Updates
Password Spraying
Password spraying involves an attacker placing a list of potential usernames in a program and trying a common or default password against the list of usernames.
Digital Footprint
Your digital footprint is any tidbits of information you leave about yourself online. Those comments, pictures, and posts on social media form a picture about you.
Online Donations
It is easier than ever to support the charity of your choice with online donations. It is also easier than ever for scammers to masquerade as a charity and take advantage of those who want to help in a disaster. Spotting fake charity campaigns can be difficult.
Typosquatting
Typosquatting targets internet users who incorrectly type a URL into their web browser.
Social Engineering
Social engineering is a low-tech approach used by scammers to gain access to an organization’s information and resources.
Termed Accounts
Deprovisioning is the process of deleting employee access to information resources when they leave. Supervisors and sponsors, please be sure to follow up when a user leaves UTSW. These unattended accounts could continue to be used by the ex employee or function as an easy starting point for an attacker.
Image-Based Phishing
Images may be used by cyber attackers to perform a phishing attack just like a malicious link or an infected attachment. Clicking an image or graphic included in an email may execute malware, initiate a malicious download, or send you to a website intended to steal your credentials or financial information.
Phishing – Back to Basics
Phishing attacks happen fast! According to Verizon 2024 Data Breach Investigations Report, “The median time to click on a malicious link after the email is opened is 21 seconds, and then it takes only another 28 seconds to enter the data. That leads to a frightening finding: The median time for users to fall for phishing emails is less than 60 seconds.”
Dumpster Diving
Dumpster diving is searching someone’s trash for information that can be used to launch a social engineering and/or computer system attack.
Free Digital Offerings
Are you tempted to install “free” software from the internet? Have you considered the hidden cost you pay for free apps, social media, toolbars, search engines and other digital offerings that look too good to pass up?