Phishing & Other Scams
Phishing Infographic Social Engineering Infographic
Report Suspicious Emails with PhishAlarm
- PhishAlarm is a tool that allows you to easily report a potential phishing email. With a simple click of the "Report Phish" button, the suspicious email will be forwarded to the IT Security team for review, enabling them to respond quickly to threats.
Report Junk/Spam Emails Within Outlook and Gmail
- Have you received junk emails in your inbox? If so, you can easily report the junk email and block the sender through Microsoft's "Report Junk" feature within Outlook (desktop, mobile, or online) or Gmail's "Report Spam" feature.
Cyberattack Targets iPhone an Apple IDs – Learn How to Avoid this Type of Scam
- A recent cyberattack targets iPhone users through a text message (SMS) and email phishing campaign, tricking them into revealing their Apple ID credentials. The attack uses fake messages claiming to be from Apple and directs users to a fraudulent iCloud login page in an attempt to steal their username and password information.
Deepfakes: AI-Generated Synthetic Media – Can You Spot Them?
- A deepfake is a type of synthetic media generated through deep learning algorithms, often involving artificial intelligence (AI). These algorithms are used to manipulate or replace audio, video, or images to depict something that didn't occur or to make someone appear to say or do something they never did. Educating ourselves about deepfakes is an essential step in combating the spread of deceptive content and safeguarding against potential risks.
Beware of Phishing Attempts: Top 10 Things to Look For
- The University community should remain on high alert for any suspicious emails or activity that may compromise our organizational data or employee information.
Don't Get Phished: Protect Yourself and Stop Identity Theft
- Phishing is a form of fraud, in which an attacker tries to learn private information (such as login credentials) by masquerading as a reputable entity or person (usually via email).
Phishing at The U: Scam to Look Out For!
- At the U, we use a variety of measures to protect email, including advanced threat protection tools. However, scammers are constantly changing tactics. Being aware of phishing schemes and understanding email best practices can help ensure your email stays safe.
Beware of Supplier Chain Scams
- Don’t fall victim to the growing danger of supplier scams! These scams include purchase order scams where criminals pretend to be representatives of vendors and redirect shipments. Supplier imposter fraud also involves altering payment details or creating fake services.
Stop Scam Phone Calls and Vishing
- Vishing (a combination of the words "voice" and "phishing") is the fraudulent practice of attempting to steal information or gain unauthorized access to your personal information via a telephone call.
Avoid Technical Support Scams
- Take precaution when answering a phone call from an unknown or 1-800 number, or if you see a "help" window pop up in your web browser unexpectedly. These could be technical support scams where a representative is offering to help fix a computer problem or sell you a software license.
Access IT's Internal News Area