Updates
Business Email Compromise (BEC) Attacks
A business email compromise (BEC) attack is a type of phishing attack in which a cybercriminal impersonates a trusted contact and uses social engineering techniques to trick an email recipient into transferring funds into a fraudulent account.
Juice Jacking
“Juice Jacking” is a type of cyberattack on an electronic device while being charged at a public charging kiosk.
Doxing
“Doxing” (also spelled "doxxing") is a form of cyberbullying that uses identifiable information gathered from the internet with the intent to shame, scare, or blackmail the target.
What is Wiper Malware
Wiper malware is an attack used to disrupt an organization by permanently overwriting and destroying data.
SEO Poisoning Attacks
In “SEO Poisoning” cyber criminals use this tactic to make their malicious websites more prominent in searches.
October is Cybersecurity Awareness Month
Now in its 20th year, Cybersecurity Awareness Month continues to raise awareness about the importance of cybersecurity.
Always Use Multi-Factor Authentication (MFA)
Multi-factor authentication (MFA) is a login process that requires you to verify your identity in more than one way.
Telecommuting Security Requirements
Following these requirements will significantly reduce risk to UT Southwestern and ensure policy compliance.
Phishing Attack Consequences
Fraudulent links (URLs) and attachments found in emails can lead you to dangerous sites, putting your data, computer, and the UTSW network at risk.
Use caution to protect personal data, UTSW network
Fraudulent links (URLs) and attachments found in emails can lead you to dangerous sites, putting your data, computer, and the UTSW network at risk.