%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> /XObject << /I1 13 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240511132852+00'00') /ModDate (D:20240511132852+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 6062 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 147.904 521.469 598.830 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 148.279 520.719 598.080 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(WHAT IS RANSOMWARE?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(The term )] TJ ET BT 99.527 564.033 Td /F3 9.0 Tf [(ransomware)] TJ ET BT 149.036 564.033 Td /F3 9.0 Tf [(will leave most people flabbergasted. How can software hold something ransom or is technology )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(becoming so clever it can take over anything?)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(However, this description isn't as far-fetched as it seems.Ransomware forms part of a group of malicious computer )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(software called )] TJ ET BT 123.539 522.066 Td /F3 9.0 Tf [(malware)] TJ ET BT 157.541 522.066 Td /F3 9.0 Tf [(, which cunningly installs itself on your pc and then has t he audacity to demand data or money )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(from you. This type of programme can be installed by means of an e-mail attachment, an infected programme or unsafe )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(website with )] TJ ET BT 112.532 500.088 Td /F3 9.0 Tf [(malware)] TJ ET BT 146.534 500.088 Td /F3 9.0 Tf [( installed on it.)] TJ ET BT 206.564 500.088 Td /F3 9.0 Tf [(Ransomware)] TJ ET BT 259.574 500.088 Td /F3 9.0 Tf [(" is also known as a a)] TJ ET BT 348.809 500.088 Td /F3 9.0 Tf [(cryptovirus)] TJ ET BT 392.315 500.088 Td /F3 9.0 Tf [(,)] TJ ET BT 397.319 500.088 Td /F3 9.0 Tf [(cryptotrojan)] TJ ET BT 444.335 500.088 Td /F3 9.0 Tf [(or)] TJ ET BT 457.340 500.088 Td /F3 9.0 Tf [(cryptoworm)] TJ ET BT 503.843 500.088 Td /F3 9.0 Tf [(.)] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(The software indeed "kidnaps" your data by encrypting or limiting )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(your access to it and then sending you a message demanding )] TJ ET BT 61.016 458.121 Td /F3 9.0 Tf [(money to regain your access. The only way access is possible )] TJ ET BT 61.016 447.132 Td /F3 9.0 Tf [(again, is by acquiring an encryption key from the creator of the )] TJ ET BT 61.016 436.143 Td /F3 9.0 Tf [(ransomware)] TJ ET BT 110.525 436.143 Td /F3 9.0 Tf [(at a fee.)] TJ ET BT 61.016 416.154 Td /F3 9.0 Tf [(A more recent version of the software will not notify the user that )] TJ ET BT 61.016 405.165 Td /F3 9.0 Tf [(ransomware)] TJ ET BT 110.525 405.165 Td /F3 9.0 Tf [( has been installed, but will merely block all access to )] TJ ET BT 61.016 394.176 Td /F3 9.0 Tf [(the data and depend on the victim to search the internet for )] TJ ET BT 61.016 383.187 Td /F3 9.0 Tf [(information on their "problem". This search will then lead them to )] TJ ET BT 61.016 372.198 Td /F3 9.0 Tf [(legit websites selling software to remove the)] TJ ET BT 237.083 372.198 Td /F3 9.0 Tf [( ransomware, )] TJ ET BT 294.098 372.198 Td /F3 9.0 Tf [(which)] TJ ET BT 61.016 361.209 Td /F3 9.0 Tf [(of course is sold by the creator of the original culprit.)] TJ ET BT 61.016 341.220 Td /F3 9.0 Tf [(Ransomware)] TJ ET BT 114.026 341.220 Td /F3 9.0 Tf [(is nothing new. In 1996 security experts at )] TJ ET BT 61.016 330.231 Td /F3 9.0 Tf [(Columbia University and IBM wrote an essay called )] TJ ET BT 61.016 319.242 Td /F3 9.0 Tf [("Cryptovirology: Extortion-Based Security Threats and )] TJ ET BT 61.016 308.253 Td /F3 9.0 Tf [(Countermeasures" to describe the software. At that time businesses were the main targets of )] TJ ET BT 433.373 308.253 Td /F3 9.0 Tf [(ransomware )] TJ ET BT 485.384 308.253 Td /F3 9.0 Tf [(and not )] TJ ET BT 61.016 297.264 Td /F3 9.0 Tf [(individuals.)] TJ ET BT 61.016 277.275 Td /F3 9.0 Tf [(In March 2006 )] TJ ET BT 121.046 277.275 Td /F3 9.0 Tf [(ransomware)] TJ ET BT 170.555 277.275 Td /F3 9.0 Tf [(called)] TJ ET BT 199.067 277.275 Td /F3 9.0 Tf [(Crypzip)] TJ ET BT 229.568 277.275 Td /F3 9.0 Tf [(of)] TJ ET BT 242.078 277.275 Td /F3 9.0 Tf [(Zippo)] TJ ET BT 264.587 277.275 Td /F3 9.0 Tf [(was sent to )] TJ ET 0.965 0.835 0.851 rg 315.113 276.443 5.004 9.158 re f 0.400 0.400 0.400 rg BT 315.113 277.275 Td /F3 9.0 Tf [(a)] TJ ET BT 320.117 277.275 Td /F3 9.0 Tf [( group of internet users. Those who received the )] TJ ET BT 61.016 266.286 Td /F3 9.0 Tf [(programme also received an e-mail demanding a ransom of $300 if they wanted to access their data again.)] TJ ET BT 61.016 246.297 Td /F3 9.0 Tf [(Most antivirus vendors have ways of detecting and blocking the most known )] TJ ET BT 366.152 246.297 Td /F3 9.0 Tf [(ransomware. )] TJ ET BT 420.665 246.297 Td /F3 9.0 Tf [(However)] TJ ET BT 456.170 246.297 Td /F3 9.0 Tf [(,)] TJ ET BT 458.672 246.297 Td /F3 9.0 Tf [( no data is100% safe. )] TJ ET BT 61.016 235.308 Td /F3 9.0 Tf [(To ensure you don't find yourself in this tricky situation, try to back up data regularly, be cautious when browsing the )] TJ ET BT 61.016 224.319 Td /F3 9.0 Tf [(internet and under no circumstances open e-mail attachments from unknown sources.)] TJ ET 0.373 0.169 0.255 rg BT 61.016 204.330 Td /F3 9.0 Tf [(More info)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 203.179 m 98.528 203.179 l S 0.400 0.400 0.400 rg BT 98.528 204.330 Td /F3 9.0 Tf [( on the latest )] TJ ET BT 152.564 204.330 Td /F3 9.0 Tf [(ransomware)] TJ ET BT 202.073 204.330 Td /F3 9.0 Tf [( targeting Skype users.)] TJ ET BT 366.430 184.341 Td /F3 9.0 Tf [(SOURCE: Wikipedia, Microsoft enTechtarget.)] TJ ET BT 61.016 165.852 Td /F3 9.0 Tf [(Posted in:General,Security | Tagged:Data,Malware,Ransomware,Security | With 0 comments)] TJ ET q 225.000 0 0 167.250 325.984 321.640 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 203.4976 98.5277 212.6551 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/af/2012/10/12/skype-users-targeted-by-ransomware/) >> endobj 13 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 223 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 35060>> stream JFIFצ9ʓv_shu}~=>@W⌀zep?&B:/N:#p~|\~/z79W|'Zt_ Zψu}7A,#3_j힙¹̷WmoߖU^z?~ZXxg[Ʃ<Ya5ΧʰxgH-nVUխWfvUMTMjR*Zӓ[#3l*3 e2irZR*_8Jl~so|FeYoCulA~`V"K1e _/׿Go|!5>y(ֵ5HejM* Kkɲ5h..$beDIfv9KI+iX>Y;18*"2N]kN\R_8Z>F|y7 sI$]]]Ɣ\~뜠ڇCIŤ^˥^YeqtA3! ㅯRK4qD2` FC*K 9#tttlHe#y+&\+R詚&lu/:"H}mz 5=l>|bq'ޮ3N>(*x'~[NGބVo^x][H/.Ω4ṱ*NjA˙]ݴnHG?v#U)ps3Ӄc ~x==c>ўqQ~`S<ߪoz2??/;49ۇhWס=Oqϱhr=yB}SsQ+#?}N !4qӿLǨg_h#o>zFxߦOjS9ƀ:/j^9{ Z;{|?n˿;϶nzw2F~'G^?ct':|PN|=ۜ s?_Nzstڗמ3րNO^==GPqϾTϧӾ{dsG?<P}gnè8߭Cqsmh-6 I$KHT|LW'} UE9 lIu+RR!)$ߢn[Nö>V?^R``:Xl.7n,^#;>Gn? w<M%̰ř.Oqy|M÷ڒ^[O itum[RB:\eY+ K߂$x[F Ij N Q*՝̟-Ky$mK.}tqrjNeݻ_K6~Wk: RTmNO¾$N Ew!w$E ^pG:8h%FFUSmApH;PFzTծcn'XEQv;yQ! M.7KWdyhTJ449ouE&Mhֶ_oөKm((')E)6m8٧þ"ǩh _YBNXʇ9AxWNdTn?0۱? ?W*K[`&2F3E<#J;H ]}y[+օ$H-4K}I9'xWVRGY^;Nz.g$>h+SK~bJj>ץ)$}ۄ3=?t94?^}яNntFPvG79>PP?[}E*8;zJ/FmY*FySk鵨8yFރ׾(鑟~Ώ?ˊа/ntNNhFy?_d?oz_z~?t?=p93?LR~?Ǐ=?>N9 c>Ԅz8Ys~;?g@k{_R qG>;9G9~:s'Gx폔yx?9k}&h ,l̾z]\[.>"^ԕ]F@an#vXH>{I`3M-b.ݥ@+Ut $)JUM&ME T(N*QwROMu_ot 96qkkeN.뜹?5 6喟[(fF1=ԋd}=;Ӹ:{Gׂ{glgWRuYG[h9nR_rK:In%ԯ<留>D q8Ϡ=xm|F|dק8kpz SGOyOo5E_zV-UGL@3tIu~<8㹭108r=A^>Ǧ0FxuvTimwvN21A*+: .໵[{[h'ThxR,lctude%H5 d$?zH2}:;SpѤfiۯpi4WOFvg? xͩ K;xS^M\Ǩ4H²Zݵւ#DjC񽕽~:,wj>.=x0kZDE1mx0j1. l-om,-໵[{[ y Z)aHVWF*9XI~#~>Fz|3[laCA4 M< pVIɧ|u8\*a.WB> ;7V8z{JQM>OxEiPbpM+.iTws?i>ڧO:!.MYN6m^ -766\ƌgf]Okov^X?FI(GiRWu?6ҰV[V^]ɕhu_O';8"RXFj ;G+K{$F!wt̑y$x!oۯ6~OsQ˪L4|C_फ2^{YDV+yMy_%К# vjfzr[jv->h%ho.║&wx8F\,`\BNn4ҕn-[U XX%Uijg$8Wk4kQ"x~vEb/gӲ3*n.P~a1G3϶GjKK;[umaGN7v :UbF&Ʈ&<;QWIrN)EWl՛9qsN5-5j%kYꞍc[|ShGt:Cy]%QjgsᕂU+b7Wq='8\;o>,EyGB:z=~O<-Ũ,wnntRwBI zoÝ6[; =:mZ/uyb.UfG(nƒ]},T$6Bڣqeַ̪R)0N2RJRIB)FQqG*׏4o2WYN0dH:Q4W$!MN2I//ۻ o>@¿j&^ugZOtaҭ%ԓNE yVTKi}xZ7ᅌv;x[4_~Z%ZxQEK}; ^ 'ȜNҤprsdqWűs1<`ee9^MȰH2iZe91 J Ӌjg(yqybkTi֫SkV9SΤr+96Wwu~};}oԈ$M@bF4^jWy nelNUBo#.<:\h:w}3A[Yiֱv$.c2;ch vNp_Lv'rp@S?wt9k1mgc;V*xr758՜ܽԗ3=(ҝX\=T,*tJ|ъIŽGʟKorǩA*aJKm"Svrv-ƒ& :R*FC  Gxr֬_\+F4(e; ˃6Ǒ%Τ,ᡍjSiȍ lxJUuAiuӞ񻓱SVo/(+ҝNlĕ줤vk8B:9}q=s?NjΞǿ4}^6o2BzqoƕU,1z~_?Y*3cL߀zz{b0I}[ۯ\@~.r|Cϫ20 s??ʀ}y>#ӸN8ⳗby8Apw!-?W#9~cxA,ʟuI}?\&IgiJbsS%VHyiPIaC>_ZkQu ]ESMʲE$R.#9+̏ _Hc;8P8##Hq׾9=_ uX~Ex^[hz4_mms%]& 9R_|mjxz=%Zpm?^M~x+k~&m~i-Γm}ZbEִM-o-->a| iygi{m=]Z]C-͵I<#G4JK4r"  |<}M}1xŪZJˬ~(ekK sW%X DHMtt[6 p$”E%hao~^ϙGN%ENb:5$*t);7Z ? /nu̩::>kX^ُxV,˨iZ%Iu[uh\ZE em;S 'S|m9Y"kryK"w~*͋χ++U~O4|[ž |glh6_|N_#ETOkEuG1^XjO$ k2|D𞏫i^n_kwjId>%).@o` oykg+9~ZkjstkГ'EP~kXI;8Wy՞BR9ŨΜVo8٭moEgoG?|iK#CZXYgk@Սwo4qC#DXp>5|3ao3C/ ho}jSL@,6 XP#?/m5o:wlo[UGӭ -Q4w7oI#i,}{KYM|5XmZPD1G+a&+8f.gř~Y*O =SSUiuwg^N?1 JZ4ߺڣF)F{כW4(%f~g {{{"'~A/0}zҿ@?L9^Sڗw_o=z_AK>=sLޤz~9L?֓_xs|z+s#/x >g s?:vnTN_OWS4oxC{ 𯉖w7Wnh:̘&;;+15W~Jώ> mQlH[KI/,-`vpY Oϋa7 ⹡us%uhgU9R]'}9XDrĒ+6^R: ߬Jz`zߵ|(E;aY]\KqxN;MK PxwV$5c7'ݎ@r=qqeЅH$ѶOjYI%.&}/F$jFcrrFO.(!q9׎ysOcx#ƌ=999'$D}6׮!D$`qs\cu.9*2``2}j+*pO9:wQ݆}^^c2=.Ve)\F#J:G?9Z ż3inмhyY%s*R LO mjuYsv1#<+.k7r0*yD\dTI_1?^0H>-_+ogfqVjN.KUgmY*gqvpмN6<[31'=g-ﵨnؠ6Sۖ20u% )F B+V״mNRH-our+mlaЫ)PJ7>h*irXN%Ղ Jso{vjw18>E'>2l{Iӏ<^2s8)KȪ~;p=3 {zcq׎td$=qNϑL)䑞HoӚi7NTe#v^Xc'>S׿r8#=Ўߦr:Y2=s'D ={x߹~n*:d@Ϩ=Jxz})_V[i7T.}8C7ugua[Mg{ey\Z\ZA*SA#܉#g^i 1׹7/T՝LRf?~ޟLA~&;/usXKu7"9$ti4u(%a_짆U~\<ޟ^GKż1-v{7g8${˨0">$iZo+e_.K}6B!XQ6:19%}HYP+99$f #`6|WNYN_^_M*+AQqQK3iUW5O ΜU!JIӗ4g.F)/`no=i^4K;m;8akYE4wzϝywK;2*,MY%`󲝸(y>Oy;ީ?'εD~\4yЃ};@\Z6S"R= nӴiY挡R:GpC/V\Xu&ǂXEPQZNIi~Vϡ\T8]#;6 icdw>j\d$Ld9T3H\D8/bKxWvMqmCYTȶѓ!vj.=Jxcºnvik M4R"&x5~wT\HQ>ӍpҴeI6)ژDvo09^%;o]Jݽvvam},{BM/NÝ>zιGix׷$e]`i@Tų"YV>VpZϞkr.uO#UBGuKnh *s|)}z"HT>ch<}\=;n¿?^xݿzg?N᝿j*퍗Mf8,T|ž6mcH2A~#*TeHČ6Ay g9_E<xPKKY>xX:CfB 'P]Mme,w i^=|HҸrC:6D!ԣki0;L7j$$ [{-+E MJujR==vugv99 gۜtɘedÿ|8]$g灜qsH<9=jGn`! \{Mi2ۣ;k߭h˞dc$g;@=x=sKj|r~^\F$jڍe%6vNLG c,4۲i%ݒ[j/ewܴl:~>LhԃA9 y=+CC<|A=xD}KWL6Q23H$a!Y$_:xC|jӭW⟇Z3v}%ז>"H.f/!]kM/2K?>80OV[9r/|pV\왍\V~֭(riiqMˑ4+r7uf׭D]T?+6`0Ym0Ve㷸t/ 躦ZiZͫjqhv rk LfUDs~a~ǯ~<5cp< '7^,/|SIäi~#e:xUZ <̳xׇ⯈8[3&WW.^[+SxƅxΔTi j7|)ߝQ{[g?(Ɠ~3өIBϕ¢QNܪ׃B8rNOLqxy=?sǟ7]>Zmώil.ŴMN^NVu Pֈ\[hlY|/a\<󯤣RzP).y?G[\*N7 ROUF]Fs8q:4ꌲǁz&DE Incu T5oGcuaߒu[ -5kXg*9=~"I!Y^ `ps5brĨ$9R2J5/321=I?O>W,vUwz9剒Yhޏz?-]̮yhAupxN;+jWlEarO@/5pxYz[wQzd=yMws2ԌyG Jm/WwYrݽm[zytZojrx𶾡̑wH NG<%wH5V" 6 [slo"\|ɴ- [#98 b/F9A)h\aofET,#,J夐[/ʧyZ:y(Twm98vץnϸÖup7p]-ѷgбgAgqEEabT\P)L Q %@S섩*J)R3P\4v m7J9\,erI'[ BL†Yp@%PHa2$.[ ) +M;gI+F𭺻}L7Q_[Mr!"f0w73nm BǷtk5ErZG.!XTvrSe}\5=wcpՑ(bHo)" ek+3yf(N]xIo#݅i O&o6ڕP&19)(V(f۽( }&RSJ<]9儵_hvWUּln𞐃T4%ݝoR[ bf`_j?xF7:]rZƿ'$˩IaMIi4,.nQyG"+kHg^=wZm9r!aĮH"K8kdK?K~1xPj0i-=gᦼ~ȥou;&'Wm)KӭGΌIJ\JiW(ӃkITU[Er]>E{^W?N1lbs߷OŒ _l |;?z4sw<;}q<+]=s8A>qiy~_Ϟ^⃟Czݿs^?w<op:hsxg3{|?^3>ux>;Q^A#OC'oxh]@N.0kVoInEZ;AÀpHwvj+BliǃurƷ-G*ӯM9>~//e?̾!xŶM]>T~4h.wPP4uuV*\}_|HFtZTԨiܶSic*J %)P :^U* K݃9cM񾕩"C\"gx"mGo T@ĉH{΃ xK!WCo<;aZijZQm|Z}BFPKz?jk5A"̕բn -mh_k]r n%mgVOXX_T ]/seE'+try#A85ڿ[ٷNN2y=9k5/Hpg1~H*]'RH c9dU'z˦Zǹ*ғmKh=/T\ˆ'qXC$K*98 s>Dv9)$ #W3yFc$8Ri?ỘI/Zqq4>`2$ps$85o: G|q#71+Yys 29[c8P@A5ꫭSO/k+j׷zvaprw$1!xma{Edi``:1ϐ[',փ/K|;aq]B"7麃)9tdпfϊ Tƹ|5$Pi<^baW &amG^k-őaJ[{8JV+EmPgby,[ko^Vz' |bKk?pϩ2X)Ń`pB|S 75-R6~ ekv"F6cplst?_@q ~k,zSV3F>6vn I/7W`#@ X\d0c[긺b*I+;Ovw'9"1kW:TRtUOOIFǒz-x^*{}g_ xzNҴGj&9q5zDQ^c/e\_+yGoB%d@oFM˶yR#&E{!XRW?k*pѼ^g&? R%s$bb7x\-zL=ÿ$K+.1obub\K-NURl\ZnœTEhN1_Rwo NWO BzدerehBezP{58Nk:X濚2($`Q1pg-Jak}s"3HU[V@oQ(<؛o^Kp{})[x$uc=e Ki|k(NL8Hc6 CB8yUJP,[WVNъM.[s?7O]V51*mdmt|"}//f72~ o"ChPau2uek>=p`w |YivV}t,!M;ܩ{epG%'ZT-ѡ[D6xgmCuso.<WVC𽑕 >bۀA[wFE~‰<5Y-ͤZ*0ѽo/sכ٥vdһm඲ўǷol&a7_489;Qۯ㿯#=+D#O~:Q|sS׿!;.>&"B83Jj'5~U%^WkCwէIuա+ptuM XL)5!RK!$3Զߴ- '-ht-7E ιyY@3yeXb2)M6L7~<+ġ5tw(/ ?#%})HfVu-i h 7OKmR:SGn(~˼&ܐͭxz$v'šY;&8Ybکwvf<OѷVRq5N~լ޳LT$$ax8e W~) kt#fId-`˩;qi,(#JNi^֔4:j0/,uI6j7 &Z5N1ϒVWolt&6&K>#-.%ó|ɜJ+חesj2vٴѓcwrrC$Jh^KeZP:ơ~|2sq{-Bp`Tk/+df#&moxx֬el H.$L;FR(B\E'ggu֩%O^::r[ke~oo*:V/ى ׷?6`ylWxCWTp5Z!LoPlA'˙#= ^qi_.[ԵI@ =2K#m䕌(5L]%TcbJILՐX9A*8k֩*}.k]Y٭_~v7 (НYIj^;+T.I&|mg4u igmeDBVP)aw ~ڻAE:X 1A q.B.n\0JqRh&2}9$we B0K`H$u0UmŖR,7b#2Ӛ8I*1MvZSJ5)iVj{F*J6Mw[X[D,U՛`?L <\iARIqvsZaj^ ˴H A: 4xZh|=xS`,əAi:I5K4IdcQ,NgG~]Nx[:һ5,|'nYI$8]6{2FҬi= $2B^{}>k{i'.%`M|Iˡ/)KiH|.IשNmԚPrjJJky6YYKqӛ^.iYUEٴsK+&VnƱ]~veU"Q#IJBXG*:y~ Ztڟ#ppLQ.[`Gܼ X/Mәtrq>]s-bpK2sImei9]#E>vXؤ,Ydo2740R*woVկy%4ҊMϣI;ڼZE=QMtާHſVGmxSF[fIz&P1}:n5KEqkDXb"DDEUUUUT@€01{kYua$ x;F,4^,_X>L`  \HJ,RG;?^_d-YʥP>v~88arzRR&r)j-#M]^“! Lk:#GC+>9$}/~#/z3ތA|h{}Q+{uHsS{{g>yip=@}hr=r} L/qgwr~_OOL9v3JL~zׁ~V0?%A8s:,:hyQOOԖX׌ZP0K(Qp@9O+ht\h4Q|gҮ/T1\ #p%,6"/gBΪ*9/ƙ&6HtFѼG&,I?|?xN&1&4ϯ]+M^y3$p宛ƍ<QxkKUn/'{b숖d\$Q5RqSHN|}ml}4Qv>m%UZSJPi&WZ.vmsIJ)jnVӵ0n[/xe/L4cQ#6֒eD7 B:)8\q)uw;iim H)gg8~2~КjK[D"G-t6zW6W^:G*bM!pѽʺH :d/;hQmkR!+)M |:X<66ok 3i <⛂emci7;pgCW cEdʍV9(4[UTej]ZEa0+FHNq iNm-J|KQ>jާqu]"w%Ci ḏYI0p ǔ,Eg2Bd ժĒlv  .#z޾.1pR-#/>Kq":gY6pXIӑIvغ}nL)ohd3ubI>$F;*rkɾVFήݚg%̥&979My;7)lۻOD;~WӳtzDsU#e!--|]{ V*75q4/R &|T( \^g,ZMŵs}w]Sɂ=29.+^X,]vSC3(?|OKhS%~]xS q 2K,z)*hT~JI-.*,-\\|*qn:ΣJS{IF/x_b:v5ΣL X!!%HWssçzW IP%8Rf>Weuݝ_BxlEV qU: _Uf'R?v߿b'np9~K׶?,3~>=KON}O8?G_=('_G<âl/?㾟q@ Ƕ?chA|G?}=zgo_@ixOo8&x}:Rr;'q⹟-"ֻ#Dniw6 ʠ@tё;?JQRRN-wMYi44^OsOּ=zZR܃%태J [ʂx®.b._V-7025֙%H{۴%}G?,b` i<1jx3=/XWx4ˢi 2]5⹷-3bUhs;Ć,Fn.\,PJO/Kqwui=YSiˑANOwowɯ4D⿔=J!ap$۝"Y1OB nd5hb7,?.X2^2|:xGKkIR52pM4~bڸ(JCp$JqrJ+٦ӻ[+u>Q[}c Y%L~tRƆHLVQ8-$7CpjOc"%34P빴  U|UԊjġcPH]Atn _*2#:}֮VyqK$>ImK$vXK(gݩ~}aNmhӧDvk{i\)j*OE+h֥+;Ϭ+"YR4K=@dZiY3meO& 5 \u[L]E---ev3\XK [so tdJ)F+P,VE<;m_Tz|c~SWh}&Q&ylze7!bDa|Q⯆-tK⾻os/L4 &N̔WedwZ|,cw%w[mQv#mGkM8ә引č51kC ]ڢzDqUcr.f(xuZmЇ@7xwJN_j,>R%|4+\,eVTOT7XN@SUo5Mu4}4Gk#N4˨aUk0σ6M5孝wi6:SERx,0r6**kKD׽5֊6Y|X1eVm VJ$!gd|TTV,;qMok |З*#2 4i:aAd+C]s_46i]h&i,/-ei\=٨@=̗b?6(GijtȖ+Qo8 XnuUԾLֲl.P?g/eu+ &{,CJ`wWDK%e-iuNQݤQܝ읝S93eRQnNq9mծ߻ewov]J<:':B^I1 1gi %S'95o/?I5&PSƣGYEc6W0;fM>B[} ោ $7i]5I:N5ã aS!FiRSbu E^NZziߡ|/3*zdX_fм<62P0It]?TRfWxr~{׾4dmIy?d]E*ܾc5K{ H\kxf "Ƨlj%pleG*kיa rY0 [8l~T!F_< 86nO>YQ7atkg?9D#NVt>Rv}?/p?cیңJ8ңNZ0EWݟ{ҍ 5Xz0V*08G1I]{m>_=ǰK<h:L:߶{ֆ@8>7ޔǏ?Ȥ=@:忖^cNG?)K':!@#sn;v>_bz`ўO'<nhw=0s;H?:\x^w/>OԝGnT`gFG@?Q_{~IǠw 7txXλk#\tv sF57:G4e]'ígįx TiX  ݌ ?s? wYn.L*>Uj0On X%HW_Y{zq|2s-A]-<ƒGA^QQkjtZgC;[?kyd!IK -iR&h@_y2{㘍vRG.O"%R?itYO:Ė<$sӦCSmNVrۛӇ#,D%J l,ܛd~&-x-BŎ2NdkԵC$9;̀@8\d {H8݌ '=}~g=͸ erÜs1)ޟCw-~g]eTZC}A2 .qs3< 2J I w;t߇5IWF-t `kw"A3?AӾͪa-KwUWڱ[}[S^-EU i巡buM_ami5ӱ*p/ݎ뭝ߔTz~oO^8G:#M- fg/Xc[JV)I.}\5xCC ͂r1j"5$-F6z(ׅ<5& š"b?H(i8ɷt^icqO[?^ ;Ju/M5╟>WG. JZAmom33JMҼ7dz}$NM{!Pq}sq9v|U?A|>cI%%=RQI%I$ _Nyzс?q>ׁߢLb;G?㿮?&8?N(A|Þ1@?_1?*093O۷~{сOO(П?G>3u_;?q@<}?>ק<Ïz02OyҎi0=l߷?h3G?"灿u@N;)34GFNG=8{qނy?y3?u';hϹ?gc)'<ޟj9 #Pȥ$+te*H ?_??@IE|_Դh<^aV7ZWO@H!xn`q7u<9d_m"G3M3ݣV8)Q8jPnW6p#x@Y\~:Dϥq+YSk^[\W6j:n0uj1nY[9UϧʥI"},#c9UdQM:nݒaVQju'OOv-ۚk4ީ#y<#7夺5۶Ei4"Eq ڽMa-xw> 8_,+<[ĥ\#d`5;ɧ ^RHrtǬGO|5[閐Z,0^Y/q T,`6TK9w|GvүC1x--FYVaiFRQ;K_ym.n/ZojϛKg{E%p^vѫk:"ˑ&?hv$dW)M^]}YDWL+K#mӭT Vp2_a"hz>'BQY,)D$oy߄p^ɍ[4G+gIYeq 0dEl]Q-M\_=~PY#hc%R}3 aG"|VW @WEC k ʐA QXc4P4E Sw<z|Fҩ-fjkM,~C/Jkϼ5_:V:&]k aci 8`1#W<5ݟOs/oM$Z$K߶ۯ?ZLvK'>@Q7qn?M4v<Xh1:~J2y׳Fzr^}j2q>Gn=>Q߯?^G?*\G>Z\=zqן7uX_<qFxz|g1r:QFz_=y|@37~('*Lc=G){g{ 'N@ q/ڗϠr?O=qҀv=?~}䎽.p~XIǷOF= {wt^rz?~8j0q׷_L mlY<{7_׷~oў_9>J~*x~n?m?D_E"_U:yP $6+`^{~[k|\}_Jbevcf}7VtJ >`m.6[Ys< cpeڤuIvj𗓾# A;M5:rӋKsk6G{e'k}a 8eR)g =H`Y.p LܣW\K4s)HvේUGZH6 })&o FY)uWXUx!H|c$Dc?  xǞ+84 WZ__HWlup[|0e$ukrMEme?9էEHY ֔գ=n5[n?سolQH(JW$Zk_^s `n/u4M&ݵVUmU2Ɏ26m2DFan~!~ k㯊>;"x.k}wAfoFTyV̠_mxHu&%/}cź+Wg#c{+,U@<._`)]km=F˵kqEQ9&TnoTeN/kU~c|Eio#k,`}KdziE\&ych˯ ȡ_c -Oox*[k\>!mnӧ-yoxz߰{9^ B֨f$U`Xp<=Z쾳]>ooY)tpJ;}s0 =Q;=9F6|9߭s GC}k>=W?[ڛ_ {nM/lT`*}zR_Nޝ?gQ[Pz/882? N}'W(㞜߯)28޿lz@_O^JNyzrq?ʃ~߯n?|z{@?{9<~xx^?a;v}^WG9xvsI?~Ӹlh矽/__{ӧG8?{e2>t #oӠ^'Hr{7i8zvF@?_>霃=yG'?Ɨ'[z`}h;usױ@<Ƿ'^q<`~h9k=xh3_Gy9ߞzqG<x x3=hN{Ӛ\t}۞6v@}=Fy<?ȠOSg8֌t_QIoC/M&a=Cú>t#c[[r[XdMӦ4%>? (|3^]='.>{,1B>e7rf|9Es@{vQ>ⲍ 0B#RmMEs6{tҲo[]saiVBkwYB>nYY/u5v|Qsz2zd^.?1p0z/:yc'_K܎{ߎsN:g}sG//9xep1swzoU&xtA>~^g$wiPsx>=hϿ?zXG^Nz/|u)rx܌^GZL\?N}{cޝ_y_E3shs?}9_~ips$~J9篧E4?קoؚPy}yP3^3;dqG^\1@ |~?QcA> startxref 42506 %%EOF malware « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

malware

Vaccinate your pc

Friday, November 9th, 2012

Every year you have to go to your doctor to get an anti-flu injection. You have to get one every year because the influenza virus mutates and adapts every year into a new strain. Computer viruses are exactly the same! Here are a few handy tips and hints to ensure the whole process is as painless as possible. But first things first –

  • Use an AntiVirus Software – It is very important that your computer has an antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and therefore infect yourself.

See this link for a listing of some online/stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software –  There is no point running an antivirus program if you do not make sure it has all the latest updates available to it. If you do not update the software, it will not know about any new viruses, trojans, worms, etc that have been released into the wild since you installed the program. Then if a new infection appears in your computer, the antivirus program will not know that it is bad, and not alert you when you run it and become infected. Therefore it is imperative that you update your Antivirus software at least once a week (Even more if you wish) so that you are protected from all the latest threats. If you are lucky then you will have an anti-virus product that will update itself automatically via the internet, but never blindly trust this. A large number of the more virulent viruses and trojans can deactivate your anti-virus software’s updating functions.
  • Install an Anti-Spyware Program – Just as you installed and use an antivirus program, it is essential these days to use a Spyware protection and removal program. These programs can be used to scan your computer for spyware, dialers, browser hijackers, and other programs that are malicious in nature. The 4 program that I recommend are SuperAnti-SpywareSpybot – Search and Destroy, andLavasoft’s Ad-Aware, and Windows Defender.A tutorial on using some of these programs can be found below:

Using Spybot – Search & Destroy to remove Spyware , Malware, and Hijackers

Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Commercial Spyware Removal/Protection Programs – If you feel more comfortable installing a commercial Spyware removal program then I recommend WebRoot’s Spysweeper or Lavasoft’s Ad-Aware Professional. Both are fair products and a worthy addition to the arsenal of software protecting your computer.

Spysweeper Product Information

  • Occasionally Run Online Virus Scans – Unfortunately not all antivirus programs are created equal. Each program may find infections that other antivirus programs do not and vice-versa. It is therefore recommended that you occasionally run some free online antivirus scanners to make sure that you are not infected with items that your particular antivirus program does not know how to find. Three online scanners that we recommend are:

Every once in a while, maybe once every 2 weeks, run one or both of these scanners to see if they find anything that may have been missed by your locally installed antivirus software. Believe me, you will not regret it!

ARTICLE BY David Wiles, GERGA

For regular updates on the latest spam, malware and ransomware threats, please check or blog regularly.

Scam: Cancellation Of Debit Order (Absa)

Monday, October 29th, 2012

Please note the following phishing scam: These scams are becoming far more fine-tuned to South African victims and especially university accounts. Earlier this month there was a specific scam using Alexander-Forbes as a means to attack, Alexander-Forbes being the university’s preferred consultant for insurance, medical aid consultancy etc. Barely a week later Virgin Active’s name was used to attempt to scam university personnel. This week it is the turn of Outsurance. The e-mails are virtually identical, only the names and the servers in the background change, but you should be able to see that they are homing more and more to South African users, which tells me one thing that either they are getting this information from South African victims or these scamming operations are South-African based.   Here is an expurgated version of the scam. Please take note and be very careful!  From: Absa [mailto:ibt@onlinedata.co.za] Sent: 29 October 2012 01:46 PM To: Name <university_email@address.goes.here> Subject: Cancellation Of Debit Order(Absa) Dear Customer, We received a Debit Order alert on your account this morning from Outsurance Insurance Company to deduct the sum of R3150.00 from your account. If you don’t want to authorized this Debit Order you can cancel by following the instruction below. Click below to Cancel the Debit Order on your profile. You will receive a message on your cellphone with a link, type in the last Eight digit RVN on the SMS message to complete the cancellation. click here to Cancel. . Regards, Security Department

(INFORMATION SUPPLIED BY DAVID WILES)

What is ransomware?

Friday, October 12th, 2012

The term ransomware will leave most people flabbergasted. How can software hold something ransom or is technology becoming so clever it can take over anything?

However, this description isn’t as far-fetched as it seems. Ransomware forms part of a group of malicious computer software called malware,  which cunningly installs itself on your pc and then has t he audacity to demand data or money from you. This type of programme can be installed by means of an e-mail attachment, an infected programme or unsafe website with malware installed on it. Ransomware” is also known as a a cryptoviruscryptotrojan or cryptoworm.

The software indeed “kidnaps” your data by encrypting or limiting your access to it and then sending you a message demanding money to regain your access.  The only way access is possible again, is by acquiring an encryption key from the creator of the ransomware at a fee.

A more recent version of the software will not notify the user that ransomware has been installed, but will merely block all access to the data and depend on the victim to search the internet for information on their “problem”. This search will then lead them to legit websites selling software to remove the ransomware, which of course is sold by the creator of the original culprit.

Ransomware is nothing new. In 1996 security experts at Columbia University and IBM wrote an essay called “Cryptovirology: Extortion-Based Security Threats and Countermeasures” to describe the software. At that time businesses were the main targets of ransomware and not individuals.

In March 2006 ransomware called Crypzip of Zippo was sent to a group of internet users. Those who received the programme also received an e-mail demanding a ransom of $300 if they wanted to access their data again.

Most antivirus vendors have ways of detecting and blocking the most known ransomware. However, no data is 100% safe. To ensure you don’t find yourself in this tricky situation, try to back up data regularly, be cautious when browsing the internet and under no circumstances open e-mail attachments from unknown sources.

More info on the latest ransomware targeting Skype users.

SOURCE: Wikipedia, Microsoft en Techtarget.

New malware warning doing the rounds

Tuesday, October 9th, 2012

Incidences of malware infecting computers on campus have been reported the past week. If a window from an unknown source warns of a virus, do not attempt to click on the close button or move the window as this will in fact activate malware. The window can only be closed with the Task manager.

IT Service Desk: 021 808 4367

Money gone phishing?

Friday, May 11th, 2012

The second you connect to the internet you put yourself at risk. Scary thought, but we tend to forget just how vulnerable we are and the easy targets we become when we’re not careful about our safety on the internet.

As an internet user you expose yourself on a daily basis to malicious software and the possibility of data theft. This includes phishing. Phishing scams use bogus e-mails and Web sites that seem legitimate but are actually designed to trick users into revealing personal and financial information. Computer criminals can then use the data to spy on or blackmail users, hijack their online accounts (including bank accounts), spread rumors, or operate under the victim’s identity.

According to our local Stellenbosch ABSA branch there are still some Stellenbosch University staff who fall prey to cybercriminals by clicking on phishing emails. To make sure you don’t become a victim, read more on phishing on IT’s self help wiki.

SOURCE: www.cnet.com

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.