Cybercriminals use phishing—a type of social engineering—to manipulate people into doing what they want. Social engineering is at the heart of all phishing attacks, especially those conducted via e-mail. Technology makes phishing easy. Setting up and operating a phishing attack is fast, inexpensive, and low risk: any cybercriminal with an e-mail address can launch one. […]
Security
Don’t let “FREE” cost you July 3, 2018 by Emma Fletcher Division of Consumer and Business Education, FTC When a company says you can try its product for free, you might think, why not? Here’s why not: You could end up paying a lot of money for that free trial. Scammers often use free trial […]
Are You Ready for Ransomware?
What Is Ransomware? Ransomware is a type of malicious software that encrypts your files. Often, the only way to decrypt and gain access to the files is by paying a “ransom” or fee to the attackers. The attackers might provide the decryption key allowing you to regain access to your files. Ransomware may spread to […]
iTunes email scam
The Office of Information Systems would like to notify university personnel of the following iTunes email scam. The email usually appears to be sent by the University President, Executive VP, or a Department Head. The report also states the group sending out this email scam are making improvements to and tailoring the email as they […]
Secure Remote Access—Easy as A, B, C
It is well publicized that today’s attackers are ever vigilant in their attempts to uncover weak points in networks, computers, and mobile devices to establish a foothold and leverage vulnerabilities, thus resulting in the compromise of critical assets or personal information. Areas of concern that can lead to a breach include the lack of physical […]