%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250619184836+00'00') /ModDate (D:20250619184836+00'00') /Title (Report 06-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 3910 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 233.675 521.469 513.059 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 234.050 520.719 512.309 re S 0.773 0.773 0.773 rg 61.016 249.425 m 550.984 249.425 l 550.984 250.175 l 61.016 250.175 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(NO, SARS DOESNT REALLY WANT TO GIVE YOU A REFUND AND )] TJ ET BT 61.016 676.134 Td /F1 14.4 Tf [(OTHER PHISHING TALES)] TJ ET 0.400 0.400 0.400 rg BT 61.016 647.326 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 647.326 Td /F3 9.0 Tf [(June 02,2013)] TJ ET BT 160.079 647.326 Td /F2 9.0 Tf [( by )] TJ ET BT 174.587 647.326 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 619.837 Td /F4 9.0 Tf [(Every year we send out literally dozens of warninge-mails, and continue to do so, )] TJ ET BT 61.016 608.848 Td /F4 9.0 Tf [(because despite the frequent warnings, people still get caught falling for these )] TJ ET BT 61.016 597.859 Td /F4 9.0 Tf [(tricks.)] TJ ET BT 61.016 577.870 Td /F4 9.0 Tf [(Take noteof the following scam from fraudsters claiming to be from SARS.)] TJ ET BT 61.016 566.881 Td /F4 9.0 Tf [()] TJ ET BT 61.016 555.892 Td /F4 9.0 Tf [(Emails are going out touniversity \(and private addresses\)seeminglycoming from )] TJ ET BT 61.016 544.903 Td /F4 9.0 Tf [(SARS informing them that they have a refund waiting for them. \(Wow! a tax )] TJ ET BT 61.016 533.914 Td /F4 9.0 Tf [(refund\) Clicking on the hyperlink in the email takes you to a fake e-filing site that )] TJ ET BT 61.016 522.925 Td /F4 9.0 Tf [(has hyperlinks for the four big South African banks and instructions to log on to your )] TJ ET BT 61.016 511.936 Td /F4 9.0 Tf [(Internet banking site for confirmation of your details. When you follow the Nedbank )] TJ ET BT 61.016 500.947 Td /F4 9.0 Tf [(link \(as an example\), you are taken to a copy of the Nedbank internet banking site )] TJ ET BT 61.016 489.958 Td /F4 9.0 Tf [(that asks for profile, pin and password. Supplying these takes you to a second page )] TJ ET BT 61.016 478.969 Td /F4 9.0 Tf [(that asks you for your mobile number. Submitting information on this page takes you )] TJ ET BT 61.016 467.980 Td /F4 9.0 Tf [(to a page that requests the reference number sent to your cellphone.)] TJ ET BT 61.016 456.991 Td /F4 9.0 Tf [()] TJ ET BT 61.016 446.002 Td /F4 9.0 Tf [(Do not authorise anycellphone message that comes through if you end up in the )] TJ ET BT 61.016 435.013 Td /F4 9.0 Tf [(above situation. Furthermore, do not click on any hyperlinks in emails or divulge )] TJ ET BT 61.016 424.024 Td /F4 9.0 Tf [(your account or mobile number details to anyone over the phone or via email.Banks )] TJ ET BT 61.016 413.035 Td /F4 9.0 Tf [(will never ask you to access internet banking through a link in an email, neither will )] TJ ET BT 61.016 402.046 Td /F4 9.0 Tf [(banks ever ask for your mobile number when you access internet banking.)] TJ ET BT 61.016 382.057 Td /F4 9.0 Tf [(Another particulary sneaky phishing attack surfaced today.)] TJ ET BT 61.016 362.068 Td /F4 9.0 Tf [(It comes from Linda Perez and has a subject line of Administrator \(Sorry for the inconvenience\))] TJ ET BT 61.016 342.079 Td /F4 9.0 Tf [(It asks you to contact the sender with your username and password so they can expand your mailbox manually)] TJ ET BT 61.016 322.090 Td /F4 9.0 Tf [(Of course this is a phishing attack, and you should never respond to such mails.)] TJ ET BT 61.016 302.101 Td /F4 9.0 Tf [(Do not respond, flag the sender as Junk Mail and delete the message.)] TJ ET BT 437.953 282.112 Td /F4 9.0 Tf [(ARTICLE BY DAVID WILES)] TJ ET 0.400 0.400 0.400 rg BT 61.016 263.623 Td /F2 9.0 Tf [(Posted in:E-mail,General,Security | Tagged:Phishing,Spam | With 0 comments)] TJ ET q 149.250 0 0 225.000 401.734 403.628 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 199 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 3351>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 80 C   %# , #&')*)-0-(0%()(C   (((((((((((((((((((((((((((((((((((((((((((((((((((," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?)(h((((JZ((((((J(h(JZ(((((JZ((J(h((((((((bIbIY]C) EQEQEQEQEQEQERR@Q@Q@Q@Q@Ck`+sƧ9z8ǧ~(s;;: ǘzp;߆k_l//r${aZQV ((()h 1EQEQEQEQERR@Q@_ĻtM=o,Ck1w?"9bOξ@>":fd%66CRƏhQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@UHg@3^S)ޣg&Wwx;S'c"d?'x4{QQ@Q@Q@Q@Q@Q@%-QEQEQEQE0n_?g8oPciSn?|\3b5 eU.ݧALhJ(QEQEQERR@ E-RR@ E-QEQ@ KER@%]-_7|;BHo-^#_ξݡ_o_6|6ٸ,LhBQKE%-PQKERQ@ F(J\QIM)2P \?PQ@()k:-V=(dzWΑ|?&f@h$!$:je.(b)(qF( ( ( ( ( tK5[Eo+D%qAB?Zͼ=pަim]aЏI4QE0 ( ( ()S▊vfXށWZ]?_/xh1 AS->*QEQEQE%PQKE%PWizȃ %i|$ʾ'kCzUמ$K8.a9hE>fQ@ E-R@_M|?t<5׭}AhIA*4nH@ nabDCG|ӜIrp WW>|7 ^0M~So4o" mcqtHAES((vX~b`i~*h)"X _Lƾg <ufcL-NФg*d4}7EfAEf ( (QIE-PIEdxgQbp<^2#$"{׈- jZX]@|H>3#v?rܤ}mE27YcY#`2AN J(hJ([3G̕FO{cZ< ;97~U^[o]&GR*~ x y\VϦ8݌褢BIE-RPIE-Q@hPEP_/nмO5ʗ[K=xnJo. Bj+x꺅A}?++ԏX_|KkVہ@cھy?M$1Z( )S(4z%QT ,l(f8W3C<eI YHSA>|NҢ{})ķ' Tiޥs,lԒ{64?prG$zEV9';t$XHP*X^ ѢkKy>s5B@4QE13EP(Z((Z((9/xMu-ˆo~G=3_4.ɻkU?%C+|OҾæMsF̉$l0U .=P>I!Լy{d+㶫TҬdlr?J{g b1%W5/o7{\+gge@#WZLj5^;)<&v-{ J^kNp~?v|9m7IU+.l5b/4|Oyi$R_EN |'}7?gbd>=E4 E-%PQKE%PQK( )( )(PE%.(((JZ((J(h(((((((((((((((((((8((((((b((Q@((1EPEPEPF( 1EQEb( endstream endobj xref 0 13 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000570 00000 n 0000004532 00000 n 0000004644 00000 n 0000004759 00000 n 0000004879 00000 n 0000004987 00000 n trailer << /Size 13 /Root 1 0 R /Info 5 0 R >> startxref 8506 %%EOF spam « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

spam

No, SARS doesn’t really want to give you a refund and other phishing tales

Wednesday, February 6th, 2013

Every year we send out literally dozens of warning e-mails, and continue to do so, because despite the frequent warnings, people  still get caught falling for these tricks. 

Take note of the following scam from fraudsters claiming to be from SARS.
 
Emails are going out to university (and private addresses) seemingly coming from “SARS” informing them that they have a refund waiting for them.  (Wow! a tax refund) Clicking on the hyperlink in the email takes you to a fake “e-filing” site that has hyperlinks for the four big South African banks and instructions to log on to your Internet banking site for “confirmation of your details”.  When you follow the Nedbank link (as an example), you are taken to a copy of the Nedbank internet banking site that asks for profile, pin and password.  Supplying these takes you to a second page that asks you for your mobile number.  Submitting information on this page takes you to a page that requests the reference number sent to your cellphone.
 
Do not authorise any cellphone message that comes through if you end up in the above situation.  Furthermore, do not click on any hyperlinks in emails or divulge your account or mobile number details to anyone over the phone or via email.  Banks will never ask you to access internet banking through a link in an email, neither will banks ever ask for your mobile number when you access internet banking.

Another particulary sneaky phishing attack surfaced today. 

It comes from “Linda Perez” and has a subject line of “Administrator (Sorry for the inconvenience)” 

It asks you to contact the “sender” with your username and password so they can “expand your mailbox manually” 

Of course this is a phishing attack, and you should never respond to such mails. 

Do not respond, flag the sender as Junk Mail and delete the message.

ARTICLE BY DAVID WILES

Vaccinate your pc

Friday, November 9th, 2012

Every year you have to go to your doctor to get an anti-flu injection. You have to get one every year because the influenza virus mutates and adapts every year into a new strain. Computer viruses are exactly the same! Here are a few handy tips and hints to ensure the whole process is as painless as possible. But first things first –

  • Use an AntiVirus Software – It is very important that your computer has an antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and therefore infect yourself.

See this link for a listing of some online/stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software –  There is no point running an antivirus program if you do not make sure it has all the latest updates available to it. If you do not update the software, it will not know about any new viruses, trojans, worms, etc that have been released into the wild since you installed the program. Then if a new infection appears in your computer, the antivirus program will not know that it is bad, and not alert you when you run it and become infected. Therefore it is imperative that you update your Antivirus software at least once a week (Even more if you wish) so that you are protected from all the latest threats. If you are lucky then you will have an anti-virus product that will update itself automatically via the internet, but never blindly trust this. A large number of the more virulent viruses and trojans can deactivate your anti-virus software’s updating functions.
  • Install an Anti-Spyware Program – Just as you installed and use an antivirus program, it is essential these days to use a Spyware protection and removal program. These programs can be used to scan your computer for spyware, dialers, browser hijackers, and other programs that are malicious in nature. The 4 program that I recommend are SuperAnti-SpywareSpybot – Search and Destroy, andLavasoft’s Ad-Aware, and Windows Defender.A tutorial on using some of these programs can be found below:

Using Spybot – Search & Destroy to remove Spyware , Malware, and Hijackers

Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Commercial Spyware Removal/Protection Programs – If you feel more comfortable installing a commercial Spyware removal program then I recommend WebRoot’s Spysweeper or Lavasoft’s Ad-Aware Professional. Both are fair products and a worthy addition to the arsenal of software protecting your computer.

Spysweeper Product Information

  • Occasionally Run Online Virus Scans – Unfortunately not all antivirus programs are created equal. Each program may find infections that other antivirus programs do not and vice-versa. It is therefore recommended that you occasionally run some free online antivirus scanners to make sure that you are not infected with items that your particular antivirus program does not know how to find. Three online scanners that we recommend are:

Every once in a while, maybe once every 2 weeks, run one or both of these scanners to see if they find anything that may have been missed by your locally installed antivirus software. Believe me, you will not regret it!

ARTICLE BY David Wiles, GERGA

For regular updates on the latest spam, malware and ransomware threats, please check or blog regularly.

Scam: Cancellation Of Debit Order (Absa)

Monday, October 29th, 2012

Please note the following phishing scam: These scams are becoming far more fine-tuned to South African victims and especially university accounts. Earlier this month there was a specific scam using Alexander-Forbes as a means to attack, Alexander-Forbes being the university’s preferred consultant for insurance, medical aid consultancy etc. Barely a week later Virgin Active’s name was used to attempt to scam university personnel. This week it is the turn of Outsurance. The e-mails are virtually identical, only the names and the servers in the background change, but you should be able to see that they are homing more and more to South African users, which tells me one thing that either they are getting this information from South African victims or these scamming operations are South-African based.   Here is an expurgated version of the scam. Please take note and be very careful!  From: Absa [mailto:ibt@onlinedata.co.za] Sent: 29 October 2012 01:46 PM To: Name <university_email@address.goes.here> Subject: Cancellation Of Debit Order(Absa) Dear Customer, We received a Debit Order alert on your account this morning from Outsurance Insurance Company to deduct the sum of R3150.00 from your account. If you don’t want to authorized this Debit Order you can cancel by following the instruction below. Click below to Cancel the Debit Order on your profile. You will receive a message on your cellphone with a link, type in the last Eight digit RVN on the SMS message to complete the cancellation. click here to Cancel. . Regards, Security Department

(INFORMATION SUPPLIED BY DAVID WILES)

Spam – not just processed meat

Friday, September 14th, 2012

Spam, or junk mail is defined as identical, disruptive e-emails sent to a large amount of e-mail or cellphone users.  When a receiver clicks on one of the links in the message, he/she is diverted to a phishing website or websites containing malware.  Spam e-mails can also contain hidden malware scripts. The opposite of spam is, believe it or not, ham. In other words e-mails you WANT to receive.

The origin of the meaning of spam in this context, can be laid at the feet of the obscure British comedians known as Monty Python. In a 1970 sketch a group of Vikings in a restaurant starts chanting the word “spam” so incessantly that no-one else can have a conversation. Click here if you’d like to see the original Monty Python sketch where the word “spam” is mentioned 132 keer times in a mere three and a half minutes.

Even Google is amused by die word. The company once hid a surprise in their gmail users’ spam folder. When you clicked on your Spam folder, a webclip containing a variety of recipes for the original variety of spam. Amongst others recipes for  “Spam Primavera”, “Spam Swiss Pie”, “Creamy Spam Broccoli Casserole” and “Spam Veggie Pita Pockets”. The first spam was sent on 3 May 1978 to advertise a new computer system. It was sent to 600 ARPANET users and all 600 names were typed in by hand from a printed document. You can read the original e-mail here.

It is estimated that, from August 2010, 200 billion spam messages are sent per day. Lucky for Stellenbosch campus users, we have a fairly strict spam filer and huge amounts of spam bypass your inbox every day. If you still receive unnecessary spam, there are ways to decrease it even more. If it makes you feel any better though – according to Steve Ballmer, Microsoft CEO, Bill Gates receives four million e-mails a year and most of it’s spam.

SOURCES: http://blog.emailaddressmanager.comhttp://mashable.com & www.wikipedia.org

Spyware infected mail – USPS Shipment e-mail

Thursday, May 17th, 2012

Since this morning (Thursday 17 May) a number of e-mails have been delivered into University accounts with a subject line of “USPS Shipment Info for 2351 3200 0122 9268 0611 3688”. The mail contains a cleverly disguised executable disguised as a web page or a document that when clicked or opened (the attachment) will modify the security settings in your Internet Explorer browser settings to allow criminals to gain access or control to your computer. If you get any mail with these sort of characteristics (often disguised as a USPS, UPS or international postal or courier services notification) please delete or quarantine the file. (Information supplied by David Wiles, Gerga)

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.