%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 18 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240617031507+00'00') /ModDate (D:20240617031507+00'00') /Title (Report 06-2024) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 6137 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 180.857 521.469 565.877 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 181.232 520.719 565.127 re S 0.773 0.773 0.773 rg 61.016 196.607 m 550.984 196.607 l 550.984 197.357 l 61.016 197.357 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(LOSE YOUR CELLPHONE, LOSE YOUR INFO)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.000 0.000 0.000 rg BT 61.016 637.420 Td /F4 9.0 Tf [(If you lost your cellphone today, what would a criminal have access to? Your smses? Your banking details? Your private )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(documents saved in your e-mail? Or sensitive work documents even?)] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(And yet, we carry this invaluable information with us every day. We absentmindedly wander around talking in public while )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(we're within reaching distance of any opportunistic criminal. But there are also other ways to access information on your )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(phone by means of spyware and other suspicious software.)] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(We use our cellphones more and more to organise and plan our lives and at the same time, make ourselves more )] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(vulnerable.)] TJ ET 0.153 0.153 0.153 rg BT 61.016 534.997 Td /F4 9.0 Tf [(However, there are a few measures you can take to ensure you don't become a victim. 1. PASSWORD OR PIN This is )] TJ ET BT 61.016 524.008 Td /F4 9.0 Tf [(your most important first line of defense. Without a PIN or password, anyone can get hold of your cellphone, access your )] TJ ET BT 61.016 513.019 Td /F4 9.0 Tf [(e-mail, bank details, sms and personal information. )] TJ ET BT 266.594 513.019 Td /F4 9.0 Tf [(And Microsoft's head of online )] TJ ET BT 61.016 502.030 Td /F4 9.0 Tf [(security agrees."Using a PIN or unique password is the single most important thing to do )] TJ ET BT 61.016 491.041 Td /F4 9.0 Tf [(as a user of a smartphone to protect the device, the data and your reputation." According )] TJ ET BT 61.016 480.052 Td /F4 9.0 Tf [(to Beauchere the data on your phone is also more recent than the data on your desktop or )] TJ ET BT 61.016 469.063 Td /F4 9.0 Tf [(laptop. This increases the risk even more. Last year Microsoft conducted a worldwide )] TJ ET BT 61.016 458.074 Td /F4 9.0 Tf [(online survey regarding the usage of PINs. 10 000 desktop and mobile device users from )] TJ ET BT 61.016 447.085 Td /F4 9.0 Tf [(20 countries took part. Only 28% of these used a PIN on a device. 2.CELLPHONE APPS )] TJ ET BT 61.016 436.096 Td /F4 9.0 Tf [(Be very careful which apps you download and where you download them from. It's great )] TJ ET BT 61.016 425.107 Td /F4 9.0 Tf [(having an app to streamline your life or one to entertain you, but weigh the pros and cons )] TJ ET BT 61.016 414.118 Td /F4 9.0 Tf [(against each other. Even if an app looks nifty, rather download a similar one from )] TJ ET BT 61.016 403.129 Td /F4 9.0 Tf [(renowned app shops like iTunes, Google Play and Amazon. So some research. Read )] TJ ET BT 61.016 392.140 Td /F4 9.0 Tf [(other readers' comments, how they rate the app and if they experienced any problems )] TJ ET BT 61.016 381.151 Td /F4 9.0 Tf [(with it. 3. DUBIOUS LINKS According to research people are 3 times more likely to click )] TJ ET BT 61.016 370.162 Td /F4 9.0 Tf [(on a link on their phone than one on their PCs. The fact that the screen is smaller and )] TJ ET BT 61.016 359.173 Td /F4 9.0 Tf [(dubious links not as easily recognised could be the reason. Be suspicious of request for )] TJ ET BT 61.016 348.184 Td /F4 9.0 Tf [(personal information you receive via links in sms, e-mail or social networks. By clicking on )] TJ ET BT 61.016 337.195 Td /F4 9.0 Tf [(them, you run the risk of identity theft. 4. UNPROTECTED WI-FI When you use an open )] TJ ET BT 61.016 326.206 Td /F4 9.0 Tf [(WI-FInetwork in coffee shops, malls and other public places you information isn't securely )] TJ ET BT 61.016 315.217 Td /F4 9.0 Tf [(sent through the air. Any other person can intercept it during transmission. If you have to )] TJ ET BT 61.016 304.228 Td /F4 9.0 Tf [(do banking on your phone or work with sensitive information, rather wait till your at work or )] TJ ET BT 61.016 293.239 Td /F4 9.0 Tf [(home and have access to a secure WI-FInetwork. 5. )] TJ ET BT 274.109 293.239 Td /F2 9.0 Tf [(SPYWARE)] TJ ET BT 319.118 293.239 Td /F4 9.0 Tf [( Without a password )] TJ ET BT 61.016 282.250 Td /F4 9.0 Tf [(cyber criminals can load spyware on your phone and track your sms records, e-mails, banking transactions and location. )] TJ ET BT 61.016 271.261 Td /F4 9.0 Tf [(To prevent this from happening, activate a password or PIN on your phone or download an app from a reputable store to )] TJ ET BT 61.016 260.272 Td /F4 9.0 Tf [(scan for and remove spyware and viruses. If you'd like to read more on cellphone security, )] TJ ET 0.373 0.169 0.255 rg BT 422.888 260.272 Td /F4 9.0 Tf [(wikipedia)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 422.888 259.121 m 459.896 259.121 l S 0.153 0.153 0.153 rg BT 459.896 260.272 Td /F4 9.0 Tf [(has extensive )] TJ ET BT 61.016 249.283 Td /F4 9.0 Tf [(information. )] TJ ET BT 341.455 229.294 Td /F4 9.0 Tf [([SOURCES: )] TJ ET 0.373 0.169 0.255 rg BT 393.466 229.294 Td /F4 9.0 Tf [(www.rd.com)] TJ ET 0.18 w 0 J [ ] 0 d 393.466 228.143 m 442.966 228.143 l S 0.153 0.153 0.153 rg BT 442.966 229.294 Td /F4 9.0 Tf [(,)] TJ ET 0.373 0.169 0.255 rg BT 445.468 229.294 Td /F4 9.0 Tf [( www.computerworld.com])] TJ ET 0.18 w 0 J [ ] 0 d 445.468 228.143 m 550.984 228.143 l S 0.400 0.400 0.400 rg BT 61.016 210.805 Td /F2 9.0 Tf [(Posted in:E-mail,Security | Tagged:Mobile Security,Security | With 0 comments)] TJ ET q 128.250 0 0 225.000 422.734 296.810 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 422.8877 259.4392 459.8957 268.5967 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://www.wikiwand.com/en/Mobile_security) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 393.4663 228.4612 442.9663 237.6187 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://www.rd.com) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 445.4683 228.4612 550.9843 237.6187 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www.computerworld.com/article/2497183/mobile-security/mobile-phone-security-no-brainer--use-a-device-passcode.html) >> endobj 18 0 obj << /Type /XObject /Subtype /Image /Width 171 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 18989>> stream JFIFC?|)'㘴1Jwk$q,qGDD@P*@ s7@Wφ_M_G3 G; H_rs~uqGۚw} 쿯e ð_g+0ð_g+0'i?=x] vS %|vW %@W>$SX%k;MJ?7^.maִ/PaGz~݉a/D׿n?.rn}EvW %=a5"_/dW3F{C_~w_y/; HG; H^,xŸ_KCM+|Msľ񶗨x3nj<j:njڷ~Lm4/iDŽG}@ֵ?S??]CӲ>a5?"W/`(a5?"W/`+N?Ew/,/}/&#KE/ <=_Uo|I;\r~ pHHHWUaO۩_'ӧ鞔zgoC}xEw/,/]4~Οwᕖd?fcƍ|Hӣx ՚\}j(U3/_joo^jmEhZ૭kEGX7C_i|%_o?$/u4MVmO~2ХW|G jZfyuN|E~̷u_!Ri2{>\ lWw#ϥ<~$r|sX-ݿɽ/MY?9ge^!ּ1w?y| ྷmk |{AAokoHomjzn hGM?;~<\|z; 4 P房|}6<?ek1Ϣx&ǝ vOkv7~KiAc4T4]( * ~|C.xk&G#ԟi:OZEÓH~|G#&X1N^h8?tc@~/Ƿfoɽ0=GlE|/'gNJ?B?k^,H|G]ko/#Jςe#Oҭ]-\O @C7~i0=ھ [F AG&_R7_[ק;z}bf}φǿ—7_ e.p5=Q E>u0f}ZnjZ&k6cyjFgj^o%X]5^Y-ͼC4om߲:W'Z]QZ'?iړÞ,aAB˧aiZfi6V K G&_R7_޷ǿ.}kL4{O/)G%uewp~nu'&_R7__߯[{Q 7 oOj5y}Z+Gy}g?͇~x?.u={^45 2Z߉|ecӴ[m[^lwip$ῼ& c/)w/ Ln&ǯ:?ח ǧOٟsῼ&;pߓ|/ G&_R7_[@s}FǷfoɿ¾ [F q{ ?/x:] Ӫ^V9YB Ն[YG*3+vpr0r# gu|gw %g7Q-?gktO2|% >|C_ý%_21NNH&HMiCL?FǯݿHzܧtz9WßL,õ?\1/T=`~CWܼ?7_ߵ ~C{[l(_ ~]s F}}G_}ϡ~>?gf@cb ~gA@=3n=>\<\xҗCC?4 LV9G>{PsM{߇O>?ր=w}q2s׿v{w^}_<}_+ր;sߟ?4`]'?ſsOo^ip}_.t{v>?Ls^1Gɼ|z$_v#\?z}oo=u/K}wr=Ec~Xzɿzºz)_5;<|N29DÃ+y_ ;/E _~wU_7ۮ~kU}3T_7YG_up~F Q&7&u+Dzy}n>ϥ|5;S 7OP~=H>_AQz/NsvNzW?}?11gH:_t`vo\_~7 "0~==}F}Ϸw_'ӯ뎔}vW=w>`18g_'4=Kh=?oh0=W_"˷u?:f?T`}?,czgޙ?.\_S@ v?=Y=?qwS?qO^(?y?h9^1Gɼ|z$_uFx??E){wN??s@v?fo;{\WvӏN9Xy?o?DØ1k tQz/N?kM'vj??J*9SKfݻzѨ O=pays67%s=}}BcFa5?9ݿH_r`nGe!0=Go~?g+ ƿf\}"~=wo_׶ |1? G-6{98 ޺}wQǮA>ɥgߗ N?ϗG˥?>t`z>޿Z_oq=ۧ@Ta}}(߿vO {v^M=?_KׯwqG?~oqD_.qEx3ǮRkJ;{zkh<|z$_v#\nϯc~,~<Ϳ{_@qO_?XzɿN9:}z>= ;/E M'훏oO5~~UߟOV+M/v?j?@5p~FO'LoL~`?Ҿ87޾ayٍɟy_rǶ?N???J_|{ $FWw^3?_9(}F}ѕ?q;uǧ"{9?J3t\[z/Ǣ]|Oz3z/\{t+;z_3;SF}?|{1Fx?=h^?wШv94q迧FsqӶh{wQǢ]Όۜ|{_#?)v$kq^џoҼc'H.#=hN#ciɿ?xs?Aۮov_M|'ŏ٧8_3zQz/8_4o۷O5~_ֿʫGٿn?De3Yj<DJǦ}z_L,õ?_cg??_)z?ߡ֠7z~k?ٟP>?f,?}с1g=?fts߯I>7z޿W:|K~N>>挷٤w<18}{'׾/_OZN}Ҍ^g/@ ϣwFO>]/{z\\u3 $_◯oE{F]O5xE)qЏ(N 4z:_+}n 46s]xo=q_@qsӏ՚ѿ&M/vG_fW;+|lջzѨ O=pays67%{'{~X5)= O'O13?@?}vu_?_Ჿ< ~̿!k=k\Xuȯg?Ჿ< ~̸DB?/dP3\Stswۥ_A߰c(OO7(tq迒tq@|0}Oo?Q迒t|n9?O}O4|sX⏗wlP=|̣{v_N#%9"Oÿގ=_.E3 $_g\sֽ^ޟzCx/K}su>'gciɿct㏯n+829N9E>hv^ϙ_U#i?lջzѨ U%M'mۦ?~Q3zG&j<d}A;{dkRN^1+&ڟO,&7%0Ҿ;O^Ge z+e@xF_ao_+_ 52 _@ϹsϵoC=G>h2}}?ޗ~?z9{}Iw.zާg?u?zL{>އӿzWzLxpQ۷6z޾G>@>~ѓaG>~stgv?z9<<|z/KPw'Ǒ^z޿Og\"{x#]k'ŏ٧9zM}~|q_?ۿ?f_'^k}}ϡ=}?(&}?.ҿʫGٿn?VU?r?vQ\7~&{/_џj<ɍɝ3uܟZ=GNW}Jk ;S ?OP~X5)oF튂_u}:~_ ~f\8_R9۴NA\2c_ f@?DFǧ\yџs]ׯۺ=>>M}~ N?~{◟S?G>g;8g_&}}:~O?F>h9g^}'>z>\R~`2h>}8c8g_'4~s=gxg]1 _uF_N>\ki>=rR$kc~XzɿN9ןqx29'^c_@s>_Ǯ;~BqOoVkM'vj?>O)ݽ~W ߧꉞg80j<oK?{N^~]|5j<1/?c)kczz_?|/? c>=q~߷vק_~6g ?f.篨4>>(=Oǿwnϯ_4]zwlP0z8"?ÿڗOo^h8">Q;s}Iǿo`a}}Oz?/qK:޿}}hOׯ8?q?$Og?/Ҏ?~q|_'4ך0=Go~??R?{߯x!g]S$kۿOZXy9DÞJ㞟?d,~=wo'^^޹}~n?Jz*9SIfݻzѨ UͿ*9SKfݻuP \7~&{/_џO'˟/P?}G_g5loL?xI}OoAPTv^vV?þzt#_5>Wge@N:_ '=2s~'FSlF??=hϷ?JLa {q.Ad~Czۯ>ϿA(>[?@?n.=?玙syK׿u&~_Nv;ODё:.?#sd~CsϦ2=O"vϷZ<<|yR#Y*<<|y/K#\O 8,~?/N93k zɯd4ٿu=u5?/ӊo>4oo7oe~d~޿v=L*9 Ifݻ( ʮO=qag?c_fCЊO?=&?ڟO.d~׷j ~Bk6W_&~ _|N2kL/1_ ~e@y"7>lϩi09w? ?:c=hy?Ɠ#{j_O4sٿӯ'|0=}?}P~?Nhi0|GB`zqy=7^hOI鞴q|_O4~'j8>].zvo^/H $_H1B9g=n?x_w~@p?O'Mxs_N^k8e٧u|z+=OwQz/_O5U?r?vQG{UO7G_\7~&{/_џj<ɍ}'1$uN0z%>Xj<ɍɝ?uǰNE?PTv^~=xk_Pz!k>݇l(C_.8?-sXO}ǩݿ÷On׃t_A߰c(qOO_?4z/Ǣ)8oq迒te}oO+8ݺ}N:Gݿׯ|2sO2{b[ӿ(M'osGzqҀ?4~&E;]O^{޿O^l?ݺogޟWkh?>=p3 _aBF?1'cci&s:߶:;澀wt9|'mXxo=?xs;zv/~BMO)ݺG_SoN_ֿʯG~ٿn?~W ߧꉞg80kS f7% zdkRNsTOYj\/>o]{>lt xH?B5{״|އ~=pq _◯ bW^=~ר{`q_?ۿ?f_'^k}}ϡ}?z@_J*9SKfݻ( ʿ[׿޿ʧGٿn~jQ3zG&S LoLW3q۩'Wܧ:zN8_ 0yrG` ~tDZH<3j_nO5'!ًFc{W8>_ 1ًőϹ.⏮;wNw4`{ݿMӞۥ?׊9"O9fȓ~s ~?ǂs]=:s_x_=2{րw^I~i?~)ϧ=3sہI(R~_=xs';O4v㾝?L׋1/KБ/^ϯ???rO\aG= 4?w_'^ԊӏfN2Ӄ6sݾxsӧ־#~C_W#i?lnQ+Uy"NWU_7G_5p~F O'O1/? WĮ:/N~LGUpseo7! |;SoHc|KM|4WVSFr>=No==xPTv^Goۨ"L kaGYv>%<E`Չ4#_ %xKE4l'Ӟ['@Y}}z~Gܷ\3>r?n?n_K_{~ֿ?_r\|^hǡo~[?ڝw/V] w/@/??O) /%kܸn^=Nw_ ._q;R_KOק?r?n~&~mWm{4>&7ZvHѴ_2nj^}Yj>&Kxm_zfޘ.D[}o_r ._q;R_KORùe|e7iZ\ϵR*/ \/h틬xCF5 |i2 [%&droھ/|DwgVxc>1tO/Ήr[_3ψhnGmJ3I7nb׿ ;[mջ[}<[( /oO}ùe/|eĴܾ{v~AF_]2˲|5G;R_KO}ˌ߈F~mQw_ ._q;Q^v5[&싩]麗.j~kqea{VVWwq<Vvp [$y'xVFe?wqo'펔~}?拾_pYv_w}'9?Ú|5Cs&J3D, 4>.'w xye0d=}9/֓.)9t0_*9SKfG_"W^ëz?ů+㟇>'Mff|qh>$kن\m|4|z借V-AxZ4!QҼGif4+goӷHއF[dsۺ>=foL>} wg3'W>G~3xzǎb}Z~V-|y/473^뺍95mOž,ՓSo:ji?ڻן+f?Mt|V>.x{~)/ŋ eRo|Tc'$ j/~!|,W|]oNtźG<)hzy_FॿZanl??n)]+%ݿcjG?o??_z?jG?o??_oFॿZaoF~9FॿZaoF4i|^W_K{ω?_ [O^{ ~uRmx3_xKzVĚOIw;M{vz7<%kO*߷ƿx1h~ 4[xwZ'_B$Ծ|@!zj^Ľ7OM?7-%> `ho;⯁%S?GMW]c_?/.tVO>"UWahGuoZiP r[xU?R?EӴCD??z,V^!ΉkwÈ#&>ҼéxVYÝ~#}ae~w6>Ӛg-yt MwП ^e{IIB[jmĺR{1=xl7>Wk|s |(|;kᗆ-#TuMrduh?Xh^.`Kuaɴڻ|d ϋ~ <,>:1kƁiK:M+>YuxPӴ y//aM{ WNv֗QŵAu`=WNZX_l WPm o=mKػ_[t?#C^;EO u'g E-u-*Mk~.7]jzu{Ee_i)u1Z{X6萝VQj^X ۭ2þΞ{hg[vP{vKe{[~,I~d[?}iK?.hg [EasF_5/yyy?~+]cok޹v?o x:͏t-gGïͮjZ~xJ𾽦xQoc|_-kĚO7{dWWg?~~?gHڞ? "K1:ȼo'/ _j~)w3xO~{__+=hIϷw_'ӯ뎕GU4LuoQG5m[T43OQo+[+ H(-idHј!GDooƿ|C#v6nP/V~qP._'Z{gRkz^a4/-i ~x+?|c_>2mO-ug~џB׏_uI |݅ǎ~jZ7Mť~xu*ĚW#:R==z |O~|bRXi7c}o]/L m Y.]ͽ'Ս_|75_`~c>1 E@xH/|= ǨYZujPlΗ2Zx/ѤvCw5Mĺ%N7Vۛ2c\ڴolcT=;H~v=K~]?Ke$hOw{_?R"O__?R"O_r.%2_|Ƽoχ'Rңth񗁼gN~xzN7h~ xik>>{ş?i٣b$k5? 7WWҼ_߲zx_%O|UG}SCǍa_]\HO <5~woa^*ԯ5xސ71417ׁH$U =Ѳ惙ZV4r~5|*ψu 6Vlz!lh-O_?X|aN㿏n:~"t ]N%TuY>i[Jբzև?m[ڲjuͯv8ϥݷC^GG*"""*TU(OOIEjPg$zR endstream endobj xref 0 19 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000603 00000 n 0000006792 00000 n 0000006904 00000 n 0000007019 00000 n 0000007139 00000 n 0000007247 00000 n 0000007375 00000 n 0000007469 00000 n 0000007597 00000 n 0000007666 00000 n 0000007794 00000 n 0000007967 00000 n trailer << /Size 19 /Root 1 0 R /Info 5 0 R >> startxref 27125 %%EOF security « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

security

Security tips for travelling at home and abroad

Wednesday, March 1st, 2017

Travelling without your electronic devices is highly unlikely — whether it’s to the coffee shop around the corner or overseas. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, photos, videos, location, and other personal and financial data — about ourselves and our friends and family. Following are some ways to protect yourself and others.

Before you go:

  • If possible, do not take your work or personal devices with you on international trips. If you do, remove or encrypt any confidential data.
  • For international travel, consider using temporary devices, such as an inexpensive laptop and a prepaid cell phone purchased specifically for travel. (For business travel, your employer may have specific policies about device use and travelling abroad.)
  • Install a device finder or manager on your mobile device in case it is lost or stolen. Make sure it has remote wipe capabilities and that you know how to do a remote wipe.
  • Ensure that any device with an operating system and software is fully patched and up-to-date with security software.
  • Makes copies of your travel documents and any credit cards you’re taking with you. Leave the copies with a trusted friend, in case the items are lost or stolen.
  • Keep prying eyes out! Use strong passwords, passcodes, or smart-phone touch ID to lock and protect your devices.
  • Avoid posting social media announcements about your travel plans; such announcements make you an easy target for thieves. Wait until you’re home to post your photos or share details about your trip.

While you’re there:

  • Physically protect yourself, your devices, and any identification documents (especially your passport).
  • Don’t use an ATM unless you have no other option; instead, work with a teller inside the bank. If you must use an ATM, only do so during daylight hours and ask a friend to watch your back. Also, check the ATM for any skimming devices, and use your hand to cover the number pad as you enter your PIN.
  • It’s hard to resist sharing photos or telling friends and family about your adventures, but it’s best to wait to post about your trip on social media until you return home.
  • Never use the computers available in public areas, hotel business centres, or cyber cafés since they may be loaded with keyloggers and malware. If you use a device belonging to other travellers, colleagues, or friends, do not log in to e-mail or any sensitive accounts.
  • Be careful when using public wireless networks or Wi-Fi hotspots; they’re not secure, so anyone could potentially see what you’re doing on your computer or mobile device while you’re connected.
  • Disable Wi-Fi and Bluetooth when not in use. Some stores and other locations search for devices with Wi-Fi or Bluetooth enabled to track your movements when you’re within range.
  • Keep your devices with you at all times during your travels. Do not assume they will be safe in your hotel room or in a hotel safe.

When you return:

  • Change any and all passwords you may have used abroad.
  • Run full antivirus scans on your devices.
  • If you used a credit card while travelling, check your monthly statements for any discrepancies for at least one year after you return.
  • If you downloaded any apps specifically for your trip and no longer need them, be sure to delete those apps and the associated data.
  • Post all of your photos on social media and enjoy reliving the experience!

Also read the New York Times article, “Traveling Light in a Time of Digital Thievery”. Looking for hotel safety tips? Watch this four-minute Travel Channel video, which explains how to avoid thefts, Wi-Fi hackers, and fire-hazard hotels.

 

[SOURCE: www.educause.edu]

Warning about (Standard Bank) phishing scam being sent from university e-mail address

Friday, February 24th, 2017

It seems that phishing scammers are again using some student accounts, either by direct access or address “spoofing” (a technique commonly used by spammers to hide the origin of their e-mails by using a forged return address ) to send phishing mail such as the one below to many university accounts.

The phishers attempt to trick the recipients of their mail into thinking that because the mail is from a “sun.ac.za” account, it is genuine.

The mail below is an obvious phishing scam and should not be responded to. Also, don’t click on the enclosed links or provide any usernames, passwords or personal details to the senders.

Looking at the mail below, note the following 5 “warning signs”.

  1. No personal salutation – Just “Valued Customer”.
  2. Intimidating threats should you not comply – “Failure to Update”.
  3. Request to click a link to verify your details or to provide usernames and passwords
  4. The link takes you to a webpage that might look legitimate but is not based in the university network. (this phishing scam originated in Sri Lanka)
  5. Poor grammar and spelling.

Never be fooled if a mail seems as if it was sent from a university address.

In this case, the e-mail address of an Agricultural Sciences student was used.

Information Technology does have a good automated mechanism for submitting spam. It is quite simple to use, but being automated there will be no indication or acknowledgement that the mail has been received by Information Technology:

  1. Start a new mail addressed to sysadm@sun.ac.za
  2. Use the Title “SPAM” (without quotes) in the Subject field.
  3. With this New Mail window open, drag the suspicious spam/phishing mail from your Inbox into the New Mail Window. It will attach the mail as an attachment and a small icon with a light yellow envelope will appear in the attachments section of the New Mail.
  4. Send the e-mail.

Do not “Forward” the Spam mail to this address. When you forward the original sender and all the information that the spam filters use to filter out the mail is lost and the Forwarded mail will be rendered useless for the filters.

Here is the mail that is circulating at the moment (malicious links have been removed):


From: Compromised, Student Account <12345678@sun.ac.za>

Sent: 23 February 2017 16:00

Subject: Mandatory Update 

Dear Valued Customer, 

STANDARD BANK MONETARY SERVICES 

We wish to inform you that your Credit Card has been listed for suspension due to recent Error/Traffic on your previous transaction. 

You are MANDATED to re-update your details here: https://dont.click.on.this.link.com 

Failure to Update within 24Hours will Lead to your Banking Services Suspension/Interruption.

We are sorry for any inconveniences this might have caused you.

[ARTICLE BY DAVID WILES]

 

Ransomware attack uses fake SA Post Office e-mails

Wednesday, February 22nd, 2017

Be aware that a ransomware attack using fake SA Post Office e-mail has made its appearance recently on the Tygerberg network.

The hacking attack, originating in Russia, uses fake e-mails from the SA Post Office to inform the victim of a parcel intended for delivery. The mail contains a link which downloads malicious software – in this case a nefarious variant of the Cryptolocker malware.

Crypto ransomware is a type of malware used to extort money from victims by preventing access to their computer or files. Recovery of infected systems is virtually impossible without clean backups.

When the victim opens the malicious e-mail attachment, the virus attacks the target PC system, encrypts victim’s files and displays a ransom note, which informs the victim that in order to restore access to their files, a ransom of between $100 and $500 must be paid. Victims have only a certain amount of time to pay a ransom or they will lose access to their files forever.

If you have been backing up your data and have extra copies of your photos, documents, and other files, you won’t need to pay a ransom. Reformatting your drive, and restoring the drive from backup is the only reliable way of undoing the damage.

Cryptolocker ransomware is a nasty infection. Criminals only seek to earn easy money and frequently manage to do so. For victims of this ransomware, I want to emphasise that paying the ransom will not solve the problem. There is no guarantee that your data will be restored. Making the payment will not help to remove Cryptolocker ransomware.

Here is some advice to prevent becoming a ransomware victim:

  • Use spam filters and be cautious when opening e-mails, especially if there are attachments.
  • Make sure you are using reputable, up-to-date security products.
  • Make sure your operating system and applications are up to date and fully patched.
  • Run a regular scan of your computer.
  • Set and use strong and unique passwords.
  • Set passwords on all your hardware devices (modems and routers).
  • Back up your data.
  • Keep a backup copy of your data in a safe place, disconnected from your computer and the internet.
  • Only visit reputable websites and online services.

[ARTICLE BY DAVID WILES]

 

Learn What It Takes to Refuse the Phishing Bait!

Wednesday, February 1st, 2017

Cybercriminals know the best strategies for gaining access to your institution’s sensitive data. In most cases, it doesn’t involve them rappelling from a ceiling’s skylight and deftly avoiding a laser detection system to hack into your servers; instead, they simply manipulate one staff member or student.

According to IBM’s 2014 Cyber Security Intelligence Index, human error is a factor in 95 percent of security incidents. Following are a few ways to identify various types of social engineering attacks and their telltale signs.

  • Phishing isn’t relegated to just e-mail! Cyber criminals will also launch phishing attacks through phone calls, text messages, or other online messaging applications. Don’t know the sender or caller? Seem too good to be true? It’s probably a phishing attack.
  • Know the signs. Does the e-mail contain a vague salutation, spelling or grammatical errors, an urgent request, and/or an offer that seems impossibly good? Click that delete button.
  • Verify the sender. Check the sender’s e-mail address to make sure it’s legitimate. If it appears that our help desk is asking you to click on a link to increase your mailbox quota, but the sender is “UniversityHelpDesk@yahoo.com,” it’s a phishing message.
  • Don’t be duped by aesthetics. Phishing e-mails often contain convincing logos, links to actual company websites, legitimate phone numbers, and e-mail signatures of actual employees. However, if the message is urging you to take action — especially action such as sending sensitive information, clicking on a link, or downloading an attachment — exercise caution and look for other telltale signs of phishing attacks. Don’t hesitate to contact the company directly; they can verify legitimacy and may not even be aware that their name is being used for fraud.
  • Never, ever share your password. Did we say never? Yup, we mean never.Your password is the key to your identity, your data, and your classmates’ and colleagues’ data. It is for your eyes only. The IT department will never ask you for your password.
  • Avoid opening links and attachments from unknown senders. Get into the habit of typing known URLs into your browser. Don’t open attachments unless you’re expecting a file from someone. Give them a call if you’re suspicious.
  • When you’re not sure, call to verify. Let’s say you receive an e-mail claiming to be from someone you know — a friend, colleague, or even the rector of the university. Cyber criminals often spoof addresses to convince you, then request that you perform an action such as transfer funds or provide sensitive information. If something seems off about the e-mail, call them at a known number listed in the university’s directory to confirm the request.
  • Don’t talk to strangers! Receive a call from someone you don’t know? Are they asking you to provide information or making odd requests? Hang up the phone and report it to the helpdesk.
  • Don’t be tempted by abandoned flash drives. Cyber criminals may leave flash drives lying around for victims to pick up and insert, thereby unknowingly installing malware on their computers. You might be tempted to insert a flash drive only to find out the rightful owner, but be wary — it could be a trap.
  • See someone suspicious? Say something. If you notice someone suspicious walking around or “tailgating” someone else, especially in an off-limits area, call campus safety.

[ARTICLE FROM Educause]

Latest WhatsApp hoax

Monday, January 9th, 2017

If you are a user of the popular chat app WhatsApp, you should be aware of the latest hoax that states that the chat service will soon start charging a fee.

Here is an example of the current hoax:

Tomorrow at 6 pm they are ending WhatsApp and you have to pay to open it, this is by law. 

This message is to inform all of our users, our servers have recently been very congested, so we are asking you to help us solve this problem. We require our active users to forward this message to each of the people in their contact list to confirm our active users using WhatsApp. 

If you do not send this message to all your contacts WhatsApp will start to charge you. 

The message is allegedly sent from Whatsapp’s chief executive officer – Jim Balsamic.

  1. The real CEO of WhatsApp is Jan Koum.
  2. WhatsApp publically declared that they’ll never charge users for the service. [ https://blog.whatsapp.com/615/Making-WhatsApp-free-and-more-useful ]

This isn’t the first time this sort of hoax has plagued the web – a similar message was sent around in 2013.

In some cases, it was reported that victims of this hoax were “tricked” into opening a legitimate-looking Word, Excel or PDF document attached to a WhatsApp message. The PDF attachment then downloaded malware to devices to steal personal information.

Another student reported that one message they received tried to persuade them to download a R200 Edgars voucher. In reality, the link simply installed cookies and a browser extension on their phone that flooded the phone with adverts.

Always be wary of messages with the following characteristics:

  1. The person sending the message claims to be associated with WhatsApp.
  2. The message contains instructions telling you to forward the message. (Use a bit of common sense here. According to this hoax message, WhatsApp servers are “very congested” and Jim Balsamic want you to add to the congestion by forwarding the message to all your WhatsApp contacts?)
  3. The message says you will suffer some sort of punishment, like account suspension, if you don’t follow the instructions.
  4. The message promises a reward or gift from Whatsapp or another party.
  5. Just because a message was forwarded to you by a friend or family member, doesn’t make it legitimate. (friends and family can be just as gullible as any other person)

[ARTICLE BY DAVID WILES]

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.