The Protection from Harassment Act 17 of 2011 is available as an online document.
Readers are referred specifically to the definitions of 'harassment' and 'harm', as well as section 3(2) that stipulates what a court has to consider in the granting of an interim order.
The biggest cyber attack the world has ever seen is still claiming victims and threatens to create even more havoc on Monday when people return to work.
The attack is a virus that locks people out of their computer files until they pay a ransom to the hackers.
Experts say the spread of the virus had been stymied by a security researcher in the U.K. Hackers have issued new versions of the virus that cyber security organizations are actively trying to counter and stamp out.
The very popular Certificate in Cyber Security offered by the Centre for Cyber Security in the Academy for Computer Science and Software Engineering of the University of Johannesburg will be available from July this year in an online mode.
This makes it possible for any person, anywhere in the world, to register for this Certificate and complete it totally online, including an online examination*.
However, as this is the first time this Certificate will be offered in this way, an examination restriction* will hold for this first offering starting in July 2017. This *restriction will require any student who registers and completes the modules in an online mode, to take the 5 module examinations physically at the University of Johannesburg on the specified examination dates. This means that such students will have to travel to the Auckland Park campus of the University in Auckland Park, Johannesburg, to write and complete the examinations.
We plan that from the beginning of 2018, this restriction will fall away, and students will be able to complete the examination online from any place. Final arrangements of dates and logistics for writing the examinations online are still being finalized. Online students will be able to contact the Course Coordinator by email to ask questions about the course material – such questions will be directed to the module experts if necessary. The course and study material are specified and provided on the course website – three modules require a prescribed text book.
The Courses tab at www.cybersecurity.org.za provides the structure, content and examinations dates of all 5 modules making up the Certificate in Cyber Security (see July 2017 (Second) Intake for examination dates). Students completing the examinations and assignments successfully, will receive an official Certificate in Cyber Security from the University of Johannesburg.
Please contact: Ms Simangele Msibi / Mr Carl Van der Westhuizen on 011 559 2967 for more information.
Fax: 011 559 2138 | E-mail: email@example.com / firstname.lastname@example.org
The Future of Life Institute reports that Artificial Intelligence (AI) has already provided beneficial tools that are used every day by people around the world. Its continued development, guided by certain principles, will offer amazing opportunities to help and empower people in the decades and centuries ahead.
As a result, the Asilomar AI principles were developed in conjunction with the 2017 Asilomar conference.
Furthermore, TechTarget also notes that the introduction of the Asilomar AI Principles provides guidelines to protect us against an AI apocalypse and ensure that the many, not just the few, reap AI's benefits.
Vanity Fair reports that FAKE NEWS IS ABOUT TO GET EVEN SCARIER THAN YOU EVER DREAMED.
The article underscores fake news’s rapid ascent from an amorphous notion to perhaps the most significant digital epidemic.
Furthermore, it is also mentioned that advancements in audio and video technology are becoming so sophisticated that individuals will be able to replicate real news — real TV broadcasts, for instance, or radio interviews — in unprecedented, and truly indecipherable, ways.
One research paper published last year by professors at Stanford University and the University of Erlangen-Nuremberg demonstrated how technologists can record video of someone talking and then change their facial expressions in real time.
The department of Justice and Constitutional Development of the Republic of South Africa has published the Cybercrimes and Cybersecurity Bill along with supporting documents. Access the articles here:
Cybercrimes and Cybersecurity Bill
Cybercrime Discussion Document
Cybercrimes and Cybersecurity Bill Briefing
The statistics for the second half of 2016's cybercrimes that have been reported through the UJ Centre for Cyber Security's reporting facility (for statistical purposes only) are now available.
Readers are reminded of the South African Cybersecurity Hub which allows South African citizens to report incidences of cybercrime at www.cybersecurityhub.co.za.
★ Featured Post ★
WiFi and VPNs
★ WiFi - Evil Twin Attack Background:
TechoPedia describes an Evil Twin attack (in the context of network security) as a rogue or fake wireless access point (WAP) that appears as a genuine WiFi hotspot offered by a legitimate provider.
In an evil twin attack, an eavesdropper or hacker fraudulently creates this rogue WiFi hotspot to collect the personal data of unsuspecting users. Sensitive data can be stolen by spying on a connection or using a phishing technique.
★ Evil Twin Attack Approach:
A hacker using an evil twin exploit may be positioned near an authentic WiFi access point and discover the service set identifier (SSID) and frequency. The hacker may then send a radio signal using the exact same frequency and SSID. To end users, the rogue evil twin appears as their legitimate WiFi hotspot with the same name.
★ Virtual Private Network (VPN) Background:
PCMag explains that connecting to public WiFi networks, for example, is a commonplace practice, but these are also excellent avenues for attackers to seize your personal information.
This is where virtual private networks, or VPNs, step in by using simple software to secure your Internet connection and give you greater control of how you appear online.
In the simplest terms, it creates a secure, encrypted connection, which can be thought of as a tunnel, between your computer and a server operated by the VPN service. While connected to the VPN, all your network traffic passes through this protected tunnel, and no one in between can see what you are up to.
★ VPN Examples:
A selection of free and premium examples of desktop VPNs available from PCMag.
A selection of free and premium examples of Android VPN apps available from PCMag.
★ Free Wifi - Friend or foe? A summary by VeraCode:
★ Reasons why businesses offer free WiFi - a summary by Shaw Business:
Source: Shaw Business
★ Featured Post ★
TrendMicro asks what makes ransomware so effective? One reason — fear. Just like any traditional extortion op, ransomware operations succeed because they capitalise on fear, which ultimately forces victims to do something irrational such as paying cybercriminals.
★ Ransomware - a summary by TrendMicro:
Mail & Guardian ft. Prof Von Solms - Internet banking fraud: The scourge of SIM swaps.
Information brochures, timetables, application forms and fee structures for the Certificate in Cyber Security 2017 courses have been uploaded.
This Certificate is aimed at individuals currently working full time that would like to get a formal qualification in Information and Cyber Security. The Certificate standard is on NQF Level 5, and successful students will get an official Certificate from the University of Johannesburg.
★ Featured Post ★
Smartphone/Mobile Operating Systems
GSMArena summarises an Operating System (OS) as a base infrastructure software component of a computerised system. It controls all basic operations of the computer (or other electronic devices such as smartphones etc.). The OS allows the user to install and execute third-party applications (commonly called apps for short), usually adding new functionality to the device.
PCMag notes that the four major smartphone OSs that are currently in use include:
Although more Symbian smartphones had been sold worldwide than any other, in 2011, Nokia switched from its native Symbian OS to Windows Phone. At one time the market leader, BlackBerry was unable to hold its customers even with innovative new phones in 2013.
★ Worldwide smartphone OS market share - a summary by Statista:
★ Featured Post ★
Microsoft refers to cloud computing as the use of computing power that is located elsewhere, in "the cloud" of remote networks.
It's really just a name for storing and processing data online. For example, many of us already use cloud computing when using the internet for storing photos and emails.
Different types of clouds include:
- Private: resource dedicated to one customer.
- Public: resources shared by multiple customers.
- Hybrid: customised combination of shared and dedicated resource.
- Community: dedicated resource for a group of customers.
A selection of cloud storage services readily available to the public:
★ What is cloud computing? - a summary by Microsoft:
★ Featured Post ★
The Dark and Deep Web
★ Dark Web Background:
Lynley Donnelly, from Mail & Guardian reports that readers should beware of the Web's dark side.
The dark web does not only host places for terrorists, child pornographers and arms dealers to sell their wares, it is also where activists in oppressive regimes go to get around government spying and censorship, whistle-blowers can leak material in relative safety, and ethical hackers gather to share knowledge and campaign.
Nevertheless, the cybersecurity risks that can stem from the dark web have government agencies and private companies around the world sweating about the security of their networks, their data and their bank accounts.
Access the full article here.
★ Media Reports:
Articles hosted by Cyanre discussing the Dark Web in South Africa:
★ Everything You Wanted to Know about TOR & the Deep Web by Who Is Hosting This: The Blog:
Source: Who Is Hosting This: The Blog
★ Featured Post ★
Social Communication Guidelines for Schools
The article, Cyber-safety: A South African School Perspective, by Professor E. Kritzinger reports that despite the benefits, ICT (Information and Communications Technology) devices and online access can lead to a number of online risks.
These risks can be harmful to school learners if the learners are not educated on how to protect themselves and their information.
It is therefore vital to ensure that learners are educated accordingly on the matter.
Educating school learners regarding cyber risks within the school environment is dependent on a number of factors; some of these factors include preparedness of:
To access more articles like this, in addition to other resources such as research reports, pupil workbooks and classroom posters, visit the Cyber Security Awareness project.
- The school towards ICT devices and relating ICT policies and procedures;
- The teachers and their knowledge regarding ICT devices and online activities;
- The available educational material regarding online safety; and
- The handling of ICT incidents within the school.
★ Media Reports:
A list of sexting media reports involving South African learners:
by Times Live.
Examples of Social Communication Guidelines from schools across South Africa:
★ My Cyber Safety Pledge for learners as summarised by Cyber Security Awareness project:
Source: Cyber Security Awareness project
★ Additional reading:
by Steven Anderson.
★ Featured Post ★
Anti-virus software can typically assist with preventing, detecting and removing malicious software from various types of digital computing devices such as desktop computers and smartphones. Many anti-virus software suites are readily available online and some are also free of charge!
A brief summary of resources to guide end users in choosing their own anti-virus software follows.
as identified by PCMag.
★ Most popular free anti-virus for Windows desktop (PC):
★ Most popular free anti-virus for Android smartphones:
★ Featured Post ★
is a cross-platform mobile messaging app which allows you to exchange messages without having to pay for SMS. WhatsApp Messenger is available for .
★ Staying Safe on WhatsApp:
A list of that have been designed to help you stay safe while using WhatsApp, as recommended by WhatsApp.
★ Guides for parents:
WhatsApp: a guide for parents and carers - by
NSPCC and O2: WhatsApp - by
WhatsApp: What parents need to know about the instant messaging app - by
★ A few useful WhatsApp tips and tricks as summarised by :
★ Featured Post ★
Understanding SIM Swap Fraud
With the rise in SIM swap fraud occurences all over South Africa, make sure you take all the precautions you can to avoid becoming a victim.
note that while the methods used to steal a person’s banking details may differ, the process followed by fraudsters to steal money from online banking users in South Africa is nearly always the same:
In each of these steps the criminals can exploit different weaknesses in the system to achieve their goal.
- Get the victim's Internet banking details, typically through a phishing/insider attack.
- Create a bank account(s) which money can be transferred to and also withdrawn from.
- Clone the SIM card (SIM swap) used by the victim.
- Create beneficiaries (using the bank accounts created in point 2) and transfer money to these beneficiaries.
- Withdraw the money from these beneficiary accounts.
Read up on some of the SIM swap articles featuring incidents from across South Africa:
by Ivor Powell | WEEKEND ARGUS | 05-03-2016
by fin24.com | 03-03-2016
★ Bank Resources:
A collection of SIM swap resources from leading South African banking institutions:
A summary of resources to aid you in understanding, analysing and reviewing your Facebook profile security.
★ 3 Simple Facebook Security Tips from :
- Protect your password. Don't use your Facebook password anywhere else online and never share it. You should be the only one who knows it. Avoid including your name or common words. Your password should be difficult to guess.
Facebook will never send you a message or email asking for your login details or credit card number. If someone asks you for this information do not respond or click on any links in their message. Please report the message to the Facebook team to investigate and then delete it. You can also block the sender from contacting you again.
- Use extra security features to add more protection to your account and information on Facebook:
★ Active Facebook users can now review their security settings by making use of facility.
★ Active Facebook users that make use of the Android app on their smartphone can now review their security settings by making use of facility.
★ A look at some of the reasons why people hack Facebook accounts as summarised by .
★ Bridge the digital divide and become a tech-savvy parent with the book by Nikki Bush and Arthur Goldstuck.
If you are a WhatsApp user and do not want to share your account information with Facebook, you can take steps to prevent this from happening. You may only have 30 days to react if you have already accepted the new policy.
The report cybercrime statistics for the first half of 2016 have been released based on input received through the UJ Centre for Cybersecurity's reporting page.
Read the article featuring Prof Von Solms, the director of the UJ Centre for Cyber Security, entitled "Cyber criminals make big bucks as security budget cut" as published in The Times – 30 May 2016 – pg.8.