<?xml version="1.0"?>
<News hasArchived="false" page="17" pageCount="21" pageSize="10" timestamp="Tue, 28 Apr 2026 14:53:46 -0400" url="https://dev.my.umbc.edu/groups/doit/posts.xml?page=17&amp;tag=notice">
  <NewsItem contentIssues="false" id="94420" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94420">
    <Title>Part Time Job Phishing Alert: CORNERSTONE JOB OFFER</Title>
    <Tagline>Fake Job Scams Target UMBC Students</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>During the past week, DOIT has received notifications of several phishing emails. Below is a sample of a Phishing message that over 600 UMBC students have received. For privacy purposes the To field was removed.</span></p><br><p><span>From: Summer Woodforest &lt;</span><a href="mailto:summerwoodforest@gmail.com" rel="nofollow external" class="bo"><span>summerwoodforest@gmail.com</span></a><span>&gt; </span></p><p><span>Date: Tue, Jul 21, 2020 at 8:30 AM</span></p><p><span>Subject: CORNERSTONE JOB OFFER.</span></p><br><p><span>Dear student,</span></p><br><p><span>   We got your contact through your school database and I'm happy to inform you that our reputable company Cornerstone® is currently running a student empowerment program. This program is completely school oriented as it has been designed not to deter you from all school activities which is priority for you and this organisation. This program is to help loyal and hardworking students like you secure a part time job with an attractive weekly salary.</span></p><p><span>TO PROCEED WITH THIS JOB OFFER, KINDLY REPLY TO THIS MAIL WITH YOUR ALTERNATE E-MAIL ADDRESS IN ORDER TO RECEIVE THE FULL JOB DESCRIPTION.</span></p><br><p><span>Best Regards,</span></p><br><p><span>Summer Wood,</span></p><p><span>HR Recruit Manager/Consultant</span></p><p><span>Cornerstone®,</span></p><p><span>Staffing-Solutions</span></p><br><p><span>Similar phishing emails were received from the following addresses listed below: </span></p><ul><li><p><span>Gavan Ryan &lt;</span><a href="mailto:ryangavan724@gmail.com" rel="nofollow external" class="bo"><span>ryangavan724@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>Clerk Trevor &lt;</span><a href="mailto:clerktrevor@gmail.com" rel="nofollow external" class="bo"><span>clerktrevor@gmail.com</span></a><span>&gt; </span></p></li></ul><br><p><span>If you have received any message similar to the one listed above, please forward the message to </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  Please attach the email headers, information on how to find the email headers can be found here: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>DO NOT RESPOND to this email, if you have done so already please contact us immediately at </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><br><p><span>For more information on scams and phishing handling, please visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495</span></a></p><br><p><span>To read more articles published by DOIT visit: </span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a></p></div>
      ]]>
    </Body>
    <Summary>During the past week, DOIT has received notifications of several phishing emails. Below is a sample of a Phishing message that over 600 UMBC students have received. For privacy purposes the To...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94420/guest@my.umbc.edu/afe2db17898b22d485373aa9643dd137/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 22 Jul 2020 14:52:41 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94419" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94419">
    <Title>Fake Covid-19 Fund Scam</Title>
    <Tagline>No.  The FTC Is NOT Offering You Any Money</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Fake Covid-19 Fund Scam</span></p><br><br><p><span>The FTC posted an article warning of a phishing scam that they recently discovered. In this scam, the malicious actor is sending email claiming to be from the FTC and saying that users could get money from a Covid-19 “Global Empowerment Fund.” All that is required of the user is to respond with their bank account information.</span><span><br></span><span><br></span><span>This email is a scam.</span><span>  It is </span><span>not </span><span>from the FTC, there is </span><span>no </span><span>money and there is </span><span>no </span><span>fund. The FTC says that they will never contact you by phone, email, text message, or by social media to ask for financial information, this includes your social security number. They also state that any stimulus checks will be from the IRS , not the FTC.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.consumer.ftc.gov/blog/2020/06/fake-emails-about-fake-money-fake-covid-19-fund" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/blog/2020/06/fake-emails-about-fake-money-fake-covid-19-fund</span></a></p></div>
      ]]>
    </Body>
    <Summary>Fake Covid-19 Fund Scam    The FTC posted an article warning of a phishing scam that they recently discovered. In this scam, the malicious actor is sending email claiming to be from the FTC and...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94419/guest@my.umbc.edu/18d39ec7d1971003e8881366aa63b703/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 22 Jul 2020 14:49:56 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94418" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94418">
  <Title>Phishing Email Subject Lines</Title>
  <Tagline>A Guide To Common Phishing Email Subjects</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>With COVID-19 and associated restrictions remaining prevalent, many malicious actors have used the opportunity to update their phishing email campaigns. The article linked below explains some of the ways malicious actors try and trick people into giving up their information or even into installing malware.</span></p><br><p><span>The article states that many of the emails will use subject lines like coronavirus, work reopening, rescheduled meetings, stimulus payments, and new vacation policies. Malicious actors also craft themed emails to look like popular social media sites like Facebook and LinkedIn.</span></p><br><p><span>For LinkedIn they noticed subject lines "You appeared in new searches this week," "People are looking at your LinkedIn profile," "Please add me to your LinkedIn Network," and "LinkedIn Password Reset."</span></p><br><p><span> Facebook sees phishing emails using subject lines like "Your Friend Tagged a Photo of You" and "Your friend tagged you in photos on Facebook." Phishing campaigns from Twitter were said to try and entice people with subject lines similar to "Someone has sent you a Direct Message on Twitter."</span></p><br><p><span>Other subjects included "A login alert for Chrome on Motorola Moto X," "New voice message at 1:23AM," and "55th Anniversary and Free Pizza". The article also describes some general subjects to look out for:</span></p><br><ul><li><p><span>Password Check Required Immediately</span></p></li><li><p><span>Vacation Policy Update</span></p></li><li><p><span>Branch/Corporate Reopening Schedule</span></p></li><li><p><span>COVID-19 Awareness</span></p></li><li><p><span>Coronavirus Stimulus Checks</span></p></li><li><p><span>List of Rescheduled Meetings Due to COVID-19</span></p></li><li><p><span>Confidential Information on COVID-19</span></p></li><li><p><span>COVID-19 - Now airborne, Increased community transmission</span></p></li><li><p><span>Fedex Tracking</span></p></li><li><p><span>Your meeting attendees are waiting</span><span><br><br></span></p></li></ul><p><span>According to the article, the most common subject lines within phishing emails found “in-the-wild” in the last quarter were:</span></p><br><ul><li><p><span>Microsoft: Abnormal log in activity on Microsoft account</span></p></li><li><p><span>Chase: Stimulus Funds</span></p></li><li><p><span>HR: Company Policy Notification: COVID-19 - Test &amp; Trace Guidelines</span></p></li><li><p><span>Zoom: Restriction Notice Alert</span></p></li><li><p><span>Jira: [JIRA] A task was assigned to you</span></p></li><li><p><span>HR: Vacation Policy Update</span></p></li><li><p><span>Ring: Karen has shared a Ring Video with you</span></p></li><li><p><span>Workplace: [company_name] invited you to use Workplace</span></p></li><li><p><span>IT: ATTENTION: Security Violation</span></p></li><li><p><span>Earn money working from home</span><span><br><br></span></p></li></ul><p><span>At UMBC some of the most common subject lines for phishing emails seen recently have been “UMBC JOB OPPORTUNITY”, “CORNERSTONE STUDENT JOB OFFER”, “CORNERSTONE JOB OFFER”, “UMBC COVID-19 INFORMATION”, “UMBC COVID-19 PART TIME JOB OFFER” and “WORK FROM HOME.”</span><span><br></span><span><br></span><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.techrepublic.com/article/watch-out-for-these-subject-lines-in-email-phishing-attacks/" rel="nofollow external" class="bo"><span>https://www.techrepublic.com/article/watch-out-for-these-subject-lines-in-email-phishing-attacks/</span></a><span> <br></span></p></div>
]]>
  </Body>
  <Summary>With COVID-19 and associated restrictions remaining prevalent, many malicious actors have used the opportunity to update their phishing email campaigns. The article linked below explains some of...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94418/guest@my.umbc.edu/f495c17d1f174c06aa6488841c31760d/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 22 Jul 2020 14:45:53 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="94417" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94417">
    <Title>Limited Part-Time Offers</Title>
    <Tagline>Yet AnotherJob Scam</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>The email below is an example of a recent job scam phishing email that has been going around campus. This email, like many other job scam emails, tries to trick users into giving up their personal information like the users address, phone number, and personal email address.</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>Jennifer Johnston</span><span> &lt;</span><span><a href="mailto:jenniferjohnston32@gmail.com">jenniferjohnston32@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Fri, Jul 17, 2020, 4:07 PM</span></p><p><span>Subject: Limited Part-Time Offers.</span></p><p><span>To: &lt;</span><span> @umbc.edu</span><span>&gt;</span></p><br><br><p><span>Dear Student,</span></p><p><span>     I'm happy to inform you that our reputable company The Amynta Group® is currently running a part time programme suitable for students. The programme is to help interested students secure a part time job which does not deter you from doing any other. </span></p><p> </p><p><span>KINDLY EMAIL BACK IF INTERESTED IN THIS JOB POSITION.</span></p><p> </p><p><span>Best Regards,</span></p><p><span>Jennifer.</span></p><p><span>Recruiting Manager </span></p><p><span>The Amynta Group®</span></p></td></tr></tbody></table></div><br><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p></div>
      ]]>
    </Body>
    <Summary>The email below is an example of a recent job scam phishing email that has been going around campus. This email, like many other job scam emails, tries to trick users into giving up their personal...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94417/guest@my.umbc.edu/853b31f1996cec91d7eb022ccd476d48/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 22 Jul 2020 14:38:16 -0400</PostedAt>
    <EditAt>Wed, 22 Jul 2020 14:46:22 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94345" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94345">
    <Title>Tips to Help Protect Against Smishing Scams</Title>
    <Tagline>Scammer Don't Just Use Email</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Smishing scams are a type of phishing scam which occurs when a malicious actor sends text messages or direct messages. They follow a similar pattern of acting as if they were from a trusted source like banks, government agencies, or even friends and family, trying to trick users into clicking a malicious link or possibly giving personal and financial information.</span></p><br><p><span>In recent years smishing attacks have started to become more numerous and sophisticated. Just like with phishing attacks, smishing also spikes during a crisis like COVID-19. These attacks are designed to exploit the public’s fears and anxieties, making their victims an easier target. </span><span><br></span><span><br></span><span>According to the article below, many more adults and children will open a text message or direct message on average compared to an email. Malicious actors can also automate the sending of text and direct messages to thousands or even millions of phone numbers and, unlike emails, there is no viable way for a user to block or flag suspicious messages.</span><span><br></span><span><br></span><span>These scams are similar to other phishing scams. They will still instruct the user to perform actions that could be harmful. Some of these actions might include: </span></p><ul><li><p><span>Replying to the text or direct message with personal or financial information.</span></p></li><li><p><span>Clicking a link that downloads malicious files or directs them to a website designed to gain the users personal or financial information.</span></p></li><li><p><span>Asking the user to call a ‘customer service’ number.</span></p></li><li><p><span>Asking the user to wire money to the malicious actors.</span><span><br><br></span></p></li></ul><p><span>Tips on how to spot and avoid smishing attacks:</span></p><ul><li><p><span>Do not click on a link or call a number from an unknown number.</span></p></li><li><p><span>Do not submit personal information to an unknown number.</span></p></li><li><p><span>If possible try to verify the authenticity of the message by finding the sender’s website and official contact details online. For example if a message is claiming to be from your bank, check the bank's website to find the real contact information.</span></p></li><li><p><span>If it looks too good to be true, it probably is too good to be true.</span></p></li><li><p><span>Delete all suspicious texts.</span></p></li><li><p><span>If the sender has a ‘5000’ number, the message was sent via email and could be malicious.</span></p></li><li><p><span>If the sender is anything other than a cell phone number, the message may have been sent via email and could be malicious.</span></p></li><li><p><span>Block unknown numbers if possible.</span></p></li></ul><br><br><p><span>For more information, please check out: </span></p><p><a href="https://portswigger.net/daily-swig/what-is-smishing-how-to-protect-against-text-message-phishing-scams" rel="nofollow external" class="bo"><span>https://portswigger.net/daily-swig/what-is-smishing-how-to-protect-against-text-message-phishing-scams</span></a></p></div>
      ]]>
    </Body>
    <Summary>Smishing scams are a type of phishing scam which occurs when a malicious actor sends text messages or direct messages. They follow a similar pattern of acting as if they were from a trusted source...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94345/guest@my.umbc.edu/5551cec3c68635f6294850df8d21610f/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 17 Jul 2020 12:40:22 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94288" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94288">
  <Title>SIM Swap Scams</Title>
  <Tagline>Make Sure Your Phone Stays Yours</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>With so many online services associating phone numbers with a person’s identity, it is more important than ever to ensure that malicious actors cannot take control of your number. However, a growing scam called SIM swapping seeks to do just that. Using personal information found or bought online, scammers can call a cell phone service provider while posing as a customer and ask to have the victim’s number transferred to the scammer’s phone. Without the proper precautions, this can all be done without any contact with the real customer.</span></p><p><span>SIM swap scams can cause more harm than just a fraudulent phone bill. Combined with other personal information, access to a victim’s phone number can allow scammers to access a variety of online accounts, all while posing as the legitimate owner of those accounts. This could even allow access to the victim’s email and online banking accounts. It also allows scammers to bypass any SMS or phone call-based two-factor authentication.</span></p><p><span>Phone service providers have added a few security measures to help stop SIM swap scams, but they rely on you to keep them secure. First, you can set up a PIN that must be provided before a SIM swap can be completed. Your PIN should be kept private, and should not be based on other personal information, like your birthday. Additionally, you should never send a security code from your provider to the sender of an unexpected text or phone call. Scammers may pose as your service provider before or while attempting a SIM swap scam in an effort to trick you into giving up verification codes sent by your provider. If you receive a code, it is best to contact your provider directly using their official contact information, not a number sent in a text.</span></p><p><span>For more information, please see:</span></p><p><a href="https://scambusters.org/simswap.html" rel="nofollow external" class="bo"><span>https://scambusters.org/simswap.html</span></a></p><p><a href="https://www.wired.com/story/sim-swap-attack-defend-phone/" rel="nofollow external" class="bo"><span>https://www.wired.com/story/sim-swap-attack-defend-phone/</span></a></p><br><br></div>
]]>
  </Body>
  <Summary>With so many online services associating phone numbers with a person’s identity, it is more important than ever to ensure that malicious actors cannot take control of your number. However, a...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94288/guest@my.umbc.edu/5fb4593af090a3a49d51d3ed14d90b71/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 14 Jul 2020 20:31:22 -0400</PostedAt>
  <EditAt>Tue, 14 Jul 2020 20:32:34 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="94262" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94262">
  <Title>Securing Mobile Devices</Title>
  <Tagline>Stay Secure Online</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>Mobile devices are now an integral part of our daily lives. They make communication and access to information incredibly convenient from virtually anywhere. This convenience can make it easy to forget that mobile devices are vulnerable to many of the same threats as computers. Here are some common risks to watch out for when using your device.</span></p><br><p><span>Unsecured internet connections –</span><span> Free public Wi-Fi is often unencrypted, meaning other people on the network may be able to access any data you send or receive. Depending on your settings, your device may connect to these networks automatically in order to decrease mobile data use. Consider turning off this feature for more control over your data. However, wired connections in public places may not be secure either, and can be tampered with and monitored or used to send malware to your device. In either case, it is important to know where your connection is coming from and limit transmission of private and sensitive data accordingly.</span></p><p><span>Malicious apps –</span><span> Downloaded apps often request a number of permissions that they claim are necessary in order for the app to function. If granted, a malicious app can easily take control of your device. To avoid this risk, only download verified apps from reputable sources, like Apple’s App Store or Google Play. For an example of a malicious app and the damage it can do, check out this article about how one app spreads ransomware:</span><a href="https://itsecurity.umbc.edu/critical/?id=93247" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=93247</span></a><span>.</span></p><p><span>Loss or theft – </span><span>Mobile devices contain a plethora of personal data, all of which can be valuable to unscrupulous individuals. Therefore, it is just as important to use a strong password for your phone as it is for your computer. A short PIN may not be enough to stop determined thieves from stealing your data. Consider adding 2-factor authentication by enabling both the password and fingerprint recognition settings, if possible. Finally, remember that remote wiping is an option for cases where your device is permanently lost. This will allow you to delete all data remotely, preventing it from being stolen. For more information on remote wipe, see</span><a href="https://insights.samsung.com/2020/05/28/3-things-you-should-know-about-remote-wipe-2/" rel="nofollow external" class="bo"><span>https://insights.samsung.com/2020/05/28/3-things-you-should-know-about-remote-wipe-2/</span></a><span>.</span></p><p><span> </span></p><p><span>For additional information, check out: </span></p><p><a href="https://cybersecurity.osu.edu/cybersecurity-you/protect-personal-devices/mobile-devices" rel="nofollow external" class="bo"><span>https://cybersecurity.osu.edu/cybersecurity-you/protect-personal-devices/mobile-devices</span></a></p><p><a href="https://www.pandasecurity.com/mediacenter/panda-security/mobile-security-tips/" rel="nofollow external" class="bo"><span>https://www.pandasecurity.com/mediacenter/panda-security/mobile-security-tips/</span></a></p><br><br></div>
]]>
  </Body>
  <Summary>Mobile devices are now an integral part of our daily lives. They make communication and access to information incredibly convenient from virtually anywhere. This convenience can make it easy to...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94262/guest@my.umbc.edu/4f67c84fbf393f15b7aa61fd4beeb760/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 13 Jul 2020 16:36:00 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="94261" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94261">
    <Title>Phishing scam exploits Black Lives Matter</Title>
    <Tagline>Don't Click On Unrecognized Attachments</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Forbes posted an article of a phishing attack discovered by Abuse.ch. This attack is using a Black Lives Matter-themed email phishing campaign with the goal of having readers unknowingly install malware. The attack is said to be sending out emails with the subject “Vote anonymous about ‘Black Lives Matter’ ”. </span></p><br><p><span>The email is said to contain the statement: “Leave a review confidentially about Black Lives Matter… Claim in the attached file”. If the reader clicks on the attached file it will install known at "Trickbot"  onto the reader's device. </span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh4.googleusercontent.com/m-UllYkQz7P2htvg2dZr7ztMvU76dk-gQ2h1SBfqE__NjkPtAK9LiK_yu_pVxyrLpiDqsiCzLT49GdXABXrxU1PWMAPHaoWu9iXwI5BL_06zly9WPebbte3ak4xXT-EFI9-c4H3x" width="610" height="767.8048780487804" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. As well please do not click on or download any attachments from suspicious emails, this action could put your device at risk. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.forbes.com/sites/thomasbrewster/2020/06/11/watch-out-theres-a-big-black-lives-matter-scam-about/#7449987a62d8" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/thomasbrewster/2020/06/11/watch-out-theres-a-big-black-lives-matter-scam-about/#7449987a62d8</span></a></p><p><span> </span></p><p><span>The image as well as original tweet from abuse.ch can be found at: </span></p><p><a href="https://twitter.com/abuse_ch/status/1270739166716989443?s=20" rel="nofollow external" class="bo"><span>https://twitter.com/abuse_ch/status/1270739166716989443?s=20</span></a><span> <br></span></p></div>
      ]]>
    </Body>
    <Summary>Forbes posted an article of a phishing attack discovered by Abuse.ch. This attack is using a Black Lives Matter-themed email phishing campaign with the goal of having readers unknowingly install...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94261/guest@my.umbc.edu/c72b836832a3ef8c27f25691da0e28cd/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 13 Jul 2020 16:30:14 -0400</PostedAt>
    <EditAt>Mon, 13 Jul 2020 16:33:46 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94260" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94260">
    <Title>Work-From-Home Scams Targeting College Students</Title>
    <Tagline>"To Good To Be True"</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>According to the article linked below, a recent work-from-home scam has been targeting college students. These malicious actors are targeting students via emails that appear to be sent from a college or company advertising fake work-from-home job opportunities.</span></p><br><p><span>The malicious actor will use these emails to obtain the students personal information. Once the malicious actor has the students information, they will send a counterfeit check instructing the students to deposit the check into their personal checking account. The malicious actor will then ask the student to withdraw the money and make a payment necessary for the job.</span></p><br><p><span>The article states that students who do fall victim to this scam can experience bank accounts being closed due to fraudulent activity and a report filed by the bank with a credit bureau or even law enforcement. The student would also be responsible for reimbursing the bank.</span></p><br><p><span>Tips to help spot and avoid these type of scams:</span></p><br><ul><li><p><span>Research the company first, look for a legitimate website and contact information. Try to find what others are saying about the company as well.</span></p></li><li><p><span>If they are contacting you and claiming to be from the University, locate the sender’s information through the school website and confirm whether the offer is real or not.</span></p></li><li><p><span>Look for bad grammar and spelling.</span></p></li><li><p><span>Offers of employment or pay without an interview are red flags. Legitimate jobs usually want to see who they are hiring.</span></p></li><li><p><span>Never send funds in the form of cash, check, gift cards or wire transfer to secure a job.</span></p></li><li><p><span>If you do receive a check from a scam similar to the one above, please do not cash the check.</span></p></li><li><p><span>If you have provided any banking or financial information to the suspected scammers, please notify your bank or financial institution immediately.</span></p></li></ul><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>  </span></p><br><p><span>For more information, please check out:</span></p><p><a href="https://www.winknews.com/2020/06/17/work-from-home-scam-targets-florida-college-students/" rel="nofollow external" class="bo"><span>https://www.winknews.com/2020/06/17/work-from-home-scam-targets-florida-college-students/</span></a></p></div>
      ]]>
    </Body>
    <Summary>According to the article linked below, a recent work-from-home scam has been targeting college students. These malicious actors are targeting students via emails that appear to be sent from a...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94260/guest@my.umbc.edu/c9348fcd16b6cc05899fd6cfc75cc4e1/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 13 Jul 2020 16:08:20 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="94259" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94259">
    <Title>Tips for online purchasing during COVID-19</Title>
    <Tagline>Scamming Websites Are Selling Fake Products</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>With COVID-19 causing many to shop online instead of in person, many scamming websites have appeared selling fake products. The Better Business Bureau created a list of tips for shopping online safely.</span></p><br><br><ul><li><p><span>Make sure you know who you are dealing with. Check the spelling and the domain names, then google the website to see if the site has had any complaints against it.</span></p></li><li><p><span>Scam websites usually have poor grammar and spelling, very little information, and capital letters in the middle of sentences.</span></p></li><li><p><span>Make sure the website is using https:// at the beginning.  A trusted website will have a secure domain so that your information is safe. Make sure to check the address bar for a “not secure” message as that is another red flag.</span></p></li><li><p><span>If at all possible try to find the age of the website to see if it was recently established. Many malicious actors establish new websites in response to current events.</span></p></li><li><p><span>Check the website's ‘about me’ and ‘contact us’ links, as many malicious actors will not take the time to fabricate a history for the brand such as you would see on a legitimate website.</span></p></li><li><p><span>Check for the website's privacy policy to understand what personal information is being requested. If there isn’t a privacy policy that is a big red flag.</span></p></li><li><p><span>If you receive a phishing email from a malicious actor, the Better Business Bureau says that they are usually without personalization. They say legitimate companies will usually refer to the customer by name, while malicious actors might not.</span></p></li><li><p><span>Research the business first to make sure it is legitimate before giving them any of your personal and/or financial information.</span></p></li><li><p><span>If the deal feels too good to be true then it probably is too good to be true.</span></p></li><li><p><span>The Better Business Bureau recommends using</span><span><span> a credit card </span>when purchasing any product or service through a website.  If your transaction is protected by the Fair Credit Billing Act, and you receive a defective product or it doesn’t arrive at all, you can dispute the charge and temporarily hold the payment while the credit company investigates them.</span></p></li></ul><br><br><p><span>For more information, please check out: </span></p><p><a href="https://www.bbb.org/article/news-releases/22474-bbb-warning-be-careful-purchasing-from-unknown-websites-during-covid-19" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/news-releases/22474-bbb-warning-be-careful-purchasing-from-unknown-websites-during-covid-19</span></a></p><p><a href="https://www.bbb.org/article/tips/14040-bbb-tip-smart-shopping-online" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/tips/14040-bbb-tip-smart-shopping-online</span></a></p></div>
      ]]>
    </Body>
    <Summary>With COVID-19 causing many to shop online instead of in person, many scamming websites have appeared selling fake products. The Better Business Bureau created a list of tips for shopping online...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94259/guest@my.umbc.edu/9264b7351c998d920f8335392ad57cd0/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology (DoIT)</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 13 Jul 2020 16:03:11 -0400</PostedAt>
  </NewsItem>
</News>
