%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 18 0 R /I2 19 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240512141435+00'00') /ModDate (D:20240512141435+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 3319 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 123.022 521.469 623.712 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 123.397 520.719 622.962 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(PHISHING AND WHALING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Recently we gave you some pointers on identifying )] TJ ET 0.373 0.169 0.255 rg BT 266.108 564.033 Td /F3 9.0 Tf [(phishing)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 266.108 562.882 m 299.624 562.882 l S 0.400 0.400 0.400 rg BT 299.624 564.033 Td /F3 9.0 Tf [(e-mails. So now that you know all the signs and how to outwit )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(the criminals,there's another variant - spear phishing. But don't panic, it's almost the same, with a bit of a twist.)] TJ ET BT 61.016 533.055 Td /F4 9.0 Tf [(Spear phishing)] TJ ET BT 126.032 533.055 Td /F3 9.0 Tf [( is an e-mail that seems to be sent from an individual or business you know. Of course it's really from )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(hackers attempting to obtain you credit card, bank account numbers, passwords and financial information.)] TJ ET BT 61.016 502.077 Td /F3 9.0 Tf [(These types of attacks focus on a single user or department within an organisation and use another staff member from the )] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(organisation's name to gain the victim's trust. \(Also see our recent article on the incident at )] TJ ET 0.373 0.169 0.255 rg BT 423.113 491.088 Td /F3 9.0 Tf [(Finance)] TJ ET 0.18 w 0 J [ ] 0 d 423.113 489.937 m 455.126 489.937 l S 0.400 0.400 0.400 rg BT 455.126 491.088 Td /F3 9.0 Tf [(.\))] TJ ET BT 61.016 471.099 Td /F3 9.0 Tf [(They often appear to be from your company's human resources or IT department, requestingstaff to update information, )] TJ ET BT 61.016 460.110 Td /F3 9.0 Tf [(for example passwords or account details. Alternatively the e-mail might contain a link, which will execute spyware when )] TJ ET BT 61.016 449.121 Td /F3 9.0 Tf [(clicked on.)] TJ ET BT 61.016 429.132 Td /F3 9.0 Tf [(But wait, there are even more fishing comparisons.)] TJ ET BT 61.016 401.643 Td /F3 9.0 Tf [(When a phishing attack is directed specifically at senior executives, other high profile staff or seemingly wealthy people, )] TJ ET BT 61.016 390.654 Td /F3 9.0 Tf [(it's called )] TJ ET BT 100.247 390.654 Td /F3 9.0 Tf [(whaling)] TJ ET BT 130.757 390.654 Td /F3 9.0 Tf [(. By whaling cyber criminals are trying to catch the "big phish", or whale.)] TJ ET q 450.000 0 0 158.250 61.016 221.206 cm /I2 Do Q BT 394.933 203.415 Td /F3 9.0 Tf [([SOURCE: http://www.webopedia.com])] TJ ET BT 61.016 184.926 Td /F3 9.0 Tf [()] TJ ET BT 548.482 173.937 Td /F3 9.0 Tf [()] TJ ET BT 548.482 162.948 Td /F3 9.0 Tf [()] TJ ET BT 548.482 151.959 Td /F3 9.0 Tf [()] TJ ET BT 61.016 140.970 Td /F3 9.0 Tf [(Posted in:E-mail,General,Security | Tagged:Phishing,Spear Phishing,Whaling | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 266.1077 563.2006 299.6237 572.3581 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/af/2016/01/13/phishing-e-mails/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 423.1127 490.2556 455.1257 499.4131 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/2016/01/new-cyber-crime-e-mail-targets-specific-individuals/) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 221.2063 511.0157 379.4563 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/files/2016/01/phishing.gif) >> endobj 18 0 obj << /Type /XObject /Subtype /Image /Width 600 /Height 211 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 600 /BitsPerComponent 8>> /ColorSpace /DeviceGray /BitsPerComponent 8 /Length 555>> stream xA 0 7r ̃&c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 cX&"M endstream endobj 19 0 obj << /Type /XObject /Subtype /Image /Width 600 /Height 211 /SMask 18 0 R /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 600 /BitsPerComponent 8>> /ColorSpace [ /Indexed /DeviceRGB 63 20 0 R ] /BitsPerComponent 8 /Length 28258>> stream x]"I0,*j4Vs陝{{ N?qO?! Lkxu5ۧ-:^?>o `aoη͖*[lARBIO[+XlAb,%X~ Xj#c.ퟧԿv.ߤ O R\# c\sU*`BJQ`GJr*XJ]" V" G A ȿߤ\v[sJ+"g: `bEa^/x~ oGiz&yFw?> Xa8XxϷa$`7k`5I{-Eqefq@\E~v* t*Fsy_0ix?nަKq;e9D*~ GCڐ|b%AޅVP> Xa깽ճ֖7.~( `AC5IE`Vza|zF bQ*g(x\,{(V\n@>' hK1*B * !XhZZ&?y9Kɀ |/ $ } v2$`mf{= v>q8NNH30"\dۙ7t@_A L V9]gd# T#0߻|:LnE! zĿYn ]mWhp1 |i|BKo fh"6@FABk]m[`A! `%:}?HPCBUT!gQ-A ŒDOodÇTu0[mx:E1y8^ s7X:+o4W6;r=N!8=& +#KqӟIتX_\ReaxKE a ;ۜ,5sv.W.fw=G_KZI[D\"Uc  pBQ~ON1`%'B Ԙf19aq5⎲ )2+#逤e{.AJdw²)^s x9B bzuZtXdd.\«Y,G0$jvG!)SИWxD>=}(>59F.(:%p:-w􃀕H*n5TffU݊Ѧc AyV4U5l9{2j < Eߌn*ꚪ11uiAJǴGG~6V6!?jﺱ2`ْ,9xw $UXXa i3PcAcLjk$t\`NhtMvC<lwo8T] l<46Kǖev߲~kۚ^~rbWd_!kG:dfǜۖex j>t,Ȝj_%,_t6//16 5`&Gq' S~/pqx6y~H@;>6);H?;&DfR|U% X! }z{A)ݾ]a18ۏ9M^=&u9FP,qxDa^9N[J|U\7MdQ/b6_vWJ#1g2`0]WjgQ?PaxVPh^{? ;wsqP1t6s4W@F'ؤgf &]ǹ 4ȇBo.2_X:3;&0t>s?b˄n D6JQc<&=?{{p0g"e*Y&1~`jk`ys1* 1!:ǵc<撎%Ma9>TZ*q%/h@DS"H`|D+er]X =&R@f|ަAEQlDnab 6 <{_ ;G4ZٰjcװvϏW?!mv c䝢i-l 1{v bp nn^ *l{D~A+/W䠪QK8"FP6@noa*%j bINRĄ^KS$s-EX.:X]~>oSn0YOն/zG+H4YF8 05㮑ǩb@݌I+ʡ6^u%(X0cyR#u;q-J,꽴E6 n!Vݴ Պ]jKFJHq)B5o39=nc( L % X 9sFtN`"Q%؛Pz온BU/OBz}>oV`vc?K[ BA(E,Y„ GGt#L %Fm,/L+q+`\42B 2-^e#(.v oHo\=`Q^ٍ>[H>dzV$Ng~ANgwC$ Xq]cjBҀk9!lN+@Qt,ez؍πZ[&GnP<;'t6S YO5C.:Ds LCNa#-5d03jT#1CiSF}z '(([1` JCiHT97OsBb$])m+."zx8³c7x|-n%R8$D{nrz~5 (Mr~l6|;\suJ3 .83M1gXy^9tw>Okny 3a` 6Z5K*h־[n(uDh]:`$F*l1s֭0OSʁKS mUk|S'E1V jFRGFJ_hD2@Rįtl ŘW̞ȕ?K BQVy 2ĠVz(t@%:er {f=@@J ĐO1VF9Ȅ@m<d8uw>OkiZnWuD{2a^V!`xyY_km2XYɩ7C>]vj~7vwg N5)d#-0%$A eb^ubؠ,kyKX4*f;e:Vtn+ ]`ӇBB.ҹV.7 L){a6# -m75=d:D/bɎ, ߦgLaXuN-yw2HQD)JlF1(or_{t $B|Ei'x$`{Tpvq=@Aq2 hrJVk4$MN "jӤ܂qUXPp7T3Hc>{()#Aӿ>\k=~bRm~m yQԳe CA `{_bni=}7UpmjMQ'^dmL9$HRv/׿x!D XQm {`=hTdI0+gzmf\jˑ)ǿX%Q#Ah˽6鄓5]`6cjVָkZz&m&((-Pe**dQ%A_b(J ~]*E*-%QTش"cP'W!l$Js`*=] -Ea:9(2-m14QypyQr;k?YiĀZE(}N1 6w\p@QSR^QylT7xb2VnT |S5N2q1xA4<4⨋S57Ey,E|S!5YOhMwJt8 3 ;!4Jwt 1 nE  yFH`ILaX +סb=KݘF~$ތav FG#=>S &m(!bm`-TfJ@ayG[qi)L>]8dDyiסuLLSʼXqv*YS*Q Y.(f (j  3D;}BZqKoorI/(U]2`%$KnzX~ox()%5ڿ 6|n[XoZĩr14Tַg]>/N|V^Q&8V*fۡ|.et|Mĩz}C2E]W+Vkg0vCEQݿ;H ߉v"w"۱4A_|umu$PW4*ɀ8A|j\A!cS>oY>ݼk])H<5QoPu1Kp7# rR PG5+{z" -A[ARmsSUqT׮QVV݌4G[ۡ})hصZp9b?1[ЙyX-+EUIf7dAW\@zVxUy'<de*qKBMTPS(beN^V.2,c`[t+ qo![< )jV/;/UQÊi"H Ecr8O:MʨZETuy^ͩ֝Ife iC枅=!ewsv|5^9r:V ͥb7D9w{XI _;f\Y?w,:̖.hӲ*i K~Atǀ}8(e fٽ BKY.L k@U[WEGB. #U; -$s X,F*6GLHD]n'm;d,i9V7M$jhF +>,\pLC2qP^ iH1ԪCX>uب#bD\KW 7~5E9 c!G<.8A2@EY'[1aVoWR(;1uV+6X'X p,Xݮup `&4Ӱ>%I Ci[T!97x9P58%Tϑш'i4_S'[ ΑMs6R8&V|Pp! 4%E]/~.l6Q&RUL<*L$k`) xĘAf4S)B:M0L5ArJ<%@ZВDzzr( Y/%Zg֕nSE.y-(.In92?%3ױ^a/ ]׋'F03 M>j^q-BȥvVZћf2Y=Q֓GZtRXv߅=Im]mdi Vb[? m1L >k_&Yvn6 J$S<Ơrie䴥pHx䠀vR_sSb^$}w Ѣ?'ҹBi^ g0@ayT%5/wG=j|p\ r#q8 pDsqfdY'/ƣp&mgHpC~{.hRYrKR%UA6!I3`!Cl6:g""(68ͮ=?xȆ./}i3~Љ~м9}/"ĵp-jl٨# Ex3TE2<"0GquOx{-!wW;<@@O9QG{]{"\aI_ Ha@?j`AG =n3s{ށ]u=drU6k`I}儳~1Dk4WZ5XlSQM0LYmھrmۣR,?lз-79}=3`e m2䫕 ,v P#q++'EPHa.J[p$P,,!o{Xj}h}~Gzk{߉Ym=5I1"}ye J%Ui|J^o:Vof$n mۇWYԸFu,/N ƢP-G3k%No~iΗ謼+JF93 O! }Y=%Ğp% zx*|060X6 KNGr)Sr UFѺ("bxπuU.)[*wD"GKtlj};X~L6qm@%TGNj- zDno\NJkvHPLۤEH!+-22E4%j6Tl>Iv IE:K6E7V/cA!Eӎէi>Ɍ?CJ'r;VXD7%SI>6l+*m15XQ M :L=ڶ8_IGY,'fLa[A}ؼp;TlcY/ėoڎbIiNn<*x@j78"dD3 4Ic(jDg8"uж !V 4dQhC؝|cS D YWRev2EYGڴ-9 -i mԤE[Ǭ;Ų`wO,6={:#5[kuiWF($.>L2BSU ~ yW|_'jS '?;@FbSewsJGX8ħ!S{&F<'Dj `+#:"( 7ی&QW*r`dr 9$M?Uk#R0#iewa(ÕD4D.>zqXZգ:|R=ڕxqda޸@`*p4~isTr0*yH Y XjMX͚>I;,lm A@Fp;\hh.(p Y_tr|(4)^YIiHc .Zr -0(.SbKO4DMVXˈe($3@i6"%Fk"#Z$P˘&ːL A:8$&C ?*ϋohBQm| }lt[0kLC͹VD3axf$߬V+6Y ]oslԎԌ`%#RVB|hcdq#A {u@m_ubmB_BNUuֻzX'B 'YȈK4h3`5QAxQD{uA*ajd}th7jkl(3Q|r1FT^&(?ޥ=B>մ>1YBb_r*,5M8BD"T>Xtᰃ-c,[z̸YN[eؐ\ f$v@T5潃,=EOg=F,WD̎]Mlg:ٜdmYcx;+ P2INHU|d*?~Bgf*j,H^t|̬:K߁3MZ'Z| m73:WXY Z]v!.H^&p|d_f5 _c a ^e7U>bORٶ?.Bk-1,i;P Gp9e\_0K?HT>9sFA_ FQ_^"YJ,Aɤ266o{ma; GŖkowr9:O_ã({ )н`3HzNtgBV<% mpːvO=hC:'ҷoDй{tAnRbu, T 1ͤRp2GJ4mh%լI `!6\ 9/[W+lw\23*N>wѨ՝bFnbj'wM4csh}<Զ Y!67HENC-j%H"w6^(BP*/4"E2Ʉ eDxr]l X3_ X @"M.*B(1~$/r TไmG^+4| \>Bs !ft&6Vրl?Wr`%N?X6#n"FSG m0jȃҸaKe|)1WPT+ ?6W!*db*WD%gТRu.ۦRf]mJ teZ{xe5HN`nC:|@CKm `gj*VG /J"D(=^U5[ Uo!H".eEX2w۠eM QPZ'iMqzQnU;'P&ok3~7'[_TmBhY Q԰{hkjeN]& ½ETQQ!e=k ,\s{YSE}/s&\&  z 0•?@6)ōQ)xO6SI\TP^A(F{2rf{i3 ^JU(5z/xb%A$%eDJlw$1aI:Oڠ̲(u}\ǒjK|4:$]-JZH- :!) /X*vB6Ņf Q=G |z[b{4ɮj^ֵRk^d$٬HEdzAfPhr{Ռ3\ڂ(zPZhujs+˨XDH׵_؟@l5QDVUP>KrV1"5Wi@4#`WcLޤKҁ[u,ynW;d5?ʂ)H2;)6)3ҫMpsJTM`DSlS[ȇ%׈2Bt1;7F@Æix rn,,-n PKHfT "Co>b&X$N>ѽCP -?9`}Pb_2)N&JRQ7 BPN /*y =I(Q,X¢l7g2aJ qPڤ- i17V IVH=*s0sZVIʐDlrK`9=cr;pA;ӿ~|}F.}'B:AFIDJ}W&+tMo-~̄ͥ/:OX5K}6pb;?}cr)˕weeWǖYl2MM Y[FJlDlW=M c"'؄I hffcn0ow\dG˫$bQ`5_ޅJW-qEߣiGdњ}b9+KƟoR?k$N 7Z;2u'L%P38̰Qr?DI[CWW(G yb`˜r=q<:չ~aмKsh^@M*`hsRdI3lH$?ʶ/:!-!L#Dl9f{Z>Bju%u6+\bP']yzҮ¹/<8(ܶ^:=X  _H/K ?,1|Bܑ~68@҃8 VLID\ |X/ m;:_m16=U]2/Xߥ&gpU5Sg>qqB 9LHtN2]8BF% zq}`uwէ۽M~`y8ś qCgKo61eǞ7Q&`I6vFz=R  ux%7`}P66XowCo bmDN-)ĤKT!>_WrPaL'TQ_c/ލj[ZR**Q Is`nHSYn"ٿ6̷[ X`ِz.ău݋I5?~q{:V>dD)@MOū-S]]F;_Ќ HJ'"WXkjjL'c2G=e޺qzbk \dZbۈV!Myqo;b䖷~:#4a="YRX ?K/Fcz=bWo(V[F %z}tʁw9oRE4aٞel6m]! ]d7xNy^p5:V?W>~q DZl-okU! ǴDbz&/d:t͌n̘4@ǍnϥU_Qʷ9#]o&_$Ewў sG,F7X18p,Vp6*_TXG'}GK^>VRZm>Ow_5# s0u83`X,ٝ=t^, tʟ}5Sj$D.3'iIdMۜ/G 4VZ>OӼ3`inZ72`9lb,K≶ֺ"T X<$վtw>\:-ǀ翧T}`;+olH1a Fqc=f4:HNaxqfARP̷{j w6d. CYhgdmqɸIZ)P>Ss0 k}ip9)įe IRwʆ9<\#2\4P,`SOJU %є}x Xq\)Vkte-m')Yx[,!(,eaױlPUSr.,ž'}%^MҴ\gFֿٽܴ+LOL3k,4Q2hʿ=n"΂ó_p֧C+1E.Q˺DbѥXERO*&!R@eVoUtYJn7Њ}hʀJNju̩W G-`AS(?ʱW&EN6jBgPO7PLV(zR)ixMaK/8I3`9AI}Xnӑ؋sλ ^X@hohUrBvp ;+*A UŞ>A*Vܐ /TYhR.r)&O¶("j@g &71DՐeL5mKzv2Oꌏ~9.QW<sz,xQ)8mY!V>,?! ߈$(?/6uBs_/k jXVGk%4dsJ؈),:EH(pyrK$r7ЁɼufxEWmL7NEZc%wQ4ʦ?5qNڽ_%LaˀXHa2}y!bѐ/^-!6+XD\y>ß]1灾/ 6Sg>\e_0恸Ob\Pwh-J h+2)Ob' yC4]:) }~2{cR5R:$5ɍ=zIi{W8N^ =7ϣs`TS֨[0,>d/ ^δج#MlR#noB%;/%UxAyFDGλ| 5L61/2\! `p{z!|Rpڱ"܈m j y's:rin^~[ƕ78V_LDtQZ7W,L U HN iK$2^Qg}Ô'=d|o9*_}UJkS,SPMuAZuPG˱kD.tUEv~ä˺KqbJT,+vYƪm^7?oq>-S~y5l\[+;ce߂s˴yρ3-QOk$6i"gN@eYvU&ezf\kZ_V8")mECLm{uRw|B}7d铅f] zZ2~2D- DP*2 _, ;+mkiK,T,:0XP9vx'zJY*[5SC=~ |A{?kD ^Yy#Pԑԓ77춈>Mav4xTȆugk^'S)mp{4<,mg X+=pn+Н;c4w~8DUFqCQ;Bއ#/ uϥʯ=U[[,a̳֬O+ }ZOr+gd=i~a},EV/D80q!zH9t$Is7k޽nie bF"%\ / B |a4v2y"1DU43R>c͞X<_;`qI>̀5HIZo!o\,B>V,{OI퇏dGi@S9+៷ uG/|Z[|N2^$ X f eAüYyZ }'$edS~*J0<~gꔈqD7ɶ]Co?R,mnv]b],|~Պ=_N E@/FDÐ} -n)rw%WZr;Pno8 Ҏݬΐ^I=zny`HcƓ(}㛓M&`EZwަ{A:3<ϑ@WY(W4Uc`1lD+o[\>!lW9u@7V[~\d!p*,rI1 fșnEXھ)ۚ~X!? XpaF|ѧb`A0pOYyu:yu2s>SDD|%[1]T-TsD?C틷] WZYJ\ߕ?d ԟMl"}ݰ_"xy`Aa~oj)Qztkb?* |Bw^egө1'e$#36p^E#3Ӆըպ r͙LF݊T'(x՝T1 cMIt >X\g{ it{MXx3S4Q ;m#]k&]gzd`/r}\Z^V'5=IӹtTO\8иoڱ+;Wzsk}.VO\rv(i U;7ib,N3 T?O&kRI@Z$NMl┄_67QJ<\b-D+6g1?$~eɝ+Mקk(\' 7WjUQ`Q1,=OVn~  г X>KqH48u ##ي H^cw섂Q6sT];We~ TnGLCeޖ< J~|̫]ӷ}]ɽLO?%,p(+`346;."{cއ/*Iz,?f^لtqߔۃ~,uÆ՗(\)F_V"p$D r u=QHXs,$aݻXVUIR9oG)YL^%5h Uf7\},xJ,Ȳ CG 8y248/D~ d% J4VۓԶbJQ @F0`7Q!2"@굹Pb61U^/sH}%Z#Or7;1lnӚd:g)qr!siVw/pdIưK:>{eӋpD{\{Lc!,ԇ8>׵?%D9=x on{i'I ^6ceRI/)t0BVf}]"G@]NS}c-ɺԲڑ5 i*8ki=rM /0mldߚaԣiN6}yY}V:λ]Rtp=7U%%JM\Is;FI٣4<|G[Qh4,л{tV Y>y"lkxE \yW[;֟h b=Vf%Rde&ऌo[M4ɜƺY!k`ٽIE!1" ߙVG^GQz;\'}:WuztԻJ3XbJ.=^]P%K[0'N|yQ\3 X=l~`-o3ݩ95іXssa-%o^0欍L} ,6jr I4`v7ԭ 74YXoцz97 d^w%܉2ّ]D\%jTTԨD"( cf{NjN2jvģ83%`DwH4Ћ"}h-J7DX;V' E"LEHK+f `Zg)=Qls[4 Sbi(\mK*'A4#jXи֎&/~HuՔUlX=. o:kqL*_À~+)`ي?/2ͭ/˅$ܠ%y^Zv"%~2,<1 ƻ͵^'y;"V"`}TXZ WiK@>$2<.Τ<<,ݱvP=gK֯\$b>Vj+4\$ wմ}m`Uq0ifaӲ|?_鶂S(9N ݆%@zM6xFӏ D-7SCDNk]^FD" ȋjρ&à3nUdec,)])Q_',pmc&յ!N I٨sMVxǐ{D/[ DUt?ՙ7SZ+ e+ڝ)9"ݫn% SR)UH z X[l\K4 |,s6<VF@;Q*8ADH ]q:@% f#, XkMs6zhNjuIk͝,ju>7 ux @@g*~+X'eTmvÕkd]כieY"- 8VT,gc-⺶ X5{}+ɣ݂@(zԽʰ \2wD7t=?ðxgA&/ -WuUԎ?YaR,6p<ۋ˥5#qYϳ.}ZetYЮ `V.VU5FtɬqٛK"`h19";,:O:1 8Q-;ۏOQ*M/R :?{͎\:ʻhoMae"$7l p]t7<6㝮e y/4jԝ<3~ /}56D N O1yρ5RpL{ќ\'l<jk{twNOBGP惍XI؟hKf(a6#(5T})l,V!u`F,M }4,1 %ս ˤQlu˕ D.$->:0D]jH4D]tT:JHVL]XȽE1N.5hTђm`F v[/DEjf Hȸ*t0I@rōՁ-hȒ\.UUcA8A@1aFw|g F&nXT8VR&ҋe4?P-iv t6W|9cK 9K3*ZOUIi&CLv3~on8[)Od2϶#5ZOhkIrJgrOglA"}Y&b~pn,ca>_n` 㣔"wg\ܲzjJvS &4VT@[`ߝfwaAoy_"h2((_KeڰhH)VL Lfa]qBM.x(tE O(i%qw;s8U4s!gA\쑱):;\TiƎUܤJL ,l.Tq_VNE{ͻt CXYI\v3Z oA)Jk]x|9n#3XUAH-]QHJ%ei_}ʱ9VW+|"+= RèWmp}͑ԲJ<3R'9`~0L8g%P,!çۍo>w\TyTE?d ?hG; m^%!c~nRXQ7g~o7$W>) b ì7KFN AΜzcy@gzɮVb+F&Q*Sh]@ QIY־Xg9QtW|VYquc KQ%PȦ{鼅$S2>`]iO "$+Z%\/Plgu:y}ѻ'*ָrb_-Fse[EOr^Tɺ+~XMM-<#o3N E?b՗:, XLhgҍ EM 7~KdÚT krPӆ .ciN5S%LnE|MZzPlJ)! =zhL^EVˣ֨WU ʮ^`Is50O;*c}CjC!p]M⺹J!5)Q1Zp\]w\ J:) 3qIlql}yZ 5ez3䏯^0e]PH̀ )X%Y``WA86L?5omO=;L02 +~>`zSo^5 5{K]%L3p0dm6?f Zn~z<`GWBTA?kr'- Ftw&ǒ͠O(m?!X\.S瘾e?d1$}jz&&Z?.rCH۹DZ*4Q{5 YnmM&_8}Fx{X*-y!nQ ? su,! lč~4$Qt Wϣf IذK&p=#!7{ '1ߞFja8r!  !wYMп%lx>gL̽ް-^=H.MlC(l=O5pc.PPeoFyh%3Bd,pٛp#zvWWNtB '4=50^~ ֓Py4j#I~γ=Y zȠ >a.2Z^ \z*=!K}6k7c;uB+J>eg\.P(Ly2}WJmU)|T̮L G5`oo ;}X:.*]{M|lovmZn|:*ͻK)=foӽID3$ɓVNCHVHԲ35 /UxMzt,I!eW$|nN_k30%'Qqz^eGPd3fg+?=Wa  {=(S>ݲ%Qa?@"arX~E;fgd 8*YX<'ξ;^JBXB6V3ۺ Ŝ:0$4?pr،?Y>֓Ƈw2xj{x+ y^RZk61>H _GNVQQD3:29GiXm WG $g+=1N`.Zvg)ƒрdZʬb%eěTNLȱL#.a X@ر̑(M0 K%u\^Ը: fc)Gǒs+{NMwl':mӗyњˌ\:I|MC&efٯZ h~K玾?ju E=V <慄Fv< 'p-nT`UHb.4<`mNЬEǽX شab=L˜l M&qe<[vı.X'&1*XM zLzbfG7X/ &FШRR^Cr9R?i KU`qN Z)`S;C 8XM J-Pg"_q; ֫p8_MjuQyո1+׼H+Đ(Zy蟋%gxX6/@"uIYm{\<*X1lb`Ul]e8qoC7'#EN5Vg袠ϗuevNy|Z'dsҙnSg鎨%d֝/\/},hq9g) }J~dف9 U)*0oY8*`݅P3neěř} )u,?%xvw|Xng)K͚aYV7tmOSX{}XAmu" \&N\͜j_bX2v_w#?$>/.9/1x]'tXM\w>3>O,Uw[B_cH$t=eC!\օ73s(DHJ8e5Ê|X]| \ka3` T~B  bsYn4kvXa='1v˛.%0? YdX Hu]Mfb^Iɏ4IB6 yҶ<Éh,I*/L<^gp3`v?'JħJ7-% _M ʾQJI|K'"TT|_~YKg>OEQa펳([e_ n|h aŊbbQXcf"W͓Vgh5aoɚ }jʣr K|AzvKGp-gǂm)SQNTƓa=tBc(rS!NJEhgVVKBk=ִ$Ѫx?-;VHH p(%I;n1uS}?,ĬveM|x+ ( `,ۯjl=?\TCWB >ՐYR~y`e]1.fMH`P6Uǭsg|.a?.L7% uYeܺ7:K0kKn~Qcca%2E.9MO`n1KL>:d+2,7W1΄yrz.XRB6n%j$R6\@!푐Qxe#ڨD*x<{QhFc%`+a's"LB8Fʍ b߻br>4NwHM KHֳhZ 4Fw& @%,Jznb턡ɺE5ɲK@v]wD)_z^\ qz$.c|+ϏKX Xe8VNrq  VbB.Ş҇ bK}|2. a [U|D# t_3\Bf<`)c )T6#pČ̃o 17n3lth6 \WtsL+lztz{]ͿsW7N08x K N ̀?1}la8jب&S0$B%8 ^dYq d H00sRXߗOX%S F0 Llc*9ez+2⹰ XS6NcKC GRZ,0$8.: lpB8 7` CQX/A# pC0 4C눾>`2??$y+|8.: +c/!&v4s `E/%B %&R; d6cv !bNı L3,W`E#:xpDZ'L [p| 燎M_!P.; B LHƂ  HR`1hDJF4 j@0<2VxP$c<*& '"lAe\X5F)ǠwF~ p- 1v M&cf Ï8t04> stream """+++333;;;@@@EEEIIIMMMQQQUUUZZZ]]]aaafffiiimmmpppuuuxxx}}} endstream endobj xref 0 21 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000343 00000 n 0000000380 00000 n 0000000515 00000 n 0000000611 00000 n 0000003982 00000 n 0000004094 00000 n 0000004201 00000 n 0000004317 00000 n 0000004437 00000 n 0000004565 00000 n 0000004674 00000 n 0000004802 00000 n 0000004940 00000 n 0000005067 00000 n 0000005171 00000 n 0000005971 00000 n 0000034513 00000 n trailer << /Size 21 /Root 1 0 R /Info 5 0 R >> startxref 34757 %%EOF whaling « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

whaling

Phishing and whaling

Friday, February 5th, 2016

Recently we gave you some pointers on identifying phishing e-mails. So now that you know all the signs and how to outwit the criminals, there’s another variant – spear phishing. But don’t panic, it’s almost the same, with a bit of a twist.

Spear phishing is an e-mail that seems to be sent from an individual or business you know. Of course it’s really from hackers attempting to obtain you credit card, bank account numbers, passwords and financial information.

These types of attacks focus on a single user or department within an organisation and use another staff member from the organisation’s name to gain the victim’s trust. (Also see our recent article on the incident at Finance.)

They often appear to be from your company’s human resources or IT department, requesting staff to update information, for example passwords or account details. Alternatively the e-mail might contain a link, which will execute spyware when clicked on.

But wait, there are even more fishing comparisons.

When a phishing attack is directed specifically at senior executives, other high profile staff or seemingly wealthy people, it’s called whaling. By whaling cyber criminals are trying to catch the “big phish”, or whale.

phishing

[SOURCE: http://www.webopedia.com]

 
 
 
 
 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.