Did you spot August’s #SecureUD #Phishing test?
If you’re reading this, you may have spotted August’s phishing test email! As always, you should forward this, or any other suspicious or questionable email, to reportaphish@udel.edu. Even if you click on a phishing link, always report the message. When it’s a UD...Did you spot July’s #SecureUD #Phishing test?
If you’re reading this, you may have spotted July’s phishing test email! As always, you should forward this, or any other suspicious or questionable email, to reportaphish@udel.edu. Even if you click on a phishing link, always report the message. When...June 2014: Understanding Social Engineering
It is far easier for hackers to gain access to systems by simply asking for it. Through the process of social engineering, hackers bypass security systems by deceiving their victims into taking certain actions or surrendering certain information.
What Is Social Engineering?
It’s often said that social engineers use our human nature against us. They manipulate our trust in order to get us to do what they want, whether that’s surrendering our personal information or taking actions that put us at risk.
Security Spotlight: Phishing
A successful phishing attempt can result in the compromise of your personal information, your important accounts, and even your devices. Links and attachments can deliver malware to your device. That malware can harvest your information, make your device vulnerable to further attacks, and even give the phisher control of your device.