With the POPIA deadline looming around the corner it is essential for all business to take action and ensure that their business meets the criteria for POPIA compliance. The need for your business to be POPIA compliant is not only to utilize internal data protection but, the penalties involved if your business is found not to be compliant after 1 July 2021.

The POPI Act sets forth eight conditions for the lawful processing of personal information. These conditions address how organizations demonstrate accountability for ensuring they respect the privacy of individuals in South Africa.

The Act regulates how this information is collected, stored, processed, and shared. Although the Act was signed into law in 2013 and certain sections of the Act went into effect in 2014, these effective sections pertained to the establishment and appointment of the Information Regulator. Once the sections of the Act that place obligations on organizations to ensure the lawful processing of personal information begin, organizations will have one (1) year following that date to comply with the Act’s provisions.

There are essentially two legal penalties or consequences for the responsible party:

  1. A fine or imprisonment of between R1 million and R10 million or one to ten years in jail.
  2. Paying compensation to data subjects for the damage they have suffered.

It is very unlikely that anyone will go to jail and the fines are small compared to other jurisdictions. The other penalties include:

  • Reputation damage
  • Losing customers (and employees)
  • Failing to attract new customers

But your main motivation for complying with the Protection of Personal Information Act (POPIA) should be to protect people from harm.

Infraplex has POPIA packages available for your business to help you get compliant before the POPIA deadline. Infraplex has devised a four step solution within our POPIA packages these are:

Consultation

The first step to becoming compliant is setting up a consultation with a compliance agent. This one on one consultation will allow us to get to know you and your business.

Assessment

The assessment process allows us to see what your business currently is and is not compliant with. This involves analysing your internal data storage and processes to determine your current level of legal compliance.

Appointment

In order to gain and maintain your business compliance, we will be required to appoint a compliance officer within your business to monitor your compliance and ensure that processes are performed in accordance to the law.

Solution

Once your current compliance needs have been established, we will then offer your business the correct products and security solutions to maintain compliance.

Click here to set up a consultation with our compliance officer.

Visit compliance.infraplex.net for more infor mation on getting your business compliance.

Telegram has a feature that lets you import messages from WhatsApp, allowing users to migrate entire chat histories from WhatsApp to Telegram.

This new feature relies on WhatsApp’s “export chat” function, which lets you export the messages in a conversation as a text file. You can also export the photos, videos, audio, and contacts in a conversation.

It isn’t possible to move all of your conversations from WhatsApp to Telegram at once this way. You have to go into each of your contacts and groups, and export all of your chats one by one.

Before deciding whether to transfer all of your WhatsApp messages to Telegram, it is important to know how Telegram will be storing those messages.

Telegram “cloud chats” vs. WhatsApp store-and-forward

When you send a message over WhatsApp and Signal, it is encrypted on your phone and sent to one of the platforms’ servers.

The message is then forwarded — in its encrypted state — to the person or group you are sending it to. Once delivered, the message is deleted from the server.

In other words, the unencrypted message only exists on your phone and on the phones of the people you sent it to.

Telegram has built its platform on an entirely different philosophy. By default, Telegram stores and keeps messages on its servers, along with the keys to decrypt them.

While Telegram does offer a “secret chats” feature that works similarly to WhatsApp and Signal’s end-to-end encryption, but it is not possible to import your WhatsApp messages into a Telegram secret chat.

Telegram’s cloud chats have the benefit that you can log in to your Telegram account from anywhere and access all your messages without having to restore them from a backup.

However, it has a major drawback in that you have to trust that Telegram will not read the contents of your messages, sell them, or monetise them in some other way in future.

Telegram’s privacy record

Telegram’s track record in this regard has been good so far.

It fought an attempt by the Russian government to force Telegram to hand over encryption keys which the Federal Security Service in Russia wanted to use to decrypt users’ messages.

The battle between Telegram and the Russian government ultimately led to the messaging service being banned in Russia.

This in turn led to a high-tech game of cat and mouse that saw Russian authorities blocking Internet Protocol addresses belonging to Amazon Web Services and Google in an attempt to prevent access to Telegram within Russia. Many local businesses were temporarily knocked offline as a result of the fight.

In an FAQ on its website, Telegram states: “To this day, we have disclosed 0 bytes of user data to third parties, including governments.”

WhatsApp cloud backups

To make an informed decision about the privacy and security risks of migrating your messages to Telegram, it’s also important to take WhatsApp’s cloud backup feature into consideration.

WhatsApp offers the ability to back up your messages through integrations with Google and Apple cloud storage services. iPhone users may back up their WhatsApp messages to iCloud, while Android users may use Google Drive.

It is possible to disable cloud backups and opt to manually back up your WhatsApp data.

Whether stored in the cloud or not, these backups are not protected by WhatsApp’s end-to-end encryption.

Backing up your WhatsApp messages to the Apple or Google cloud is, in principle, similar to exporting and uploading them to Telegram.

Apple, Google, and Telegram may use their own encryption to protect your messages, but they also hold the keys to decrypt them.

If you wish to use WhatsApp’s cloud backup feature, you must then decide whether you trust Apple or Google to keep your data safe and private.

Similarly, if you wish to migrate your messages to Telegram from WhatsApp you must decide whether you trust it to keep your conversations safe and private.

No quid-pro-quo

Another factor to take into account is that while WhatsApp has provided the option to export your messages, Telegram does not offer a similar feature in its mobile app.

The Telegram desktop client does have the ability to export all of your chats either as human-readable HTML or in JSON format.

However, it does not offer the same level of granularity or ease of use that WhatsApp currently does.

Comparison of WhatsApp, Telegram, and Signal

The following table compares the key features of WhatsApp, Telegram, and Signal.

Not covered here is the issue of the collection and monetisation of personally identifying information by instant messaging applications.

Your messages over free platforms like WhatsApp and Telegram may be encrypted and treated with respect, but that does not stop these platforms from gathering other data such as your usage patterns, contacts, and phone number.

For more on this, please read our earlier report: WhatsApp compared to alternatives Telegram and Signal.

WhatsApp’s updated privacy policy and terms of service were recently the subject of significant social media backlash, causing Facebook to delay the cut-off date to accept its new terms for using WhatsApp.

Telegram has also previously disclosed that it plans to roll out advertising in the large public broadcasting groups hosted on the platform. It will introduce its own ad platform rather than supporting and sharing user data with third-party ad platforms.

Feature WhatsApp Telegram Signal
End-to-end encryption Yes (Signal Protocol) Only in secret chats (MTProto) Yes (Signal Protocol)
Group chats Max. 256 people Max. 200,000 people Max. 1,000 people
Voice calls Yes Yes Yes
Video calls Yes Yes Yes
Group voice calls Max. 8 people Thousands of people Max. 5 people
Group video calls Max. 8 people Not yet available Max. 5 people
User ID Phone number only Phone number or username Phone number only
Cloud storage / backups Backups to Google or Apple servers available Encrypted messages stored on Telegram servers. Telegram has keys to decrypt them. None / Manual backups only
Open source encryption software No — Possibly re licensed from GPLv3 lib signal-protocol No Yes
Open source client software No Yes Yes

Information sourced from My Broadband.

WhatsApp has updated its terms and conditions section to include further Facebook integration – including a requirement that app users share data with the company.

As WhatsApp is the central social point of communication within South Africa, it is essential that app users take a minute to understand these new privacy rules they are agreeing to.

In an in-app message sent to users this week, WhatsApp said that the changes will include:

  • Updates to WhatsApp’s service and how it processes your data;
  • How businesses can use Facebook hosted services to store and manage their WhatsApp chats;
  • How WhatsApp will partner with Facebook to offer integrations across Facebook Company products.

WhatsApp said that these changes will officially come into effect from 8 February. After this date, any user which has not agreed to the new terms will no longer be able to use the messaging service.

New Privacy T & Cs can be found here

ArsTechnica reports that some of the data that WhatsApp collects includes:

  • User phone numbers;
  • Other people’s phone numbers stored in address books;
  • Profile names;
  • Profile pictures;
  • Status message including when a user was last online;
  • Diagnostic data collected from app logs.

Under the new terms, Facebook reserves the right to share collected data with its family of companies.

Facebook acquired WhatsApp for $19 billion in 2014. The company was founded by Jan Koum and Brian Acton who had previously spent 20 years combined at Yahoo.

More than two billion people in over 180 countries use the app, which is currently available as a free download.

Information provided by Business Tech Insider.

Get ready for new and exciting movies and TV Shows coming to Netflix and Showmax this week.

Miami Vice

Netflix

IMDb – 6.0

miami-vice


Left Behind

Showmax

IMDb – 6.5

left-behind-2014


 

The Lost World: Jurassic Park

Netflix and Showmax

IMDb – 6.6

the-lost-world-jurassic-park


Spirit: Stallion of the Cimarron

Showmax

IMDb – 7.2

spirit-stallion-of-the-cimarron

 


Pieces of a Woman

Netflix

IMDb – 5.4

pieces-of-a-woman


The Post

Showmax

IMDb – 7.2

the-post

 


Split

Netflix and Showmax

IMDb – 7.3

split


Vikings – Season 6

Showmax

IMDb – 8.5

vikings

 


History of Swear Words – Season 1

Netflix

IMDb – 6.6

history-of-swear-words


Brooklyn Nine-Nine – Season 7

Showmax

IMDb – 8.4

brooklyn-nine-nine


Information courtesy of My Broadband.

Infraplex in association with Sophos brings you the Ransomware Hall of Infamy, a collective case study of the most controversial and fascinating Ransomware cases in history. Infraplex as a telecommunications provider has embarked on a mission to educate and grow with the modern users of the day, not to only provide quality products and services, but to teach our audience about online safety.

Ransomware is a type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. This is a collection of the most infamous cases in ransomware history.

Case 1: The AIDS Information Trojan.

The AIDS Trojan, also known as the PC Cyborg virus, was the first ever ransomware virus documented. … The AIDS trojan was created by a biologist Joseph Popp who handed out 20,000 infected disks to attendees of the World Health Organization’s AIDS conference.
“Popp’s malware was delivered in a fairly unorthodox manner, with the internet still being in its infancy. Popp mailed every victim an infected floppy disc, labeled as “AIDS Information Introductory Diskette,” using hijacked mail subscriber lists to the World Health Organization AIDS conference and PC Business World magazine in December 1989.
The software contained a questionnaire about the AIDS virus, disguising itself as a survey. The disc was stamped with a logo for the “PC Cyborg Corporation.”
In reality, the floppy disk would deliver its payload of encryption malware onto the computer, making it one of the earliest pieces of Trojan malware.” -Lessing
(for more on the case study for this case visit https://www.sdxcentral.com/security/definitions/case-study-aids-trojan-ransomware)

Case 2: Cryptolocker

Cryptolocker is a type of ransomware virus that infects your computer and secretly encrypts office documents, images, and other important files. Once the files are infected, you will receive a message, or “ransom note,” explaining you cannot access your files unless you pay a “fine.”

The files become encrypted and not even an antivirus software can help. Once the files are locked, it’s impossible to recover them.

” The most common method of infection is via emails with unknown attachments. Although the attachments often appear to be familiar file types such as *.doc or *.pdf, they in fact contain a double extension — a hidden executable (*.exe).

Once opened, the attachment creates a window and activates a downloader, which infects your computer. Because the program is a Trojan, it cannot self-replicate, meaning it must be downloaded to infect your computer. In addition to malicious email attachments, this malware may also come from websites that prompt you download a plug-in or video player. Typically, you will see nothing wrong with your computer until all files have been encrypted. Then, a warning will pop up indicating that you have been infected and showing a countdown timer until all your data is destroyed.

Many antivirus programs can remove this Trojan, but are unable to decrypt your data. In some cases, users have re-installed the Trojan after removal in order to pay the ransom and unlock their data. ” – Kapersky

Technopedia discusses how malware itself is not difficult to remove, the affected files remain encrypted. At the time of the initial outbreak, users without reliable backups had the choice of paying the ransom — and hoping that those behind the infection were honest enough to actually decrypt the affected files — or simply accepting their data as lost. However, there are now online tools that claim to have the ability to decrypt files that have been encrypted by CryptoLocker.

Case 3: Reveton

The Troj/Reveton-Ransomware family consists of computer infections that lock you out of computer unless you pay a ransom.  It does this by displaying a lock screen when you login to Windows that pretends to be from a law enforcement agency in your country.  For example, if you are in the United States of America the message may be from the FBI and if you are in the United Kingdom the message would pretend to be from the Metropolitan Police Service. In order to access your computer you must submit a MoneyPak voucher, or other payment coupon, to the malware developers and they will then unlock your computer so you can access your Windows desktop again.

 

The lock screens that will be displayed state that your computer was detected as having broken various laws regarding pornographic material, download copyrighted programs, or the distribution of copyrighted programs.  They will then state that you need to pay a fine or the government will prosecute you and that you may have to pay a fine or will be jailed. In order to pay a fine you will typically need to purchase a MoneyPak voucher and submit the voucher identification number into the lock screen.  It is important to remember that these messages are fake and you have not actually been locked out of your computer by the government.

 

When infected with a variant of the Troj/Reveton-Ransomware family, your computer wil perform the following behavior:

  • When you login to Windows you will be shown a screenlocker that pretends to be from a government agency. This screenlocker will state that you must pay a fine in order to gain access to your computer.
  • The screen locker will pretend to be from a government agency from the country that corresponds to the geographic region of your computer IP Address. Therefore, if your IP Address is located in the United States you may be shown a message from the FBI, while if you are in Argentina it would be from Police Federal Argentine.

Information provided by Bleeping Computer.

Case 4: Ryuk

 

The operators of Ryuk ransomware are at it again. After a long period of quiet, we identified a new spam campaign linked to the Ryuk actors—part of a new wave of attacks. And in late September, Sophos’ Managed Threat Response team assisted an organization in mitigating a Ryuk attack—providing insight into how the Ryuk actors’ tools, techniques and practices have evolved. The attack is part of a recent wave of Ryuk incidents tied to recent phishing campaigns.

First spotted in August of 2018, the Ryuk gang gained notoriety in 2019, demanding multi-million-dollar ransoms from companies, hospitals, and local governments. In the process, the operators of the ransomware pulled in over $61 million just in the US, according to figures from the Federal Bureau of Investigation. And that’s just what was reported—other estimates place Ryuk’s take in 2019 in the hundreds of millions of dollars.

Starting around the beginning of the worldwide COVID-19 pandemic, we saw a lull in Ryuk activity. There was speculation that the Ryuk actors had moved on to a rebranded version of the ransomware, called Conti. The campaign and attack we investigated was interesting both because it marked the return of Ryuk with some minor modifications, but also showed an evolution of the tools used to compromise targeted networks and deploy the ransomware.

The attack was also notable because of how quickly the attacks can move from initial compromise to ransomware deployment. Within three and a half hours of a target opening a phishing email attachment, attackers were already conducting network reconnaissance. Within a day, they had gained access to a domain controller, and were in the early stages of an attempt to deploy ransomware.

The attackers were persistent as well. As attempts to launch the attack failed, the Ryuk actors attempted multiple times over the next week to install new malware and ransomware, including renewed phishing attempts to re-establish a foothold. Before the attack had concluded, over 90 servers and other systems were involved in the attack, though ransomware was blocked from full execution.

Information sourced from Sophos.

Case 5: SamSam

As the year 2016 began, a ransomware threat appeared that attacked its victims unlike any previous ransomware attack. SamSam, named after the filename of the earliest sample we uncovered, uses a brutally minimalist, manual approach to target and compromise victims.
The attacker or attackers use a variety of built-in Windows tools to escalate their own privileges, then scan the network for valuable targets. They want credentials whose privileges will let them copy their ransomware payload to every machine – servers, endpoints, or whatever else they can get their hands on.
Once in, the attacker(s) spread a payload laterally across the network; a sleeper cell that lays in wait for instructions to begin encrypting. Ever a predator, the attacker waits until late at night, when the target organization is least well equipped to deal with it, before the final blow is struck. A sneak attack while the target literally sleeps, SamSam encrypts a prioritized list of files and directories first, and then everything else.
Unlike virtually every other ransomware attack, the entire attack process is manual. No badly worded spam email with an attachment is the culprit. The attacker breaks in the old fashioned way: using tools that attempt as many logins as quickly as the Remote Desktop Protocol will permit, and exploits operating system vulnerabilities, though not as many as you’d think. SamSam usually succeeds when the victim chooses a weak, easily guessed password.
In this report, we’ll cover the anatomy of a SamSam attack, and why it isn’t necessarily hard to defend against. We also took a deep dive into the ransomware payload, tracing its evolution from an early beta through its (so far) third major revision, with no sign of a slowdown in sight, and an ever-increasing ransom demand with each subsequent attack. Partnering with the cryptocurrency monitoring firm Neutrino, we traced the money trail and discovered far more victims – and funds – than had been previously reported.

Information provided by Sophos.

Case 6: Satan

Cybercriminals have long used themes like the devil, the occult and what you might rather loosely call “the dark arts” as inspiration for malware names: Dark Avenger, Necropolis, Mydoom, Natas (which is Satan backwards) and SatanBug are just a few examples

But there’s one aspect of the Satan ransomware that isn’t old-school, and that’s what we’re looking at in this article: its business model.

Satan is a ransomware, a malicious software that once opened in a Windows system, encrypts all the files, and demands a ransom for the decryption tools.

But Satan is also an online crimeware service:

As you can see from the welcome screen on Satan’s website, which you access using Tor via a .onion address on the dark web, this ransomware is backed by a cloud service you sign up for.

Satan has brazenly copied the business model of many legitimate online services such as iTunes and eBay: joining up is free, but you pay-as-you-go on a percentage basis when you put business through the site.

The Satan service claims to:

  • Generate a working ransomware sample and let you download it for free.
  • Allow you to set your own price and payment conditions.
  • Collect the ransom on your behalf.
  • Provide a decryption tool to victims who pay up.
  • Pay out 70% of the proceeds via Bitcoin.

The service (we’ll use that word without quotation marks, but you may infer them if you wish) even supports optional two-factor authentication based on a public-private key pair, just like SSH, and a CAPTCHA to make automatic mass signups more difficult:

Once you have a login, you can begin to generate ransomware samples, tailored to your own price point.

Information provided by Sophos.

Case 7: WannaCry

We’re aware of a widespread ransomware attack that is affecting several IT organizations in multiple countries. A new ransomware attack called Wanna (also known as WannaCry, WCry, WanaCrypt, WanaCrypt0r, and Wana DeCrypt0r) is encrypting files and changing the extensions to .wnry.wcry.wncry, and .wncrypt.  The malware then presents a window to the user with a ransom demand.

The ransomware spreads rapidly, like a worm, by exploiting a Windows vulnerability in the Windows Server Message Block (SMB) service, which Windows computers use to share files and printers across local networks. Microsoft addressed the issue in its MS17-010 bulletin.

The analysis seems to confirm that the attack was launched using suspected NSA code leaked by a group of hackers known as the Shadow Brokers. It uses a variant of the ShadowBrokers APT EternalBlue Exploit (CC-1353). It uses strong encryption on files such as documents, images, and videos.

There were three key factors that caused this attack to spread so quickly:

  1. The inclusion of code that caused the threat to spread across networks as a worm quickly without needing further user action after the initial infection had taken place.
  2. It exploited a vulnerability that many organizations had not patched against. Patching operating systems is the first line of a security strategy, yet many still struggle to achieve regular updates across their environments.
  3. Organizations are still running Windows XP. Microsoft had discontinued support for Windows XP and not issued a patch for this system, but subsequently issued a patch for Windows XP in light of this attack. Microsoft does support legacy versions of Windows, but at extra cost.

Information provided by Sophos.

Case 8: GP – Code

The GPcode ransomware was released in June 2006 infecting PCs through spear phishing scams.  The GPcode was spread via email attachments that looked to be a job application.

GPcode Ransomware Message

GPcode Ransomware Instructions Example

The first versions of GPcode was easily broken because it wrote the encrypted file to a new location, and deletes the unencrypted file, and this allows an undeletion utility to recover some of the files. This sometimes gives enough information to decrypt other files. Other variants or GPCode ransomware use symmetric encryption, which made key recovery very easy.

How It Works 

Using a 660-Bit RSA public key to encrypt or lock victims files, GPCode ransomware would prevent victims from accessing everything in the MyDocuments directory.  GPCode required victims to pay a fee or ransom and in return a code or key would be delivered to the victims; which they would used to unlock their files.

This version of ransomware is especially nasty because it can leave a backdoor open to other hackers. Furthermore, this gateway allows hackers to access important information such as secure documents, social security number, bank account numbers and credit card information.

In late November 2010, a new version of GPCode was discovered that uses stronger encryption (RSA-1024 and AES-256) and physically overwrites the encrypted file, making recovery nearly impossible.

Information provided by KnowB4.

This is how many people are not paying their TV licence in South Africa

“The Democratic Alliance (DA) has launched a petition to oppose the government’s plans to extend TV licence fees to streaming services like Netflix and Showmax.” – My Broadband

The Department of Communications and Digital Technologies is set to present its proposal to extend the payment of TV licence fees to include streaming services like Netflix as of 25 November 2020.

The Broadcasting Act currently requires South Africans to pay a TV licence fee for viewing “broadcasting services”. South Africans are also not allowed to buy a television without a TV licence, a requirement that is enforced by retailers.

Failure to be in possession of a valid television licence when owning a television and watching broadcasting services is a civil offence. Any person who fails pay their TV License is committing an offence and is liable, upon conviction in a criminal court, to a fine not exceeding R500 in relation to each offence and/or to imprisonment for a period not exceeding six months.

As it currently stands, the definition of “broadcasting services” applies to content viewed on a television. The department now wants to broaden the definition of a “broadcasting service” to include online broadcasting services.

If this proposal goes through, it means that people will require a TV licence to watch streaming services like Netflix, Apple +, Showmax, and Amazon Prime.

This is part of an attempt to increase TV licence revenue and compliance, which has come under pressure over the past few years.

The SABC’s annual report for the 2019/2020 financial year revealed that less than a quarter of TV licences were paid over last year. This is due to the mass migration from traditional television to streaming services.

This new implementation however does come with a few concerns. One major concern being that if you are subscribed to multiple streaming services for example Netflix, HBO and Prime Video, this new regulation is unclear on if you will be paying one fee as a end user or multiple TV License fees for every subscription registered to you.

The DA’s campaign follows the Organisation Undoing Tax Abuse’s (Outa’s) call to scrap TV licences altogether.

TV licence revenue declined by 18% year-on-year to R791 million, which the broadcaster said was due to the delayed use of debt collection agencies in this period.

Instead of trying to improve TV licence collections, Outa said the system should be scrapped completely.

“Incompetence, maladministration, and corruption at the SABC should not become a burden to successful private industries or South Africans,” it said.

“Any tax or levy that fails to achieve its purpose due to failed administration or unenforceable mechanisms should be closed down.”

It added that the proposed regulations have far-reaching implications for South Africans, including that owning a smartphone or tablet would require them to have a TV licence.

Outa added that content from on-demand services, like Netflix, would be regulated to ensure South African content is given airtime or face being blacklisted.

“This is a blatant rebuttal of freedom of choice, the democratisation of information and universal access,” said Outa executive manager Julius Kleynhans.

He added that whichever way you look at it, citizens once again have to pay for government’s incompetence and failure to run state-owned enterprises like the SABC.

“We fear that this will be another method of getting more money from citizens to fund the corrupt,” Kleynhans said.

Information provided by My Broadband

This is how many people are not paying their TV licence in South Africa

The Department of Communications and Digital Technologies is set to present its proposal to extend the payment of TV licence fees to include streaming services like Netflix as of 25 November 2020.

The Broadcasting Act currently requires South Africans to pay a TV licence fee for viewing “broadcasting services”. South Africans are also not allowed to buy a television without a TV licence, a requirement that is enforced by retailers.

Failure to be in possession of a valid television licence when owning a television and watching broadcasting services is a civil offence. Any person who fails pay their TV License is committing an offence and is liable, upon conviction in a criminal court, to a fine not exceeding R500 in relation to each offence and/or to imprisonment for a period not exceeding six months.

As it currently stands, the definition of “broadcasting services” applies to content viewed on a television. The department now wants to broaden the definition of a “broadcasting service” to include online broadcasting services.

If this proposal goes through, it means that people will require a TV licence to watch streaming services like Netflix, Apple +, Showmax, and Amazon Prime.

This is part of an attempt to increase TV licence revenue and compliance, which has come under pressure over the past few years.

The SABC’s annual report for the 2019/2020 financial year revealed that less than a quarter of TV licences were paid over last year. This is due to the mass migration from traditional television to streaming services.

This new implementation however does come with a few concerns. One major concern being that if you are subscribed to multiple streaming services for example Netflix, HBO and Prime Video, this new regulation is unclear on if you will be paying one fee as a end user or multiple TV License fees for every subscription registered to you.

Have your say about TV licence fees

The TV licence fee proposal is contained in the Draft White Paper on Audio and Audio-visual Content Services Policy Framework: A New Vision for South Africa 2020.

This draft white paper is open for public comment until the end of the month (16:00 on 30 November 2020).

Comments can be sent to the acting Director-General of the Department of Communications and Digital Technologies via email – aacs@dtps.gov.za.

The full Draft White Paper on Audio and Audio-visual Content Services Policy Framework is embedded below.

Information and Documentation sourced from My Broadband.

When choosing between DSTV Add Movies or Netflix it is important to consider every part of your package from price, amount of users and of course most importantly value for money.

DSTV has created an Add Movies package (details below) .

“MultiChoice recently launched a new Add Movies bundle, which can be purchased in addition to standard DStv subscription.

Add Movies is priced at R99 per month and includes access to M-Net Movies 1, M-Net Movies 2, and fliekNET.

The package is available to Compact Plus, Compact, Access, EasyView, Indian, and Family customers. Premium subscribers already get access to these channels.” – Jamie McKane for My broadband.

Netflix Content and Plans

Below are the number of shows available on Netflix at the time of writing.

Netflix Content
Series 1,783
Movies 3,545

The pricing for Netflix South Africa’s packages is shown in the table below.

Note that Netflix has been testing Mobile and Mobile+ streaming plans in the country, but these only support streaming on portable devices and at lower resolutions.

Netflix plans Netflix Basic Netflix Standard Netflix Premium
Resolution 480p 1080p 4K HDR
Watch on your TV Yes Yes Yes
Watch on your smartphone or tablet Yes Yes Yes
Watch on your laptop Yes Yes Yes
Simultaneous streams 1 2 4
Multiple registered devices Yes Yes Yes
Price per month R99 R139 R169

DSTV Add Movies

Shows: 14 – 16 October

The table shows all the titles airing on the M-Net Movies 1, M-Net Movies 2, and FliekNET channels from the morning of 14 October until midnight on 16 October.

This serves to provide an idea of the shows which are available on a three-day basis via DStv’s Add Movies bundles. Repeats have been omitted.

M-Net Movies 1
The Halloween Family Toy Story 4
Black Knight The Sun is Also a Star
Mom’s Night Out The Aftermath
Rocketman A Fantastic Fear of Everything
Boy Erased Wedding March 5: My Boyfriend’s Back
Will To Love Secret Millionaire
Turu: The Wacky Hen Chasing Liberty
The Kid Who Would Be King Spycies
The LEGO Movie 2 Five Feet Apart
Edge of Seventeen The Baby Proposal
Jexi A Time to Kill
You Don’t Know Jack Racetime
Alpha Nancy Drew and the Hidden Staircase
Mr Peabody & Sherman How To Train Your Dragon: The Hidden World
Addams Family Values The Nutcracker And The Four Realms
The Hustle American Pie: The Wedding
Ghost Team Men, Women & Children
M-Net Movies 2
3022 Light of My Life
Second Sight Searching
Replicas Line of Duty
Overlord Pet Sematary
Into The Dark Chronicle Mysteries: The Deep End
On the Parth To Paradise Crossword Mysteries: Abracadaver
Tangent Room Jumper
Segfault Aurora Teagarden 12
Hunter Killer Holmes & Watson
Collateral Rampage
Ma The Nanny
Feedback The Boy
Crossword Mysteries: A Puzzle to Die For Witness To Murder: A Darrow Mystery
Gone Daughter Gone Pretty Little Stalker
Syriana The Keeping Hours
Star Wars Episode IX: The Rise of Skywalker Terminator: Dark Fate
The Rhythm Section Stuber
Sea Fever
FliekNET
Semi-soet Ons Stories
Dit was Aand En Dit Was More Stroom Op: Theuns Eloff
Stroom Op: Franklin Son Erfgenaam
Die Silwerskermfees Kortflieks ‘n Man Soos My Pa
Wonderlus Daar Doer In Die Fliek
Die Spaanse Vlieg Bossies
Ikaya Hoofmeisie
Fiela Se Kind Gee Jou Hart Vir Hillbrow
Nicolene Dis Ek, Anna
Paljas 100 Meter Leeuloop
Verkeerde Nommer Stroom Op: Ton Vosloo
Rian – Nelson Mandela Special Skollie
Die Seemeeu

Depending on personal preference and current packages you already have, we hope this information can assist you in making a choice.

For more information on DSTV Add Movies vs Netflix click here

In today’s climate, the demand for news exposure coupled with sensation has led to an exceptionally high demand for sensational news pieces. This with the idea of subjective opinions thrown in to the mix has led us to a society where we cannot tell fake news from reality anymore.

It is important as citizens to know that the news articles we ready are factual, this is why it is important to know which news sources are credible or not. Below is a list of known fake news websites.

We feel it is important for us to share these sources with you to discourage the sharing of fake news stories that spread over social media, which can ultimately taint your ideals. We all have a right to stay informed as well as a responsibility to educate ourselves to ensure we only share news from credible news outlets.

Here is a list of both national and international websites that have been confirmed to be fake news.

SA Based Fake News Sites:

• African News Updates
• blackopinion.co.za
• mzansitimes.com
• Nationalnewsbulletin.com
• News24-TV
• Pretorialive

International Based Fake News Sites: (that are known to publish articles related to SA):

  • • ab-tc.com [USA] • Abcnewgo.com [USA] • AfricaNewsUpdate.com
    • AfricanNewsUpdates.com
    • AllNews.co.za [USA] • AllNews1.com [USA] • AllReport.co.za [USA] • AllTheNews.co.za [USA] • ANewJerusalem.com
    • BestNews.co.za [USA] • BreeknuusZA.com [USA] • CitySun [USA] • DailySun.fun
    • Dodgysaministers.com [Bulgaria] • GautengPraise.com
    • Gossipmillsa.com – Gossip Mill Mzansi [USA] • hdnews24h.blogspot.com [USA] • Hinnews.com [USA] • Hinviral.com [USA] • iMzansi [USA] • Live Monitor [USA] • LiveReport.co.za [USA] • Lovejessy.com [Ukraine] • Mzansi LIVE [USA] • Mzansistories.com [USA] • Mzansistories.co.za [USA] • Mzansistories.inf [USA] • NationalNewsBulletin.com
    • News360.co.za [EU] • Newsatlast.com
    • Newsatlastsa.online [USA] • Newsdaily.co.za [Canada] • NewSoweto.co.za [USA] • Newspage.co.za [UK] • Newsupdatessa.site [USA] and Facebook Page
    • NewToilet.xyz [USA] • Nusa.site [USA] • Operanewsapp.com [USA] • Sanews247.blogspot.co.za [USA] • Sa-news.com [USA] • Satirenews.co.za [USA] • Southafricabuzz.co.za [USA] • South Africa Latest News [UK] • SouthAfricaToday.net [USA] • SouthAfricaUncut.com [USA] • Southern Daily [USA] • Sultrysource.com [USA] • TheReports.co.za
    • TimesOfBotswana.com
    • Timesl1ve.co.za [USA] • Trendsdaily.co.za [USA] • Tumfweko.com [USA] • The-watchdog.wixsite.com [USA] • ucrtv.com [USA] • Wmcleaks.com [USA] • Worldwatch.site [USA] • Xpouzar.com [USA] • ZANews.xyz

For more information please click here

2020 has proved to be one of the most challenging years of our time. Our economy has taken a huge knock, creating a huge ripple effect into how our business and daily lives function.

Al businesses, both big and small have had to adapt and change their environment to ensure the health and safety of staff and customers. We understand that the shift to remote working and work from home solutions have brought technological challenges to businesses that are not equipped or informed on how to make the transition, maintain the transition and enforce new technological principles to implement remote working as a permanent solution. This will also help businesses and staff members save on costs to house staff in big buildings.

Getting your staff and business connected.

Of course, for employees to conduct work from home successfully there needs to be programs and systems in place to make the process as effortless as possible.
Microsoft 365 has multiple features and programs to connect all your internal business properties. Microsoft Teams has gone on to be one of the most secure, functional and versatile form of online communication to successfully collaborate amongst employees and business alike.

“The outstanding functionalities, easy access from all devices, interactive chat functions, and
opportunity to collaborate in real time gave this event a human touch. Microsoft Teams fostered strong inclusion and sense of collaboration between the two large global teams.”
—Reza Honarmand, VP Software & Cloud, Tech Data

Ensuring your business compliance.

POPIA was implemented to enforce the ownership of personal information and the permissions around using it.The POPI Act sets forth eight conditions for the lawful processing of personal information. These conditions address how organizations demonstrate accountability for ensuring they respect the privacy of individuals in South Africa.

Citizens will have more control over the processing and privacy of their information, which will result in fewer spam calls and reduced exposure of their personal details to companies. The provisions which are to be commenced from 1 July may result in “cold calling” no longer being allowed and will impose a significant burden on direct marketers to secure databases of personal information. Companies will also need to ensure their customer data is processed securely and in line with the regulations, or they will face hefty fines. Importantly, POPIA includes provisions for the disclosure and processing of personal information. In cases which fall outside of these categories, personal information may not be processed or disclosed – providing South Africans with protection against companies that would use their personal data unscrupulously.

Infraplex is partnered with SOPHOS to help individuals and business owners comply with POPIA protocols and regulations. The SOPHOS XG firewall comes with a multitude of settings to assist in data protection, intrusion prevention and information regulation.

Getting you and your staff connected.

Having all of these wonderful products and features cannot work of course without a reliable internet connection. Infraplex has a variety of options available for your staff and your business. Our business fibre options offer a 1:1 contention ratio ensuring that you will get the most out of your fibre connectivity. We also have fibre to the home packages to connect your staff.

Powering you during load shedding.

Load-shedding recently returned to South Africa, which means that many people may need to buy backup electricity solutions to keep important electronics running while the power is out. This requirement has been exacerbated by the increased prevalence of working from home due to the COVID-19 pandemic.

How much power will I need?

To figure out which power trolley you would require, you must calculate the power consumption of your PC.

Infraplex has a few options on offer from Nova Neptune. Before making your choice, our sales team will evaluate how much energy it will take to power your internet and devices for a load shedding period.

While an entry-level PC power supply will be rated between 200W to 250W, high-end PCs like gaming desktops can use upwards of 500W, depending on the exact components used.

To determine the amount of power your computer will draw, you must add the power consumption of all the components – including the motherboard, graphics card, memory, and storage devices together.

There are various online power supply calculators available, which allows you to calculate the estimated power consumption of your particular desktop build. Monitors will also need their own power supply, which is typically around 30W for a standard 17-inch LCD panel. Additionally, if you want your router to stay powered, this would on average require a further 20W. The total power needed for an entry-level computer can therefore be calculated as follows: 250W + 30W + 20W = 300W. If you want to keep this computer powered on throughout load-shedding, the total standby capacity required would then be 600Wh for two hours, while a four-hour load-shedding period would need 1,200Wh (1.2kWh).

Our Nova Neptune range caters for a multitude of power supply capacities. We are sure to have the best option for you visit our online store at shop.infraplex.net

All of these business solutions are readily available for you. Consult with our sales teams to find the best solutions for you.

Email sales@infraplex.net

or

call 010 590 8856