Skip to Main

Updates

Dual-Purpose Phish

 

Cyber experts have identified a dual-purpose phishing attack that attempts to harvest user credentials and deliver malware.

Types of Phishing

 

Phishing is a type of attack that targets individuals through email, text messages, phone calls, and other forms of communication. Be alert to these common types of phishing.

Business Email Compromise (BEC) Attacks

 

A business email compromise (BEC) attack is a type of phishing attack in which a cybercriminal impersonates a trusted contact and uses social engineering techniques to trick an email recipient into transferring funds into a fraudulent account.

Juice Jacking

 

“Juice Jacking” is a type of cyberattack on an electronic device while being charged at a public charging kiosk.

Doxing

 

“Doxing” (also spelled "doxxing") is a form of cyberbullying that uses identifiable information gathered from the internet with the intent to shame, scare, or blackmail the target.

What is Wiper Malware

 

Wiper malware is an attack used to disrupt an organization by permanently overwriting and destroying data.

SEO Poisoning Attacks

 

In “SEO Poisoning” cyber criminals use this tactic to make their malicious websites more prominent in searches.

October is Cybersecurity Awareness Month

 

Now in its 20th year, Cybersecurity Awareness Month continues to raise awareness about the importance of cybersecurity.

Always Use Multi-Factor Authentication (MFA)

 

Multi-factor authentication (MFA) is a login process that requires you to verify your identity in more than one way.

Telecommuting Security Requirements

 

Following these requirements will significantly reduce risk to UT Southwestern and ensure policy compliance.

OSZAR »