Feed on
Posts
Comments

Category Archive for 'Security'

Anatomy of a PHISH and the use of Social Engineering   PHISH is defined as a method of getting you to provide credentials or otherwise profit the originator of the email independent of who is harmed. Social Engineering is roughly defined as manipulating you to do some one else’s bidding but having you think it […]

There is an article about this very item and how to better identify
PHISHing scams. The article is located at……
 

From: Kyle Richard <kylerichy001@gmail.com<mailto:kylerichy001@gmail.com>> <–NOT a legitimate email address for this link of business. Expect a Business email address.
Date: Wed, Nov 21, 2018 at 11:17 AM
Subject: Pt switf
To:
Hello…

I have created a Knowledge article in ServiceNow to assist with this issue.
 
KB0010918
https://wesleyanedu.service-now.com/kb_view.do?sysparm_article=KB0010918

Students Beware of Email Scams We have seen a recent uptick in email scams targeting students. There have been emails sent to advertise Personal Assistant jobs or Internship possibilities. Typically these emails are not sent from a Wesleyan email address. Resumes and replies asked for in the emails are not sent to a Wesleyan email […]

From: Casey Gerrish <cgerrish@paulsmiths.xxx>
Date: Tue, Oct 16, 2018 at 9:20 AM
Subject: Notice :personal assistant job
To:

Professor James  is new in wesleyan.  and he is looking to hire a student as his PA on a part time basis.. <&#821…

What is the IoT, why do I care and what do I need to know/do?    The Internet of Things (IoT) is simply a way of saying “devices that require little to no configuration to connect to the internet but provide information to your phone or computer. Or things you can program from afar”. Some […]

Social engineering and what it means  Social engineering. THE BEST DEFINITIONS I’VE FOUND FOR IT ARE—”Any act that influences a person to make decisions that may or may not be in their best interests”.  Followed by—”The practical application of social principals to particular social problems”.  In the case of criminals email and people encourage you […]

Compromised Passwords Being Used in Porn Scam There is a new and prevalent scam going around leveraging compromised passwords and threats to publish porn watching habits unless you pay hush money in Bitcoin.   How it often works is that users receive an email with one of their old passwords in the subject line in […]

Compromised Passwords Being Used in Porn Scam There is a new and prevalent scam going around leveraging compromised passwords and threats to publish porn watching habits unless you pay hush money in Bitcoin.   How it often works is that users receive an email with one of their old passwords in the subject line in […]

« Prev - Next »