%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517065655+00'00') /ModDate (D:20240517065655+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 9572 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 61.981 521.469 684.753 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 62.356 520.719 684.003 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(BEWARE OF SIM CARD SWAP FRAUD)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [()] TJ ET BT 61.016 544.044 Td /F3 9.0 Tf [(Although it is a known scam, when it hits one of your colleagues, it makes you aware that there are very real dangers out )] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(there. A SIM card swap fraud occurs when criminals obtain and utilise a replacement SIM card to acquire security )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(messages and one-time passwords \(OTP\) sent to you by the bank. Using the OTP, criminals are able to change, add )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(beneficiaries and transfer money out of your account using your personal information that they would have obtained )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(through phishing. One of our colleagues lost R20 000 over the holidays and asked us to warn other staff as well:)] TJ ET BT 61.016 480.099 Td /F4 9.0 Tf [(How does a SIM swap scam work?)] TJ ET 0.400 0.400 0.400 RG 85.866 462.926 m 85.866 463.339 85.696 463.748 85.404 464.040 c 85.113 464.332 84.703 464.501 84.291 464.501 c 83.878 464.501 83.469 464.332 83.177 464.040 c 82.885 463.748 82.716 463.339 82.716 462.926 c 82.716 462.514 82.885 462.104 83.177 461.813 c 83.469 461.521 83.878 461.351 84.291 461.351 c 84.703 461.351 85.113 461.521 85.404 461.813 c 85.696 462.104 85.866 462.514 85.866 462.926 c f BT 91.016 460.110 Td /F3 9.0 Tf [(The SIM swap takes place after the fraudsters have received a your bank logon details as a result of the you )] TJ ET BT 91.016 449.121 Td /F3 9.0 Tf [(responding to, for example, a Phishing e-mail. \(this is why phishing e-mails are so dangerous and you should )] TJ ET BT 91.016 438.132 Td /F3 9.0 Tf [(never ever respond or click on links contained in these phishing e-mails.\))] TJ ET 85.866 429.959 m 85.866 430.372 85.696 430.781 85.404 431.073 c 85.113 431.365 84.703 431.534 84.291 431.534 c 83.878 431.534 83.469 431.365 83.177 431.073 c 82.885 430.781 82.716 430.372 82.716 429.959 c 82.716 429.547 82.885 429.137 83.177 428.846 c 83.469 428.554 83.878 428.384 84.291 428.384 c 84.703 428.384 85.113 428.554 85.404 428.846 c 85.696 429.137 85.866 429.547 85.866 429.959 c f BT 91.016 427.143 Td /F3 9.0 Tf [(Once the fraudsters have the your cell phone number and other personal information, the fraudster can pose as )] TJ ET BT 91.016 416.154 Td /F3 9.0 Tf [(you, requesting a new SIM card from a cellular service provider.)] TJ ET 85.866 407.981 m 85.866 408.394 85.696 408.803 85.404 409.095 c 85.113 409.387 84.703 409.556 84.291 409.556 c 83.878 409.556 83.469 409.387 83.177 409.095 c 82.885 408.803 82.716 408.394 82.716 407.981 c 82.716 407.569 82.885 407.159 83.177 406.868 c 83.469 406.576 83.878 406.406 84.291 406.406 c 84.703 406.406 85.113 406.576 85.404 406.868 c 85.696 407.159 85.866 407.569 85.866 407.981 c f BT 91.016 405.165 Td /F3 9.0 Tf [(The cellular service provider transfers the your SIM card identity to the new SIM card, cancelling your old SIM card )] TJ ET BT 91.016 394.176 Td /F3 9.0 Tf [(in the process.)] TJ ET 85.866 386.003 m 85.866 386.416 85.696 386.825 85.404 387.117 c 85.113 387.409 84.703 387.578 84.291 387.578 c 83.878 387.578 83.469 387.409 83.177 387.117 c 82.885 386.825 82.716 386.416 82.716 386.003 c 82.716 385.591 82.885 385.181 83.177 384.890 c 83.469 384.598 83.878 384.428 84.291 384.428 c 84.703 384.428 85.113 384.598 85.404 384.890 c 85.696 385.181 85.866 385.591 85.866 386.003 c f BT 91.016 383.187 Td /F3 9.0 Tf [(The result is that there is no signal on the old SIM card, which means the you cannot receive / make phone calls or )] TJ ET BT 91.016 372.198 Td /F3 9.0 Tf [(send SMS messages. \(This ought to be the first sign of something wrong, so if you get SIMCARD INVALID error )] TJ ET BT 91.016 361.209 Td /F3 9.0 Tf [(on your cell phone\))] TJ ET 85.866 353.036 m 85.866 353.449 85.696 353.858 85.404 354.150 c 85.113 354.442 84.703 354.611 84.291 354.611 c 83.878 354.611 83.469 354.442 83.177 354.150 c 82.885 353.858 82.716 353.449 82.716 353.036 c 82.716 352.624 82.885 352.214 83.177 351.923 c 83.469 351.631 83.878 351.461 84.291 351.461 c 84.703 351.461 85.113 351.631 85.404 351.923 c 85.696 352.214 85.866 352.624 85.866 353.036 c f BT 91.016 350.220 Td /F3 9.0 Tf [(The SMS authorisation reference number, which is normally sent to the client, reaches the fraudster instead of )] TJ ET BT 91.016 339.231 Td /F3 9.0 Tf [(you, the legitimate owner, and the fraudster is able to make once-off payments and create beneficiaries fraudulently)] TJ ET BT 61.016 319.242 Td /F4 9.0 Tf [(What should I do if I suspect an unlawful SIM swap?)] TJ ET 85.866 302.069 m 85.866 302.482 85.696 302.891 85.404 303.183 c 85.113 303.475 84.703 303.644 84.291 303.644 c 83.878 303.644 83.469 303.475 83.177 303.183 c 82.885 302.891 82.716 302.482 82.716 302.069 c 82.716 301.657 82.885 301.247 83.177 300.956 c 83.469 300.664 83.878 300.494 84.291 300.494 c 84.703 300.494 85.113 300.664 85.404 300.956 c 85.696 301.247 85.866 301.657 85.866 302.069 c f BT 91.016 299.253 Td /F3 9.0 Tf [(If you fall prey to an unlawful SIM swap, or suspect that you have, contact your cellular service provider for )] TJ ET BT 91.016 288.264 Td /F3 9.0 Tf [(assistance.)] TJ ET 85.866 280.091 m 85.866 280.504 85.696 280.913 85.404 281.205 c 85.113 281.497 84.703 281.666 84.291 281.666 c 83.878 281.666 83.469 281.497 83.177 281.205 c 82.885 280.913 82.716 280.504 82.716 280.091 c 82.716 279.679 82.885 279.269 83.177 278.978 c 83.469 278.686 83.878 278.516 84.291 278.516 c 84.703 278.516 85.113 278.686 85.404 278.978 c 85.696 279.269 85.866 279.679 85.866 280.091 c f BT 91.016 277.275 Td /F3 9.0 Tf [(Also contact the internet banking helpdesk to request that your internet banking access be suspended with )] TJ ET BT 91.016 266.286 Td /F3 9.0 Tf [(immediate effect. This will prevent fraudsters from gaining access and transacting on your accounts.)] TJ ET BT 61.016 246.297 Td /F4 9.0 Tf [(What can I do to prevent SIM swap fraud?)] TJ ET 85.866 229.124 m 85.866 229.537 85.696 229.946 85.404 230.238 c 85.113 230.530 84.703 230.699 84.291 230.699 c 83.878 230.699 83.469 230.530 83.177 230.238 c 82.885 229.946 82.716 229.537 82.716 229.124 c 82.716 228.712 82.885 228.302 83.177 228.011 c 83.469 227.719 83.878 227.549 84.291 227.549 c 84.703 227.549 85.113 227.719 85.404 228.011 c 85.696 228.302 85.866 228.712 85.866 229.124 c f BT 91.016 226.308 Td /F3 9.0 Tf [(Protect your information all your information.)] TJ ET 85.866 218.135 m 85.866 218.548 85.696 218.957 85.404 219.249 c 85.113 219.541 84.703 219.710 84.291 219.710 c 83.878 219.710 83.469 219.541 83.177 219.249 c 82.885 218.957 82.716 218.548 82.716 218.135 c 82.716 217.723 82.885 217.313 83.177 217.022 c 83.469 216.730 83.878 216.560 84.291 216.560 c 84.703 216.560 85.113 216.730 85.404 217.022 c 85.696 217.313 85.866 217.723 85.866 218.135 c f BT 91.016 215.319 Td /F3 9.0 Tf [(Do not disclose your ID number on websites unless you have verified the legitimacy of the site. The bank already )] TJ ET BT 91.016 204.330 Td /F3 9.0 Tf [(knows your ID number and will not require you to give it to us again.)] TJ ET 85.866 196.157 m 85.866 196.570 85.696 196.979 85.404 197.271 c 85.113 197.563 84.703 197.732 84.291 197.732 c 83.878 197.732 83.469 197.563 83.177 197.271 c 82.885 196.979 82.716 196.570 82.716 196.157 c 82.716 195.745 82.885 195.335 83.177 195.044 c 83.469 194.752 83.878 194.582 84.291 194.582 c 84.703 194.582 85.113 194.752 85.404 195.044 c 85.696 195.335 85.866 195.745 85.866 196.157 c f BT 91.016 193.341 Td /F3 9.0 Tf [(Do not disclose your cell number on websites unless you have verified the legitimacy of the site. Phishing sites )] TJ ET BT 91.016 182.352 Td /F3 9.0 Tf [(often request for information such as ID Number, email address and email address password, physical address, )] TJ ET BT 91.016 171.363 Td /F3 9.0 Tf [(etc.)] TJ ET 85.866 163.190 m 85.866 163.603 85.696 164.012 85.404 164.304 c 85.113 164.596 84.703 164.765 84.291 164.765 c 83.878 164.765 83.469 164.596 83.177 164.304 c 82.885 164.012 82.716 163.603 82.716 163.190 c 82.716 162.778 82.885 162.368 83.177 162.077 c 83.469 161.785 83.878 161.615 84.291 161.615 c 84.703 161.615 85.113 161.785 85.404 162.077 c 85.696 162.368 85.866 162.778 85.866 163.190 c f BT 91.016 160.374 Td /F3 9.0 Tf [(Always make sure that your contact details on Internet banking are valid and correct. You know when your details )] TJ ET BT 91.016 149.385 Td /F3 9.0 Tf [(have changed, so when you are ready, you can update the information on Internet banking or at a local bank )] TJ ET BT 91.016 138.396 Td /F3 9.0 Tf [(branch.)] TJ ET BT 360.940 118.407 Td /F3 9.0 Tf [([INFORMATION SUPPLIED BY DAVID WILES])] TJ ET BT 61.016 98.418 Td /F3 9.0 Tf [()] TJ ET BT 61.016 79.929 Td /F3 9.0 Tf [(Posted in:Communication,Security | Tagged:Cell Phone,Phishing,Security | With 0 comments)] TJ ET q 225.000 0 0 156.000 61.016 332.890 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 208 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 7784>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 80 C   %# , #&')*)-0-(0%()(C   (((((((((((((((((((((((((((((((((((((((((((((((((((," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?((((((((((h2JTW=y&VDK Mocu.EU "+ oS18z袊`QEQEQEQEQEQEQEQEf(Q@Q@hP3EQEPU.ⴄ)S5謢˜:d3d_{.}U8#/3 XW=7H)ɝB7$cInq#fƺC!,Pε5Z|8 q5*9(E]*I $c'sӥ|ow[ xS7Z=U OjiM{w> b!AT>.cY֙rz<#5~4ԕ󲌠dfE2C4f((3KEfE%-PIKEPQKEQEQE%-PQKE%P5M 1/}UmA 4篢뙑G,Y'&YyZIXni6{9f>Ukv=2fK(S9>{\>U$_bkލU^'U5$mQwZ$ F[': zէZ\gNiD$ $_;=h0!,C߻?ʽM-5;D'2c_Eºw|;.-EFTWA%PQKE%-PEPEPEPEPEPEPEdMcVAjFOCaz3°[I$ϾD;{#銳js=XJ?[r-nm19kE(gu֭ʏ.Xd7|Qzsu$=e$wsXD,Tްķ:s !cЀiB<Ó}`^-4} ?z/SҶcv Ĝ|қoj"%=jKF\AOYz܉~EO4,2A֢&{-4"5X}۷zak\ Nv9gnǹ' h3QNg^YU KԻPkc9AK kp͍(&b{eQUg;xGF:.߼hO VЖ828"6)RQ1 >x=ZlQS$ӷaԛvi|sxeԶxֺ\ȷ&hݑT|S{8F^da#Apk ~]ss./a]N4TWp_Zsg2M*rN.N(QEQEQEQEQEQEQQ*CI+E@vTRBzW3rLPw=Qj6@ k79ԭ}cAMi3ڢ͖u9?=E+&f~dܱ*:[ȶ@VHt5Z+vᰣcӅMttՑh-v'Qncv#};bTF8}jvطu͍{a3nn4]:}KaRF.d’}NV1&_Sִ4M 2"IaE3eq}GZZ }k@gԖFVReҪZY"1l=0-ޱoX.O4ekr桨Ecg 9IHހTZ}qy{D*}OEcgWkBA5 A~_&qҥǾzs~Sj䧍nO!tͼ :|'ªlv0s+ .i{)lUB^V2̕S$dç@=j4E2U~h̳*jws.vv]߇, '!t{W>ڌwKV?{}]>B#;wZ( ( ( ( ( (y[9'hKa2LQ /e|^mQjCw=}sb\VUԭVOʅE&1y:M];,y'5|X4YH5m>@c |&FRpMWknT5-D[2An{?L{(Q^9E \d)9=[+id=j-eE7G] u\,**>Rq5w-wVKy$@*=J|[i)lU}qRM5/$,q3(2\S o++2I:B*sfVI, )@0p{VcդUԕbI_}Sw5g Y5ɵVރXbtҳK' srz?ߡJ+NbH@9HI5m"(П|Gk4㷾c g8`pF@Sp[;ϐGө' J+cBMOGV##\(jdUzGEZXy1F$*9$CKVjo K3Yp5t=@Jy'޸Ha@wbqd_U{e+I;x sܤdq([ڗPY#̍yt]. *C˞^B9sps$_+ӲO[Zœ'V|JR' .٧#AO>՛ok6:^jqC SսoIik-^Kly}[߷oZs7_JOFkEx!b“ $?;S+ݴ: 2`\1סʇ.sz-Lҭ6sjW ( ( ( ( ( ( W䑷3]۝ff}-RP!k3]lV@`Dėl>HW7}ܭ$ܓq^~/_9$vWH~4dω*<正;dj83f%Tr6 gqjSX^F1'wǡOeמ;NHHQQ+HMˉSS娵/]W䤣xD19jh9-٠ "AW\ų8"kw{SpS6>_w6g.Mshvt?o~ZЋ]CmT^:OsP!HmQaUz Pśgdպ_4RIWXf:Tj00Pֵ83m*cIEVUّu: YpX@ =ҫT:Ąat VDCk8O[9*zGzvXj~ E*.~K  ~g>/5[#/^קAڤɵ'ף[;ý:t4U0=XE,QEQEQERR ( ( (/18JAJ9&r(\c`>՛o}?{ל#%Į$`ԓ+~ΖϨ2/j|Jz.C/.%i/#c?+7j`nS@_b=g$hm8]*֧lBQDTrIƷl'm}PZv#5l $WQL$*ʖViԐIV2oP+cpV3xuHkܒ%c<I(P.A1/_AVJwcԛ^`' |SuR\oŕ)R.k|u\$H ^?VYR8NG3ׂO6_L}=Oh @@?ֽ\ߩYˬ6X$5}MX ( ( ( ))h(((( k8D?:u=wԌ53*p|Xܡ`p~YңCkԇg7 8S*Ӽ|coC}ϵ|+*WC2KIv/Zn\c 31Nj؁flSqlTE,WNyMM"iKx.E <>lv~}ROu19i.}.I;OJ] Imuq*IAo?%K (A_v: Gz-HmPvbrIɩ!-u?3J<$@֧8"v֒yA?Z-p)vc i=${"֗8PkԼq4gB~)CM6d`+hcGj8DSssדEYۤ$TQ^aEPEPE%-QI@ EPEPEPEPEPEPX:m8+~c\e=}zM&ƛ>z.4.D6-9\DvfKęc)_Wzt[e\8:y% rp,ּ|^4}VY{?rvCˎqOJ[;YnXBǀ(IJJ7 $dH$:fSV~x'|qOt1 W׭CAE *F 0t ѣb[) 4U(Th((((()(h((((+Z):7PjZ(˼oH-wn +ȐW )^!f<$8澯QmU pi#PƬ. V׈|9w $Y#89Q\: ti#0 ],Q]ӡ\I*E$OsM翜Gd=m#jTӜ,Y؛[{WW$s9\o`nn? }O|;4K \ܩOVe޽YcEH*(P0T|oK*O4XTB uW|QEQIK@QEQEQE%-PE%-Q@Q@RPEQEQEQEVeq7kU> startxref 18598 %%EOF cell phone « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

cell phone

Mobile technology survey reveals new trends

Friday, November 1st, 2013

Android and Apple mobile phones look likely to dominate share amongst students within a year while Blackberry’s share is dwindling rapidly. The picture has changed significantly since 2012:

mobile-phones

This is just one example of the results of a recent mobile technology survey conducted by the Information Technology division to track trends in students’ mobile devices. The purpose of these surveys (the first was conducted in September 2012) are to identify trends so that relevant university mobile services and strategies can be implemented in future. Understanding the mix of devices that students possess and how rapidly the picture is changing, is crucial for informed planning and decision-making.

Another unexpected trend is the slow penetration of tablets on campus. Since the vast majority of students have daily access to a laptop, ultrabook or notebook, the tablet seems to be an optional “third” device, which 47% of students can’t afford and 25% prefer not to use. Only 28% of respondents have a tablet, almost half of which are Apple iPads, closely followed by Android tablets. Students indicate that the take-up is likely to increase but accelerate slowly.

Unfortunately awareness of the national Student Technology Programme, which provides students with the opportunity to purchase heavily discounted tablets, laptops and notebooks, is also still lacking.

On the positive side students consistently rate mobile services and content related to learning and academic events and schedules as the most important. It is possible that as more learning content, including e-textbooks, becomes available via mobile devices, for offline consumption as well, that the penetration of tablets may accelerate.

mobile-content

More surveys will be conducted in the foreseeable future to discern trends and changes over time and students are encouraged to participate.

One lucky respondent, BComm student, Pierre-Etienne Rossouw, was the winner of an Incredible Connection gift voucher to the value of R1500.

2832 students out of 32266 invitees responded.

 

[PHOTO: Ralph Pina (director of development) with winner Pierre-Etienne Rossouw]

 

 

 

Geared for the future

Friday, October 4th, 2013

Do you still remember those enormous Casio watches with the built in calculators? Well, don’t start sniggering just yet (besides, we know you also had one). Because soon you’ll want a large watch again and this time around it will be able to do more than just adding and subtracting.

The Samsung Galaxy Gear smart watch was recently launched in Berlin by Lee Young-hee, Samsung‘s vice president of mobile technology, two weeks before the Berlin IFA electronic consumer show.

With Samsung’s new smart watch you’ll be able to make calls, browse the internet and manage your e-mails. All this while you’re looking the part  – bodyguard meets FBI agent.

Other useful extras include a camera, various applications such as Evernote and Pocket, as well as MyFitnessPal and RunKeeper for the fitness fanatics among us. For those who prefer wine above exercise, the Gear comes with Vivino Wine Scanner – an app which allows you to take a photo of  a wine label and immediately have access to the wine’s information.

[Photo: www.samsung.com]

But BEFORE you get too excited, I have to warn you that, to use a Galaxy Gear, you also need a Galaxy Note. It is estimated that the Gear will be available during October for the recommended price of  R4 599. The latest Galaxy Note model, with which the Gear is compatible, has been available since 27 September at R8 999.

In total this comes to the considerable amount of approximately R14 000. Not necessarily an option for someone earning an average salary, but at least the technology is now available and with a little bit of patience, we all will be able to afford one one day.

More information on the Samsung Galaxy Gear can be found on Samsung’s website

[SOURCES: www.cnet.com, www.wikipedia.org, www.news24.com, www.mybroadband.co.za, www.pcadvisor.co.uk  en www.t3.com]

 

 

Beware of SIM card swap fraud

Friday, February 22nd, 2013

 

Although it is a known scam, when it hits one of your colleagues, it makes you aware that there are very real dangers out there. A SIM card swap fraud occurs when criminals obtain and utilise a replacement SIM card to acquire security messages and one-time passwords (OTP) sent to you by the bank. Using the OTP, criminals are able to change, add beneficiaries and transfer money out of your account using your personal information that they would have obtained through phishing. One of our colleagues lost R20 000 over the holidays and asked us to warn other staff as well:

How does a SIM swap scam work?

  • The SIM swap takes place after the fraudsters have received a your bank logon details as a result of the you responding to, for example, a Phishing e-mail. (this is why phishing e-mails are so dangerous and you should never ever respond or click on links contained in these phishing e-mails.)
  • Once the fraudsters have the your cell phone number and other personal information, the fraudster can pose as you, requesting a new SIM card from a cellular service provider.
  • The cellular service provider transfers the your SIM card identity to the new SIM card, cancelling your old SIM card in the process.
  • The result is that there is no signal on the old SIM card, which means the you cannot receive / make phone calls or send SMS messages. (This ought to be the first sign of something wrong, so if you get  “SIMCARD INVALID” error on your cell phone)
  • The SMS authorisation reference number, which is normally sent to the client, reaches the fraudster instead of you, the legitimate owner, and the fraudster is able to make once-off payments and create beneficiaries fraudulently

What should I do if I suspect an unlawful SIM swap?

  • If you fall prey to an unlawful SIM swap, or suspect that you have, contact your cellular service provider for assistance.
  • Also contact the internet banking helpdesk to request that your internet banking access be suspended with immediate effect. This will prevent fraudsters from gaining access and transacting on your accounts.

What can I do to prevent SIM swap fraud?

  • Protect your information – all your information.
  • Do not disclose your ID number on websites unless you have verified the legitimacy of the site. The bank already knows your ID number and will not require you to give it to us again.
  • Do not disclose your cell number on websites unless you have verified the legitimacy of the site. Phishing sites often request for information such as ID Number, email address and email address password, physical address, etc.
  • Always make sure that your contact details on Internet banking are valid and correct. You know when your details have changed, so when you are ready, you can update the information on Internet banking or at a local bank branch.

[INFORMATION SUPPLIED BY DAVID WILES]

 

Keep your cell phone secure

Friday, February 22nd, 2013

These days your smartphone is just as powerful as your laptop or pc a few years back. You store more personal and work information on your device and it’s always connected to the internet.

It’s exactly this convenience that puts you as a smartphone user at risk. Cooltech, iAfrica’s tech section, has a few ideas to minimise risk and ensure your personal information stays, well, personal and safe from malware and cybercriminals and other security risks.

Set up a password

Your first line of defense is to simply set up a password on your phone. Most cellphone providers allow you to type in a pin number each time you switch on your phone or after a period on inactivity.

Install security software

Since smart phones are no longer just for storing phone numbers and sms’s, but also bankdetails, they’re also an easy and perfect target for cybercriminals.

Consider installing anti virus software to protect your device against malware. F-Secure, Norton and other large security software vendors each have their own version for the main smartphone platforms.

Activate the remote wipe function

The biggest risk is the the theft or loss of your device. Rather than worry about a stranger snooping through your information, activate the remore wipe function.

This function will allow you, by means of an internet connection, to delete your photos, business contacts and e-mails when you suspect you might not be able to recover your phone.

Some manufacturers like BlackBerry and Apple offer the remote wipe function and location applications for their latest devices, while third party applications are available for other platforms.

Download safe and approved applications

The temptation to download a free, unofficial application on your iPhone or Android instead of purchasing one through iStore, is big, but do you really want to take the risk and expose your phone to malware.  Rather stick legitimate sources where proper quality control is done and applications don’t come with added nasty surprises.

Backup your data

As we’ve already established, a substantial amount of your life is on your smart phone – e-mail, phone contacts, documents, photos and much more. Just as you back up your computer (hopefully!), do the same with your cell phone so you won’t lose everything if you lose your phone.  Many smartphones allow you to make a thorough backup from your device to your pc or at least sync the most important data and settings to an online service.  Many smartphones allow you to make a comprehensive backup of your device to a computer, or to sync your most critical data and settings to an online service.

New procedures for setting up Outlook on Android causes confusion

Friday, October 26th, 2012

Since the recent Exchange upgrade a few people have been confronted with a few unusual questions when trying to set up Outlook on their Android phones.Fortunately the process is less intimidating than it seems at first glance.

After the standard Outlook setup on your Android (click here for the full instructions),  Activate device administrator” will appear, prompting you to select a long list of options, for example Erase all dataChange Screen unlock passwordPassword recovery . Do not be alarmed as this is standard for setting up Exchange/Outlook on any Android phone. This just indicates what the app is capable of doing. Other cell phone operating systems include the same settings, but it’s not always displayed to the user when the programme is being installed.

The text being displayed is therefore standard for the specific Android application – IT has no control over the text it displays. It is also standard practice at various universities using MS Exchange.

One of the options is – Erase all data: Perform a factory reset, deleting all of your data without any confirmation. This option in particular led to many questions. If we look at the Exchange implementation, it’s very clear that the only person who has access to this function and can actually wipe the device, is the mailbox owner himself.

These and other advantages  and additional e-mail functionality, is available to Android users on www.sun.ac.za/webmail. In webmail, under Options -> See All Options -> Phone -> Mobile Phones there are various functions available:

Sync Logging: Enables you to look at the synchronisation of your phone, to select what you want synchronised, which servers should be used, etc.

Remote Wipe: With this option, you can wipe your phone’s data (contacts, photos, etc.) if it ever gets into the wrong hands. The phone will then be reset to it’s default factory settings. ONLY the registered e-mail user will have access to this function, no one else has access.

Details: Shows exactly which devices is linked, model, software versions, etc. 

Delete Device: This removes the connection between the Exchange and the selected device. If you initiate this via webmail, the person who has your phone will not be able to reinstall the mailbox. Your data stays protected.

(INFORMATION SUPPLIED BY FRANCOIS DE KOKER)

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.