Skip to Main

Updates

It’s time for an IT spring cleaning

 

Ensure the safety of your data and devices by using the following IT spring cleaning tips for your UTSW and personal accounts.

Don’t fall victim to credential stuffing

 

“Credential stuffing” refers to a cybercriminal using stolen username and password combinations obtained from data breaches to access other online services and websites.

Maybe you’ll break the internet – just don’t let it break your security

 

We might be gradually making our way back to an in-person world, but online browsing and social media are still defining the way we communicate.

Vishing for sensitive data

 

Vishing, or voice phishing, is a form of fraud where cybercriminals trick you into providing sensitive information through a phone call.

How to “hover” over hyperlinks on a mobile phone

 

Attacks from cybercriminals often start with a phishing email that contains a malicious link. An embedded hyperlink is when you see text that may appear legitimate, rather than the actual URL.

Don’t be scared of scareware

 

“Scareware” usually starts with a legitimate looking pop-up warning that your computer is infected with a virus. The scammer tries to trick users into purchasing and downloading fake antivirus software that actually may be malware.

Don’t be scammed by your next robocall

 

Robocalls are automated pre-recorded calls to your phone. Some robocalls are legitimate. Others are from scammers using automated software to make fraudulent calls.

Security tips for mobile apps

 

Some mobile apps are designed to resemble legitimate apps but instead carry out malicious activities like stealing data. Use these simple tips before you download from your device’s app store.

Avoid a ‘smishing’ attack

 

Smishing is a form of phishing in which an attacker uses a text message to trick a recipient into clicking a link and sending private information or downloading malicious programs to a smartphone.

Good practices for scanning QR codes

 

QR codes are the square, scannable codes that you see for touchless menus at restaurants, real estate listings, TV ads, social media posts, and more. Unfortunately, cybercriminals can also create QR codes linking to malicious websites.