Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Security

Lost your cell phone?

Friday, October 26th, 2012

You know that sinking feeling when you realise you’re lost your wallet/phone/keys? Well, we can help you with the lost phone …

If your cell phone has been stolen, there are ways to prevent whoever has your phone from accessing your data and personal information. Some applications can even track the location of your phone.

Which method you use, depends on the phone you use.

1. BlackBerry

BlackBerry Protect is a free application able to assist you with locating your BlackBerry and to ensure that your data is safe.

If you lose your BlackBerry, you can log on to the BlackBerry Protect website and lock your device to make sure the person who has it, can’t use it. If you’re pretty sure you won’t be seeing your phone again, you can remove your data and SD card via the website.

If you are registered on Blackberry’s Enterprise Server, the device can also be wiped on the server side.

If you merely lost your phone, there’s also the option to lock your phone and display a message on the screen for whoever finds your phone. By means of GPS, it’s possible to establish your phone’s location and find it again. Or, if you suspect the device is within hearing distance, just adjust the volume to it’s loudest setting and you’ll be able to find your phone,

Apart from these functions, you can also backup your contacts, calender and bookmarks wirelessly. This can be done automatically and as frequently as you prefer (daily, weekly or monthly)

If you’ve replaced your old BlackBerry with a new one, you also can get your backed up settings, contacts and calender items back with BlackBerry Protect.

2. iPhone

Apple users can user Find My iPhone via the iCloud-fasiliteit.

Sign on at  iCloud.com or use the Find My iPhone app on a different phone to locate your phone on a map, display a message on the screen, lock the phone and display a message or wipe your data.

With iOS 6, iCloud also provides a Lost Mode, which makes it even easier to lock your phone with a four digit password and send a message to the phone with a contact number. If the phone is in Lost mode, it will continuously keep track of where the phone was and you’ll be given a report when you sign on to p iCloud.com or on the Find My iPhone app.

3. Android

If  Google Sync is configured on your phone or the Google Apps Device Policy application on your  Android, your data and personal information can be wiped from another device. Use this function when you phone has been stolen or lost. Just keep in mind the remote wipe function will remove ALL device based data  – e-mail, calendars and contacts and reset your phone to it’s initial default factory settings. It will not, however, remove data stored on the SD card.

New procedures for setting up Outlook on Android causes confusion

Friday, October 26th, 2012

Since the recent Exchange upgrade a few people have been confronted with a few unusual questions when trying to set up Outlook on their Android phones.Fortunately the process is less intimidating than it seems at first glance.

After the standard Outlook setup on your Android (click here for the full instructions),  Activate device administrator” will appear, prompting you to select a long list of options, for example Erase all dataChange Screen unlock passwordPassword recovery . Do not be alarmed as this is standard for setting up Exchange/Outlook on any Android phone. This just indicates what the app is capable of doing. Other cell phone operating systems include the same settings, but it’s not always displayed to the user when the programme is being installed.

The text being displayed is therefore standard for the specific Android application – IT has no control over the text it displays. It is also standard practice at various universities using MS Exchange.

One of the options is – Erase all data: Perform a factory reset, deleting all of your data without any confirmation. This option in particular led to many questions. If we look at the Exchange implementation, it’s very clear that the only person who has access to this function and can actually wipe the device, is the mailbox owner himself.

These and other advantages  and additional e-mail functionality, is available to Android users on www.sun.ac.za/webmail. In webmail, under Options -> See All Options -> Phone -> Mobile Phones there are various functions available:

Sync Logging: Enables you to look at the synchronisation of your phone, to select what you want synchronised, which servers should be used, etc.

Remote Wipe: With this option, you can wipe your phone’s data (contacts, photos, etc.) if it ever gets into the wrong hands. The phone will then be reset to it’s default factory settings. ONLY the registered e-mail user will have access to this function, no one else has access.

Details: Shows exactly which devices is linked, model, software versions, etc. 

Delete Device: This removes the connection between the Exchange and the selected device. If you initiate this via webmail, the person who has your phone will not be able to reinstall the mailbox. Your data stays protected.

(INFORMATION SUPPLIED BY FRANCOIS DE KOKER)

Skype users targeted by ransomware

Friday, October 12th, 2012

Skype users are being targeted by a round of ransomware that is being sent around as a message from contacts.

The message reads  “lol is this your new profile pic?”, which is followed by a link. If the Skype users clicks on the link, a zip file containing an executable that infects the computer system.

The system is the locked down and displays a message demanding money.

More about the Skype ransomware.

SOURCE: www.mybroadband.co.za

What is ransomware?

Friday, October 12th, 2012

The term ransomware will leave most people flabbergasted. How can software hold something ransom or is technology becoming so clever it can take over anything?

However, this description isn’t as far-fetched as it seems. Ransomware forms part of a group of malicious computer software called malware,  which cunningly installs itself on your pc and then has t he audacity to demand data or money from you. This type of programme can be installed by means of an e-mail attachment, an infected programme or unsafe website with malware installed on it. Ransomware” is also known as a a cryptoviruscryptotrojan or cryptoworm.

The software indeed “kidnaps” your data by encrypting or limiting your access to it and then sending you a message demanding money to regain your access.  The only way access is possible again, is by acquiring an encryption key from the creator of the ransomware at a fee.

A more recent version of the software will not notify the user that ransomware has been installed, but will merely block all access to the data and depend on the victim to search the internet for information on their “problem”. This search will then lead them to legit websites selling software to remove the ransomware, which of course is sold by the creator of the original culprit.

Ransomware is nothing new. In 1996 security experts at Columbia University and IBM wrote an essay called “Cryptovirology: Extortion-Based Security Threats and Countermeasures” to describe the software. At that time businesses were the main targets of ransomware and not individuals.

In March 2006 ransomware called Crypzip of Zippo was sent to a group of internet users. Those who received the programme also received an e-mail demanding a ransom of $300 if they wanted to access their data again.

Most antivirus vendors have ways of detecting and blocking the most known ransomware. However, no data is 100% safe. To ensure you don’t find yourself in this tricky situation, try to back up data regularly, be cautious when browsing the internet and under no circumstances open e-mail attachments from unknown sources.

More info on the latest ransomware targeting Skype users.

SOURCE: Wikipedia, Microsoft en Techtarget.

New malware warning doing the rounds

Tuesday, October 9th, 2012

Incidences of malware infecting computers on campus have been reported the past week. If a window from an unknown source warns of a virus, do not attempt to click on the close button or move the window as this will in fact activate malware. The window can only be closed with the Task manager.

IT Service Desk: 021 808 4367

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.