By Tehillah Niselow for Fin24 

Liberty Holdings customers received SMSs on Saturday alerting them that personal information related to their insurance policies could have been stolen by an external party.

The Information Regulator, which has asked for information about the Liberty breach, is clearly concerned about the increasing number of cyber attacks affecting personal data in South Africa.

“Without a fully functional Information Regulator, these breaches will continue to occur without sanctions provided for in the Protection of Personal Information Act (POPIA),” said chairperson Advocate Pansy Tlakula.

Tlakula urged “the powers that be to assist it in fast tracking its operationalisation”.

According to corporate law firm Michalsons, certain limited sections of POPIA have already been implemented. However, the bulk of the legislation will only commence at a later date, to be proclaimed by the president. As there is a one-year grace period, the POPIA deadline might only be set for the end of 2019 or in 2020.

In the meantime, South Africans are coming under heightened attack from cyber criminals and hackers.

Andrew Chester, MD of Ukuvuma Security, told Fin24 that affected clients or users should immediately alert their banks and cellphone provider. They should also undertake a credit check as well as a Google search to determine whether their personal information is in the public domain.

Liberty email hack

In SMSs to clients on Saturday, financial services company Liberty informed them that its email repository had been breached by a third party trying to demand a “ransom” in exchange for the data.

Liberty has not revealed much about the breach, citing a police investigation. CEO David Munro confirmed that Liberty’s insurance clients were the only ones affected, and that none of its other business had been compromised.

The company said none of its clients have been impacted financially, and that individuals will be personally advised if their information has been affected.

ViewFines licence details

In May the Hawks, the State Security Agency and the Information Regulator said they would probe the breach of personal records of 943 000 South African drivers, allegedly from online traffic fine website ViewFines.

The information reportedly contained the names, identity numbers and email addresses of South African drivers stored on the ViewFines website in plaintext.

The ViewFines website is owned by Aggregated Payment Systems. News24 reported that its operations manager confirmed the company was “implementing security measures immediately” to improve the website after being informed of the breach.

The source of the data was located by Troy Hunt, an Australian security researcher and creator of the free service Have I Been Pwned, which checks whether an individual’s information has been compromised.

Facebook scandal

While Facebook founder and CEO Mark Zuckerberg had to face angry lawmakers in the US and European Union, it was reported that the data breach involving the UK political consultancy affected almost 60 000 South African users.

In May, the Information Commissioner’s Office of the United Kingdom (which regulates Facebook outside the US and Canada) advised the Information Regulator of South Africa that over 87 million people had been affected worldwide.

However, no evidence could be found of South Africans having been targeted, as the majority of users involved were in the US.

Master Deed’s data breach “biggest” digital security threat in SA

Hunt was once again instrumental in revealing what was known as the “biggest” data breach in South African history, together with iAfrikan CEO Tefo Mohapi in October 2017.

Over 60 million South Africans’ personal data, from ID numbers to company directorships, was believed to have been affected.

The information was traced to Jigsaw Holdings, a holding company for several real estate firms including Realty1, ERA and Aida. The information reportedly came from credit bureau agencies, and was used to vet potential clients.

The information trove was found not to have been hacked, as it was stored in an easily accessible manner on an open web server.

Ster-Kinekor’s database compromised

Movie theatre chain Ster-Kinekor was responsible for up to 7 million South Africans falling victim to a data leak in March 2017.

Fin24 reported that Durban developer Matt Cavanagh announced he had discovered a flaw in Ster-Kinekor’s booking website, and that he had reported it to the company.

There were between 6 and 7 million users in the database. Of those, 1.6 million people had email addresses linked to them on the movie theatre chain’s database.

By Aaron Brown for MailOnline

WhatsApp will drop support for millions of older smartphones, leaving users unable to send or receive texts via the hugely popular messaging app.

The Facebook-owned chat app will drop support for iOS 7 from 1 February 2020.

As a result, WhatsApp users with an iPhone 4 or older will be forced to either upgrade to a new phone, or find an alternative to the world’s most popular chat app.

WhatsApp has set the same deadline for Android smartphone owners running version 2.3.7 and older, known as ‘Gingerbread’.

From today, WhatsApp has stopped new users setting up account with the messaging service on either iOS 7 or Android Gingerbread.

Existing accounts can send and receive messages until the end of support date.

However, WhatsApp has warned that some features could stop working at any time between now and the final deadline in early 2020.

WhatsApp confirmed plans to drop support for Android Gingerbread and iOS 7 with a quiet update to an existing blog post about previous end of support deadlines.

In the post, the company also confirmed that it has stopped actively developing for iOS 7 and Android Gingerbread and that as a result, ‘some features might stop functioning at any time’ between now and February 2020.

Since iPhone 4 handsets and older are unable to upgrade to iOS 8, the successor to iOS 7, these Apple smartphone owners will no longer be able to continue to use WhatsApp without plumping for a new phone.

The same is true for some Android devices, like Google’s Nexus One, which cannot be upgraded past Android 2.3.6 Gingerbread, and the HTC Desire HD, which is stuck on version 2.3.5.

WhatsApp has confirmed plans to drop support for Nokia S40 in December 2018, and iOS 7 and Android Gingerbread in February 2020.

After this deadline, WhatsApp users will no longer be able to send or receive text messages, voice or video calls within the popular chat app.

Following the announcement of the end of support, WhatsApp stopped new users setting up an account with the messaging service on either iOS 7 or Android Gingerbread handsets.

Existing accounts can send and receive messages until the end of support date.

However, WhatsApp has warned that some features could stop working at any time between now and the final deadline in early 2020.

Handsets that will no longer support WhatsApp after February 2020:iPhone

  • iPhone 3G
  • iPhone 3GS
  • iPhone 4
  • Google Nexus One
  • Samsung Galaxy S
  • HTC Desire HD
  • HTC Wildfire
  • HTC Wildfire S
  • Sony Xperia X10
  • Sony Xperia Arc

This list is not exhaustive. Any Android-powered smartphones running version 2.3.7 and older will stop working on 1 February 2020.

WhatsApp periodically drops support for older operating systems so that it can guarantee its entire user base enjoys the same experience and features.

As the messaging service adds new functionality to its app, it is sometimes unable to replicate these features on smartphone running outdated operating systems.

On January 1 2018, WhatsApp removed support for phones running BlackBerry OS, BlackBerry 10 and Windows Phone 8.0, leaving these users unable to download the app, send or receive texts.

The Menlo Park-based developer has previously dropped support for:

  • Android versions older than 2.3.3
  • Windows Phone 8.0 and older
  • iPhone 3GS/iOS 6
  • Nokia Symbian S60

According to the latest figures from Google, 0.3 per cent of all Android devices still run Gingerbread.

That amounts of around 6-million active smartphones and tablets powered by the 10-year-old operating system.

While that may be a drop in the ocean compared to the 2 billion total active monthly devices running Android, it is sure to leave plenty of WhatsApp users unhappy about the latest announcement.

Apple does not reveal the exact breakdown of each iOS operating system, however, the iPhone maker has confirmed that five per cent of all iOS devices sold are now running iOS 9 and older.

However, it’s unclear what percentage of that 75 million total are running iOS 7.

WhatsApp periodically drops support for older operating systems so that it can guarantee its entire user base enjoys the same experience and features.

As the messaging service adds new functionality to its app, it is sometimes unable to replicate these features on smartphone running outdated operating systems.

On January 1 2018, WhatsApp removed support for phones running BlackBerry OS, BlackBerry 10 and Windows Phone 8.0, leaving these users unable to download the app, send or receive texts.

The Menlo Park-based developer has previously dropped support for:

  • Android versions older than 2.3.3
  • Windows Phone 8.0 and older
  • iPhone 3GS/iOS 6
  • Nokia Symbian S60

In a statement issued during the last round of end of support announcements, WhatsApp said it wanted to focus its efforts on the operating systems used by the majority of its chat app users – instead of trying to support a smaller percentage running older software.

The company said: ‘As we look ahead to our next seven years, we want to focus our efforts on the mobile platforms the vast majority of people use.’

Online shopping grows in SA

By Joseph Booysen for Business Report

Although traditional retail stores dominate the South African market, consumers are choosing the online option for cheaper technical goods purchases.

According to the latest research report by GfK (Growth from Knowledge), South Africa, E-commerce 360:Navigating the Technical Goods E-Commerce Market in South Africa, e-commerce retailers grew their share of the South African technical consumer goods market by 52 percent last year, accounting for 6.9 percent of total consumer spending by rand value for the year.

This meant they had nearly doubled their share of the market since since 2015.

Cherelle Laubscher, a senior retail manager at GfK South Africa said e-commerce in South Africa was still in its infancy compared to European markets, where a quarter of technical goods spending goes through digital channels.

“However, growth in South Africa is strong and shows no signs of declining as bargain-seeker flock online to buy technical consumer goods like smartphones, IT, consumer electronics, and major home appliances,” said Laubscher.

She said although traditional stores dominated the market, they were not growing the value of the sales they generated in technical goods as quickly as the digital players and e-commerce retailers were seeing strong growth in smartphones, panel televisions, small domestic appliances, gaming consoles and laptops.

According to the report, survey respondents cited better prices, attractive promotions and wide product selections as major reasons for shopping online rather than at at a traditional store, while by contrast, experiential factors such as getting to see and feel goods motivated shoppers to go to physical stores.

GfK South Africa’s point of sale data showed that the consumer perception that e-commerce prices were lower than in-store prices was accurate. More than two-thirds of the top 100 sellers among technical goods products in South Africa were cheaper through digital stores that at physical retailers.

Across the top 100 products, online prices were an average of 4.7 percent cheaper.

Odette Jardim, a client solutions manager at GfK South Africa, said 45 percent of connected consumers in the survey claimed to increasingly use the internet to buy products online compared to the previous year (2016).

“However, a consumer journey often straddles both physical and digital channels, meaning that the most successful retailers should have an omnichannel strategy,” said Jardim.
Meanwhile, Kevin Tucker, PriceCheck chief executive, said although South African consumers might be lagging in the amount of online shopping they did compared to the US, for instance, with increased innovation and tech security, South Africa would continue to see growth.

“South Africa has seen a boom in cutting-edge e-commerce innovation, and this needs to be celebrated,” he said.

Tucker said although the e-commerce industry had grown by 25 percent in South Africa, only 1.5 percent of online consumers ended up making a purchase.

“Online spending in South Africa is expected to reach R53 billion by the end of 2018, up from R37.1bn in 2017, according to research conducted by PayPal. There is clearly huge untapped potential in this industry,” said Tucker.

Tech-friendly letter writing

By Akanksha Singh for Grok Nation

Imagine sending out an email to a friend, only to receive a digital handwritten note back. Handwriting correspondence, snapping a photo and sending it digitally is what I call “tech-friendly letter writing.”

Once upon a time, people sat at desks with inked fingertips and wrote letters with quills. Messengers delivered them on horseback. Such correspondence was so culturally essential that collections of letters from famous authors became a means of insight into their lives. Then came stamps. Then email. Tech-friendly letter writing combines the best of handwritten notes with the convenience of technology.

Plus you skip on stamps by taking a photo and sending it via email, text–faster and there’s some guarantee of receipt. But, that’s not to say I’m against “snail mail.” I’ve been writing letters since college. When I moved from Dubai to Montreal for university, I was lonely and homesick. I remember feeling elated when I sorted through my usual spam (pizza fliers, bills), and finding a letter in the mix. My roommate’s mother had sent it, along with an exam-season care package. It meant the world to me.

So, whenever I write someone a letter, I think of them looking through bills and fliers, and finding something that was actually intended for them, created with love and thought.

Before you knock the idea for being a waste of time, let me give you some background: I attempted tech-friendly letter writing after I read this article about a Jordanian bookshop owner who replies to text messages and Facebook posts with a picture of his handwritten response. Around the same time, I decided I wasn’t immune to the technology-induced dopamine reward loops just because I was aware of them, and that I was sick of being glued to my phone all day, being plugged into everything from my Apple Watch (FYI: we broke up) to my Messenger app.

We’re all aware that our connectedness has made us bad communicators, and that we’re too busy nowadays; tech-friendly letter writing is a good way to disconnect without losing connection.

Often, when I’m typing, I’ve noticed that I type as fast as –if not faster than– I think. Word vomit all the time. Handwriting, I’ve found, has been a great way to slow down, reflect on my day and just breathe. And not surprisingly, handwriting has several benefits for the brain, like increasing neural activity, helping us learn, and more. In addition, letter writing increases those benefits!

How to go about implementing it

  1. Pretty stationery + camera phone
    I’m one of those people who indulges in stationery shopping at Kikki K whenever life gets too real. Pretty stationery does make the whole experience more enjoyable for you and the person receiving an emailed letter. Beautiful stationery options we love here, here, and here.
  2. Get over handwriting perfectionism
    Since I was a child, I’ve always prided myself on having nice handwriting; the sort that people looked at and commented on for its prettiness, which I’d counter with, “Oh, that chicken scratch?” Truthfully, I’d learned calligraphy in school (the real sort, not the messy sort that’s trendy nowadays), and picked it back up when I learned Meghan Markle was a calligrapher (shameless girl crush; judge away). So when I started writing several letters a week and experiencing hand cramps, and produced genuinely messy handwriting, I did what most perfectionists do: I’d rewrite letters that were almost ready to go, minding my cursive and avoiding spelling mistakes best I could.
    It. Was. Exhausting.
    Eventually, the reality of it (time wasting, neuroticism) dawned on me, and I let myself have messy days. The whole point of this exercise was to be real, after all.
  3. Take the pressure off
    When I initially committed to this, I overwhelmed myself with the need to do it all the time.. I eventually realized that I was taking the fun out of what was supposed to be a relaxing exercise, and I was stressing myself out. Which brings me to my next point…
  4. Accept that not everyone or every situation is deserving of a handwritten note
    Set aside a time for correspondence, like the “old days.” I know there are certain people who are worth my time and the paper and ink it takes me to write a thoughtful note. I want to be thoughtful for said people.
  5. Commit for a significant period to see if it works for you
    Like all habits, this will take some time to cultivate. In fact, it’ll likely take longer–texting is just so damned easy. Schedule an hour, half an hour, or even ten minutes per week and stick with it. When I started, I did it for a month, then it became three months, and now we’re going on four. (This is coming from someone who has issues committing to a favorite color, much less a favorite band or tv show, can I add?)

If the letters are long and personal —and sent to someone I really care about— I’ll spend money on postage and mail them off. If not, I’d have typically written the letter or note in my diary, so it will stay there. So, I definitely hang on to everything, sentimentalist that I am!

Friends writing back made this wholly worthwhile: I even reached out to a friend I’d lost touch with (life happens!), with a handwritten apology, and she called and we talked like no time had passed. The biggest benefit for me, personally, has been slowing down to reflect on my thoughts as I’m writing them. So, yeah–it takes longer than clacking out an email or a long text message. But that’s the point.

R552bn wiped off cryptocurrencies after hack

By Eric Lam, Jiyeun Lee and Jordan Robertson for Bloomberg / Fin24 

The 2018 selloff in cryptocurrencies deepened, wiping out about $42bn (about R552bn) of market value over the weekend and extending this year’s slump in Bitcoin to more than 50%.

Some observers pinned the latest retreat on an exchange hack in South Korea, while others pointed to lingering concern over a clampdown on trading platforms in China. Cryptocurrency venues have come under growing scrutiny around the world in recent months amid a range of issues including thefts, market manipulation and money laundering.

Bitcoin has dropped about 12% since 5 pm New York time on Friday and was trading at $6v756, bringing its decline this year to 53%.

Most other major virtual currencies also retreated, sending the market value of digital assets tracked by Coinmarketcap.com to a nearly two-month low of $298bn. At the height of the global crypto-mania in early January, they were worth about $830 billion.

Enthusiasm for virtual currencies has waned partly due to a string of cyber heists, including the nearly $500m theft from Japanese exchange Coincheck Inc. in late January. While the latest hacking target – a South Korean venue called Coinrail – is much smaller, the news triggered knee-jerk selling, according to Stephen Innes, head of Asia Pacific trading at Oanda in Singapore.

“This is ‘If it can happen to A, it can happen to B and it can happen to C,’ then people panic because someone is selling,” Innes said.

A cryptocurrency slump

The slump may have been exacerbated by low market liquidity during the weekend, Innes added.

“The markets are so thinly traded, primarily by retail accounts, that these guys can get really scared out of positions,” he said. “It actually doesn’t take a lot of money to move the market significantly.”

Coinrail said in a statement on its website that some of the exchange’s digital currency appears to have been stolen by hackers, but it didn’t disclose how much. The venue added that 70% of the cryptocurrencies it holds are being kept safely in a cold wallet, which isn’t connected to the Internet and is less vulnerable to theft. Two-thirds of the stolen assets – which the exchange identified as NPXS, NPER and ATX coins – have been frozen or collected, while the remaining one third is being examined by investigators, other exchanges and cryptocurrency development companies, it said.

Coinrail trades more than 50 cryptocurrencies and was among the world’s Top 100 most active venues, with a 24-hour volume of about $2.65 million, according to data compiled by Coinmarketcap.com before news of the hack.

The Korean National Police Agency is investigating the case, an official said by phone.

In China, the Communist Party-run People’s Daily reported on Friday that the country will continue to crack down on illegal fundraising and risks linked to Internet finance, quoting central bank officials. The nation’s cleanup of initial coin offerings and Bitcoin exchanges has almost been completed, the newspaper said, citing Sun Hui, an official at the Shanghai branch of the central bank.

By Daniel Cooper for Engadget

Problematic transportation outfit Uber is thinking about a way to use your phone to determine if you’ve been drinking. A patent application was uncovered by CNN, entitled “Predicting user state using machine learning,” which outlines the general idea. Essentially, by watching how you behave day-to-day, the system can pick up when your behavior is normal (for you) or abnormal. That could be, for instance, how you use your phone, the angle at which you hold it, and even how you’re walking.

Obviously there are some common sense elements to this, too, especially if you’re requesting a ride in the small hours from a notorious night spot. The thinking is that drivers will be fed this information ahead of you boarding the vehicle to better prepare them for what’s coming. A cynical reading of the plans could mean that drivers choose not to pick up a ride from a drunk passenger to avoid trouble. That would likely mean they’re left fending for themselves or, worse still, choose to drive themselves instead.

Of course, patent applications are mostly the province of companies wealthy enough to devote such time to dreaming up new ideas. Wacky concepts and ideas are patented all the time in the hope that, in years to come, they prove to be both useful and profitable. There’s no indication that this system is going to pop up in Uber’s customer-facing app in the near future, although it certainly could do.

By Vicky Sidler for MyBroadband / Nick Saunders at Mimecast

When I say the word “bat”, what image comes to mind? A flying mammal? A cricket bat?

In English, they call this a “homograph”: when two or more words are spelled the same but don’t have the same meanings or origins.

In cyber-security, a homograph is a lot more sinister. It’s a term given to a type of impersonation attack where an email address or website URL looks legitimate but isn’t. It’s designed to trick people into clicking on malicious links or to fool them into transferring money or sharing sensitive information.

Recent research by Vanson Bourne and Mimecast found that more than 85% of respondents had seen impersonation fraud in the past 12 months, and 40% had seen an increase in this type of attack in the same period. In South Africa, 36% of respondents had seen an increase in impersonation fraud asking to make wire transactions, and 37% had seen an increase in impersonation fraud asking for confidential data.

Despite this growth, many organisations do not have a cyber resilience strategy in place to help them detect, prevent and recover from these types of attacks.

Easy to execute, hard to detect
Homograph attacks are difficult to detect – by both the user and regular email security systems.

To create these lookalike domains, attackers use non-Western character sets or special characters found in Greek, Cyrillic and Chinese, to display letters which, to the naked eye, look identical to the western alphabet. Mimecast.com, for example, looks like мімесаѕт.com in Cyrillic. According to one domain name checker, there are 117 possible Mimecast domains that can be misrepresented with just one character from a non-English alphabet.

These subtle changes are likely to go unnoticed by users. In South Africa, 31% of respondents were not confident that employees could spot and defend against impersonation attacks, which easily and often slip through an organisation’s security systems.

Some 21% of South African respondents were not confident that their organisation’s security defences could defend against impersonation fraud asking for confidential information, rising to 25% for fraud asking to make wire transactions – in line with global trends.

This is because the emails themselves don’t contain malware and the URLs often have legitimate (read: stolen) security certificates.

Is it me you’re looking for?
Website URLs aren’t the only avenues for impersonation attacks; email address impersonation is also on the rise.

These types of attacks are designed to trick users such as finance managers, executive assistants and HR representatives into transferring money or disclosing information that can be monetised by cybercriminals. The email appears to come from someone they trust – a C-suite executive or a third-party supplier that they regularly do business with – and therefore wouldn’t think twice about responding to.

South Africans reported that, in the past 12 months, cybercriminals have attempted to impersonate finance teams (24%), third-party vendors (20%), a member of the C-suite (7%), as well as HR, sales, operations, legal and marketing team members (between 5% and 8%).

Again, these emails do not contain malware, which means they can go undetected by most email security systems. Social engineering attacks such as these rely on our inability to spot anomalies in URLs and email addresses – and the fact that we believe we’re communicating with someone we know.

Know what to do
Cybercriminals have figured out that they can bypass security systems by switching from malware-laden attacks to malware-less impersonation attacks. Now, social engineering meets technical means to put us in the middle of the next evolution of cyber-attacks.

Here are some measures organisations can implement to guard against these types of attacks:

  1. Education – when users know how social engineering and spoofing attacks work and then understand they shouldn’t click on links in emails, breach incidents can be drastically reduced. Users should be encouraged to physically type an address into a browser rather than click on a link in an email, even if it was supposedly sent by someone they know and trust. Education and awareness will always be the most important defence mechanisms.
  2. Protection – email security systems are getting better at stopping malware which enter the network through dodgy files and attachments, but few are effective against impersonation attacks. Organisations need a solution that can deep-scan all inbound emails and inspect for header anomalies, domain similarity, sender spoofing and the existence of keywords and suspicious impersonation emails. These can then be blocked, quarantined, or delivered as flagged to alert the receiver of potential risk.
  3. Resilience – having the right threat protection in place is just one part of a robust cyber resilience strategy. Organisations also need to be able to adapt their strategies to stay ahead of attacks, while having the durability to continue with business as usual in the event of an attack, and the recoverability to ensure data and emails are always accessible.
  4. Oversight – often, lax security on a third-party supplier’s side provides an entry point into an organisation’s network. Enterprises should continuously evaluate and manage the security and privacy policies of their suppliers and include security in their service level agreements. They should also perform on-site security assessments with new suppliers before sharing sensitive information.
  5. Visibility – organisations need to know who their vendors are and who has access to company information, and for what reasons. This is even more important now that the EU’s General Data Protection Regulation has come into force and will affect all South African organisations when the Protection of Personal Information Act is finalised.

Thirty-seven percent of South African organisations have suffered data loss because of email-based impersonation attacks in past 12 months. These organisations also reported reputational damage (34%), loss of customers (29%), direct financial loss (17%) and lost market position (19%).

Email continues to be the number one threat to organisations globally and accounts for 96% of all incidents that organisations face.

Clearly, there is an urgent need to work towards a higher standard of email security. Cyber-criminals have evolved their attack methods. It’s time the security strategies organisations use to protect their users and their businesses evolve as well.

Source: Martha Stewart

Monogrammed boxes
These elegant containers are perfect for jewelry, gift cards, and small items.

Materials:

  • Coloured card stock
  • Computer
  • Printer
  • Bone folder
  • Scissors
  • Straightedge
  • Glue stick
  • Heavy books

Instructions:

In a photo-editing program, create a 2-page document. On the first page, draw a picture box, and then import a box template, from a CD, centering it carefully on the page.

Draw a second picture box, and place it on the template where you want the letter to appear. Import letter from a CD, sizing it as desired.
Copy template and letter from first page, and paste onto second page in the same position.
Delete letter from first page; delete template from second page.
Print first page onto colored card stock. Flip card stock over, and print second page with letter on other side.
(For a white letter, draw a picture box on the second page larger than the template. Color in box, make the letter white, and print onto white card stock.)
Cut out along template’s outside edges.
Using a bone folder and a straightedge, score straight dotted lines. Score curved lines using a round plate as a guide. Fold along straight lines, and seal with a glue stick.
Let dry between heavy books. Fold along curved lines to close box.

Punch-out pizzazz
Whimsical iron-on shapes turn basic T-shirts and totes into one-of-a-kind gifts.

Materials:

  • Photo-editing program
  • Iron-on transfer paper
  • Paper punches or decorative scissors
  • Iron
  • T-shirts or tote bags

Instructions:

In a photo-editing program, import patterns.
Print onto iron-on transfer paper, following the manufacturer’s instructions. (For crisp printouts, use paper meant for dark fabric.)
Cut out shapes using paper punches or decorative-edge scissors.
Iron onto fabric, following the manufacturer’s instructions.

Memory DVD
Create a DVD full of memories for the favourite dad in your life.

Materials:

  • Blank DVDs
  • DVD labels
  • Digital images
  • Printer
  • Envelopes
  • Card stock
  • Ribbon

Instructions:
Share memories of your Dad by creating your own DVDs and DVD labels on a computer. Simply take one of your favorite pictures, and print the image on a sticky label designed to fit a DVD – it’s a small touch that makes the gift extra special. When packaging the DVDs, place them all into individual envelopes, and then take your chosen photographic image and print it on card stock to make a one-of-a-kind cover.

Custom treats container
Take holiday photo cards to the next level: paste an image on a small container and fill it with your Dad’s favourite treats.

Materials:

  • Small box
  • Red nontoxic acrylic paint
  • Paintbrush
  • Pencil
  • Card stock
  • Scalloping shears
  • Photograph
  • Craft glue
  • Scissors
  • Glassine
  • Favourite snacks (such as sweets, biltong and nuts)

Instructions:
Coat a small box, outside and in, with red nontoxic acrylic paint; let dry. Trace the box top onto card stock.
Draw a circle about 1/2 inch larger around the traced circle; cut out with scalloping shears. Repeat to make a second circle.
Print or photocopy a photograph, adjusting the color, if desired. Trace the box top onto the picture; cut out. Use craft glue to affix the photo to one of the scalloped red circles; let dry.
Affix that circle to the top of the box and the other circle to the bottom using craft glue. Line bottom of the box with glassine.
Fill with your Dad’s favourite snacks.

By Harry Pettit for MailOnline 

An ’embarrassing’ leak shows the European Union has fallen short of its own data protection laws.

The European Commission’s website has published 700 records, including the names, addresses and mobile numbers of conference attendees, according to a report.

Officials in Brussels admitted the authority that designed the rules is not itself compliant with the General Data Protection Regulation (GDPR).

The Commission has previously warned that those who breach these rules, which came into force last week, could face millions in fines.

Following the leak, a spokesperson said the authority was exempt from GDPR laws for ‘legal reasons’.

Officials in Brussels will follow a similar set of new laws that ‘mirror’ those laid out in GDPR.

These rules will not enter force until autumn, according to the Telegraph.

The spokesperson added that the Commission is ‘taking and will continue to take all the necessary steps to comply’.

GDPR aims to strengthen and unify data protection for all individuals within the EU, which means cracking down on how companies use and sell user data.

Under GDPR, companies are required to report data breaches within 72 hours, as well as allow customers to export their data and delete it.

Companies scrambled to comply with the rules before they were ratified on May 25 with the Commission threatening hefty fines for those who breached them.

The bureaucracy’s website exposed 700 records that include people’s names, professions, and even some postcodes and addresses.

Officials in Brussels admitted the authority that designed the rules is not itself compliant with the General Data Protection Regulation. GDPR aims to strengthen and unify data protection for all individuals within the EU.

The records, some of which featured the private information of Britons, were collected during EU meetings and conferences and stored on data spreadsheets.

Tech website Indivigital found the documents are among thousands hosted by the website Europa.eu that are freely accessible online.

Many of them could be found by simply searching for the document on Google.

This leak would constitute a breach of GDPR rules were the blunder committed by other organisations or businesses.

What is GDPR?

The General Data Protection Regulation is an EU-wide law that cam into force on May 25 2018.

It gives greater power to regulators to penalise companies who mishandle personal data or are not transparent about how their business uses it.

For consumers, it brings new powers that require firms to obtain clear consent from users before processing their data.

It also grants users a right to easily access the data collected from them and transparency on how it is being used.

Everyday users have to do very little to comply with GDPR – it’s more targeted at big online businesses.

Under the new rules, any company that controls or processes the data of EU citizens must adhere to the GDPR guidelines.

This ends territorial-based accountability used by some firms not based in the EU to previously avoid sanction.

The law also states that notification of a data breach must occur within 72 hours of being first discovered, increasing transparency around leaks.

The weight of fines able to be issued has also increased under GDPR.

Regulators will be able to issue penalties equivalent of up to four per cent of annual global turnover or 20 million euro (£17.5 million) – whichever is greater.

For tech giants such as Google and Facebook, this could mean the risk of fines running into the hundreds of millions.

Fines for such a breach can reach up to £17.5 million ($23 million) or four per cent of global turnover – whichever is largest.

Jon Baines, a data protection expert at law firm Mishcon de Reya, described the ‘irony’ of the EU’s admission.

‘Although the information disclosed here does not appear to be particularly sensitive, it does raise questions about the general level of compliance, and whether any further inadvertent disclosures have been made,’ he told the Telegraph.

Steve Gailey, security expert at database security firm Exabeam, added that the exposure ‘is embarrassing for the EU, coming hot on the heels of GDPR’.

Reserve Bank trials blockchain successfully

By Hanna Ziady for Business Live 

Payments between SA’s banks, averaging R350-billion daily, can be settled using blockchain technology, tests demonstrate.

“Project Khokha”, whose results the Reserve Bank announced on Tuesday, successfully trialled interbank settlements using distributed ledger technology (DLT), of which blockchain, the mainstay of cryptocurrencies such as bitcoin, is one type.

Distributed ledgers use independent computers to record, share and synchronise transactions in online ledgers, without the need for an independent third party to verify those transactions. DLT could “fundamentally change the financial sector, making it more efficient, resilient and reliable”, according to the World Bank. In the long term, it could usurp a large portion of the work performed by trusted intermediaries such as banks and clearing houses.

DLT developments

Central banks around the world, meanwhile, are grappling with the implications of financial technology (‘fintech’) for financial markets and their supervisory roles in those markets. That Project Khokha has been a success puts the Bank at the cutting edge of developments in DLT, alongside the likes of the Bank of Canada and Singapore’s central bank.

The trial was designed, built and executed in three months. Key role-players included the Bank’s fintech unit, established in August 2017, and SA’s six biggest banks, as well as newcomer Discovery Bank.

The results show that the typical daily volume of SA’s payments system, averaging R350bn, could be processed on a distributed ledger in less than two hours with full confidentiality of transactions.

This has considerable implications for future applications of blockchain technology in SA. Future “blockchain experiments” might involve other central banks on cross-border payments, said Bank governor Lesetja Kganyago.

The Bank had “pushed the envelop in a number of ways” on the project, said Peter Munnings, technical lead of enterprise delivery at New York-based ConsenSys, a blockchain software technology firm and the Bank’s technology partner.

“There are many issues to consider before the decision to take a DLT-based system into production can be taken,” the Bank said.

“Some of these issues relate to the practicalities of implementation, but also to legal and regulatory factors, and to the broader economic impact.”

One of the objectives of Project Khokha was to better understand how the South African Multiple Option Settlement (SAMOS) system would integrate with a DLT system. SAMOS is the current interbank settlement system provided by the Bank, allowing banks to settle their obligations in real-time.

Follow us on social media: 

               

View our magazine archives: 

                       


My Office News Ⓒ 2017 - Designed by A Collective


SUBSCRIBE TO OUR NEWSLETTER
Top