%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517114523+00'00') /ModDate (D:20240517114523+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R 24 0 R 26 0 R 28 0 R 30 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 7290 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 65.959 521.469 680.775 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 66.334 520.719 680.025 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(SMISHING: NOW ON YOUR PHONE)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(According to )] TJ ET 0.373 0.169 0.255 rg BT 113.540 564.033 Td /F3 9.0 Tf [(McAfee)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 113.540 562.882 m 144.050 562.882 l S 0.400 0.400 0.400 rg BT 144.050 564.033 Td /F3 9.0 Tf [( SMiShing is:)] TJ ET BT 61.016 544.044 Td /F3 9.0 Tf [("...  a version of phishing in which scammers send text messages rather than emails, which appear to have been sent by a )] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(legitimate, trusted organization and request that the recipient clicks on a link or provide credentials in a text message )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(reply. The term is a condensed way of referring to “short message service phishing,” or “SMS phishing.”")] TJ ET BT 61.016 502.077 Td /F3 9.0 Tf [(Over the past few years, we've learnt not to trust emails, fearing we'll become victims of phishing fraud. Most people by )] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(now know not to click on links in emails. With SMS's you can't preview links as in emails, which increases the possibility of )] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(clicking on it out of curiosity. Unfortunately, human behaviour is the greatest threat to cyber security and it's something that )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(cannot be controlled by IT security staff. )] TJ ET BT 61.016 449.121 Td /F3 9.0 Tf [(Criminal hackers had to find another way to trick users into revealing personal information. As we start using more and )] TJ ET BT 61.016 438.132 Td /F3 9.0 Tf [(more mobile devices, the potential for possible platforms increases. Additionally, if you use your devices at home and at )] TJ ET BT 61.016 427.143 Td /F3 9.0 Tf [(work, you also put the university at risk when you are a victim of either phishing or smishing. At the university, there are )] TJ ET BT 61.016 416.154 Td /F3 9.0 Tf [(thousands of staff and students using various devices, all at risk of being infected. )] TJ ET BT 61.016 396.165 Td /F4 9.0 Tf [(How do they do it?)] TJ ET BT 61.016 376.176 Td /F3 9.0 Tf [(Hackers have access to software that generates cell phone numbers based on area codes, they then plug into a cell )] TJ ET BT 61.016 365.187 Td /F3 9.0 Tf [(phone service provider's extension and generate the remaining numbers with the software. By means of a mass email text )] TJ ET BT 61.016 354.198 Td /F3 9.0 Tf [(message service, messages are distributed. Text messages will contain a link which installs keyloggers or link to malicious )] TJ ET BT 61.016 343.209 Td /F3 9.0 Tf [(websites which harvests your personal information. Other text messages trick the receiver into calling numbers, leading to )] TJ ET BT 61.016 332.220 Td /F3 9.0 Tf [(outrageous phone bills. \()] TJ ET 0.373 0.169 0.255 rg BT 159.566 332.220 Td /F3 9.0 Tf [(Also see the latest Wangiri scam)] TJ ET 0.18 w 0 J [ ] 0 d 159.566 331.069 m 290.111 331.069 l S 0.400 0.400 0.400 rg BT 290.111 332.220 Td /F3 9.0 Tf [(\) Yet another type will trick you into thinking you've subscribed to )] TJ ET BT 61.016 321.231 Td /F3 9.0 Tf [(a service. When you try to unsubscribe, you'll be billed for using the service.  Some text messages will download spyware )] TJ ET BT 61.016 310.242 Td /F3 9.0 Tf [(which can see everything you do on your phone.)] TJ ET BT 61.016 290.253 Td /F4 9.0 Tf [(How to avoid it)] TJ ET BT 78.360 270.280 Td /F3 9.0 Tf [(1.)] TJ ET BT 91.016 270.264 Td /F3 9.0 Tf [(Know how this kind of scam works. You'll be able to recognise it easier. )] TJ ET BT 78.360 259.291 Td /F3 9.0 Tf [(2.)] TJ ET BT 91.016 259.275 Td /F3 9.0 Tf [(Don't reply to text messages from numbers you don't know, especially if it asks for personal information.)] TJ ET BT 78.360 248.302 Td /F3 9.0 Tf [(3.)] TJ ET BT 91.016 248.286 Td /F3 9.0 Tf [(Even if it's a message from a friend, make sure it's legitimate. Your friend could have been hacked. Check with )] TJ ET BT 91.016 237.297 Td /F3 9.0 Tf [(them first.)] TJ ET BT 78.360 226.324 Td /F3 9.0 Tf [(4.)] TJ ET BT 91.016 226.308 Td /F3 9.0 Tf [(Install security on your phone, for example, a VPN, anti-virus and spyware.)] TJ ET BT 78.360 215.335 Td /F3 9.0 Tf [(5.)] TJ ET BT 91.016 215.319 Td /F3 9.0 Tf [(Never install apps from text messages. Rather go to the app store where you know the software has been tested )] TJ ET BT 91.016 204.330 Td /F3 9.0 Tf [(and verified. \(e.g. Google Play\))] TJ ET BT 78.360 193.357 Td /F3 9.0 Tf [(6.)] TJ ET BT 91.016 193.341 Td /F3 9.0 Tf [(If you're unsure if a text message is safe, don't open it.)] TJ ET BT 78.360 182.368 Td /F3 9.0 Tf [(7.)] TJ ET BT 91.016 182.352 Td /F3 9.0 Tf [(If you didn't sign up for a service, ignore the message.)] TJ ET BT 61.016 162.363 Td /F3 9.0 Tf [( )] TJ ET 0.373 0.169 0.255 rg BT 61.016 142.374 Td /F3 9.0 Tf [('Smishing' scams target your text messages. Here's how to avoid them)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 141.223 m 342.275 141.223 l S 0.400 0.400 0.400 rg BT 342.275 142.374 Td /F3 9.0 Tf [( from )] TJ ET 0.373 0.169 0.255 rg BT 365.279 142.374 Td /F3 9.0 Tf [(CNBC)] TJ ET 0.18 w 0 J [ ] 0 d 365.279 141.223 m 390.776 141.223 l S 0.400 0.400 0.400 rg BT 390.776 142.374 Td /F3 9.0 Tf [(.)] TJ ET BT 61.384 122.385 Td /F3 9.0 Tf [([SOURCES: )] TJ ET 0.373 0.169 0.255 rg BT 113.395 122.385 Td /F3 9.0 Tf [(www.webopedia.com)] TJ ET 0.18 w 0 J [ ] 0 d 113.395 121.234 m 198.418 121.234 l S 0.400 0.400 0.400 rg BT 198.418 122.385 Td /F3 9.0 Tf [(; )] TJ ET 0.373 0.169 0.255 rg BT 203.422 122.385 Td /F3 9.0 Tf [(CNBC)] TJ ET 0.18 w 0 J [ ] 0 d 203.422 121.234 m 228.919 121.234 l S 0.400 0.400 0.400 rg BT 228.919 122.385 Td /F3 9.0 Tf [(; )] TJ ET 0.373 0.169 0.255 rg BT 233.923 122.385 Td /F3 9.0 Tf [(www.bbc.com;)] TJ ET 0.18 w 0 J [ ] 0 d 233.923 121.234 m 292.432 121.234 l S 0.400 0.400 0.400 rg BT 292.432 122.385 Td /F3 9.0 Tf [( )] TJ ET 0.373 0.169 0.255 rg BT 294.934 122.385 Td /F3 9.0 Tf [(www.norton.com)] TJ ET 0.18 w 0 J [ ] 0 d 294.934 121.234 m 361.948 121.234 l S 0.400 0.400 0.400 rg BT 361.948 122.385 Td /F3 9.0 Tf [(; )] TJ ET 0.373 0.169 0.255 rg BT 366.952 122.385 Td /F3 9.0 Tf [(www.consumeraffairs.com)] TJ ET 0.18 w 0 J [ ] 0 d 366.952 121.234 m 472.468 121.234 l S 0.400 0.400 0.400 rg BT 472.468 122.385 Td /F3 9.0 Tf [(; )] TJ ET 0.373 0.169 0.255 rg BT 477.472 122.385 Td /F3 9.0 Tf [(www.mcafee.com)] TJ ET 0.18 w 0 J [ ] 0 d 477.472 121.234 m 548.482 121.234 l S 0.400 0.400 0.400 rg BT 548.482 122.385 Td /F3 9.0 Tf [(])] TJ ET BT 61.016 102.396 Td /F3 9.0 Tf [( )] TJ ET BT 61.016 83.907 Td /F3 9.0 Tf [(Posted in:Communication,Security | Tagged:Smishing | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 113.5397 563.2006 144.0497 572.3581 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://securingtomorrow.mcafee.com/consumer/family-safety/protect-yourself-from-smishing/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 159.5657 331.3876 290.1107 340.5451 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/en/2017/07/wangiri-fraud-on-the-rise/) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 141.5416 342.2747 150.6991 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (https://www.cnbc.com/video/2017/07/05/smishing-scams-target-your-text-messages-heres-how-to-avoid-them.html?__source=cnbcembedplayer) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 365.2787 141.5416 390.7757 150.6991 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (//www.cnbc.com/?__source=cnbcembedplayer) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 113.3953 121.5526 198.4183 130.7101 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (http://www.webopedia.com/TERM/S/smishing_scams.html) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 203.4223 121.5526 228.9193 130.7101 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (https://www.cnbc.com/?__source=cnbcembedplayer) >> endobj 24 0 obj << /Type /Annot /Subtype /Link /A 25 0 R /Border [0 0 0] /H /I /Rect [ 233.9233 121.5526 292.4323 130.7101 ] >> endobj 25 0 obj << /Type /Action /S /URI /URI (http://www.bbc.com/news/business-35201188) >> endobj 26 0 obj << /Type /Annot /Subtype /Link /A 27 0 R /Border [0 0 0] /H /I /Rect [ 294.9343 121.5526 361.9483 130.7101 ] >> endobj 27 0 obj << /Type /Action /S /URI /URI (https://us.norton.com/internetsecurity-emerging-threats-what-is-smishing.html) >> endobj 28 0 obj << /Type /Annot /Subtype /Link /A 29 0 R /Border [0 0 0] /H /I /Rect [ 366.9523 121.5526 472.4683 130.7101 ] >> endobj 29 0 obj << /Type /Action /S /URI /URI (https://www.consumeraffairs.com/news04/2006/11/smishing.html) >> endobj 30 0 obj << /Type /Annot /Subtype /Link /A 31 0 R /Border [0 0 0] /H /I /Rect [ 477.4723 121.5526 548.4823 130.7101 ] >> endobj 31 0 obj << /Type /Action /S /URI /URI (https://securingtomorrow.mcafee.com/consumer/family-safety/protect-yourself-from-smishing/) >> endobj xref 0 32 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000469 00000 n 0000000614 00000 n 0000007956 00000 n 0000008068 00000 n 0000008175 00000 n 0000008291 00000 n 0000008411 00000 n 0000008539 00000 n 0000008681 00000 n 0000008809 00000 n 0000008924 00000 n 0000009051 00000 n 0000009235 00000 n 0000009363 00000 n 0000009455 00000 n 0000009583 00000 n 0000009686 00000 n 0000009814 00000 n 0000009912 00000 n 0000010040 00000 n 0000010133 00000 n 0000010261 00000 n 0000010390 00000 n 0000010518 00000 n 0000010630 00000 n 0000010758 00000 n trailer << /Size 32 /Root 1 0 R /Info 5 0 R >> startxref 10900 %%EOF smishing « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

smishing

SMiShing: Now on your phone

Tuesday, August 1st, 2017

According to McAfee SMiShing is:

“…  a version of phishing in which scammers send text messages rather than emails, which appear to have been sent by a legitimate, trusted organization and request that the recipient clicks on a link or provide credentials in a text message reply. The term is a condensed way of referring to “short message service phishing,” or “SMS phishing.””

Over the past few years, we’ve learnt not to trust emails, fearing we’ll become victims of phishing fraud. Most people by now know not to click on links in emails. With SMS’s you can’t preview links as in emails, which increases the possibility of clicking on it out of curiosity. Unfortunately, human behaviour is the greatest threat to cyber security and it’s something that cannot be controlled by IT security staff. 

Criminal hackers had to find another way to trick users into revealing personal information. As we start using more and more mobile devices, the potential for possible platforms increases. Additionally, if you use your devices at home and at work, you also put the university at risk when you are a victim of either phishing or smishing. At the university, there are thousands of staff and students using various devices, all at risk of being infected. 

How do they do it?

Hackers have access to software that generates cell phone numbers based on area codes, they then plug into a cell phone service provider’s extension and generate the remaining numbers with the software. By means of a mass email text message service, messages are distributed. Text messages will contain a link which installs keyloggers or link to malicious websites which harvests your personal information. Other text messages trick the receiver into calling numbers, leading to outrageous phone bills. (Also see the latest Wangiri scam) Yet another type will trick you into thinking you’ve subscribed to a service. When you try to unsubscribe, you’ll be billed for using the service.  Some text messages will download spyware which can see everything you do on your phone.

How to avoid it

  1. Know how this kind of scam works. You’ll be able to recognise it easier. 
  2. Don’t reply to text messages from numbers you don’t know, especially if it asks for personal information.
  3. Even if it’s a message from a friend, make sure it’s legitimate. Your friend could have been hacked. Check with them first.
  4. Install security on your phone, for example, a VPN, anti-virus and spyware.
  5. Never install apps from text messages. Rather go to the app store where you know the software has been tested and verified. (e.g. Google Play)
  6. If you’re unsure if a text message is safe, don’t open it.
  7. If you didn’t sign up for a service, ignore the message.

 

‘Smishing’ scams target your text messages. Here’s how to avoid them from CNBC.

[SOURCES: www.webopedia.com; CNBC; www.bbc.com; www.norton.com; www.consumeraffairs.com; www.mcafee.com]

 

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.