%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250712143238+00'00') /ModDate (D:20250712143238+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 9633 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 123.368 521.469 623.366 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 123.743 520.719 622.616 re S 0.773 0.773 0.773 rg 61.016 139.118 m 550.984 139.118 l 550.984 139.868 l 61.016 139.868 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(BEWARE OF SIM CARD SWAP FRAUD)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [()] TJ ET BT 61.016 617.431 Td /F4 9.0 Tf [(Although it is a known scam, when it hits one of your colleagues, it makes you aware that there are very real dangers out )] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(there. A SIM card swap fraud occurs when criminals obtain and utilise a replacement SIM card to acquire security )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(messages and one-time passwords \(OTP\) sent to you by the bank. Using the OTP, criminals are able to change, add )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(beneficiaries and transfer money out of your account using your personal information that they would have obtained )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(through phishing. One of our colleagues lost R20 000 over the holidays and asked us to warn other staff as well:)] TJ ET BT 61.016 553.486 Td /F1 9.0 Tf [(How does a SIM swap scam work?)] TJ ET 0.153 0.153 0.153 RG 85.866 536.313 m 85.866 536.725 85.696 537.135 85.404 537.427 c 85.113 537.718 84.703 537.888 84.291 537.888 c 83.878 537.888 83.469 537.718 83.177 537.427 c 82.885 537.135 82.716 536.725 82.716 536.313 c 82.716 535.901 82.885 535.491 83.177 535.199 c 83.469 534.908 83.878 534.738 84.291 534.738 c 84.703 534.738 85.113 534.908 85.404 535.199 c 85.696 535.491 85.866 535.901 85.866 536.313 c f BT 91.016 533.497 Td /F4 9.0 Tf [(The SIM swap takes place after the fraudsters have received a your bank logon details as a result of the you )] TJ ET BT 91.016 522.508 Td /F4 9.0 Tf [(responding to, for example, a Phishing e-mail. \(this is why phishing e-mails are so dangerous and you should )] TJ ET BT 91.016 511.519 Td /F4 9.0 Tf [(never ever respond or click on links contained in these phishing e-mails.\))] TJ ET 85.866 503.346 m 85.866 503.758 85.696 504.168 85.404 504.460 c 85.113 504.751 84.703 504.921 84.291 504.921 c 83.878 504.921 83.469 504.751 83.177 504.460 c 82.885 504.168 82.716 503.758 82.716 503.346 c 82.716 502.934 82.885 502.524 83.177 502.232 c 83.469 501.941 83.878 501.771 84.291 501.771 c 84.703 501.771 85.113 501.941 85.404 502.232 c 85.696 502.524 85.866 502.934 85.866 503.346 c f BT 91.016 500.530 Td /F4 9.0 Tf [(Once the fraudsters have the your cell phone number and other personal information, the fraudster can pose as )] TJ ET BT 91.016 489.541 Td /F4 9.0 Tf [(you, requesting a new SIM card from a cellular service provider.)] TJ ET 85.866 481.368 m 85.866 481.780 85.696 482.190 85.404 482.482 c 85.113 482.773 84.703 482.943 84.291 482.943 c 83.878 482.943 83.469 482.773 83.177 482.482 c 82.885 482.190 82.716 481.780 82.716 481.368 c 82.716 480.956 82.885 480.546 83.177 480.254 c 83.469 479.963 83.878 479.793 84.291 479.793 c 84.703 479.793 85.113 479.963 85.404 480.254 c 85.696 480.546 85.866 480.956 85.866 481.368 c f BT 91.016 478.552 Td /F4 9.0 Tf [(The cellular service provider transfers the your SIM card identity to the new SIM card, cancelling your old SIM card )] TJ ET BT 91.016 467.563 Td /F4 9.0 Tf [(in the process.)] TJ ET 85.866 459.390 m 85.866 459.802 85.696 460.212 85.404 460.504 c 85.113 460.795 84.703 460.965 84.291 460.965 c 83.878 460.965 83.469 460.795 83.177 460.504 c 82.885 460.212 82.716 459.802 82.716 459.390 c 82.716 458.978 82.885 458.568 83.177 458.276 c 83.469 457.985 83.878 457.815 84.291 457.815 c 84.703 457.815 85.113 457.985 85.404 458.276 c 85.696 458.568 85.866 458.978 85.866 459.390 c f BT 91.016 456.574 Td /F4 9.0 Tf [(The result is that there is no signal on the old SIM card, which means the you cannot receive / make phone calls or )] TJ ET BT 91.016 445.585 Td /F4 9.0 Tf [(send SMS messages. \(This ought to be the first sign of something wrong, so if you get SIMCARD INVALID error )] TJ ET BT 91.016 434.596 Td /F4 9.0 Tf [(on your cell phone\))] TJ ET 85.866 426.423 m 85.866 426.835 85.696 427.245 85.404 427.537 c 85.113 427.828 84.703 427.998 84.291 427.998 c 83.878 427.998 83.469 427.828 83.177 427.537 c 82.885 427.245 82.716 426.835 82.716 426.423 c 82.716 426.011 82.885 425.601 83.177 425.309 c 83.469 425.018 83.878 424.848 84.291 424.848 c 84.703 424.848 85.113 425.018 85.404 425.309 c 85.696 425.601 85.866 426.011 85.866 426.423 c f BT 91.016 423.607 Td /F4 9.0 Tf [(The SMS authorisation reference number, which is normally sent to the client, reaches the fraudster instead of )] TJ ET BT 91.016 412.618 Td /F4 9.0 Tf [(you, the legitimate owner, and the fraudster is able to make once-off payments and create beneficiaries fraudulently)] TJ ET BT 61.016 392.629 Td /F1 9.0 Tf [(What should I do if I suspect an unlawful SIM swap?)] TJ ET 85.866 375.456 m 85.866 375.868 85.696 376.278 85.404 376.570 c 85.113 376.861 84.703 377.031 84.291 377.031 c 83.878 377.031 83.469 376.861 83.177 376.570 c 82.885 376.278 82.716 375.868 82.716 375.456 c 82.716 375.044 82.885 374.634 83.177 374.342 c 83.469 374.051 83.878 373.881 84.291 373.881 c 84.703 373.881 85.113 374.051 85.404 374.342 c 85.696 374.634 85.866 375.044 85.866 375.456 c f BT 91.016 372.640 Td /F4 9.0 Tf [(If you fall prey to an unlawful SIM swap, or suspect that you have, contact your cellular service provider for )] TJ ET BT 91.016 361.651 Td /F4 9.0 Tf [(assistance.)] TJ ET 85.866 353.478 m 85.866 353.890 85.696 354.300 85.404 354.592 c 85.113 354.883 84.703 355.053 84.291 355.053 c 83.878 355.053 83.469 354.883 83.177 354.592 c 82.885 354.300 82.716 353.890 82.716 353.478 c 82.716 353.066 82.885 352.656 83.177 352.364 c 83.469 352.073 83.878 351.903 84.291 351.903 c 84.703 351.903 85.113 352.073 85.404 352.364 c 85.696 352.656 85.866 353.066 85.866 353.478 c f BT 91.016 350.662 Td /F4 9.0 Tf [(Also contact the internet banking helpdesk to request that your internet banking access be suspended with )] TJ ET BT 91.016 339.673 Td /F4 9.0 Tf [(immediate effect. This will prevent fraudsters from gaining access and transacting on your accounts.)] TJ ET BT 61.016 319.684 Td /F1 9.0 Tf [(What can I do to prevent SIM swap fraud?)] TJ ET 85.866 302.511 m 85.866 302.923 85.696 303.333 85.404 303.625 c 85.113 303.916 84.703 304.086 84.291 304.086 c 83.878 304.086 83.469 303.916 83.177 303.625 c 82.885 303.333 82.716 302.923 82.716 302.511 c 82.716 302.099 82.885 301.689 83.177 301.397 c 83.469 301.106 83.878 300.936 84.291 300.936 c 84.703 300.936 85.113 301.106 85.404 301.397 c 85.696 301.689 85.866 302.099 85.866 302.511 c f BT 91.016 299.695 Td /F4 9.0 Tf [(Protect your information all your information.)] TJ ET 85.866 291.522 m 85.866 291.934 85.696 292.344 85.404 292.636 c 85.113 292.927 84.703 293.097 84.291 293.097 c 83.878 293.097 83.469 292.927 83.177 292.636 c 82.885 292.344 82.716 291.934 82.716 291.522 c 82.716 291.110 82.885 290.700 83.177 290.408 c 83.469 290.117 83.878 289.947 84.291 289.947 c 84.703 289.947 85.113 290.117 85.404 290.408 c 85.696 290.700 85.866 291.110 85.866 291.522 c f BT 91.016 288.706 Td /F4 9.0 Tf [(Do not disclose your ID number on websites unless you have verified the legitimacy of the site. The bank already )] TJ ET BT 91.016 277.717 Td /F4 9.0 Tf [(knows your ID number and will not require you to give it to us again.)] TJ ET 85.866 269.544 m 85.866 269.956 85.696 270.366 85.404 270.658 c 85.113 270.949 84.703 271.119 84.291 271.119 c 83.878 271.119 83.469 270.949 83.177 270.658 c 82.885 270.366 82.716 269.956 82.716 269.544 c 82.716 269.132 82.885 268.722 83.177 268.430 c 83.469 268.139 83.878 267.969 84.291 267.969 c 84.703 267.969 85.113 268.139 85.404 268.430 c 85.696 268.722 85.866 269.132 85.866 269.544 c f BT 91.016 266.728 Td /F4 9.0 Tf [(Do not disclose your cell number on websites unless you have verified the legitimacy of the site. Phishing sites )] TJ ET BT 91.016 255.739 Td /F4 9.0 Tf [(often request for information such as ID Number, email address and email address password, physical address, )] TJ ET BT 91.016 244.750 Td /F4 9.0 Tf [(etc.)] TJ ET 85.866 236.577 m 85.866 236.989 85.696 237.399 85.404 237.691 c 85.113 237.982 84.703 238.152 84.291 238.152 c 83.878 238.152 83.469 237.982 83.177 237.691 c 82.885 237.399 82.716 236.989 82.716 236.577 c 82.716 236.165 82.885 235.755 83.177 235.463 c 83.469 235.172 83.878 235.002 84.291 235.002 c 84.703 235.002 85.113 235.172 85.404 235.463 c 85.696 235.755 85.866 236.165 85.866 236.577 c f BT 91.016 233.761 Td /F4 9.0 Tf [(Always make sure that your contact details on Internet banking are valid and correct. You know when your details )] TJ ET BT 91.016 222.772 Td /F4 9.0 Tf [(have changed, so when you are ready, you can update the information on Internet banking or at a local bank )] TJ ET BT 91.016 211.783 Td /F4 9.0 Tf [(branch.)] TJ ET BT 360.940 191.794 Td /F4 9.0 Tf [([INFORMATION SUPPLIED BY DAVID WILES])] TJ ET BT 61.016 171.805 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 153.316 Td /F2 9.0 Tf [(Posted in:Communication,Security | Tagged:Cell Phone,Phishing,Security | With 0 comments)] TJ ET q 225.000 0 0 156.000 61.016 406.277 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 208 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 7784>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 80 C   %# , #&')*)-0-(0%()(C   (((((((((((((((((((((((((((((((((((((((((((((((((((," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?((((((((((h2JTW=y&VDK Mocu.EU "+ oS18z袊`QEQEQEQEQEQEQEQEf(Q@Q@hP3EQEPU.ⴄ)S5謢˜:d3d_{.}U8#/3 XW=7H)ɝB7$cInq#fƺC!,Pε5Z|8 q5*9(E]*I $c'sӥ|ow[ xS7Z=U OjiM{w> b!AT>.cY֙rz<#5~4ԕ󲌠dfE2C4f((3KEfE%-PIKEPQKEQEQE%-PQKE%P5M 1/}UmA 4篢뙑G,Y'&YyZIXni6{9f>Ukv=2fK(S9>{\>U$_bkލU^'U5$mQwZ$ F[': zէZ\gNiD$ $_;=h0!,C߻?ʽM-5;D'2c_Eºw|;.-EFTWA%PQKE%-PEPEPEPEPEPEPEdMcVAjFOCaz3°[I$ϾD;{#銳js=XJ?[r-nm19kE(gu֭ʏ.Xd7|Qzsu$=e$wsXD,Tްķ:s !cЀiB<Ó}`^-4} ?z/SҶcv Ĝ|қoj"%=jKF\AOYz܉~EO4,2A֢&{-4"5X}۷zak\ Nv9gnǹ' h3QNg^YU KԻPkc9AK kp͍(&b{eQUg;xGF:.߼hO VЖ828"6)RQ1 >x=ZlQS$ӷaԛvi|sxeԶxֺ\ȷ&hݑT|S{8F^da#Apk ~]ss./a]N4TWp_Zsg2M*rN.N(QEQEQEQEQEQEQQ*CI+E@vTRBzW3rLPw=Qj6@ k79ԭ}cAMi3ڢ͖u9?=E+&f~dܱ*:[ȶ@VHt5Z+vᰣcӅMttՑh-v'Qncv#};bTF8}jvطu͍{a3nn4]:}KaRF.d’}NV1&_Sִ4M 2"IaE3eq}GZZ }k@gԖFVReҪZY"1l=0-ޱoX.O4ekr桨Ecg 9IHހTZ}qy{D*}OEcgWkBA5 A~_&qҥǾzs~Sj䧍nO!tͼ :|'ªlv0s+ .i{)lUB^V2̕S$dç@=j4E2U~h̳*jws.vv]߇, '!t{W>ڌwKV?{}]>B#;wZ( ( ( ( ( (y[9'hKa2LQ /e|^mQjCw=}sb\VUԭVOʅE&1y:M];,y'5|X4YH5m>@c |&FRpMWknT5-D[2An{?L{(Q^9E \d)9=[+id=j-eE7G] u\,**>Rq5w-wVKy$@*=J|[i)lU}qRM5/$,q3(2\S o++2I:B*sfVI, )@0p{VcդUԕbI_}Sw5g Y5ɵVރXbtҳK' srz?ߡJ+NbH@9HI5m"(П|Gk4㷾c g8`pF@Sp[;ϐGө' J+cBMOGV##\(jdUzGEZXy1F$*9$CKVjo K3Yp5t=@Jy'޸Ha@wbqd_U{e+I;x sܤdq([ڗPY#̍yt]. *C˞^B9sps$_+ӲO[Zœ'V|JR' .٧#AO>՛ok6:^jqC SսoIik-^Kly}[߷oZs7_JOFkEx!b“ $?;S+ݴ: 2`\1סʇ.sz-Lҭ6sjW ( ( ( ( ( ( W䑷3]۝ff}-RP!k3]lV@`Dėl>HW7}ܭ$ܓq^~/_9$vWH~4dω*<正;dj83f%Tr6 gqjSX^F1'wǡOeמ;NHHQQ+HMˉSS娵/]W䤣xD19jh9-٠ "AW\ų8"kw{SpS6>_w6g.Mshvt?o~ZЋ]CmT^:OsP!HmQaUz Pśgdպ_4RIWXf:Tj00Pֵ83m*cIEVUّu: YpX@ =ҫT:Ąat VDCk8O[9*zGzvXj~ E*.~K  ~g>/5[#/^קAڤɵ'ף[;ý:t4U0=XE,QEQEQERR ( ( (/18JAJ9&r(\c`>՛o}?{ל#%Į$`ԓ+~ΖϨ2/j|Jz.C/.%i/#c?+7j`nS@_b=g$hm8]*֧lBQDTrIƷl'm}PZv#5l $WQL$*ʖViԐIV2oP+cpV3xuHkܒ%c<I(P.A1/_AVJwcԛ^`' |SuR\oŕ)R.k|u\$H ^?VYR8NG3ׂO6_L}=Oh @@?ֽ\ߩYˬ6X$5}MX ( ( ( ))h(((( k8D?:u=wԌ53*p|Xܡ`p~YңCkԇg7 8S*Ӽ|coC}ϵ|+*WC2KIv/Zn\c 31Nj؁flSqlTE,WNyMM"iKx.E <>lv~}ROu19i.}.I;OJ] Imuq*IAo?%K (A_v: Gz-HmPvbrIɩ!-u?3J<$@֧8"v֒yA?Z-p)vc i=${"֗8PkԼq4gB~)CM6d`+hcGj8DSssדEYۤ$TQ^aEPEPE%-QI@ EPEPEPEPEPEPX:m8+~c\e=}zM&ƛ>z.4.D6-9\DvfKęc)_Wzt[e\8:y% rp,ּ|^4}VY{?rvCˎqOJ[;YnXBǀ(IJJ7 $dH$:fSV~x'|qOt1 W׭CAE *F 0t ѣb[) 4U(Th((((()(h((((+Z):7PjZ(˼oH-wn +ȐW )^!f<$8澯QmU pi#PƬ. V׈|9w $Y#89Q\: ti#0 ],Q]ӡ\I*E$OsM翜Gd=m#jTӜ,Y؛[{WW$s9\o`nn? }O|;4K \ܩOVe޽YcEH*(P0T|oK*O4XTB uW|QEQIK@QEQEQE%-PE%-Q@Q@RPEQEQEQEVeq7kU> startxref 18662 %%EOF security « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

security

Security tips for travelling at home and abroad

Wednesday, March 1st, 2017

Travelling without your electronic devices is highly unlikely — whether it’s to the coffee shop around the corner or overseas. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, photos, videos, location, and other personal and financial data — about ourselves and our friends and family. Following are some ways to protect yourself and others.

Before you go:

  • If possible, do not take your work or personal devices with you on international trips. If you do, remove or encrypt any confidential data.
  • For international travel, consider using temporary devices, such as an inexpensive laptop and a prepaid cell phone purchased specifically for travel. (For business travel, your employer may have specific policies about device use and travelling abroad.)
  • Install a device finder or manager on your mobile device in case it is lost or stolen. Make sure it has remote wipe capabilities and that you know how to do a remote wipe.
  • Ensure that any device with an operating system and software is fully patched and up-to-date with security software.
  • Makes copies of your travel documents and any credit cards you’re taking with you. Leave the copies with a trusted friend, in case the items are lost or stolen.
  • Keep prying eyes out! Use strong passwords, passcodes, or smart-phone touch ID to lock and protect your devices.
  • Avoid posting social media announcements about your travel plans; such announcements make you an easy target for thieves. Wait until you’re home to post your photos or share details about your trip.

While you’re there:

  • Physically protect yourself, your devices, and any identification documents (especially your passport).
  • Don’t use an ATM unless you have no other option; instead, work with a teller inside the bank. If you must use an ATM, only do so during daylight hours and ask a friend to watch your back. Also, check the ATM for any skimming devices, and use your hand to cover the number pad as you enter your PIN.
  • It’s hard to resist sharing photos or telling friends and family about your adventures, but it’s best to wait to post about your trip on social media until you return home.
  • Never use the computers available in public areas, hotel business centres, or cyber cafés since they may be loaded with keyloggers and malware. If you use a device belonging to other travellers, colleagues, or friends, do not log in to e-mail or any sensitive accounts.
  • Be careful when using public wireless networks or Wi-Fi hotspots; they’re not secure, so anyone could potentially see what you’re doing on your computer or mobile device while you’re connected.
  • Disable Wi-Fi and Bluetooth when not in use. Some stores and other locations search for devices with Wi-Fi or Bluetooth enabled to track your movements when you’re within range.
  • Keep your devices with you at all times during your travels. Do not assume they will be safe in your hotel room or in a hotel safe.

When you return:

  • Change any and all passwords you may have used abroad.
  • Run full antivirus scans on your devices.
  • If you used a credit card while travelling, check your monthly statements for any discrepancies for at least one year after you return.
  • If you downloaded any apps specifically for your trip and no longer need them, be sure to delete those apps and the associated data.
  • Post all of your photos on social media and enjoy reliving the experience!

Also read the New York Times article, “Traveling Light in a Time of Digital Thievery”. Looking for hotel safety tips? Watch this four-minute Travel Channel video, which explains how to avoid thefts, Wi-Fi hackers, and fire-hazard hotels.

 

[SOURCE: www.educause.edu]

Warning about (Standard Bank) phishing scam being sent from university e-mail address

Friday, February 24th, 2017

It seems that phishing scammers are again using some student accounts, either by direct access or address “spoofing” (a technique commonly used by spammers to hide the origin of their e-mails by using a forged return address ) to send phishing mail such as the one below to many university accounts.

The phishers attempt to trick the recipients of their mail into thinking that because the mail is from a “sun.ac.za” account, it is genuine.

The mail below is an obvious phishing scam and should not be responded to. Also, don’t click on the enclosed links or provide any usernames, passwords or personal details to the senders.

Looking at the mail below, note the following 5 “warning signs”.

  1. No personal salutation – Just “Valued Customer”.
  2. Intimidating threats should you not comply – “Failure to Update”.
  3. Request to click a link to verify your details or to provide usernames and passwords
  4. The link takes you to a webpage that might look legitimate but is not based in the university network. (this phishing scam originated in Sri Lanka)
  5. Poor grammar and spelling.

Never be fooled if a mail seems as if it was sent from a university address.

In this case, the e-mail address of an Agricultural Sciences student was used.

Information Technology does have a good automated mechanism for submitting spam. It is quite simple to use, but being automated there will be no indication or acknowledgement that the mail has been received by Information Technology:

  1. Start a new mail addressed to sysadm@sun.ac.za
  2. Use the Title “SPAM” (without quotes) in the Subject field.
  3. With this New Mail window open, drag the suspicious spam/phishing mail from your Inbox into the New Mail Window. It will attach the mail as an attachment and a small icon with a light yellow envelope will appear in the attachments section of the New Mail.
  4. Send the e-mail.

Do not “Forward” the Spam mail to this address. When you forward the original sender and all the information that the spam filters use to filter out the mail is lost and the Forwarded mail will be rendered useless for the filters.

Here is the mail that is circulating at the moment (malicious links have been removed):


From: Compromised, Student Account <12345678@sun.ac.za>

Sent: 23 February 2017 16:00

Subject: Mandatory Update 

Dear Valued Customer, 

STANDARD BANK MONETARY SERVICES 

We wish to inform you that your Credit Card has been listed for suspension due to recent Error/Traffic on your previous transaction. 

You are MANDATED to re-update your details here: https://dont.click.on.this.link.com 

Failure to Update within 24Hours will Lead to your Banking Services Suspension/Interruption.

We are sorry for any inconveniences this might have caused you.

[ARTICLE BY DAVID WILES]

 

Ransomware attack uses fake SA Post Office e-mails

Wednesday, February 22nd, 2017

Be aware that a ransomware attack using fake SA Post Office e-mail has made its appearance recently on the Tygerberg network.

The hacking attack, originating in Russia, uses fake e-mails from the SA Post Office to inform the victim of a parcel intended for delivery. The mail contains a link which downloads malicious software – in this case a nefarious variant of the Cryptolocker malware.

Crypto ransomware is a type of malware used to extort money from victims by preventing access to their computer or files. Recovery of infected systems is virtually impossible without clean backups.

When the victim opens the malicious e-mail attachment, the virus attacks the target PC system, encrypts victim’s files and displays a ransom note, which informs the victim that in order to restore access to their files, a ransom of between $100 and $500 must be paid. Victims have only a certain amount of time to pay a ransom or they will lose access to their files forever.

If you have been backing up your data and have extra copies of your photos, documents, and other files, you won’t need to pay a ransom. Reformatting your drive, and restoring the drive from backup is the only reliable way of undoing the damage.

Cryptolocker ransomware is a nasty infection. Criminals only seek to earn easy money and frequently manage to do so. For victims of this ransomware, I want to emphasise that paying the ransom will not solve the problem. There is no guarantee that your data will be restored. Making the payment will not help to remove Cryptolocker ransomware.

Here is some advice to prevent becoming a ransomware victim:

  • Use spam filters and be cautious when opening e-mails, especially if there are attachments.
  • Make sure you are using reputable, up-to-date security products.
  • Make sure your operating system and applications are up to date and fully patched.
  • Run a regular scan of your computer.
  • Set and use strong and unique passwords.
  • Set passwords on all your hardware devices (modems and routers).
  • Back up your data.
  • Keep a backup copy of your data in a safe place, disconnected from your computer and the internet.
  • Only visit reputable websites and online services.

[ARTICLE BY DAVID WILES]

 

Learn What It Takes to Refuse the Phishing Bait!

Wednesday, February 1st, 2017

Cybercriminals know the best strategies for gaining access to your institution’s sensitive data. In most cases, it doesn’t involve them rappelling from a ceiling’s skylight and deftly avoiding a laser detection system to hack into your servers; instead, they simply manipulate one staff member or student.

According to IBM’s 2014 Cyber Security Intelligence Index, human error is a factor in 95 percent of security incidents. Following are a few ways to identify various types of social engineering attacks and their telltale signs.

  • Phishing isn’t relegated to just e-mail! Cyber criminals will also launch phishing attacks through phone calls, text messages, or other online messaging applications. Don’t know the sender or caller? Seem too good to be true? It’s probably a phishing attack.
  • Know the signs. Does the e-mail contain a vague salutation, spelling or grammatical errors, an urgent request, and/or an offer that seems impossibly good? Click that delete button.
  • Verify the sender. Check the sender’s e-mail address to make sure it’s legitimate. If it appears that our help desk is asking you to click on a link to increase your mailbox quota, but the sender is “UniversityHelpDesk@yahoo.com,” it’s a phishing message.
  • Don’t be duped by aesthetics. Phishing e-mails often contain convincing logos, links to actual company websites, legitimate phone numbers, and e-mail signatures of actual employees. However, if the message is urging you to take action — especially action such as sending sensitive information, clicking on a link, or downloading an attachment — exercise caution and look for other telltale signs of phishing attacks. Don’t hesitate to contact the company directly; they can verify legitimacy and may not even be aware that their name is being used for fraud.
  • Never, ever share your password. Did we say never? Yup, we mean never.Your password is the key to your identity, your data, and your classmates’ and colleagues’ data. It is for your eyes only. The IT department will never ask you for your password.
  • Avoid opening links and attachments from unknown senders. Get into the habit of typing known URLs into your browser. Don’t open attachments unless you’re expecting a file from someone. Give them a call if you’re suspicious.
  • When you’re not sure, call to verify. Let’s say you receive an e-mail claiming to be from someone you know — a friend, colleague, or even the rector of the university. Cyber criminals often spoof addresses to convince you, then request that you perform an action such as transfer funds or provide sensitive information. If something seems off about the e-mail, call them at a known number listed in the university’s directory to confirm the request.
  • Don’t talk to strangers! Receive a call from someone you don’t know? Are they asking you to provide information or making odd requests? Hang up the phone and report it to the helpdesk.
  • Don’t be tempted by abandoned flash drives. Cyber criminals may leave flash drives lying around for victims to pick up and insert, thereby unknowingly installing malware on their computers. You might be tempted to insert a flash drive only to find out the rightful owner, but be wary — it could be a trap.
  • See someone suspicious? Say something. If you notice someone suspicious walking around or “tailgating” someone else, especially in an off-limits area, call campus safety.

[ARTICLE FROM Educause]

Latest WhatsApp hoax

Monday, January 9th, 2017

If you are a user of the popular chat app WhatsApp, you should be aware of the latest hoax that states that the chat service will soon start charging a fee.

Here is an example of the current hoax:

Tomorrow at 6 pm they are ending WhatsApp and you have to pay to open it, this is by law. 

This message is to inform all of our users, our servers have recently been very congested, so we are asking you to help us solve this problem. We require our active users to forward this message to each of the people in their contact list to confirm our active users using WhatsApp. 

If you do not send this message to all your contacts WhatsApp will start to charge you. 

The message is allegedly sent from Whatsapp’s chief executive officer – Jim Balsamic.

  1. The real CEO of WhatsApp is Jan Koum.
  2. WhatsApp publically declared that they’ll never charge users for the service. [ https://blog.whatsapp.com/615/Making-WhatsApp-free-and-more-useful ]

This isn’t the first time this sort of hoax has plagued the web – a similar message was sent around in 2013.

In some cases, it was reported that victims of this hoax were “tricked” into opening a legitimate-looking Word, Excel or PDF document attached to a WhatsApp message. The PDF attachment then downloaded malware to devices to steal personal information.

Another student reported that one message they received tried to persuade them to download a R200 Edgars voucher. In reality, the link simply installed cookies and a browser extension on their phone that flooded the phone with adverts.

Always be wary of messages with the following characteristics:

  1. The person sending the message claims to be associated with WhatsApp.
  2. The message contains instructions telling you to forward the message. (Use a bit of common sense here. According to this hoax message, WhatsApp servers are “very congested” and Jim Balsamic want you to add to the congestion by forwarding the message to all your WhatsApp contacts?)
  3. The message says you will suffer some sort of punishment, like account suspension, if you don’t follow the instructions.
  4. The message promises a reward or gift from Whatsapp or another party.
  5. Just because a message was forwarded to you by a friend or family member, doesn’t make it legitimate. (friends and family can be just as gullible as any other person)

[ARTICLE BY DAVID WILES]

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.