Alerts and Tips

How to Recognize a Fake URL

Online phishing and identity theft has become a major problem and is a major crime. Everyday, people fall prey to email scams and fake Web sites (that is, sites claiming to be a particular Web site but, when clicked on, actually link to a hacker's Web site).

The URL is the Web address for any Web site, and there are some clues in it that may indicate it will lead you to a fake or a phishing site.

GameOver Zeus P2P Malware

Systems Affected

  1. Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
  2. Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012


GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware identified in September 2011, [1] uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control. 


The 10 Most Dangerous Things You Can Do Online

Opening attachments from unknown senders is the riskiest thing you can do. Research shows that email attachments remain the number one means by which worms and viruses propagate.

Installing unauthorized applications such as file-sharing tools (Limewire, Azureus and other Bit Torrent clients) - Illegal downloads are against university policy and they, like email attachments, are simply another means by which "bad" files get on your computer.

Data Protection: If you deal with personal information at work

Stock count the personal data that you have and always lock them in a safe place 

Remind yourself the purpose of obtaining the personal data and assess whether they are being used in only such way

Destroy unnecessary personal data in a secure manner

Encrypt electronic data

Never store personal data in your laptop or portable storage devices

Do not send unencrypted personal data through email

Security Management and Protection of Information in the workplace

When at work use your office PC for business only, avoid using it to do personal activities such as online shopping, banking and checking social media sites. 

Be aware and alert of piggybacking. When in doubt question strangers lurking around the office area and request for their identification then verify it.

Never discuss sensitive work subjects / topics in public areas or spaces for example in an elevator, or even a taxi.