%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 12 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 14 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250703042811+00'00') /ModDate (D:20250703042811+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 3690 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 80.009 521.469 666.725 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 80.009 l 565.984 80.009 l 565.984 745.984 l f 45.266 746.734 m 45.266 80.009 l 46.016 80.009 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(SALARY INCREASE E-MAIL NOT QUITE GOOD NEWS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(April 04,2017)] TJ ET BT 159.575 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 174.083 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Several of our observant personnel have picked up that a very suspicious e-mail is making the rounds at the moment.)] TJ ET BT 61.016 617.431 Td /F4 9.0 Tf [(The subject is NOTIFICATION: Your 13.69% Salary Increase.)] TJ ET BT 61.016 597.442 Td /F4 9.0 Tf [(This is a very dangerous e-mail. Clicking on the link will take you to a )] TJ ET BT 337.613 597.442 Td /F1 9.0 Tf [(forged version of the SUN e-HR site)] TJ ET BT 490.136 597.442 Td /F4 9.0 Tf [(. If you enter )] TJ ET BT 61.016 586.453 Td /F4 9.0 Tf [(your username and password \(because the site looks like the SUN e-HR site\), the criminals will have been given access )] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(to your personal details on SUN e-HR. The ramifications of this will mean that the scammers will potentially be able to get )] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(details such as your banking details, ID number, place of residence, that are all stored on the SUN e-HR system. They will )] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(potentially then be able to steal your salary.)] TJ ET BT 61.016 533.497 Td /F4 9.0 Tf [(The e-mail contains the following message:)] TJ ET 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 523.799 m 306.516 523.799 l 305.766 523.049 l 305.766 523.049 l f 1.000 1.000 1.000 rg 1.000 1.000 1.000 RG 305.016 521.549 m 306.516 521.549 l 305.766 522.299 l 305.766 522.299 l f 306.516 523.799 m 306.516 521.549 l 305.766 522.299 l 305.766 523.049 l f 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 523.799 m 305.016 521.549 l 305.766 522.299 l 305.766 523.049 l f 0.153 0.153 0.153 rg BT 61.016 503.758 Td /F4 9.0 Tf [(Hello,)] TJ ET BT 61.016 481.969 Td /F4 9.0 Tf [(Attached herewith are two \(2\) documents summarizing your April salary as reviewed for a 13.69% merit increase in )] TJ ET BT 61.016 470.980 Td /F4 9.0 Tf [(Financial Year 2017.)] TJ ET BT 61.016 449.191 Td /F4 9.0 Tf [(This review is with immediate effect starting Friday April 28th Paycheque.)] TJ ET BT 61.016 429.202 Td /F4 9.0 Tf [(Deductions and bonuses are advised therein)] TJ ET BT 61.016 407.413 Td /F4 9.0 Tf [(The documents are attached below:)] TJ ET BT 61.016 387.424 Td /F4 9.0 Tf [()] TJ ET 0.592 0.592 0.592 rg 305.016 377.726 m 306.516 377.726 l 305.766 376.976 l 305.766 376.976 l f 1.000 1.000 1.000 rg 1.000 1.000 1.000 RG 305.016 375.476 m 306.516 375.476 l 305.766 376.226 l 305.766 376.226 l f 306.516 377.726 m 306.516 375.476 l 305.766 376.226 l 305.766 376.976 l f 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 377.726 m 305.016 375.476 l 305.766 376.226 l 305.766 376.976 l f 0.153 0.153 0.153 rg BT 61.016 357.685 Td /F4 9.0 Tf [()] TJ ET BT 61.016 337.696 Td /F4 9.0 Tf [(Below is what the forged site looks like. The address is not a university server BUT very few people notice such details )] TJ ET BT 61.016 326.707 Td /F4 9.0 Tf [(and tend to skim over them.)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Page /Parent 3 0 R /Contents 13 0 R >> endobj 13 0 obj << /Length 944 >> stream 0.153 0.153 0.153 rg 0.592 0.592 0.592 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 403.300 521.469 354.684 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 403.300 m 566.734 403.300 l 565.984 404.050 l 46.016 404.050 l f 566.734 757.984 m 566.734 403.300 l 565.984 404.050 l 565.984 757.984 l f 45.266 757.984 m 45.266 403.300 l 46.016 404.050 l 46.016 757.984 l f 61.016 419.050 m 550.984 419.050 l 550.984 419.800 l 61.016 419.800 l f q 375.000 0 0 226.500 61.016 522.484 cm /I1 Do Q 0.153 0.153 0.153 rg BT 61.016 504.693 Td /F4 9.0 Tf [()] TJ ET BT 603.005 484.704 Td /F4 9.0 Tf [([ARTICLE )] TJ ET BT 631.508 473.715 Td /F4 9.0 Tf [(BY )] TJ ET BT 620.510 462.726 Td /F4 9.0 Tf [(David )] TJ ET BT 621.518 451.737 Td /F4 9.0 Tf [(Wiles])] TJ ET 0.400 0.400 0.400 rg BT 61.016 433.248 Td /F2 9.0 Tf [(Posted in:E-mail,Security | Tagged:Phishing,Security | With 0 comments)] TJ ET endstream endobj 14 0 obj << /Type /XObject /Subtype /Image /Width 500 /Height 302 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 18075>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$." }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?i$hHT );r7^\EXv-77?wxY?dTae>}1ڭ3 l[[vI3K,P}@Q6u)V#]X:9䵩5y$c6#8̞nΜ.V+g_&cC k9蟐9ꄮ <7#nѼ1I~/iY #KNsZDFm-7n߭k^n7rx~t⽽#_LvIӬ3u%63#y#<;JOCJicxv"M_΢5->4M&(MVC`w?jE&Nkcrx~tn_κMQJ/FۧӷFv(ܿnNtw(ܿm;morx~tn_κM;morx~tn_κMQOҀ9ѹ?:6ӿFw(ܿnNtw(ܿmFw(ܿm;mҀ9ѹ?:6ӿFw(ܿnN&?J/FaNߥtw(ܿnNtw( h& XJc| 9 utw(ۧӿ@LV3$S20.ǷXh7+6|Îiw!_ i.O{Ou] Aoo,w6$&Nb>ee/m>;ϲQ>N]sp3B~&9ѩ PdBI=$UiFHAS5W֑vD/q2AcMky4֛(ʐ(Wb{>z3ˎ{=jC_*Fچ!jP˨0+@WF9TrRVZ?1ٿƠmoXsjʣ7?K1Y_j Wae&VA;3k?L46֩qAfa E&ic*(YMI?ڷYt?Sӗ qk$%.gcl1Ƹ9)u{bsd Eu9}/!Sc} gi/=<+!-p϶8\8!$=ZIWP2*U< =Qnu0ZkïrcL6'ҭ4 uk@bl=?T!ʛCN>WN6׏owa-(O)\qhԣJ $:gOJOrg57v}$jd)2[e Oj\#E89?1LU Xj$rmI<tc>_?>&N맟[OOis5*m_`m?-#8q܏p>LVv9x4ڷ׋{4ַ@[OOih&P @)gӮB2ҧ+WN`:숷fk=Һ%?M4Z%?Mx$?뭮"~2*/C~'D9[{1cC?fk^6/ |~U^Ɵ`;hL &h=DЭ 5l$O?o AjwgǮm~?ז$FhAV \[O@N:GeN1nDB:W==;]1-_-[u-%K/m+ЀMCHeeve3)XoUg==8dᗙa}Y|t~l=Mu i zJ,;pGr[>oku{no)8vd]b:#n ǖ0Fr=XN"k_`x59i'먬47Ɲ I?_ka˻0,?M? tc-fkE.86;bϳ¡кyGk`w?sGiq}9] ׇq}5Gk`g)~?QKrסQG0{I3P{ k߸}E'޽(5{DcMG>Ƹ]KPA g%!Gqz DaM&z)I[mA`}qޫG2\*G %I z.쌰E2p' JA>{%DM q:(Sx:qEWFz+60_I a*OҮ]X[Mz豹|a+.r:wbca,e?Üt,kJUNXa٥! Ì,\^?a4ѣ{iawnIk#Js.pO ÷}$lHHROƣ׮.C$e `6:dz4O"mݻ-kfT)juev 9RY7? 4pw,>5yg72?נR}pJ|=IiPePssVp0i[[eOYhc*SKp^Gt~4XȒWRxx y#^-4c24VVm<Oᾝ[-rX^%hJbQrobOx@ykmL sҸ_KL> mQC('8FFO<TwV}V5YI_D=NHZ4}bKr*YQuk*U~Nawp%%Mc:ܶݩ܌̀~V};}ҷt?hluـyl($SUtͨ]5틽E,s3hzt"gUŵvgS_幷Ӧ53\]^]@!:a[~mOpIcf׶!$E.܂Oߞ+mN_ t5 6C$ +V$ڢ𧊵&oX5,p8=;5c6}wY ˥plAps8iOi˻] 1+ #S*%'ޟ[FfO|XRG_Q3sé كml% ,ʹ#dgjwdY$O-9B1[>誟1dinP~#'NRz9#Z#QG.\!-6qX8kbmv#P"`cںM+RZUU }7&][򞓧ZXͧI&<,d#`v =p}yo5e),* >b)'>5"cB2eמ\.9-N]Y'="S^GՔıL g~Q wZ=N8+mr۹JX@W+p;jZۦSʹ l`Xgv3qy?vl7H>ͮË[Fa T=ywjV +%+xb$yǦOshI=T9'ϭh3 ( ( ( ( (ƏƊ(((?( ?(Ɗ(??(Ɗ(~=o^rQGǯ?J+ '_2i_K;f0Im.߶^Y=+}'H,!9֒5#4hysu_>I/,PCBc2Ir`N܃PhfM] 1.pzL÷Ԟ=s$zasG[[4YM㉑d r+kZ񧆮7OtyRA5U'̹O98Z5<ͦKcV!om+ CTwsg8:DkYYnʏ5㖋_a[;¶^Ѥf@G']3C]6#Pxyd!+Nx]SL{0,2ZLgr~a吧8ϧ7>=/}ew!rY=,JN>d7mO< yAN1j2v;QA+7#'ns]u? Zvj% !D 0 gM o\[r0N) <_5-{JJ|2E1/2[Lq/O7;Gsi.P hİ,=1 O]EJB!FrA\ s\>Teh $\L2#q?>?:"KqB8P!A*~X6{{ =r H.m%hmRgb28W'q׸5#h-հ%y 2d g=@Ow4;?mi#bHn0vN~to>[C##ddgZF$KtًO膷+bCF})|WmW@,2X~ioQB(\G45ؒJ8Qg#+դQpK.uo(@ »D`ELVmx\߅T]Y<5Gs^+<1=3}i$iæXCGkX's(p(((((((((((((((~=o^rQGǯ?J+ '_=^'u(nl">U$Z?Q1\|rcpׂI]j{,㵖)N$۲r}qv_:)m q Ӟ>NvVk=V}*:$7D 71g^? M^O0g߶"[t,bEͭQ7yv LƵhdH{5L.hZ gs>}~-#!m xM:? 50z|Ú^[q2tM)8| R@'boe^dUR*2zt%A]g{sxkRbOmO#sۯ}4mD֧3E#A4ddHKG7ORO83DZ!=o^rQ^Qk:_^L/hS3~U/u} ( ) F43_z?N#iZAxGD) OtB6HX I5`:%b?sJuF c#3EҬ]Vd3Zo.<=[V+?֝qn~q(El?^ Atm=+lԍYS8R.6Wh%q\R4pbi$ȰlҾe"p{ SaZ\ Y;Oozk9ʦAtAivTjE,F2YOBuf?|:s oYCab}E]OW.-N8?U]Y]:s \>t~5'HТƬg^m5u)]BiSRqh|ȷET(((((((((8(((( ( (<'v%|z#䢽?x#~6[[oRy}?¼+TU_>|ϼ5(arWh5(arW}G+ }?“? 9X\EUEGy>kGQ*y>kGQϚrjϘ(? 9B*y>kGQϚrjϘ(? 9X\EU? <_?ŽV-QU~y>cϼ1GQ*y>kGSk5U'rQHaEPE (QFh3EQEQEQEQEQEQEQEQEQFh(((~=o^rQGǯ?J+ '_=VԍЌG9_m<Z~`3YQ688Τ/mho(eYxmjhPE?m<Z~XNg2y7(zǷNMqtǤKlСe]%$n<<son^VK"6"yvI*e]"P%>[}ncܸsؿgOo֏?rr][?'48g-ڍ| ߕ/gOG֏?rb̧~l9_|Һ} /^3x^2VѸ6cxmih{ycȼV&v l  m<Z?x>XBp3,a Sy\G|o^Z P$\UO(ƜFr$e?m<ZQ4{(vk"֏?QQC{YxmjhȽmT|GhPE?m<ZQ4{(vk"֏?QQC{YxmjhȽmT|GhPE?m<Z<1>|gz)>;k`7 ?yn?Z{տu_>B^=YGRGWG}*Q|cW|G})s!ɥcm$W 6~m1KȬs>s5'ҏ$R_#'O"/ XBE0E7"J]!A#23]})+{/o޵4u5R^- JLJy'Ҏp(^y^{>y'Ҏp)y^ƓI>s!G]OI9 >W/j}(ORWI>s!K4W^OI9 ^W}(OQ}(OQ}(OR'WG}(Biy'Ҏp(^y^{>y'Ҏp(^y^{>:RC><k`7VWO.$}۱S~ʿ?|~!izO(=3 k#氲EJ/^,#T;V2O]x*xT}*|RoYHa%w8IWzMpGQ8/o/GRWM@k¾@G]3QE?WZt¾@GO]3QE?WZt¾@G>_>/gW#;Q}ڏG}?}v__#ϲ/G_|Fvi 7 O.u?}v_#ϲ/G_|Fvi 7 O._0Gџd_ʏ/_9¾@Goj?]aϷ|>ȿ?d_ʾs}ڏG+-?aϧ|>ȿ?d_ʾs}ڏG+-??|OF}*>ȿ?| 7 O.WZtge>>"|T}*oj?]#;Qϧ?}?}E"|U+-??_|FviO]3QE?WZt¾@G>_>/gW#;Q}ڏG}?}v__#ϲ/G_|Fvi 7 O._0Gџd_ʏ/_9¾@Goj?]aϧ|>ȿ?d_ʾs}ڏG+-??|OF}*>ȿ?| 7 O.WZtge>>"|T}*oj?]#;Qϧ?}?}E"|U+-??_FviO]3QE?WZt¾@G>_>/gW#;Q}ڏG}?}v__#ϲ/G_Fvi 7 O._0Gџd_ʏ/_9¾@Goj?]aϧ|>ȿ?d_ʾs}ڏG+-??|OF}*>ʿ+?WZur5HJ]zCǨ`R/|o@}*>ȿ?x4fx[l034E!mեRr `qs:C~ܿJ>ȿ+GF/u%JjjÒs2'#S\psyý?~Ϸd_}WMka~S=~aiG]q1hK01n_?'ǾW)}mEW@QEQEQEQEQEQEQEQEQEQEQ(((@Q@Q((((((((((((((%||#䢾 (%HQE|Q(J1KEPR((-QEJZ((())h((JZ(((QEP1Eb(PEPEP( ( (b(>o^rQGm?J+0W$( ( (Z))h )( ))hZ( ( ))h(JZ(((( (( ))h(( ))hJZ(>>xGE?u9( >_>+l((((((((((((((((((((((((((((((%||C 7x#J(|’J)hJZ())hJZ())h(())h(J)h((J)h))h))hJZ(JZ(%||#䢾 (%H(=((JZ(Z)(JZ))h ))h ( ( (JZ( ( ))h(Z(JZ( ))h((((((翏:ׄQG[C 7x#J(|Š((((((((((((((((((((((((((((((>o^rQGm?J+0W$k3zyzy񯞹tVgGEҥ/?Ə/?ƋIY__J?眿?眿.o> startxref 24079 %%EOF security « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

security

Step Up to Stronger Passwords

Tuesday, October 5th, 2021

Weak and reused passwords continue to be a common entry point for account or identity takeover and network intrusions. Simple steps and tools exist to help you achieve unique, strong passwords for your accounts.

 A password is often all that stands between you and sensitive data. It’s also often all that stands between a cyber criminal and your account. Below are tips to help you create stronger passwords, manage them more easily, and take one further step to protect against account theft.

  • Always: Use a unique password for each account so one compromised password does not put all of your accounts at risk of takeover.
  • Good: A good password is 10 or more characters in length, with a combination of uppercase and lowercase letters, plus numbers and/or symbols — such as pAMPh$3let. Complex passwords can be challenging to remember for even one site, let alone using multiple passwords for multiple sites; strong passwords are also difficult to type on a smartphone keyboard (for an easy password management option, see “best” below).
  • Better: A passphrase uses a combination of words to achieve a length of 20 or more characters. That additional length makes it’s exponentially harder for hackers to crack, yet a passphrase is easier for you to remember and more natural to type. To create a passphrase, generate four or more random words from a dictionary, mix in uppercase letters, and add a number or symbol to make it even stronger — such as rubbishconsiderGREENSwim$3. You’ll still find it challenging to remember multiple passphrases, though, so read on.
  • Best: The strongest passwords are created by password managers — software that generates and keeps track of complex and unique passwords for all of your accounts. All you need to remember is one complex password or passphrase to access your password manager. With a password manager, you can look up passwords when you need them, copy and paste from the vault, or use functionality within the software to log you in automatically. Best practice is to add two-step verification to your password manager account. Keep reading!
  • Step it up! When you use two-step verification (a.k.a., two-factor authentication or login approval), a stolen password doesn’t result in a stolen account. Anytime your account is logged into from a new device, you receive an authorization check on your smartphone or another registered device. Without that second piece, a password thief can’t get into your account. It’s the single best way to protect your account from cyber criminals.

Resources

 

Compromised student account used for phishing

Tuesday, April 18th, 2017

Just because mail seems to come from a university address, doesn’t mean to say that it is legitimate.

The latest phishing scam making its rounds at the university is being sent from a compromised student account. The subject line is all in capital letters and is meant to frighten you into clicking on a link and filling in your details. This is probably how the student account that is now sending it was originally compromised.

This is a typical phishing scam. Do not respond or click on any of the links. Many thanks to all the observant students who picked it up and pointed it out to us.

Below is an example of the mail (with the dangerous bits removed)


 

From: Compromised, Student account <12345678@sun.ac.za>
Sent: Monday, 17 April 2017 12:19 PM
To: fake@email.address
Subject: YOUR EMAIL ACCOUNT HAS BEEN COMPROMISED

 

Certify Your email HERE


[ARTICLE BY DAVID WILES]

Don’t Be Fooled. Protect Yourself and Your Identity

Wednesday, April 5th, 2017

According to the US Department of Justice, more than 17 million Americans were victims of identity theft in 2014. EDUCAUSE research shows that 21 percent of respondents to the annual ECAR student study have had an online account hacked, and 14 percent have had a computer, tablet, or smartphone stolen. Online fraud is an ongoing risk. The following tips can help you prevent identity theft.

  • Read your credit card, bank, and pay statements carefully each month. Look for unusual or unexpected transactions. Remember also to review recurring bill charges and other important personal account information.
  • Review your health insurance plan statements and claims. Look for unusual or unexpected transactions.
  • Shred it! Shred any documents with personal, financial, or medical information before you throw them away.
  • Take advantage of free annual credit reports. In South Africa TransUnion, Experian and CompuShare can provide these reports.
  • If a request for your personal info doesn’t feel right, do not feel obligated to respond! Legitimate companies won’t ask for personal information such as your ID number, password, or account number in a pop-up ad, e-mail, SMS, or unsolicited phone call.
  • Limit the personal information you share on social media. Also, check your privacy settings every time you update an application or operating system (or at least every few months).
  • Put a password on it. Protect your online accounts and mobile devices with strong, unique passwords or passphrases.
  • Limit use of public Wi-Fi. Be careful when using free Wi-Fi, which may not be secure. Do not access online banking information or other sensitive accounts from public Wi-Fi.
  • Secure your devices. Encrypt your hard drive, use a VPN, and ensure that your systems, apps, antivirus software, and plug-ins are up-to-date.

 

Salary increase e-mail not quite good news

Tuesday, April 4th, 2017

Several of our observant personnel have picked up that a very suspicious e-mail is making the rounds at the moment.

The subject is “NOTIFICATION: Your 13.69% Salary Increase”. 

This is a very dangerous e-mail. Clicking on the link will take you to a forged version of the SUN e-HR site. If you enter your username and password (because the site looks like the SUN e-HR site), the criminals will have been given access to your personal details on SUN e-HR. The ramifications of this will mean that the scammers will potentially be able to get details such as your banking details, ID number, place of residence, that are all stored on the SUN e-HR system. They will potentially then be able to steal your salary.

The e-mail contains the following message:


Hello,

Attached herewith are two (2) documents summarizing your April salary as reviewed for a 13.69% merit increase in Financial Year 2017.

This review is with immediate effect starting Friday April 28th Paycheque.

Deductions and bonuses are advised therein

The documents are attached below:


 

Below is what the forged site looks like. The address is not a university server BUT very few people notice such details and tend to skim over them.

 

[ARTICLE BY David Wiles]

Office365 phishing e-mail

Friday, March 3rd, 2017

Please take note of a phishing e-mail circulating on campus which looks like an Office365 e-mail notification. Unfortunately, a few students have been caught out by this trap. 

We will not send you an e-mail resembling the one below. If in doubt, rather contact us to confirm whether it’s a legitimate request.

 


From: SU Student <phishingvictim@sun.ac.za>
   Sent: 03 March 2017 12:07 PM
   Subject: Missing Mails

   You have two(2) unread messages but cannot because your mailbox has
   exceeds its quota/limit.
   Click here to use the message retriever page and enter login again to
   access missing message.

   Secretary

   Office 365

   System Administrator

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.