{"id":2965,"date":"2012-12-04T10:44:31","date_gmt":"2012-12-04T08:44:31","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=2965"},"modified":"2016-01-18T15:52:32","modified_gmt":"2016-01-18T13:52:32","slug":"new-malware-warning-2","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2012\/12\/new-malware-warning-2\/","title":{"rendered":"<!--:en-->New malware warning<!--:-->"},"content":{"rendered":"<p><!--:en--><\/p>\n<p>Please take note that a new malware threat has emerged on campus. Some users have reported the following:<\/p>\n<p>A pop up will appear on your screen (see below) prompting you to update your Antivirus package due to a threat (in this case a trojan). However, this notification in itself is a malware application. If you click on the option to update, it will install itself on your pc. Under no circumstances should you click on the button.<\/p>\n<p>Close the pop up screen immediately and if you&#8217;re worried that your pc is infected, contact the IT helpdesk.\u00a0Read more on\u00a0<a href=\"http:\/\/www.hoax-slayer.com\/fake-fedex-invoice-malware.shtml\" target=\"_blank\"><strong>http:\/\/www.hoax-slayer.com\/fake-fedex-invoice-malware.shtml<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2012\/12\/ldavids.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2966 alignleft\" title=\"ldavids\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2012\/12\/ldavids.jpg\" alt=\"\" width=\"519\" height=\"455\" srcset=\"https:\/\/blogs.sun.ac.za\/it\/files\/2012\/12\/ldavids.jpg 519w, https:\/\/blogs.sun.ac.za\/it\/files\/2012\/12\/ldavids-300x263.jpg 300w\" sizes=\"auto, (max-width: 519px) 100vw, 519px\" \/><\/a><\/p>\n<p><!--:--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Please take note that a new malware threat has emerged on campus. Some users have reported the following: A pop up will appear on your screen (see below) prompting you to update your Antivirus package due to a threat (in this case a trojan). However, this notification in itself is a malware application. If you [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49,29187],"tags":[29170],"class_list":["post-2965","post","type-post","status-publish","format-standard","hentry","category-general","category-security-2","tag-malware"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 16:57:00","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/2965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=2965"}],"version-history":[{"count":11,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/2965\/revisions"}],"predecessor-version":[{"id":9461,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/2965\/revisions\/9461"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=2965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=2965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=2965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}