%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 12 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250717075453+00'00') /ModDate (D:20250717075453+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 5744 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 71.651 521.469 675.083 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 71.651 l 565.984 71.651 l 565.984 745.984 l f 45.266 746.734 m 45.266 71.651 l 46.016 71.651 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(WHATSAPP SCAMS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(WhatsApp is a popular communication tool, used by students and personnel every day. On the downside, it provides )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(cyber criminals with another way to convince you to part with your well-earned money and unfortunately it's usually quite )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(convincing.)] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(WhatsApp scams come in many different forms and are often very convincing. Just make sure that you stay vigilant and )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(don't fall for anything that seems too good or too worrying to be true. Just because a friend or a family member sends you )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(something, it doesn’t mean that it is safe.)] TJ ET BT 61.016 553.486 Td /F1 9.0 Tf [(Voucher scams)] TJ ET BT 61.016 533.497 Td /F4 9.0 Tf [(A message arrives in your WhatsApp from someone who looks like your friend, recommending a deal they've found. The )] TJ ET BT 61.016 522.508 Td /F4 9.0 Tf [(messages usually come with a link that actually takes you to another website and tricks you into giving your personal )] TJ ET BT 61.016 511.519 Td /F4 9.0 Tf [(information. Don’t ever click a link you're not sure of and certainly don't ever hand over personal information to a website )] TJ ET BT 61.016 500.530 Td /F4 9.0 Tf [(you haven't checked.)] TJ ET BT 61.016 480.541 Td /F1 9.0 Tf [(WhatsApp shutting down)] TJ ET BT 61.016 460.552 Td /F4 9.0 Tf [(There are many fake messages claiming that WhatsApp is going to end unless enough people share a certain message. )] TJ ET BT 61.016 449.563 Td /F4 9.0 Tf [(The messages often look convincing, claiming to come from the CEO or another official. They're written using the right )] TJ ET BT 61.016 438.574 Td /F4 9.0 Tf [(words and phrases and look like an official statement. Any official statement wouldn't need users to send it to everyone )] TJ ET BT 61.016 427.585 Td /F4 9.0 Tf [(like a round robin. You would either see it in the news or it'll come up as a proper notification in the app from the actual )] TJ ET BT 61.016 416.596 Td /F4 9.0 Tf [(WhatsApp team.)] TJ ET BT 61.016 396.607 Td /F1 9.0 Tf [(WhatsApp threatening to shut down your account)] TJ ET BT 61.016 376.618 Td /F4 9.0 Tf [(This is very similar to the previous scam. It looks like an official message that claims that people's WhatsApp accounts are )] TJ ET BT 61.016 365.629 Td /F4 9.0 Tf [(being shut down for being inactive. Sending the message on will prove that it's actually being used and often instructs )] TJ ET BT 61.016 354.640 Td /F4 9.0 Tf [(people to pass it along.)] TJ ET BT 61.016 334.651 Td /F1 9.0 Tf [(WhatsApp forcing you to pay)] TJ ET BT 61.016 314.662 Td /F4 9.0 Tf [(Similar to the previous scam, with the only difference being that the message supposedly exempts you from having to pay )] TJ ET BT 61.016 303.673 Td /F4 9.0 Tf [(for your account – if you send it on to other people.)] TJ ET BT 61.016 283.684 Td /F1 9.0 Tf [(WhatsApp Gold or WhatsApp Premium)] TJ ET BT 61.016 263.695 Td /F4 9.0 Tf [(The claim suggests that people pay for or download a special version of WhatsApp, usually called Gold or Premium. It )] TJ ET BT 61.016 252.706 Td /F4 9.0 Tf [(offers a range of exciting-sounding features, like the ability to send more pictures, use new emoji or add extra security )] TJ ET BT 61.016 241.717 Td /F4 9.0 Tf [(features. The problem is that it is far from secure. Downloading the app infects people's phones with malware that use the )] TJ ET BT 61.016 230.728 Td /F4 9.0 Tf [(phone to send more fake messages at the cost of the original victim.)] TJ ET BT 61.016 210.739 Td /F1 9.0 Tf [(Emails from WhatsApp)] TJ ET BT 61.016 190.750 Td /F4 9.0 Tf [(Spam e-mails are bad enough. E-mails plus WhatsApp is even worse. There's a range of scams out there that send )] TJ ET BT 61.016 179.761 Td /F4 9.0 Tf [(people e-mails that look like they've come from WhatsApp, usually looking like a notification for a missed voice call or )] TJ ET BT 61.016 168.772 Td /F4 9.0 Tf [(voicemail. But when you click through, you will end up getting tricked into giving over your information, passphrases etc. )] TJ ET BT 61.016 157.783 Td /F4 9.0 Tf [(Don't ever click on an e-mail from a questionable sender. WhatsApp doesn’t send you e-mails including information about )] TJ ET BT 61.016 146.794 Td /F4 9.0 Tf [(missed calls or voicemails.)] TJ ET BT 61.016 126.805 Td /F1 9.0 Tf [(Fake WhatsApp spying apps)] TJ ET BT 61.016 106.816 Td /F4 9.0 Tf [(Currently, it is not possible to let people spy on other's conversations on WhatsApp, because it has end-to-end encryption )] TJ ET BT 61.016 95.827 Td /F4 9.0 Tf [(enabled, which ensures that messages can only be read by the phones that send and receive them. These scam apps )] TJ ET BT 61.016 84.838 Td /F4 9.0 Tf [(encourage people to download something that isn't actually real and force people to pay money for malware, or actually )] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Page /Parent 3 0 R /Annots [ 14 0 R ] /Contents 13 0 R >> endobj 13 0 obj << /Length 1794 >> stream 0.153 0.153 0.153 rg 0.773 0.773 0.773 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 527.866 521.469 230.118 re f 0.773 0.773 0.773 rg 45.266 527.866 m 566.734 527.866 l 565.984 528.616 l 46.016 528.616 l f 566.734 757.984 m 566.734 527.866 l 565.984 528.616 l 565.984 757.984 l f 45.266 757.984 m 45.266 527.866 l 46.016 528.616 l 46.016 757.984 l f 61.016 543.616 m 550.984 543.616 l 550.984 544.366 l 61.016 544.366 l f 0.153 0.153 0.153 rg BT 61.016 749.193 Td /F4 9.0 Tf [(read your chats once they've got onto your phone.)] TJ ET BT 61.016 729.204 Td /F4 9.0 Tf [(Lastly - )] TJ ET BT 61.016 709.215 Td /F4 9.0 Tf [(Hopefully, you have  already blocked sharing your WhatsApp details with Facebook \(telephone number, name etc. and )] TJ ET BT 61.016 698.226 Td /F4 9.0 Tf [(allowing Facebook to suggest phone contacts as friends\) and Facebook will not be able to  make your WhatsApp account )] TJ ET BT 61.016 687.237 Td /F4 9.0 Tf [(accessible to the 13 million South African Facebook users.)] TJ ET BT 61.016 667.248 Td /F4 9.0 Tf [(There are some details about this controversial policy change by WhatsApp on the following page: )] TJ ET 0.373 0.169 0.255 rg BT 61.016 656.259 Td /F4 9.0 Tf [(http://www.mirror.co.uk/tech/you-can-stop-whatsapp-sharing-8893949)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 655.108 m 339.116 655.108 l S 0.153 0.153 0.153 rg BT 61.016 636.270 Td /F4 9.0 Tf [( )] TJ ET BT 432.949 616.281 Td /F4 9.0 Tf [([ARTICLE BY DAVID WILES])] TJ ET BT 548.482 596.292 Td /F4 9.0 Tf [( )] TJ ET BT 61.016 576.303 Td /F4 9.0 Tf [( )] TJ ET 0.400 0.400 0.400 rg BT 61.016 557.814 Td /F2 9.0 Tf [(Posted in:Apps,Communication | Tagged:Malware,Phishing,Security,Spam,Whatsapp | With 0 comments)] TJ ET endstream endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 655.4266 339.1157 664.5841 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://www.mirror.co.uk/tech/you-can-stop-whatsapp-sharing-8893949) >> endobj xref 0 16 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000479 00000 n 0000000542 00000 n 0000006338 00000 n 0000006450 00000 n 0000006565 00000 n 0000006685 00000 n 0000006793 00000 n 0000006877 00000 n 0000008724 00000 n 0000008851 00000 n trailer << /Size 16 /Root 1 0 R /Info 5 0 R >> startxref 8969 %%EOF malware « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

malware

Vaccinate your pc

Friday, November 9th, 2012

Every year you have to go to your doctor to get an anti-flu injection. You have to get one every year because the influenza virus mutates and adapts every year into a new strain. Computer viruses are exactly the same! Here are a few handy tips and hints to ensure the whole process is as painless as possible. But first things first –

  • Use an AntiVirus Software – It is very important that your computer has an antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and therefore infect yourself.

See this link for a listing of some online/stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software –  There is no point running an antivirus program if you do not make sure it has all the latest updates available to it. If you do not update the software, it will not know about any new viruses, trojans, worms, etc that have been released into the wild since you installed the program. Then if a new infection appears in your computer, the antivirus program will not know that it is bad, and not alert you when you run it and become infected. Therefore it is imperative that you update your Antivirus software at least once a week (Even more if you wish) so that you are protected from all the latest threats. If you are lucky then you will have an anti-virus product that will update itself automatically via the internet, but never blindly trust this. A large number of the more virulent viruses and trojans can deactivate your anti-virus software’s updating functions.
  • Install an Anti-Spyware Program – Just as you installed and use an antivirus program, it is essential these days to use a Spyware protection and removal program. These programs can be used to scan your computer for spyware, dialers, browser hijackers, and other programs that are malicious in nature. The 4 program that I recommend are SuperAnti-Spyware, Spybot – Search and Destroy, andLavasoft’s Ad-Aware, and Windows Defender.A tutorial on using some of these programs can be found below:

Using Spybot – Search & Destroy to remove Spyware , Malware, and Hijackers

Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Commercial Spyware Removal/Protection Programs – If you feel more comfortable installing a commercial Spyware removal program then I recommend WebRoot’s Spysweeper or Lavasoft’s Ad-Aware Professional. Both are fair products and a worthy addition to the arsenal of software protecting your computer.

Spysweeper Product Information

  • Occasionally Run Online Virus Scans – Unfortunately not all antivirus programs are created equal. Each program may find infections that other antivirus programs do not and vice-versa. It is therefore recommended that you occasionally run some free online antivirus scanners to make sure that you are not infected with items that your particular antivirus program does not know how to find. Three online scanners that we recommend are:

Every once in a while, maybe once every 2 weeks, run one or both of these scanners to see if they find anything that may have been missed by your locally installed antivirus software. Believe me, you will not regret it!

ARTICLE BY David Wiles, GERGA

For regular updates on the latest spam, malware and ransomware threats, please check or blog regularly.

Scam: Cancellation Of Debit Order (Absa)

Monday, October 29th, 2012

Please note the following phishing scam: These scams are becoming far more fine-tuned to South African victims and especially university accounts. Earlier this month there was a specific scam using Alexander-Forbes as a means to attack, Alexander-Forbes being the university’s preferred consultant for insurance, medical aid consultancy etc. Barely a week later Virgin Active’s name was used to attempt to scam university personnel. This week it is the turn of Outsurance. The e-mails are virtually identical, only the names and the servers in the background change, but you should be able to see that they are homing more and more to South African users, which tells me one thing that either they are getting this information from South African victims or these scamming operations are South-African based.   Here is an expurgated version of the scam. Please take note and be very careful!  From: Absa [mailto:ibt@onlinedata.co.za] Sent: 29 October 2012 01:46 PM To: Name <university_email@address.goes.here> Subject: Cancellation Of Debit Order(Absa) Dear Customer, We received a Debit Order alert on your account this morning from Outsurance Insurance Company to deduct the sum of R3150.00 from your account. If you don’t want to authorized this Debit Order you can cancel by following the instruction below. Click below to Cancel the Debit Order on your profile. You will receive a message on your cellphone with a link, type in the last Eight digit RVN on the SMS message to complete the cancellation. click here to Cancel. . Regards, Security Department

(INFORMATION SUPPLIED BY DAVID WILES)

What is ransomware?

Friday, October 12th, 2012

The term ransomware will leave most people flabbergasted. How can software hold something ransom or is technology becoming so clever it can take over anything?

However, this description isn’t as far-fetched as it seems. Ransomware forms part of a group of malicious computer software called malware,  which cunningly installs itself on your pc and then has t he audacity to demand data or money from you. This type of programme can be installed by means of an e-mail attachment, an infected programme or unsafe website with malware installed on it. Ransomware” is also known as a a cryptovirus, cryptotrojan or cryptoworm.

The software indeed “kidnaps” your data by encrypting or limiting your access to it and then sending you a message demanding money to regain your access.  The only way access is possible again, is by acquiring an encryption key from the creator of the ransomware at a fee.

A more recent version of the software will not notify the user that ransomware has been installed, but will merely block all access to the data and depend on the victim to search the internet for information on their “problem”. This search will then lead them to legit websites selling software to remove the ransomware, which of course is sold by the creator of the original culprit.

Ransomware is nothing new. In 1996 security experts at Columbia University and IBM wrote an essay called “Cryptovirology: Extortion-Based Security Threats and Countermeasures” to describe the software. At that time businesses were the main targets of ransomware and not individuals.

In March 2006 ransomware called Crypzip of Zippo was sent to a group of internet users. Those who received the programme also received an e-mail demanding a ransom of $300 if they wanted to access their data again.

Most antivirus vendors have ways of detecting and blocking the most known ransomware. However, no data is 100% safe. To ensure you don’t find yourself in this tricky situation, try to back up data regularly, be cautious when browsing the internet and under no circumstances open e-mail attachments from unknown sources.

More info on the latest ransomware targeting Skype users.

SOURCE: Wikipedia, Microsoft en Techtarget.

New malware warning doing the rounds

Tuesday, October 9th, 2012

Incidences of malware infecting computers on campus have been reported the past week. If a window from an unknown source warns of a virus, do not attempt to click on the close button or move the window as this will in fact activate malware. The window can only be closed with the Task manager.

IT Service Desk: 021 808 4367

Money gone phishing?

Friday, May 11th, 2012

The second you connect to the internet you put yourself at risk. Scary thought, but we tend to forget just how vulnerable we are and the easy targets we become when we’re not careful about our safety on the internet.

As an internet user you expose yourself on a daily basis to malicious software and the possibility of data theft. This includes phishing. Phishing scams use bogus e-mails and Web sites that seem legitimate but are actually designed to trick users into revealing personal and financial information. Computer criminals can then use the data to spy on or blackmail users, hijack their online accounts (including bank accounts), spread rumors, or operate under the victim’s identity.

According to our local Stellenbosch ABSA branch there are still some Stellenbosch University staff who fall prey to cybercriminals by clicking on phishing emails. To make sure you don’t become a victim, read more on phishing on IT’s self help wiki.

SOURCE: www.cnet.com

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.