Skip to Main
Results 71-80 of 172 for ""

Types of Phishing - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/types-of-phishing.html

Be alert to these common types of phishing.

Recognize cyber scams: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/recognize-cyber-scams.html

Attacks from cybercriminals often start with a phishing email or text.

Avoid phony customer service contacts: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/phony-customer-service.html

Scammers publish fake customer service phone numbers on the internet for well-known businesses.

Look out for IRS phishing scams this tax season: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/irs-phishing-scams.html

The Internal Revenue Service (IRS) has warned of ongoing scams. Malicious links in emails or text messages are designed to trick recipients into sharing Social Security numbers, driver’s license numbers, or other personal information that could be used in identity theft or to file fraudulent tax

Social Engineering: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/social-engineering.html

Social engineering is a low-tech approach used by scammers to gain access to an organization’s information and resources.

Phishing – Back to Basics: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/phishing-basics.html

Phishing attacks happen fast! According to Verizon 2024 Data Breach Investigations Report, “The median time to click on a malicious link after the email is opened is 21 seconds, and then it takes only another 28 seconds to enter the data. That leads to a frightening finding: The median time for

Image-Based Phishing: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/image-based-phishing.html

Images may be used by cyber attackers to perform a phishing attack just like a malicious link or an infected attachment. Clicking an image or graphic included in an email may execute malware, initiate a malicious download, or send you to a website intended to steal your credentials or financial

Dumpster Diving: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/dumpster-diving.html

Dumpster diving is searching someone’s trash for information that can be used to launch a social engineering and/or computer system attack.

Free Digital Offerings: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/free-digital-offerings.html

Are you tempted to install “free” software from the internet? Have you considered the hidden cost you pay for free apps, social media, toolbars, search engines and other digital offerings that look too good to pass up?

Password Spraying: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/password-spraying.html

Password spraying involves an attacker placing a list of potential usernames in a program and trying a common or default password against the list of usernames.