺS{Ɋ=MZr#_pvp⦲ڀvSJʲ_X_8|X;[7G)\]H8AN3K'J/;O⮏[o١2L9+w=ʍǁ"S XSR/0w,+yi0La ػ0e*@uӠ%CQN",=oXs>,Ӟmy~vli+?e}=s}sy~cVkOCI vzdӰY)t_f@48R ]); "@t0#4gd3&Ju$ WXNa:J5-$@$+DPJbDE*(Չ!JOB A@W\3u,8cU!9WMt"@^d IB̂aըo?0BS-6̓ )(⠗2$td Y c`&iLt endstream endobj 13 0 obj << /Type /Page /Parent 3 0 R /Annots [ 17 0 R ] /Contents 14 0 R >> endobj 14 0 obj << /Length 1319 >> stream 0.400 0.400 0.400 rg 0.773 0.773 0.773 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 479.539 521.469 278.445 re f 0.773 0.773 0.773 rg 45.266 479.539 m 566.734 479.539 l 565.984 480.289 l 46.016 480.289 l f 566.734 757.984 m 566.734 479.539 l 565.984 480.289 l 565.984 757.984 l f 45.266 757.984 m 45.266 479.539 l 46.016 480.289 l 46.016 757.984 l f q 225.000 0 0 182.250 61.016 575.734 cm /I3 Do Q 0.400 0.400 0.400 rg BT 61.016 557.943 Td /F3 9.0 Tf [(This is because the malware will sync to your browsers profile and will be synced back to your device after it has been )] TJ ET BT 61.016 546.954 Td /F3 9.0 Tf [(removed. If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on )] TJ ET BT 61.016 535.965 Td /F3 9.0 Tf [(the )] TJ ET 0.373 0.169 0.255 rg BT 76.028 535.965 Td /F3 9.0 Tf [(ICT Partner Portal)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 76.028 534.814 m 148.550 534.814 l S 0.400 0.400 0.400 rg BT 148.550 535.965 Td /F3 9.0 Tf [( for a technician to assist with further remediation.)] TJ ET BT 367.438 515.976 Td /F3 9.0 Tf [([ARTICLE BY BRADLEY VAN DER VENTER])] TJ ET BT 61.016 497.487 Td /F3 9.0 Tf [(Posted in:News,Notices,Phishing,Security,Tips,Training | | With 0 comments)] TJ ET endstream endobj 15 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 243 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceGray /BitsPerComponent 8 /Length 515>> stream xA 7 !Stk:'fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff*x endstream endobj 16 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 243 /SMask 15 0 R /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 3 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 31839>> stream xwt]ǙYU72^~D$, l===gwfgfsf{LmwOo-K,+ T(b3$2rjx EْaIwx$n}K}XU!Gbbių]Z*9B|W EKDb21:AQz.0뎩&&sgPB G1N侉pC۫~B]T}DkM=R#WjA-Yl0)j䗿P1낏>θDQ=kβ\Bay!SC]UKH;΍pJr﹗W QѹKsBHQa Mw.BmK1nKA SV$a yXA4}U=sPȶt^44ڗ.g7?d9_7[nWX!0&Kcdة!GR щMe*<BIJ|Md>" Db3jPoT~{FTd!ǂR8޶ݶlJ'Fl ޼־LfSv BB!HSQcPgMܗ˿8! EDAY7Bz .\y3Ô#,_B&*x@[[6OM‹8Ftx$B EAa.w₀MIIJt^;o2 Ҍ:߹~CiMZydX.L !`JC^" 9|aS'lKڃ? 2JcO0^ojGZ&=5S>] !_gRik}Aj"BDSٖ-O# V!hκE3T KN.Z#EAD3|u5i->8ξl9hHbK+cM+>I48־tu|Xz{`qQۢ|]=m6^ iڵ:,K6jsFh]z{M2  mKڱHSb̖<2K%$XVa^bY(eZ[5G.Z|z6GD N5n૪ђbW'xjc=id4U[,u%Dp s\e[h*F}en]R)bSs7Uqw7YhyHh+Ji-\F"\6@\ETEhh?F ùz evMYRZ[k7X!.\iiiQ}܇EbWq%@llV46i[KK{"+(Mv+傡AQQ}g c/a}bY``~^jLJZIJ'm[D*+mZ|smFDFKC.. yFg2|MMvO/9Ml\(z.A53 B_Yxk0\'{L@Q*w[lz\vFO$[XͯcVMĉ:Gs F6N+z.W:v:46CZ" ^:>wۃuGhTqmҲ[,Jg%EKhэĻoW,ͭB}(=o{m\2AbU[Z*#+Z"SC,g[DfǏ} ŬOt=#wS@R<00s\ (.hr3 e9׬BRo/qW NH=P%*쑃Ro!KwOt)R͹~Q,wbNJUz&8fH%Uk cGAz.D}:k'r9֮ffrWOis.e9; 5um CA5ײ@bg' ږ82+ie:h$h<$WƔhqHQ,ð-i{vnBX>iin>x߶l9+V:V2  C#)?ep7`UzTTFn4$ e"(--ƵzA\YQ(0.wyy_hlt-')dHe ^C!צ hXCxful`Rx`̸LEei`@RIv8 XHhT̾ݬcij47;:z+V&k8ζ=(Q}7FG ٷdȫ*hD KVU-NFvyxF_'茖`, +K=@uI; 禭|Mų]B:oJynJm0 .o;#uz*^zAOOڗnmRP`>56& W|N+Ů.RIz2ʉ?1 HѴӅ,X;o[[ZŲ "1 ıX>DGoY [[[ĖV)Zhh[v; iD! B7߰-^v˼56Ƹ+R;>*0!p˲cjd.Ay- 0q=6y-b{{ǝ;r_w}#Ӓ ->D;]ۗ-,%j$uߝw7]g_r7lFK%CR),K呰P?ϽiwLt`lj2%ݕxg.\7N.\ P}F> 3$۬[o'U55ep@OMÊ%T.\lm[iZM}]{sFXS^=K}=q<80;z.Ԓ-G~wW([Ƶ~ OF͔ڌ~<З?~lj X%P6;_Y%j,WWSV<88 cMC/vmKTjhU5cy+ _]CX `Y2)'Z!F WUM-Pq.\I[D 깜<4eC!C0JD7( !McE|n|~h  O|)Nyp"WUi22- ^@K&3:6|ef**z>Fl @Y,R_/4~X #T W"#( 4_UM;N3n7_]%IK&@q u, ) ERIFTۿ;u,I9 Y@g DiZE W`Y6J%Ţ<ЇU X@hR?ZΎ0;\?'l^`Οo_J/9aE,KY,F02T &fY"5#S|7[%l(d[z[S'G~/J4zYig0-*gN8gܿ!Ly .=3a\Po:k?(~ {%7)JxU2X*+?G;]RPSiL)c\+?mtwM1Ri}Ϛ+=Bp( k0gJe J 빜^('_"x=}z&2J)1t?@t=wPY,ˆ"ϵ8_;>gcg2z&D cK !Fd\qd8!D33V|-(Ǿ&&s\0d_B͓f&&s!EUiԳ&&&d̉9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB94l'F;!i{9IJu'!z> w$_g3z6KU. Xd~3}V+F5ulCә!V3{vR [h|}|B>+z*A.tG ;&3ec0rM:rB t\zK"`]W"#QC2{?a F9/sQ,|n/#Df3uʏjZ3gQ,I7<V.s9@ du'!xv,B^)ɗHK Ӟum] 2~5MlOY,SCv[ljSR|QcBuͦO?Ʌ+ gmKmcelTňaP i(~? DK1^i8`YƲ,#~tB IRGZ& !d<>.eJب@h hTK%`(tJjJdKSQa\Vh>?(-w_U2iyhqh%]8%S'$5LZFP6;7^ BX!E utZ..(#FUVbIŠ f,uexH/`HK$DZ @i@xY41 -P1( pJ-*>% zs' iCKʾDzS:6xDQ Y.RTI~&$McE){d**DK%++%ݿ\z1 L BW;Vݝٿ׺hqfn(׵ B=olS##0e?x={ú;rh_s]wķf[.pd]%>x/#G,k_*wp'|ryou&2wJk5+?GYm;ܑCJ4WV]%sCcq\l G; ?oRN鏝6xn5+Rig/]|[jl,5d[+nڊKVdKCc[=Z.sZ*yITO7SI}旎k+Cȯ}?7K/vo>ouOO}@ У₶sZ"=҅ssΝS>yXm CO| {v>sZB)a䗿p|1jB b!x?@yI5[[K)(]U~J ,+шקbI@~ W`̀ 6D}:rd޾T<}q{ACv|8o<@t 1^a`E%!rӖ%TĻo&67;XS;?JuuXUn%-[A ek;oGζݳb ڀR}ֹÏϟK}~❷@QTb-ԒC^yY~''?ܞxWbUQF)ŵZqA2g<4DV9X\kji:QE5=ʟ찵/.^R:=Y?hd7ovznնxJ~?`IkFǚF=ÕU)%'m =[o%nf낅ֶ6>4捏D%XSLXSȰ0oλKSڹC\FW/3UBiRυ}XQ(EL>)Jl]\^lmE?k e֧v~=|r]2jD-Ħ&yh({'pЭmBO|@41Db**BO|Ghht*o/| al8wضiƹ~gj"Q:%7_XFo(Pjbso^mrypt[&&6J܆$ٖsp™3+mK Np~?R;A 3YQ:Az.S"rWF 6 rM9VM@S0r9=@yxà6J`]R6kxLK$EaEGUXW>) ҌmRDi)`\nm ĦٳJdJkXU^|^KVٗd~JXX3wܰqj wY߱jsAli44k8yRvXWB\"ٌ\|=<΢X  yd>uBmEyK)Ҩ M: iiFa\刮cY,X<,wAz]F4CYD.A,] B BbU:%X!B(r!  :@,u1hln Yƺp}rЀPS HY,# d}~.z)ͶUp0_YyEz Pv;"5@@\ v=76<(KK i-ϣDQxHQȰ@㑔8ODŋgccw,vuN'4E& VkmY-z<ݙx7m}I3l\) :gW'xVY(rR.S1_u~M^(Jn[W).ӈ&?@眫^@HVq P]sicH4 1uB"DYbK+SQ,}r-(WW3yqA}J.\ȇD(պpPE[)b>u|eMf.׵yBi[N;\0d[cBy15. 4t3S\8 XgB3g X 9&&_M9@.\dHRљ,^pt<~zIypжxɬ;~U]'uHEP[[ӻvZ .b]vv5K}Ėl[#C'8NŮ.J-M!1՚DM 孭MZJtĹ.d%i.OkߐZ=[o{E'rbXmwB&U:z&|K7cE)>hL6sz۲ضW':B L[o>h?4/V?%$ٷ'5DR6g9ls?\>LY"+{gz.} c-Ւ VS\RC(k}D}:wи iv85Bq_U!4,y?]pp%Q|XG (EK!NjxL,SA<d~D@ CK&NQeҴQ*i8xaYRc1.O/] QCjeLEEy֚Jvir{Mٖ-gOEyyJbѐJ\ѹv4[SВ⹳\(l_;m pX깠g3|e"@sG{u-o=yZd,M#QܮFbsKT-"nJ"``ijRZ"ak_*kDѺgtqBᡟX?we E3?.tA,Wf-݈j\wwCc/$.i/=+^omK .8~jinr2ӿ45W_BI}nTDZ歈e&y[K& Bx<p1l])b>ǚ5Ȱ::fJY XI蹜Q(pMa$XKŌg0J纥Ǫ|l !RsGep<22l_x N^y|ADB0y5)mr?.h tjbƛł%iƒ (R_O˖o‡e!*Ѩ"3'1LhE3{Ķ8WW[.ٝxs}2£(VNΜ-eOЈEF`+^y5Z2!:7\#6;?ub낶̾^a}>6{EXq y9zs0 4)f!,5mг=\nٷ2.WGFKcO^OJz;#7=\6Hr)]QQWzT Wږ.㫪h!C[Q6+UU%69v%+h-3|qDU2{bF{nŹ~iߧe:׮/v3׆@??C5kt-]Ƈ+}}Y/1aq3 ) D&3 Cfh D*uwYZZy 7aC zA4h22x:>el Ů.5Fl]ÈX־4w} ki[hsedxW8yB-\SBmQ6F @ >?y()/\:ĸ\|u-8jcR<эq ȳ 0~!ɨ1 _C,kX\xKfָą+1_gVJt+ ŲXL)UxKK<1u$6rFhz`)x&ABpyF,O1mD ø\q>nm[ٿ/ֶB隿\(|yhrijj!=U|Oe!АWW_:5!?X !*q qi  IxϜ0\F&g&(,46UGkw{!wo7 (%d>y}R<{VFWN(䋝[.ljbJSBm]rcGېRp^*+`PϤ!M+CF.Gt]!S^LYL ݛEy*wpdXTRɲ7yhPv-2z:=t(W^G})BhJŢpz.¤!VU#òL۝ߏhs˭|0<iBsV_p:6j*_sͺbOZg)\< R0^gB-[.޽(hI ݵzBaOU>^ub{9- M6^ (*k'm+hWߞ病/J !8֮|..ܴպpQy-Yi} $B]= A)[OiwbXv(fc:vn sf\0&̫MͬW1!EsQ*-p0lA|U <(eɃbqn WY i{f-eyn}G[5P4P(: /& &W%AT` )jbXQ E]Η%QTx /vb&LHQ& 6L}V&.[^.3Eb3 ռ|G0# PW,G_Zhw>:޾_.>E S47/itvSUmhhDkZKR$)L2tf|J%):}Ξ;Dq^oo: G\WTjj*OjWq\YBH*I$S QVWYG⪢z<9ӽ}nXo[T&٬^_CӚ'L&+D:y5MD!O-T*L0&_fs޲ee~``v ZtT*c^\5 Jɴ(Z J4d|eMSu``0 nA bt4f.7l>O D^AJ%i,TcX,< YxWZk8l8NjD:4]dU;lD*6CQjX"_(lրߋ1%(f٬bF+KLvNU2B0ͻ+<Ǎ( |>6/.¥iz6(*XEiZXIX,^*.O!1Ǔ;v  MT&HZEccq@0h{>afz(!ehfY9]UM<ӝH$*C>pשS]{ 75}@UUɵ׬mkkٳgR8r'Nзw!eO>(⡃>z8ΛꪷoߕNgec?0[ʲslkyPxs{ & qSΟݻcBأi:dK:| NXppɒ;E"Q@@2xӖ͙ln۶t]iܹy3Xu&)zT煞}Z,ϱv(7A+Wϛ8Ƹ{TU[_'6oڰhQjǎ"3Ys[1o~""p\n׶mf29alq8DZ˖.fXzt4GS錦jskKsôBa8fb{k;i[ljj߿4M|oS'N(J6lXG{Eex8R[WT4cY*K/`q,[]DGMV\z}C_z*Lҝw<E /i7pX,~' $IV.s8xPȿrҎ{ljFco}֭Fmܾ}W6]׏?)Z-[nIJ qv~/P}@Twgfef*+7 ۶mq^}O8?ݯV+Gf}WƁ>?s[߶mcw /o=żwz[ɤ_?pl666 ]kmj5@xKZnܸU\fs^'do` \ _0̙K.57׎Nҳ6Y75^y9Nx2*XLG*-t$- 9zvVV::/]jrm7;^R!^ܳO;ECc?rc8c~so~k;o>Ƒё N EvزiSÏ:A/xz{wπd̥69EMMo,//;wlٻg{'_ٷoW|f\.vZ;wn4NE+*J׭vO=e||I3UEE7ޭnX\쮭Ͼ[67nۺ!˽AE96ݦP(Hm6NM&CCoRB!dDL6˪T h(f9" /++p {l788/ L(^~]Q%\n SS`0X,0r9-Qj>EoS %gHi5l6'Je㽽J3 ɅElW+*TJ~%?tw=wes76dFbhp{ ia`x_P_P{{W6UlVTUF>2:hZf9^ύOLT:6aMu޹}Z V1iYzv-FRzѠz] `ЉE֩鹁X4x"Xb1UVt:mQu> P]Ui|ŭ|s0 zREӔJPڊ,%%Fr9C#Wsss LVe2Fw(KE!@P A!$A fqUe'&{䡃{kk*}l>OI[**|g\}X6_a|.KFEQd]]塃Ok*A*<(Z,7|bzjՕeL^Kcy6q6l0]ow%|>)8=F|:дlu4388RWW؃5 [6/[:55ZblܺuCYY1 0Qd2%(dlEZFEcq#L$S4-3 DB@"XGQX(B˃ϧ| $A@Q Mvmz@&C8e2t!IIg8iZI! (m(c(E B?otZ\N/CaxAg2Yrr,S;{.\l:|ijpgl[j(Qr7ۻZZn{橺P(,64}TV%B K KGB j?R*Q鴹9M$B'Lƍ[uuU&?ofj 0PTuAeEVD2Ĕfx7nv {|>/R( PFp?q|UEQ_Y1aC;000l0A{s.gX,166YQ m Fch4*uw;E2g7nv֯.YrbjJViABDS!L3LSsNೳd2k4ꓧΫ)va2#E*Ek*ϞD(AiyK!㝫xׯ+ZRNt `JJ<7ov?qčhpy9<2FQ㜘Z*4(/AKGw"dho着*p:?#AN/w c\./j4P(RlCО `y~\˱TRGoi0x~r!'8~I=@ XpayRB TH7|!{R,T'-Sl+$)m6]$ɜ4øB#Fe'dY"!u%B '"X JH"PBbyEH$G&Y]<)6ֹ LMCO'MMd%L3LwM-. dzfԩd I"J$&B2J&S vR` 0_dW/5 S. gp8N3 N\Ԕy\ }5Lvzh)T2,~L%'c2{Gɽu"rW寸I\vY)D裏}k#Gp<˱d;+Z/,cEYq V\Ok 8jjd^}A.Ud23P^^h+b?;0 p0F!fF.э(;b8òl_M֯S*}}CccA7ج@ 8NOK}ŴM (25=jk*Cc*rqq꿩:"vmu##F~}ch ! 7k4ƏOL_ڪoXըs\ީIa,8&Ɂ3L&LvttPk͛ppPݴqf?08Bt}}^eYvaaQ…&\nͩTv>Uה>J;8jٹl.: uu1Ltd&&FæM ۽ӳZz}cV"da`04<<:*FS*ƺ厚 =&SQ3/\vA7Y,i{n]-|Vϕ@Pt`sl*#I2fslUU,X޾!Z%eNMOKJp` M]Ǖ篷ڽ{^EW} nig=ժ7ǧ z.!duTA&ąVhuucS2tbmDgޙH2A6oYesbjn~` =;dM&#'?}}hx,O㉺d-aI*"@<8Nh,q}q1|<`,%:H{Ѩ(UJAFb /1;VeJ)z-9yj6g^Z 0MzۊS33e>b0 w+rGiF0E y2ZXb8,E+xg'LO{D"9=3D9AL6t:f.-ؾ Bh*mW00099EEP_[WW p\RCDQb1:EzFyN$S闿l[ۭ6_ÑXK ;/]jY0 Ģd2e1m6ˁ{45sE  TfliLClUSA"GF'ZM%VQ1fdxXXyy|6+[& | . "Fd2ByР׹EѨs9w>ܿoW}}͹sW(Jn]- v:ΟcBA.W5CC#y]QPȟ{n"Qׯ{~Mi4Gl慅E͢RP=uB)g KǵZM[[| :3g/ @hlO3 DP ʱ>ը-V֭.\h*)qc&ێ yĉk"+a4T*,c;;`2N+**NZ˲sxT*Lf#ŰBNx-,#-nkHē A 9^ ¡PDC4"L`AD a% Rt(mA0hd2 ˲z XLu:f1eZ=7 !ID{[_W5Z ï~|uE~Y,^{63fܹhlㆆu,BDV}ʭ_89PU ->'!y$ >y.ѴZa2h$n6:]A/ kGD'Xc$B %$Ik$B 5F#PBbD(!H"Xc$JH1%$Ik$B 5F#PBbyU14xOX rޘWE6P(_V8|>S!% A0 3LēF6 ]~RZ-ⲓ_%$3o-RjHDZ%!"uGIdMEzJH1%$;HGJH|mD(!HчQAO!jRQT*M8[H|Ez>: s;S3LfphzL>ϭ2eϝ:66T+C? pM6L&h2oy/;Ti-gj{CC(KNΜ;T*B{6_m]HJd WRh+NqR%JіU;FˀMD|14 m6DH$^~"gN8 ]xpLww?c`E={V'N zrrZ8hsMZ955xCCԌ\A~7tX,NӲwz!?CȕhZx~M֯~wEd88P*<'I |ejw3G7oj(yM&ի48EPd۶nD?T 󅞪 4-i8Ah-FiQrujʟg9V]U3 EJs_ATTT\|ɓ4M?S$((]XAx5ռ.Z&̥L&+FrSl6P*1 MM$>CK(K:ɱ,PGA2iP0LV4  ,Q@.:-(8巔<,L&Kilm 0!" q4MpԊ=E$!DDFQ8Pj j@V*C*Nb,!xȾýC< &V>wjYYqssUUK;/wf I @P)p6:u2nnn3.53L@j:;{nu]򒖖(*L6[[S100LQT.yA藊5mVbK i2'&fJK*RAl!q$I'HCa\edFMN;ٽg +f?{UVUv77]o޻EQB;TJDF jWe2_Wג$+*U A:n=7:gj*,M[[MFpPYU 0DQduuU@D!d$ar9o_͛̽wf ڂ`8FI0 A$0 Q$ըyRbeh,(&@!@ON8ϗ+?384\׽u1" $E DQ\:#$IHx4YM v9.ǽHw_v+gc:/xP/ kzA<ޱ}ӎV?񳇞~Ӆ$?<ϯfEcS. V1q2l.^HVm+8Ѩ/*(XQE*rNej5(@kviW*dj5oPv5u0@Q;6Q jE6+(ڬv;rY"(+jՅ71vLѨE6 UJF:YbJRZmMbpNU*սB-L & ,ˊfdm% aA>%)wr>ԟwYDp @qeEN'&&lLxaYvqqnc_#z6}聙v1?ZjӒz`Aό!yQ<H*($J|H"Xc$JH1;C -$z$$6HO‡@zJշIeL&#YHH"\(4J:#_'(Z,m"E%ϰ\fkO,V GBbD(!H"Xc$JH1%$Ik$B 5F#PBbD(!H"Xc$JH1%$ɋ Cl6d:#k"aY6N?^`84@I_< MMMƏw A8+//x<+ ! #9LʵcEX,{uim۞A@jvDE!T*&i3Xy^P,iH4O^:lv'$!D#PBbD(!H"Xc$JH1#B<yC T:fKf(_ip烩4 \4 *_ V9 C|`S)B*NZ$G*#"p8_R)'jk+{XSSanKC ~\((/%5A~B"7i_tF'aZ=}EQ!7?+$J ݎB%Zn(s$E swx 嶭:Ξgbwau2kӎIkLe2 O_:v||(mY6?22CQqA7\.J1 uڲ1,E^bfs*baa10nq"GGSlE=)<v ·F՗_HS#pTUh64n7޵m Uex6M>_1aҩta ?9EmQUt #,61? vuaVUUfl6b<%p4]U]Vd ?565Iyrqlǎ-JH+:.\l*++Y\ ~絧̥?@s!GAـB78:08h.{CɨT|,56Ŧ@0K[pO;o>xp1Zi_zХ(]W[/_fSԟ~7o F\.C8yNJ)jv⟙;yܫ GBWwWxE w?JWob? _l<,Ik0Ó7o[l.ѱKKkSS3?--ml.k/|^^ L\._^qV*ͼ z'?}.㣏NۋmƆD2UU]W166}C55_gv۹sϜicCQ14z]iihmk8q\IgphzѨ߾}6onid2R_꭛׭NH8W'bFۭݻj>yjAPYz8[Yy!h$w4-;|ȱcۯP.xp199; B`n_ ~"{u*N;;7ޑ[zJd2R)7 $I:muu\.:p8r%%Ag1&&gk z]xv讝[k4C֛4gH$v *s8lX[[8ᱺ*F !dԌa+)PUTdZ--T zڪ?ot'{wtIrB~j333Gqy$7oDR)u%~a3CCCssskNJ DS(BSN}]L&aj&0AD wBhrJd2px5 Q!dZ^DEʯgitTBbD(!H"Xc$JH1wDWxY5L Arr%!wgE'm7c >O !!x`8 endstream endobj 17 0 obj << /Type /Annot /Subtype /Link /A 18 0 R /Border [0 0 0] /H /I /Rect [ 76.0277 535.1326 148.5497 544.2901 ] >> endobj 18 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za/jira/plugins/servlet/theme/portal/6) >> endobj xref 0 19 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000361 00000 n 0000000398 00000 n 0000000533 00000 n 0000000596 00000 n 0000003990 00000 n 0000004102 00000 n 0000004209 00000 n 0000004325 00000 n 0000004445 00000 n 0000009872 00000 n 0000009956 00000 n 0000011328 00000 n 0000012088 00000 n 0000044187 00000 n 0000044314 00000 n trailer << /Size 19 /Root 1 0 R /Info 5 0 R >> startxref 44431 %%EOF phishing « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

phishing

Extra layer of security added to campus computers

Monday, August 2nd, 2021

Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it’s essential to stay informed of the various risks that exist on the internet if you want to stay safe online. Here’s a breakdown of the basics: 

Malware, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most common type of online threat.

Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.

You’ve probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop (Figure 1). Don’t worry, this isn’t a brand-new type of malware. Stellenbosch University’s IT department has added an extra layer of security to campus computers.

Figure 1

Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart (Figure 2).

Figure 2

This is because the malware will sync to your browsers profile and will be synced back to your device after it has been removed.  If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on the ICT Partner Portal for a technician to assist with further remediation.

[ARTICLE BY BRADLEY VAN DER VENTER]

Phishing alert: Zoom invite

Thursday, November 5th, 2020

Please be on the lookout for a new tactic that phishing scammers are employing to get your personal details, passwords and to gain access to your university account.

These scammers are using “Zoom” video conference invitations to fool their intended victims and steal passwords and other personal details.

 

Above is one such example. Take note of the highlighted the warning signs that reveal the scam. This particular scam is “custom” programmed for specific university e-mail addresses and might target your address, as the e-mail addresses are embedded into the phishing web page and the e-mail itself.

If you do get such an e-mail please report it to IT Cyber Security as soon as possible on the ICT Partner Portal.

If you have accidentally responded to the phisher and already provided them with your personal details, it is vitally important that you immediately change your password. Make sure the new password is completely different, and is a strong password that will not be easily guessed, as well as changing the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts.

After changing your password, also log a request on the ICT Partner Portal in order for your devices to be checked for malicious software. 

[ARTICLE BY DAVID WILES]

Phishing scam from a forged email

Thursday, May 14th, 2020

We are almost all in lock down and less careful with cyber security. The scammers know this and are launching numerous attacks taking advantage of the “work-from-home” situation we find ourselves in. A number of personnel have reported getting e-mails from “Prof. Jimmy Volmink” asking for assistance and are not spotting the tell-tale signs of a phishing scam.

Here is the mail:

  1. Notice that although it looks like Prof Volmink sent it, the email address is not correct.
  2.  Secondly Prof Jimmy is a very approachable person, but he is always professional in his communication so he would never say “Are you free for now”. Nor would he say something like this: (if you did respond to his mail)
    “I am currently in a meeting and I don’t know when the meeting will round off. I would have called you but phone is not allowed. I will want you to handle something for me right away and I will be glad if you can do that for me as soon as possible”.

This is a spear-phishing attack where an institution is directly attacked by impersonating prominent or public figures within the university (like the Dean) to gain access to the university network. This is an especially effective means of attack with everybody at home in lock down, where our guard is down and we are more relaxed. There was a very similar attack in September 2019, using the same tactics.  

Prof Volmink’s account has not been compromised. Phishers are just trying to fool us into thinking that prominent members in our leadership are emailing us asking for assistance, but they are not. It is a scam.

Over the next few days be on the lookout for similar mails that look like they coming from other people within the university.

If you do get mail like this be sure to report it to IT ASAP so they can block the attack and help people who have become victims.

Please immediately report such phishing scams and spam by reporting it on the ICT Partner Portal.​​

Go to https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115.​​

Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.​​

If you have accidentally clicked on the link and already given any personal details to the phishers it is vitally important that you immediately go to the USERADM page (either http://www.sun.ac.za/password  or www.sun.ac.za/useradm ) and change your password immediately. Make sure the new password is completely different, and is a strong password that will not be easily guessed, as well as changing the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts.

 

Sun email for personal purposes

Tuesday, May 12th, 2020

Recently some staff have been caught off-guard by emails from cyber criminals trying to exploit them by threatening to release sensitive video material. The sender of this email does not have any video material, but tries to be psychologically manipulative and convince the receiver that he does. Unfortunately he also refers to the email receiver’s sun email address and a password they used at some stage.

This is not because the university’s network has been compromised. It happens because staff and students also use their sun address in a personal capacity. We highly discourage you to do this. In this case someone used their sun address on a website, for example Ster Kinekor, whose database was, at some stage, compromised. Subsequently cyber criminals gained access to the username and password. This gave them access to the person’s Ster Kinekor’s (or whichever site it was) information, but also – and this is more dangerous – to the person’s potential information everywhere he reused the email address and specific password. This includes Stellenbosch University sites and applications, including the financial and HR system. Of course, it the password has been changed over time, it will be useless. However, this remains an enormous risk.

Please note the following: 

  1. Never use your sun email address for anything except for University applications. If you need to send personal emails, rather consider getting a free email account, for example, Gmail. Separating your business and personal activities is better security practice in the long run and will protect you and the University network.
  2. Keep in mind that according to the Electronic Communication Policy which all staff and students agree to when they register their usernames each year, you’re not allowed to use your sun address for personal communication and that the University owns any communication sent via email. If needed, University management has the right to access any material in your email or on your computer.  
  3. If you receive an email as mentioned above, for safety sake, go and change your login details and passwords on any sites where you are registered with your @sun address.

Phishing attack from compromised staff account with attached “Secure Message”

Wednesday, May 6th, 2020

With most students and personnel all working from home during the national lockdown, and with the reduced security (and watchfulness) of home computers and personnel/students in their home environment, and with many forced to use unfamiliar means of communication and collaboration like Teams, Zoom, Skype and Skype For Business, the environment is ripe for exploitation by phishers.

The following e-mail (with an infected attachment) is making its rounds at the moment from  a staff email.

If you get an email that look like the following do not open or respond to it. It is quite likely that the personnel doesn’t even know his account is compromised.

Please be careful when opening up attachments “sent” by colleagues especially if they are unannounced or the e-mail makes you feel a bit suspicious. Always trust your instincts.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.