ICTLIG Western Cape Blog

 

 

 

 

 

Most internet users would like to be anonymous online. PewInternet

Anonymity, Privacy, and Security Online
Source: Pew Internet & American Life Project

A new survey finds that most internet users would like to be anonymous online, but many think it is not possible to be completely anonymous online. Some of the key findings:
  • 86% of internet users have taken steps online to remove or mask their digital footprints—ranging from clearing cookies to encrypting their email.
  • 55% of internet users have taken steps to avoid observation by specific people, organizations, or the government.
The representative survey of 792 internet users also finds that notable numbers of internet users say they have experienced problems because others stole their personal information or otherwise took advantage of their visibility online. Specifically:
  • 21% of internet users have had an email or social networking account compromised or taken over by someone else without permission.
  • 12% have been stalked or harassed online.
  • 11% have had important personal information stolen such as their Social Security Number, credit card, or bank account information.
  • 6% have been the victim of an online scam and lost money.
  • 6% have had their reputation damaged because of something that happened online.
  • 4% have been led into physical danger because of something that happened online.

From Full Text Reports

"SARS wants to give you money?" From University of Stellenbosch. Information Technology

It’s that time of the year when our mailboxes are infiltrated by messages from SARS and we start making sums and filling out forms. Unfortunately elusive cyber criminals also know that this is the perfect time to prey on our gullibility.

So it’s most likely that you will be receiving (if you haven’t already) a so-called e-mail from SARS asking you either to verify your information or to let you know that a much-welcomed amount has been paid into your account. (see example below) Don’t get excited – it’s not really SARS... [More]

Cell phone: Beware of SIM card swap fraud. From University of Stellenbosch. Information Technology

... A SIM card swap fraud occurs when criminals obtain and utilise a replacement SIM card to acquire security messages and one-time passwords (OTP) sent to you by the bank. Using the OTP, criminals are able to change, add beneficiaries and transfer money out of your account using your personal information that they would have obtained through phishing. 

How does a SIM swap scam work?

What should I do if I suspect an unlawful SIM swap?

What should I do if I suspect an unlawful SIM swap?

Link to full article 

Keep your cell phone secure. From University of Stellenbosch. Information Technology

These days your smartphone is just as powerful as your laptop or pc a few years back. You store more personal and work information on your device and it’s always connected to the internet.

It’s exactly this convenience that puts you as a smartphone user at risk. Cooltech, iAfrica’s tech section, has a few ideas to minimise risk and ensure your personal information stays, well, personal and safe from malware and cybercriminals and other security risks... [More]

1. Set up a password
2. Install security software
3. Activate the remote wipe function
4.  Download safe and approved applications
5. Backup your data
 

RSS Feed

Subscribe to RSS Feed

Link to LIASA

Home
ICTLIG Committee
LIASA Western Cape Branch
LIASA Interest Groups

Techie Blogs for Librarians

ASC Online
blogwithoutalibrary.net
dave's blog
Free Range Librarian
Library Technology Guides
LibrarianInBlack
LITA
Loomware
The Shifted Librarian
Tame the Web
NEKLS Technology Weblog TechnoBiblio
walking paper

Online Journals

Ariadne
Biblio Tech Review
D-Lib Magazine
Info Technology & Libraries
Library Hi Tech
Library Journal Digital
Library Technology Now
MC Journal

Description

Blog of the Information and Communication Technology in Libraries Interest Group, Library and Information Association of South Africa (LIASA) Western Cape Branch

Archives

July 2005 August 2005 December 2005 January 2006 February 2006 March 2006 April 2006 May 2006 June 2006 July 2006 August 2006 October 2006 December 2006 January 2007 March 2007 April 2007 May 2007 June 2007 July 2007 August 2007 September 2007 November 2009 October 2010 December 2010 August 2011 September 2013 October 2013 November 2013 December 2013 January 2014 April 2014 August 2014

Powered By





 

Email Alert for Non-RSS Users

Monitor this Page

by ChangeDetect