Feed on
Posts
Comments

Category Archive for 'Security'

Anatomy of a PHISH and the use of Social Engineering   PHISH is defined as a method of getting you to provide credentials or otherwise profit the originator of the email independent of who is harmed. Social Engineering is roughly defined as manipulating you to do some one else’s bidding but having you think it […]

Subject: Blocked Mails 12/12/2018

There is an article about this very item and how to better identify PHISHing scams. The article is located at……  

Subject: Pt switf 12/03/2018

From: Kyle Richard <kylerichy001@gmail.com<mailto:kylerichy001@gmail.com>> <–NOT a legitimate email address for this link of business. Expect a Business email address. Date: Wed, Nov 21, 2018 at 11:17 AM Subject: Pt switf To: Hello, I work as a clinical counselor for the department of Disability Resources and Educational Services (DRES). I provide individual and group therapy, coaching, […]

I have created a Knowledge article in ServiceNow to assist with this issue.   KB0010918 https://wesleyanedu.service-now.com/kb_view.do?sysparm_article=KB0010918

Students Beware of Email Scams We have seen a recent uptick in email scams targeting students. There have been emails sent to advertise Personal Assistant jobs or Internship possibilities. Typically these emails are not sent from a Wesleyan email address. Resumes and replies asked for in the emails are not sent to a Wesleyan email […]

From: Casey Gerrish <cgerrish@paulsmiths.xxx> Date: Tue, Oct 16, 2018 at 9:20 AM Subject: Notice :personal assistant job To:     Professor James  is new in wesleyan.  and he is looking to hire a student as his PA on a part time basis.. <–Why i he going by his title (Professor) followed by his last name?   […]

What is the IoT, why do I care and what do I need to know/do?    The Internet of Things (IoT) is simply a way of saying “devices that require little to no configuration to connect to the internet but provide information to your phone or computer. Or things you can program from afar”. Some […]

Social engineering and what it means

Social engineering and what it means  Social engineering. THE BEST DEFINITIONS I’VE FOUND FOR IT ARE—”Any act that influences a person to make decisions that may or may not be in their best interests”.  Followed by—”The practical application of social principals to particular social problems”.  In the case of criminals email and people encourage you […]

Compromised Passwords Being Used in Porn Scam There is a new and prevalent scam going around leveraging compromised passwords and threats to publish porn watching habits unless you pay hush money in Bitcoin.   How it often works is that users receive an email with one of their old passwords in the subject line in […]

This is SPAM.  It is not asking for credentials so, is not a Phish. But it is not sanctioned by our Wesleyan HR office.  As such, this is a third-party soliciting your business. From: <beaudelaire.cadet@foresters.com> Date: Tue, Oct 2, 2018 at 2:46 PM Subject: Faculty Benefits Review To: <xxxxxxxxx@wesleyan.edu>   Hello Professor Robinson,   I […]

Next »