DON'T BE FOOLED BY A SCAM E-MAILCyberattackers use e-mail as one of their main methods of attack. One of the most prevalent types of e-mail scams are phishing attempts—when an attacker, masquerading as a trusted entity, dupes a victim into opening an e-mail, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack, or the revealing of sensitive information.
Have you received a suspicious message? Help keep UTSA safe! Unsure about a message? Click here to view common red flags. Already clicked on a suspicious link? Change your passphrase now. |
What is Phishing?
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate entity to lure users into providing personally identifiable information, credit card information, passwords, and other private data. The information is then used to access important accounts and can result in identity theft and financial loss. Phishing emails will attempt to appear trustworthy by imitating a company you know or trust such as a bank, a social networking site, or an online store. These emails will normally include a call to action by imploring you to click on a link or an attachment. They may:
Are you familiar with the most common phishing red flags? |