In its recent Q3 2013 Security Roundup Report, Trend Micro (TYO: 4704; TSE: 4704) warns consumers of a peak in both the volume of Apple iOS phishing sites, as well as a sizable uptick in online banking malware.


The findings are closely linked to its Q2 report where mobile threats were once under the spotlight as one of the fastest growing areas of concern for consumers and businesses alike. The latest Q3 report’s findings however, suggest consumers should be alert and cautious during the holiday shopping season to protect personal and financial data from being compromised.


“With the pervasiveness and ease of use of online banking, we as consumers trust these applications almost blindly,” states Gregory Anderson, country manager at Trend Micro South Africa. “It is worrying that our Security Roundup Reports consistently highlight online banking as an area for concern and we want to urge consumers to be vigilant when using online banking sites. You must ask questions of the security employed by your bank, as well as ensure you yourself are secured on all devices you access these applications from.”


Another area highlighted by the report is that while Apple has been traditionally perceived as a safe-haven against threats, the company’s findings reveal that personal information (of its users) can be jeopardised as phishing scams that target the platform continue to gain momentum. According to Anderson, this evidence suggests a potential perfect storm looming in the holiday season as busy commercial and consumer users leverage mobile platforms.


In respect to the report’s findings, it has revealed that after a spike in Q2 (5,800 in May), Apple-related phishing sites have remained steady throughout Q3 with 4,100 detected in July; 1,900 in August and 2,500 in September. This raises concern of potential new targets in Q4 with analysts estimating Apple to sell 31 million iPhones and 15 million iPads in the fourth quarter alone.


To substantiate the banking concerns, Trend Micro researchers also identified more than 200,000 malware infections targeting online banking in Q3. Three countries stood out as the most targeted, with the U.S. accounting for almost one-quarter (23 percent) of online banking malware infections worldwide, followed by Brazil with 16 percent and Japan with 12 percent.


Europe’s top countries, Germany and France, had only three percent respectively which may stem from the regions high degree of multi-factor authentication requirements with online banking transactions. Along with these increases, the level of sophisticated obfuscation techniques used by threat actors has also risen. We found within the online banking Trojan called KINS, anti-debugging and anti-analysis routines.


“While the above mentioned countries have been singled out as the worst hit, we cannot discount the effects the online banking threats pose for us here in South Africa, particularly with the rise in the use of smartphones. In our region we at Trend Micro are trying to work with businesses to create awareness around mobile security threats as until now it has been an area in which many are playing possum, some are avoiding, and others in our industry are simply saying doesn’t exist and as a result will have no impact on the end user which couldn’t be further from the truth. The people who lose in this blinkered approach adopted by our industry – is the consumer,” ends Anderson.


About Trend Micro

Trend Micro Incorporated a global leader in security software, rated number one in server security (IDC, 2013), strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe.  For more information, visit


Security specialists, Westcon Security Solutions – Electronic, is pleased to announce the immediate local availability of a range of four next generation W Series rapid dome cameras from vendor partner Sony.


The new range includes four product iterations in the W series of popular rapid dome cameras. The cameras, powered by IPELA Engine Pro, come in both indoor and outdoor varieties both of which have been purpose-built for specific industrial and commercial applications


The cameras boast a pan speed of 700º/s for quick search and detection, a view-DR at 130dB for picture clarity in strong backlight conditions as well as a 60fps frame rate. With its built-in image stabiliser customers will also be able to enjoy a reduction in vibrations as a result of wind or air reverberation, particularly in the outdoor cameras.


Additional features include a defog mode to increase visual clarity in foggy conditions as well as SD card edge storage.


The cameras are available in four models, including the indoor SNC-WR600 (720P HD) and SNC-WR630 (1080P Full HD), as well as the outdoor SNC-WR602 (720P HD) and SNC-WR632 (1080P Full HD).


For more information contact Michael Coetzee at




About Westcon-Comztek

Westcon-Comztek is a leading value-added distributor of technology and converged communications solutions for customers in the enterprise, SMB and consumer markets, in South Africa and 26 countries on the African continent. The company is made up of six business practices which include: Comstor (Cisco business), Comztek Consumer Solutions, Westcon Communications Solutions, Westcon Mobility Solutions, Westcon Security Solutions which includes an electronic and data division and Comztek Software Solutions. The Comztek Africa business deploys the solutions across all these practices into the African market.


Marketing Contacts

Louise Taute                                                     Michelle Chettoa

Marketing Director                                             Head of Creative & Communications

+27 11 233 3333                                                +27 11 848 9000                          


Fraudster operating in Cape Town


“Our Cape Chamber has advised us of a well dressed gentleman (Malawian) with a laptop who is paying printing companies in Cape Town visits claiming to be connected to the Malawian Government. He has visited a number of printers in Cape Town’s Southern Suburbs.

The said gentleman is asking for quotations for the printing of high value full colour catalogues. Once these quotations are provided he promptly accepts under the proviso that a R 10 000 commission be added to the quotation. He assures the printer that the Malawian Bank has confirmed acceptance and will settle the full amount within 3 days.

The very next day he asks that he recieve 50% of his commission as he needs to extend his stay and pay his accommodation.”


Chief Executive Officer: P Lacy

Non-Executive Directors: DH Joubert (President), FV Tshiqi (Past President)

Executive Directors: CS de Jager, P Lacy (CEO), KA Leid (British), GN Warren

Company Secretary: DL Garz

As a PIFSA member you have agreed to receive Emails and Newsletters from your Regional Chamber and the National Office. These keep you up to date with training initiatives in your region, special events and workshops and legislative changes that may affect your operations. If you are not the correct person or would like to add additional staff members, please contact Louise Moralee on and provide the relevant contact details.

NEW YORK (CBSNewYork) — Worried parents and employees are taking self-defense into their own hands, purchasing bulletproof boards to protect themselves in the event of a mass shooting.

As CBS 2′s Kristine Johnson reported, the items look like typical school supplies — a whiteboard, a backpack and a clipboard. But if you take a closer look, they are actually bulletproof shields that can buy time if faced with school or workplace violence.

“If there’s an emergency, I want my people to have something to defend themselves,” said Bob Carpenter, who bought 15 bulletproof boards for his Delaware school.

“We have whiteboards here anyway,” he reasoned. “Why not have ones that are bulletproof if, God forbid, there is an emergency?”

It’s not just school administrators who are purchasing the armored supplies. Office workers, teachers and parents are also shelling out $300 a board to protect themselves and their children.

One of the most popular items is an insert that can make a backpack bulletproof.

The company that makes the boards, Hardwire Armor Systems, also manufactures armor for the military and says their boards can withstand ammunition from handguns, shotguns and small-caliber rifles — without ricochets. Hardwire also makes a bulletproof shield that can be affixed to the back of a classroom or office door.

New Jersey parenting expert Tammy Gold, a mother of three, said she thinks the boards are a good idea but are probably better suited for older children.

“If it’s something that someone could reach for if they were under attack and it could protect them but it wouldn’t cause them anxiety or upset them, I think that’s terrific,” she said.

But “when a child, a 5-year-old, is faced with being under attack, they may not remember what to do.”

Not everyone, however, is sold on the concept.

Former New Jersey State Trooper Dennis Tully said, in an age of shrinking school budgets, limited funds might be better spent on safety training.

“My feeling about products like these is that they provide a false sense of security,” he said.

Some parents are also skeptical.

“It scares me as a mom to think that’s what we need,” one woman said.

“I don’t know how practical a clipboard might be,” added one father.

Target’s data woes will be costly

The massive consumer data breach at Target Corp. potentially exposes the company to years of litigation that could eventually cost it hundreds of millions of dollars.

In addition to thieves swiping the credit and debit card information from 40 million customers, the Minneapolis-based retailer disclosed Friday that the same criminals acquired names, addresses, and phone numbers from up to 70 million additional accounts.

The loss of such personal information significantly strengthens the legal cases of banks, credit unions and individuals looking to sue Target for fraud, negligence and invasion of privacy, some legal analysts say. Unlike credit and debit cards, which banks can quickly cancel or replace, most consumers are not about to change their names or where they live.

“It adds a lot more firepower [to lawsuits],” said Jack Tomarchio, an attorney who specializes in cybersecurity and data protection for the Buchanan Ingersoll and Rooney law firm in Philadelphia.

Normally, a plaintiff would need to prove specific damage from a data breach. “But the more personal information thieves stole, just the invasion of privacy claim alone could be enough [to prevail],” Tomarchio said.

Target spokeswoman Molly Snyder said the company does not comment on future or pending litigation. The company has said customers would have “zero liability” for any damage they suffer due to the theft of its data. It has offered to provide free credit monitoring and identity theft protection for customers for a year, and will announce details of that program soon.

Target, the nation’s second-largest retailer with more than 1,900 stores and 360,000 employees, already faces at least 10 lawsuits seeking class-action status, Tomarchio said — a number that many legal analysts expect to climb.

The most significant question shadowing Target’s legal exposure is how many customers had both their credit card information and personal information stolen, a possibility the company has acknowledged.

“There could be some overlap,” Snyde Taken together, the data breach allows thieves not only to use the credit card information to make purchases, but to steal identities by creating false driver’s licenses and other forms of identification. Such a scenario could lead to more-extensive fraud and greater legal exposure for Target, Tomarchio said.

For now, legal analysts say it’s difficult to assess the extent of Target’s liability given the still-evolving circumstances. But Eric Mazur, managing director at Huron Consulting Group, says it would cost banks at least $100 per card to cancel accounts and reissue cards because of the data breach.

Combined with consumer claims, “the cost to Target could be astronomical,” said Mazur, whose specialties include computer forensics.

T.J. Maxx paid $168 million

In 2007, thieves stole consumer information from an estimated 100 million cards used at T.J. Maxx. The retailer ultimately paid out a total of $168 million in settlements, legal and regulatory costs. The breach at Target appears to be deeper and more damaging, some analysts say.

Normally, large corporations carry a general liability insurance policy to cover these types of bills. In Target’s case, the company is self-insured, meaning the retailer sets aside a certain amount of money each year for potential losses.

Target put a total of $1.2 billion in fiscal years 2012 and 2011 into reserves to cover general liabilities and workers’ compensation, according to documents filed with the Securities and Exchange Commission.

“We believe that the amounts accrued are appropriate,” the filing said. “However, our liabilities could be significantly affected if future occurrences or loss developments differ from our assumptions.”

For example, a 5 percent increase or decrease in average claim costs could have altered Target’s self-insurance expenses by $31 million in fiscal 2012.

The company noted that insurance claims rarely are material to its financial statements. But Target has never experienced a data theft of this magnitude before — it is at least the second-largest known breach in U.S. retail history.

A key part of Target’s legal defense will be whether the company can argue that it took “reasonable” steps to safeguard the data, such as employing a third party to ensure that its systems met industry standards, Tomarchio said.

Much of that depends on the outcome of Target’s forensic investigation into how the thieves stole the information in the first place. Normally, companies are not supposed to store financial information (credit cards, PIN numbers) and personal information (names, addresses, phone numbers) in the same place, Mazur said.

“That’s what puzzles me,” Mazur said. “I’m not quite sure how the thefts of both sets of information happened.”

In any case, Target should resolve these lawsuits as soon as it can, said Randy Maniloff, an insurance attorney with the White and Williams law firm in Philadelphia. Otherwise, the threat of legal liability will linger over shareholders for years, he said.

“You don’t want unquantifiable uncertainty on your books.” Mazur said Friday.


Target disclosed on Friday that a mass information breach involved data belonging to up to 110 million individuals—a number far more extensive than originally believed.

The big box retailer said that a probe into the hacking of customers’ personal data found that stolen information—separate from payment information already reported—included names, mailing addresses, phone numbers or email addresses for tens of millions. The new figure was significantly higher than the 40 million the company initially reported.

Although Target previously stated the breach wouldn’t compromise card holders’ accounts, the dramatic rise in the number of people affected called that assumption into question.

Dow Jones reported Friday that Target shoppers’ information was stored separately from the 40 million credit and debit card accounts that the discount chain had said were affected back in December, when the breach was initially reported. Friday’s disclosure indicated that a different system had been hacked.

The third largest U.S. retailer said there was some overlap between the two sets of stolen data but didn’t say how extensive it was. The entry point for the attack has been identified and closed, spokeswoman Molly Snyder said. State attorneys general from around the country are banding together to probe the Target data breach, New York Attorney General Eric Schneiderman said on Friday.

Jaclyn Falkowski, a spokeswoman for the Connecticut Attorney General, said separately that Connecticut is joining with New York and other states in the probe. A Target official could not immediately be reached for comment on the state attorney investigations.

Given the vast amount of personal data at stake, Target’s announcement gave the issue a new sense of urgenty. Experts say thieves may find a way to manipulate sensitive data to withdraw money from card holder accounts, or make other unauthorized transactions. In the wake of the mass theft, the retailer vigorously disputed reports that personal identification numbers (PINs) had been compromised.

“The unfortunate part about this, the part we can’t escape, is that once the information is gone, it’s gone,” Paul Viollis, CEO of Risk Control Strategies, told CNBC in an interview. “The consumer is going to have to monitor on a monthly basis not only their credit card statement, but from their credit bureau as well.”

Regardless of that vigilance, the compromised data “is going to lead the criminal to where the people live, how many homes they have, where they travel to, what they buy, and that whole pattern of whether that person is affluent or not,” Viollis added.

Target has struggled to manage the fallout of the stolen data, which was hacked from the company’s cash registers between late November and early December. The snafu impacted the ability of millions of Americans to withdraw money and make purchases on their bank and credit cards ahead of the critical holiday shopping season.

“I know that it is frustrating for our guests to learn that this information was taken and we are truly sorry they are having to endure this,” said Gregg Steinhafel, Target’s president and CEO, in a statement. “I also want our guests to know that understanding and sharing the facts related to this incident is important to me and the entire Target team.”

The company said that is clients would have “zero liability” for costs incurred by fraudulent charges. Additionally, it promised to provide a year of free credit monitoring and identity theft protection to all consumers who shopped at Target locations.

Ian Gordon, equity research analyst at S&P Capital IQ believes the security breach won’t deter shoppers from making future purchases from the retailer although he predicts there will be repercussions.

“I think consumers will come around and we expect there to be some impact probably next year, but over time we think it will work out,” Gordon said on CNBC’s Power Lunch. “The shares are fairly reasonably valued, we see earnings growth pretty strong over the next couple years.”

“The question is going to be, what are the costs to Target in terms of legal and settlements and penalties,” he added. 

But not everyone agrees the retailer might be resilient to all the recent bad news.

“Unfortunately Target has released a lot of bad news over the past 12 months including much weaker-than-expected results in Canada, negative traffic in the U.S., and so I think investors have been looking at this stock and saying, ‘how much worse can it get?’ ” said Faye Landes, Cowen & Co.’s managing director on CNBC’s Street Signs.

On CNBC’s Squawk on the Street, Risk Control Strategies CEO Paul Vollis said, “The information that’s available whether or not someone is actually going to know it was stolen, is slim to none.”

Vollis adds he believes Target is being responsible to its consumers and are being transparent with the public. “The unfortunate part about this is that once the information is gone, it’s gone. The consumer is going to have to monitor not only their credit card statement, but from their credit bureau as well.”

sales in the wake of the data breach, Target also cut its fourth-quarter adjusted earnings per share (EPS) forecast for its U.S. operations to $1.20 to $1.30, from $1.50 to $1.60.

Target’s stock, traded on the New York Stock Exchange, fell 1.1 percent in afternoon trading.

By: Javier E. David and Izzy Best, , Reuters and Dow Jones contributed to this article.

Crime Stats SA


Did You Know?

  • More people murdered in Nyanga (Western Cape) than anywhere else in the country.

  • Over One hundred and Sixty OneThousand people murdered in South Africa since 2004

  • 47% of all drug related crime in the country occur in the Western Cape.

  • 5900 crimes are reported by the SAPS everyday day!

  • Over 43 people murdered on average everyday in South Africa.

  • The world average for murder is 7.6 per 100 000 people. Murder in South Africa is 36.5 per 100 000.

  • Honduras stats show that 60.9 people are murdered per 100 000. Thats nearly twice as many as South Africa!!

  • “Crime expands according to our willingness to put up with it.”
    – Farber, Barry J.

  • “I learned that courage was not the absence of fear, but the triumph over it. The brave man is not he who does not feel afraid, but he who conquers that fear.” – Nelson Mandela

  • It`s been estimated that SA has lost R650-billion to corruption over the last 18 years.

  • More than 2 million crimes were reported by the SAPS for the twelve months between 2010/2012.

  • Nearly 16000 people were murdered in SA in the twelve months between 2011/2012.

  • KZN is the highest murder province in South Africa. Then the Eastern Cape followed by Gauteng .

  • Over 400 drug related crimes reported daily.

  • Mitchells Plain in the Western Cape reports the more crime than any other precinct in the country.

  • There are 29 different crime categories used by the SAPS for reporting crime stats.

  • There are about 1118 precincts (police stations) in South Africa.


Business should focus on cyber crime

Johannesburg – Businesses need to focus on the threat posed by cyber crime, a law firm said on recently.

“If I was speaking to you two years ago, the bulk of my practice was procurement fraud, and things like business hijackings, financial statement fraud and the like,” Dave Loxton, the head of business crime and forensics at Werksmans, told reporters in Johannesburg.

“In the last two years, my whole practice has shifted across to cyber crime.”

Cyber crime is any crime involving a computer or the internet.

Authorities in countries such as the US, the UK and Europe had indicated to Loxton that within the next three years the proceeds of cyber crime would surpass those of all other forms of white collar crime combined.

“That is the way it is going,” he said.

A case Loxton had worked on involved a major South African company with a presence in Africa, Europe, and the US.

“They had their server hacked by a syndicate and the syndicate sat on their server for four years before they were aware,” he said.

“In that four years, the syndicate intercepted every single board pack (board reports), every single confidential piece of information between the MD and his co-directors, plus they sold product which is stored in the warehouse.”

The security breach was discovered only after an employee noticed that his laptop was acting strangely, which led to an investigation that uncovered the breach.

“It was an international syndicate involving Russians, Bulgarians, Latvians, Nigerians, and South Africans,” Loxton said.

“It involved money laundering, it involved human trafficking… it was a very slick operation.”

The South African member of the syndicate, who was located near the corporation’s offices, was being paid in drugs, not money, as he was a drug addict.

It was rare that cyber criminals were individuals, but rather syndicates operating almost like businesses. Cyber crime was linked to other illegal activities such as drug running and human trafficking.

“You can imagine the enormous negative impact on the client,” he said.

“At this stage, the investigation is still ongoing. We don’t know if there has been sale of intellectual property. We don’t know if there has been sale of trade secrets.”

The corporation concerned was concerned about leaks to the media, as the potential for reputational damage was huge.

“Business should be focusing a lot more on cyber crime.”

Loxton said the public needed to be aware of what information they shared on social networking platforms, such as Facebook, as this could be used by cyber criminals.

He mentioned an instance where a cyber crime consultant showed him, through using a random person’s phone number available on Facebook, how it was possible to hack a person’s smartphone.

Through that number, the consultant was able to trace the exact location of the number’s owner to a department store in Singapore, in real time.

“I’ve heard experts say its easy to hack a person. It’s not easy to hack a computer… the compromise is through people, not systems.”

Cyber crime cost South Africa around R1 billion annually, with the FBI in the US placing South Africa as the country with the sixth-highest rate of cyber crime.

Informal consensus within the private sector ranked South Africa third, behind Russia and China.

South Africa had proved to be a particularly fertile ground for cyber crime because of its “lawless society”.

Cyber crime syndicates knew law enforcement was “paper-thin”, and that there was a low chance of their being arrested and successfully convicted, said Loxton.

“We are generally dealing with highly intelligent, sophisticated people… It is a national crisis,” Loxton said.

“The syndicates find it quite easy to operate in South Africa due to a lack of resources.”

The Norton security firm stated that about US110 billion (about R1 trillion) was lost worldwide to cyber crime.

Loxton said South Africa’s banking sector was “superb”, as the major banks had strong internal forensic services. The problem lay with the customers.

“I think our banks are superb. They can’t answer to their customers who are stupid, to be blunt,” Loxton said.

“The advice is there…. They can’t protect customers from themselves.

“You can’t protect people from their own greed and foolishness.” – Sapa



October 23 2013 at 06:20pm 


Mikro Stationery closes its doors

Deon Terblanche of Mikro Stationery has reported that the cc has become insolvent. Their Telkom land line is now out of service. Should any business need assistance with legalities, please contact Philip Smit on 011 6466120.  


Cluttered tills are a sign of inefficiency, lack of productivity and impacts retailer profits, says Ian Steyn of Innervation – and integrating all those services into the point of sale is the solution!


“Customers expect more and more value-added services from retailers,” he says. “But adding a new terminal or hardware peripheral device for each service creates challenges. If you have a credit card terminal, and maybe a second one from another bank, and need to add yet another to support gift cards and loyalty, the till environment can get unacceptably cluttered.”


Wasted cashier time and longer queues are just the start of the challenges, says Steyn. “Having multiple standalone terminals at your till puts you at much greater risk of mistakes and fraud. For example, when your card payment terminal isn’t integrated with your point of sale software, it means every payment transaction has to be manually performed on a card payment terminal and then captured on the point of sale as well. That invariably leads to mistakes and typically manifests itself in end of day reconciliation exceptions.”


Adding a new terminal for each service also means training and retraining staff. “That’s a huge expense on its own – and it probably won’t be enough. If you’re incentivising your staff by how quickly they can move people through the till, but checking loyalty points on the terminal takes a few extra seconds per customer, they have a very good reason to forget about the loyalty programme.”


Finally, there are all the attendant problems of managing multlple pieces of hardware and associated consumables. “Three terminals might mean three different network connections and three different printers, which take three different kinds of paper. This can be a real issue, and a major waste of resources.”


Integrating services onto the point of sale means retailers only need to deal with one POS system, one printer and one network connection, he says. “It also means you get 100% accuracy, transactions are faster to process and it’s easier to train cashiers. Services such as coupons and loyalty, which require reference to the actual items purchased, can only be optimally implemented when integrated to the point of sale. This supports the Implementation of common business processes across all value added services, with the associated savings and productivity.”


“Retailers are best at doing retail,” he says. “Managing multiple bits of IT is not their core business, especially in smaller retailers, and it shouldn’t have to be. Rolling up multiple services into your point of sale system makes life much easier.”


About Innervation  

Innervation Value Added Services assists retailers to achieve enhanced customer service, increased revenue and sustainable competitive advantage via strategic engagement and by enabling a wide range of services across all customer touch points. Innervation utilises an agile switching and reconciliation platform to seamlessly integrate to customer touch points (POS, mobile, web, call centre, self -service kiosks and social media) and also to retail enterprise financial and CRM systems. The company’s core product offerings include the Destiny electronic payments switch and the Destiny Stored Value suite of products, including gift card, loyalty, vouchers and coupons. Commodity services such as prepaid airtime and bill payment are supported via interfaces to the Value Added Service Providers preferred by the merchant.




Follow us on social media: 


View our magazine archives: 


My Office News Ⓒ 2017 - Designed by A Collective