MyBroadband noted that towards the end of 2013 news emerged that Cell C and MTN would finally be implementing double opt-in systems for wireless application service providers (WASPs).
Vodacom rolled out its double opt-in system two years prior. The double opt-in system cost it a 33% reduction in WASP revenue, according to Vodacom, but the operator said it was worth it for the dramatically reduced fraud complaints.
Along with the unveiling of its new double opt-in systems, Cell C and MTN also launched ways for their users to manage their content subscriptions.
Previously subscribers had no way to prevent a WASP from charging their cellular accounts, or to unsubscribe from premium content services without first contacting the WASP.
Vodacom also has a method to manage WASP subscriptions in the form of an SMS command to unsubscribe from everything.
The various WASP subscription management options of South Africa’s mobile operators are as follows:
Using the USSD string *133*1# subscribers can block all existing and future content billing.
MTN also offers a USSD string (*141*5#) to manage premium content subscriptions, but unlike Cell C’s it doesn’t block all future subscriptions. Instead, users select which services to unsubscribe from.
Telkom Mobile said it does not offer an option for WASPs to charge for subscription services.
Vodacom users can unsubcribe from all WASP services by sending 'STOP ALL' to 30333.
Should you be subscribed to WASP services, you should receive the response 'Your Vodacom request to delete all WASP service has been logged'. According to Vodacom, you should then receive messages of the format, 'You have been unsubscribed from SERVICE with effect from DATE'.
Modern kids have never known a time when they couldn't connect to the entire world via the internet. In fact, they probably spend more time online than anyone else—certainly more than their parents.
If you are a parent, this presents a problem, as there are explicit, disturbing, and illegal sites on the web that you don't want your kids to encounter.
Furthermore, with the ever-increasing number of devices that kids use to connect, you simply can't supervise every moment they're online on your own.
That's where parental control services can help. This software gives you the ability to block unwanted web content, limit screen time, restrict the use of risky applications, and more.
Pwned Passwords are half a billion real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they're at much greater risk of being used to take over other accounts.
Password reuse is normal. It's extremely risky, but it's so common because it's easy and people aren't aware of the potential impact. Attacks such as credential stuffing take advantage of reused credentials by automating login attempts against systems using known emails and password pairs.
The Pwned Passwords service was created in August 2017 after NIST released guidance specifically recommending that user-provided passwords be checked against existing data breaches . The rationale for this advice and suggestions for how applications may leverage this data is described in detail in the blog post titled Introducing 306 Million Freely Downloadable Pwned Passwords.
In February 2018, version 2 of the service was released with more than half a billion passwords, each now also with a count of how many times they'd been seen exposed.
Malware is on the rise. And phishing attacks. How about ransomware, data theft, and data breaches? Yup — all on the rise. Not only are cybersecurity attacks and vulnerabilities on the rise, but their impact also costs more, takes longer to recover from, and can be extremely damaging.
With that bleak outlook in mind, it is high time for you to consider your system security. There are so many anti-this and anti-that programs out there it is difficult separating the security wheat from the cyber chaff.
If you’re confused about security apps, you need this guide presented by Make Use Of.
Over the past decade, educational instruction has become increasingly digitized as districts rush to dole out laptops and iPads to every student. Yet the most important question, "Is this what is best for students?" is glossed over.
Veteran teachers Joe Clement and Matt Miles have seen firsthand how damaging technology overuse and misuse has been to our kids. On a mission to educate and empower parents, they show how screen saturation at home and school has created a wide range of cognitive and social deficits in our young people. They lift the veil on what’s really going on in schools: teachers who are often powerless to curb cell phone distractions; zoned-out kids who act helpless and are unfocused, unprepared, and unsocial; administrators who are influenced by questionable science sponsored by corporate technology purveyors.
They provide action steps parents can take to demand change and make a compelling case for simpler, smarter, more effective forms of teaching and learning.
CSO reports on the new challenges and threats that will face IT departments in the year ahead.
Sharing fake news stories online and spreading false information could lead to criminal charges against the perpetrators as reported by News24.
Hoax-alert reported that fake news website [email protected] posted an article titled "FARM MURDERS: US PRESIDENT THREATENS TO INTERVENE IF SOUTH AFRICA DOES NOT COME UP WITH A SOLUTION TO FARM MURDERS". They were unable to locate any source for the Trump quote or any of the "news sources" mentioned in the article that made any mention of Trump "lending a hand or coming to the rescue" in South Africa.
SA People further notes that fake news sites have trotted out yet another fake story about American President Donald Trump and South Africa.
How to spot fake news according to News24:
+ Look to see if reputable news sites are also reporting on the story;
+ Check for odd-looking domain names;
+ Check the 'About Us' tab on websites or look up the website on snopes.com for more information about the source;
+ Watch out for common news websites that end in '.com.co' as they are often fake versions of real news sources;
+ Bad web design and use of all caps can also be a sign that the source you're looking at should be verified;
+ If the story makes you really angry it’s probably a good idea to keep reading about the topic via other sources to make sure the story you read wasn't purposefully trying to make you angry in order to generate shares and advertising revenue.
The main objective of the Higher Certificate in IT is to provide you with a wide-ranging, sound, academically based and industry oriented training course during which you’ll be steeped in software design and development; exposed to a wide range of technologies that will shape the future of computer applications over the next few years; fully grounded in both the theoretical and practical aspects of IT.
The course is offered part-time over 2 years, which consists of 10 modules.
A South African bank customer who has a complaint against his or her bank may approach the OBS for assistance.
MyBroadband reports on the database leak which revealed the private data of 30 million South Africans.
It is reported that the data included extensive personal attributes such as names, addresses, ethnicities, genders, birth dates, government-issued personal identification numbers, and 2.2 million email addresses.
Readers can have a look whether their e-mail address has been compromised on the "have i been pwned?" website here.
Forbes reports on the 5 computer security questions readers keep asking.
This Certificate in Cyber Security (2018 first intake now open until 30 November 2017) is aimed at individuals currently working full time that would like to get a formal qualification in Information and Cyber Security. The Certificate standard is on NQF Level 5, and successful students will get an official Certificate from the University of Johannesburg.
The course consist of 5 modules, each module lasting 3 days. Each module will be formally examined and all 5 modules must be passed to pass the course.
Disclaimer: Please note that the posted information does not indicate any advice or guidance or support by the UJ Centre for Cyber Security and readers make use of Bitcoin services at their own risk.
is a website dedicated to individuals living in South Africa who are interested in Bitcoin.
The website contains information on local Bitcoin exchanges
, Bitcoin wallets
and Bitcoin costs in South Africa
TechRadar warns users to not fall victim to the increasing amounts of Android malware and provide a list of the 10 best security and antivirus for Android.
Please note that these suggested antivirus apps have not been tested by the UJ Centre for Cyber Security and readers make use of these apps at their own risk.
The Citizen Reports that the new online suicide game, Blue Whale, may soon be available in South Africa.
The Blue Whale app can be downloaded while an 'administrator' or 'mentor' then gives the player a task every day for the next 50 days, with the final task being suicide. Tasks include self-mutilation, watching horror movies, standing on the edge of the roof of a dangerously high building and listening to music that the 'administrator' sends.
The sickening tasks lead to sleep deprivation, brainwash players as the challenges grow darker and more severe, and on the last day, the exhausted and confused player is encouraged to commit suicide.
The player must take a photo of every completed task to prove to the administrator that it has been completed.
Parents are cautioned to monitor their children’s use of social media and their internet usage.
Eyewitness News further notes that the phrase 'Blue Whale' has made international headlines in recent months, and it has a number of local organisations, including the South African Depression and Anxiety Group and the Films and Publications Board, concerned that teenagers here may soon be exposed to similar dangers.
While concern has been raised over the possible emergence of the so-called Blue Whale game or challenge in South Africa, those looking into the existence of the phenomenon believe there is enough to warrant being on alert and monitoring developments.
The Protection from Harassment Act 17 of 2011 is available as an online document.
Readers are referred specifically to the definitions of 'harassment' and 'harm', as well as section 3(2) that stipulates what a court has to consider in the granting of an interim order.
Also important is the power to have service providers produce details of where offending data messages may have originated.
The biggest cyber attack the world has ever seen is still claiming victims and threatens to create even more havoc on Monday when people return to work.
The attack is a virus that locks people out of their computer files until they pay a ransom to the hackers.
Experts say the spread of the virus had been stymied by a security researcher in the U.K. Hackers have issued new versions of the virus that cyber security organizations are actively trying to counter and stamp out.
The Future of Life Institute reports that Artificial Intelligence (AI) has already provided beneficial tools that are used every day by people around the world. Its continued development, guided by certain principles, will offer amazing opportunities to help and empower people in the decades and centuries ahead.
As a result, the Asilomar AI principles were developed in conjunction with the 2017 Asilomar conference.
Furthermore, TechTarget also notes that the introduction of the Asilomar AI Principles provides guidelines to protect us against an AI apocalypse and ensure that the many, not just the few, reap AI's benefits.
Vanity Fair reports that FAKE NEWS IS ABOUT TO GET EVEN SCARIER THAN YOU EVER DREAMED.
The article underscores fake news’s rapid ascent from an amorphous notion to perhaps the most significant digital epidemic.
Furthermore, it is also mentioned that advancements in audio and video technology are becoming so sophisticated that individuals will be able to replicate real news — real TV broadcasts, for instance, or radio interviews — in unprecedented, and truly indecipherable, ways.
One research paper published last year by professors at Stanford University and the University of Erlangen-Nuremberg demonstrated how technologists can record video of someone talking and then change their facial expressions in real time.
The department of Justice and Constitutional Development of the Republic of South Africa has published the Cybercrimes and Cybersecurity Bill along with supporting documents. Access the articles here: