<?xml version="1.0"?>
<News hasArchived="false" page="18" pageCount="21" pageSize="10" timestamp="Tue, 28 Apr 2026 17:24:36 -0400" url="https://dev.my.umbc.edu/groups/doit/posts.xml?page=18&amp;tag=notice">
  <NewsItem contentIssues="false" id="94257" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/94257">
  <Title>Avoiding COVID-19 Contact Tracing Scams</Title>
  <Tagline>How To Spot The Scammers</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>Contact tracing is an integral part of the fight against COVID-19.  It speeds response, identifies potential hot spots, and focuses testing efforts.  Unfortunately, it also creates an opportunity for scammers to deploy two of their most powerful tools, impersonating authority and a sense of urgency.</span></p><br><p><span>A North Carolina news station conducted an information test by calling a producer's friends and using a script based on CDC recommendations.  </span></p><br><p><span>After the initial greeting and confirmation of the subject's name and birth date, the script abandoned the CDC guidelines and started asking for the subject's Social Security number, home address and other personal information.  These questions are presented as necessary to 'confirm' the subject's identity.  In fact, they are the basic elements of identity theft.  Several of the attempts were successful in getting a complete picture of the subject's personal information.</span></p><br><p><span>In another part of the same segment, the station interviewed an IT Security professional who demonstrated how a simple, professionally-worded message (from a fictitious contact tracing company) could get recipients to click on a link that could install malware on their computer.  The malware could be leveraged to give  an attacker complete access to all information on the system.</span></p><br><p><span>Contact tracing gives scammers a chance to represent themselves as providing a legitimate and authoritative service in combating a pandemic, and to take advantage of the stress their victim may feel on being informed that they have been identified as at-risk for infection.</span></p><br><p><span>If you get a text message or email telling you that you will be called by a contact tracer, then just wait for the call.  If you get a message telling you to click a link, DO NOT CLICK THE LINK!</span></p><br><p><span>If you live in Maryland, please visit <a href="https://coronavirus.maryland.gov/pages/contact-tracing">https://coronavirus.maryland.gov/pages/contact-tracing</a> .  If you are called by a legitimate contact tracer, your caller ID will tag the call as <strong>MD COVID</strong>.  If you do not have caller ID, the calling number should be (240) 466-4488.  You can also call back on (240) 466-4488 if you receive voice mail.  A legitimate contact tracer will not ask you for your Social Security number, bank account number or credit card information, nor will they ask for money.</span></p><br><p><u><span>References:</span></u></p><br><p><em><span>Rossen Reports: Feds warn of new contact tracing scam</span></em></p><p><span><a href="https://www.wxii12.com/article/rossen-reports-scammers-posing-as-contract-tracers/33251285">https://www.wxii12.com/article/rossen-reports-scammers-posing-as-contract-tracers/33251285</a></span></p><br><p><em><span>Notification of Exposure: A Contact Tracer's Guide for COVID-19</span></em></p><p><span><a href="https://www.cdc.gov/coronavirus/2019-ncov/php/notification-of-exposure.html">https://www.cdc.gov/coronavirus/2019-ncov/php/notification-of-exposure.html</a></span></p><br><p><em><span>Welcome to covidLINK - Maryland,giv</span></em></p><p><span><a href="https://coronavirus.maryland.gov/pages/contact-tracing">https://coronavirus.maryland.gov/pages/contact-tracing</a></span></p><br><p><em><span>Maryland COVID Contact Tracing</span></em></p><p><span><a href="https://www.norc.org/Research/Projects/Pages/maryland-covid-contact-tracing-.aspx">https://www.norc.org/Research/Projects/Pages/maryland-covid-contact-tracing-.aspx</a></span></p></div>
]]>
  </Body>
  <Summary>Contact tracing is an integral part of the fight against COVID-19.  It speeds response, identifies potential hot spots, and focuses testing efforts.  Unfortunately, it also creates an opportunity...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/94257/guest@my.umbc.edu/302be7370b0aff46b51df57fd98e7e17/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 13 Jul 2020 15:42:21 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93891" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93891">
    <Title>How to Spot a Scam</Title>
    <Tagline>Follow the Three Golden Rules</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Scammers are always inventing new ways to exploit people. However, some of the basic tactics don’t change much. The Cybercrime Support Network (CSN), in partnership with Google, has set up the ScamSpotter web site (<a href="https://scamspotter.org/">https://scamspotter.org/</a>) . Scam Spotter lists Three Golden Rules for spotting a scam.</span></p><br><ol><li><p><span><strong>Slow Down</strong>: If any organization is rushing you to act fast, this is a red flag. Take your time to get more information. Do not rush.</span></p></li><li><p><span><strong>Spot check</strong>: Utilize the internet, search for that organization online. If you get unexpected calls, unhang up, then search to verify the phone number.</span></p></li><li><p><span><strong>Stop, Don’t Send</strong>: Scammers are always demanding payment on the spot, A trustworthy organization would not ask you to send your credit card over texts, phone calls or emails. Scammers love gift cards. Do not send any gift cards to anyone, who you have not verified or know.</span></p></li></ol><br><p><span>If you receive email and are not sure whether it’s a scam, please send  the complete headers to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.   The UMBC guide to displaying complete email headers can be found at: <br></span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span> </span></p><br><br><p><span>Source: </span><a href="https://scamspotter.org/scams" rel="nofollow external" class="bo"><span>https://scamspotter.org/scams</span></a></p></div>
      ]]>
    </Body>
    <Summary>Scammers are always inventing new ways to exploit people. However, some of the basic tactics don’t change much. The Cybercrime Support Network (CSN), in partnership with Google, has set up the...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93891/guest@my.umbc.edu/cbdccb6751f92b391d8803891110e11e/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 19 Jun 2020 14:07:25 -0400</PostedAt>
    <EditAt>Fri, 19 Jun 2020 14:12:38 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="93883" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93883">
    <Title>How to Spot a Scam</Title>
    <Tagline>Follow the Three Golden Rules</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Scammers are always inventing new ways to exploit people. However, some of the basic tactics don’t change much. The Cybercrime Support Network (CSN), in partnership with Google, has set up the ScamSpotter web site (<a href="https://scamspotter.org/">https://scamspotter.org/</a>) . Scam Spotter lists Three Golden Rules for spotting a scam.</span></p><br><ol><li><p><span>Slow Down: If any organization is rushing you to act fast, this is a red flag. Take your time to get more information. Do not rush.</span></p></li><li><p><span>Spot check: Utilize the internet, search for that organization online. If you get unexpected calls, unhang up, then search to verify the phone number.</span></p></li><li><p><span>Stop, Don’t Send. Scammers are always demanding payment on the spot, A trustworthy organization would not ask you to send your credit card over texts, phone calls or emails. Scammers love gift cards. Do not send any gift cards to anyone, who you have not verified or know.</span></p></li></ol><br><p><span>If you receive email and are not sure whether it’s a scam, please send  the complete headers to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.   The UMBC guide to displaying complete email headers can be found at: <br></span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span> </span></p><br><br><p><span>Source: </span><a href="https://scamspotter.org/scams" rel="nofollow external" class="bo"><span>https://scamspotter.org/scams</span></a></p></div>
      ]]>
    </Body>
    <Summary>Scammers are always inventing new ways to exploit people. However, some of the basic tactics don’t change much. The Cybercrime Support Network (CSN), in partnership with Google, has set up the...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93883/guest@my.umbc.edu/e37265d9704e2160094c095237743956/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Tag>students</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology (DoIT)</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 19 Jun 2020 12:25:25 -0400</PostedAt>
    <EditAt>Thu, 13 Aug 2020 04:06:44 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="93877" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93877">
  <Title>IRS Warning of COVID-19 Scams</Title>
  <Tagline>Financial Scammers Taking Advantage Of COVID-19 Uncertainty</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>With COVID-19 present in our day to day lives, malicious actors are taking this opportunity to scam people out of their personal and financial information. Recently the IRS Criminal Investigation Division (IRS-CI) has noticed various campaigns targeting Economic Impact Payments as well as other COVID-19 related scams.</span></p><br><p><span>The IRS-CI warns that some of these scams will offer more money from the government or even faster check delivery if the reader shares personal information and pays a small “processing fee.”  The IRS warns that there are no shortcuts for stimulus checks. Malicious actors have also been trying to convince people to “apply” for a second stimulus check. According to a Forbes article, as of right now, there is currently no second stimulus check in the works. </span></p><p><span><br></span><span>Malicious actors are also setting up fake charities soliciting donations for individuals, groups and areas affected by COVID-19. Some malicious actors are even offering the chance to invest in companies working on a vaccine, promising that the “company” will dramatically increase in value as a result. Some are even selling fake products like at-home test kits, fake cures, vaccines, pills and giving advice on unproven treatments. </span><span><br><br></span></p><p><span>They also warn of phishing campaigns being sent out either through text or emails. These campaigns are using keywords like “Corona Virus,” “COVID-19,” and “Stimulus.” For these campaigns the IRS-CI says the malicious actors' targets are people's personal and financial information.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.irs.gov/newsroom/irs-warns-against-covid-19-fraud-other-financial-schemes" rel="nofollow external" class="bo"><span>https://www.irs.gov/newsroom/irs-warns-against-covid-19-fraud-other-financial-schemes</span></a></p><p><a href="https://www.forbes.com/sites/kellyphillipserb/2020/06/08/irs-warns-on-covid-19-scams-involving-stimulus-checks-fake-cures--more/#67cdbd937a98" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/kellyphillipserb/2020/06/08/irs-warns-on-covid-19-scams-involving-stimulus-checks-fake-cures--more/#67cdbd937a98</span></a></p></div>
]]>
  </Body>
  <Summary>With COVID-19 present in our day to day lives, malicious actors are taking this opportunity to scam people out of their personal and financial information. Recently the IRS Criminal Investigation...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93877/guest@my.umbc.edu/1ab03c667e38e69440aee5210dae2cc9/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 19 Jun 2020 10:22:15 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93808" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93808">
  <Title>Fake Virus Alert Scam</Title>
  <Tagline>Scareware doesn&#8217;t just exploit panic, it creates panic</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>You are working from home, web browser open to whatever resources you need to write a paper, prepare a class, review a budget, or whatever else you need to get your job done.  Suddenly a window you didn’t ask for appears on your screen.  It may look sort of like a normal security product or perhaps it is flashing red and yellow.  There may even be - no kidding - sirens.   The message seared into your eyes tells you that your computer is </span><span>infected</span><span>with viruses, possibly hundreds of them.  The message says your data may be stolen, or erased, or both.  The message tells you that it is </span><span>urgent </span><span>that you click a link to buy and download an antivirus product and/or call a phone number where you will be able to buy a support contract (they just need your bank’s routing number and your account number and they will take care of the details).  If you try to close this window, it wither won’t close or gets replaced by more such windows.  In any case, the message is telling you that the most important thing for you to do immediately is to </span><span>panic</span><span>.  The pop-up window is doing it’s very best to get you to act without asking any questions.</span></p><br><p><span>This type of malware has become quite common and falls into a class called ‘scareware’.  The goal is to get you to act without thinking about what you’re doing.  If the window won’t go away, turn your computer off and then back on.  Some scareware is attached to your browser and will only reappear when you start whichever browser you were using before.  Other scareware is installed as a program and may reappear when your computer restarts.  It can be extremely annoying, but the real threat is the link and/or phone number that you are asked to use to fix the problem. DO NOT CLICK THE LINK AND/OR DO NOT CALL THE NUMBER.  </span></p><br><p><span>General Rule:  </span><span>Anything, windows, email, articles, etc. that you see on your computer that seems to be trying to induce panic, is probably trying to do just that.  Stay calm and think, don’t click!</span></p><br><br><br><p><span>Here are some references where you can find out more:</span></p><br><ul><li><p><a href="https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html" rel="nofollow external" class="bo"><span>https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html</span></a></p></li><li><p><u><a href="You%20are%20working%20from%20home,%20your%20web%20browser%20open%20to%20whatever%20resources%20you%20need%20to%20write%20a%20paper,%20prepare%20a%20class,%20review%20a%20budget,%20or%20whatever%20else%20you%20need%20to%20get%20your%20job%20done.%20%20Suddenly%20a%20window%20you%20didn%E2%80%99t%20ask%20for%20appears%20on%20your%20screen.%20%20It%20may%20look%20sort%20of%20like%20a%20normal%20security%20product%20or%20perhaps%20it%20is%20flashing%20red%20and%20yellow.%20%20There%20may%20even%20be%20-%20no%20kidding%20-%20sirens.%20%20%20The%20message%20seared%20into%20your%20eyes%20tells%20you%20that%20your%20computer%20is%20infected%20with%20viruses.%20%20Possibly%20hundreds%20of%20them.%20%20The%20message%20says%20your%20data%20may%20be%20stolen,%20or%20erased,%20or%20both.%20%20The%20message%20tells%20you%20that%20it%20is%20urgent%20that%20you%20click%20a%20link%20to%20buy%20and%20download%20an%20antivirus%20product%20and/or%20call%20a%20phone%20number%20where%20you%20will%20be%20able%20to%20buy%20a%20support%20contract%20(they%20just%20need%20your%20bank%E2%80%99s%20routing%20number%20and%20your%20account%20number%20and%20they%20will%20take%20care%20of%20the%20details).%20%20If%20you%20try%20to%20close%20this%20window,%20it%20wither%20won%E2%80%99t%20close%20or%20gets%20replaced%20by%20more%20such%20windows.%20%20In%20any%20case,%20the%20message%20is%20telling%20you%20that%20the%20most%20important%20thing%20for%20you%20to%20do%20immediately%20is%20to%20panic.%20%20The%20pop-up%20window%20is%20doing%20it%E2%80%99s%20very%20best%20to%20get%20you%20to%20act%20without%20asking%20any%20questions.%20%20This%20type%20of%20malware%20has%20become%20quite%20common%20and%20falls%20into%20a%20class%20called%20%E2%80%98scareware%E2%80%99.%20%20The%20goal%20is%20to%20get%20you%20to%20act%20without%20thinking%20about%20what%20you%E2%80%99re%20doing.%20%20If%20the%20window%20won%E2%80%99t%20go%20away,%20turn%20your%20computer%20off%20and%20then%20back%20on.%20%20Some%20scareware%20is%20attached%20to%20your%20browser%20and%20will%20only%20reappear%20when%20you%20start%20whichever%20browser%20you%20were%20using%20before.%20%20Other%20scareware%20is%20installed%20as%20a%20program%20and%20may%20reappear%20when%20your%20computer%20restarts.%20%20It%20can%20be%20extremely%20annoying,%20but%20the%20real%20threat%20is%20the%20link%20and/or%20phone%20number%20that%20you%20are%20asked%20to%20use%20to%20fix%20the%20problem.%20DO%20NOT%20CLICK%20THE%20LINK%20AND/OR%20DO%20NOT%20CALL%20THE%20NUMBER.%20%20%20%20General%20Rule:%20%20Anything,%20windows,%20email,%20articles,%20etc.%20that%20you%20see%20on%20your%20computer%20that%20seems%20to%20be%20trying%20to%20induce%20panic,%20is%20probably%20trying%20to%20do%20just%20that.%20%20Stay%20calm%20and%20think,%20don%E2%80%99t%20click!%20%20%20%20Here%20are%20some%20references%20where%20you%20can%20find%20out%20more:%20%20https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html%20https://www.consumer.ftc.gov/articles/how-spot-avoid-and-report-tech-support-scams%20https://www.businessknowhow.com/security/scareware.htm%20https://computing.which.co.uk/hc/en-gb/articles/207101035-How-to-spot-a-fake-virus-alert" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/articles/how-spot-avoid-and-report-tech-support-scams</span></a></u></p></li><li><p><a href="https://www.businessknowhow.com/security/scareware.htm" rel="nofollow external" class="bo"><span>https://www.businessknowhow.com/security/scareware.htm</span></a></p></li><li><p><a href="https://computing.which.co.uk/hc/en-gb/articles/207101035-How-to-spot-a-fake-virus-alert" rel="nofollow external" class="bo"><span>https://computing.which.co.uk/hc/en-gb/articles/207101035-How-to-spot-a-fake-virus-alert</span></a></p></li></ul></div>
]]>
  </Body>
  <Summary>You are working from home, web browser open to whatever resources you need to write a paper, prepare a class, review a budget, or whatever else you need to get your job done.  Suddenly a window...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93808/guest@my.umbc.edu/a7505e6af92d587a3543ef14fb368572/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 15 Jun 2020 16:25:51 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93743" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93743">
    <Title>How to Spot a Job Scam</Title>
    <Tagline>Scammers Are Sill Exploiting The Pandemic</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>With Covid-19 causing many Americans to file for unemployment, many people are looking for jobs.  Some malicious actors are taking advantage of them by creating new job scams. Here is a list of tips from Forbes to help spot potential job scams.</span></p><br><ul><li><p><span>Malicious actors will use keywords when describing a job such as “work-from-home”, “work-at-home”, “quick money”, or even “unlimited earning potential”. A legitimate job will usually use keywords along the lines of “remote work”, “virtual work” or “telecommute job”.</span></p></li><li><p><span>Descriptions and emails for scam jobs will usually have grammatical or spelling errors, while legitimate jobs will not have major errors.</span></p></li><li><p><span>A malicious actor will want to hire very quickly, they may include keywords like “immediate hire” in the description and any communication will feel urgent. A legitimate job will usually take some time as they want to hire the right people.</span></p></li><li><p><span>If the job description seems “too good to be true” then it probably is.</span></p></li><li><p><span>Scam jobs are known for asking for an upfront fee for things like applications, background checks, employee processing or even uniforms. They could also request personal information prior to completing the hiring process. A legitimate job will only request information like tax documents after agreeing to the terms of hire.</span></p></li><li><p><span>A malicious actor will request to communicate through email or even chat rooms like Google Hangout. Their emails might even try to mimic the real company’s emails. Even if a legitimate job will contact you through websites like LinkedIn.  They will not hire someone without having a phone or video conference interview.</span></p></li></ul><br><p><span>The key to quick scams is urgency.  The scammer doesn’t want you to stop and think, and </span><span>certainly</span><span> not to ask questions.  If you are urged to act immediately and told that you will lose a good opportunity or that something bad will happen if you delay, be suspicious.  </span></p><br><p><span>Lack of business details is another warning flag. If someone offers you a job without giving you a phone number, street address, or a link to their business to check out, be suspicious.</span><span><br></span><span><br></span><span>If the message tells you that your name was provided by UMBC, but asks you to reply from your personal email, ask yourself why they don’t want to use the UMBC email address they just used to contact you.  If you see something inconsistent, be suspicious.</span></p><p><span><br></span><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span> </span></p><br><br><p><span>For more information, please check out:</span></p><p><a href="https://www.forbes.com/sites/ashleystahl/2020/05/11/job-hunting-scams-amid-covid-19-pandemic/#57724b253c57" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/ashleystahl/2020/05/11/job-hunting-scams-amid-covid-19-pandemic/#57724b253c57</span></a></p></div>
      ]]>
    </Body>
    <Summary>With Covid-19 causing many Americans to file for unemployment, many people are looking for jobs.  Some malicious actors are taking advantage of them by creating new job scams. Here is a list of...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93743/guest@my.umbc.edu/887e86dc64d75cf47997e6125abf6b46/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 10 Jun 2020 19:52:47 -0400</PostedAt>
    <EditAt>Wed, 10 Jun 2020 19:56:52 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="93655" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93655">
  <Title>Protect UMBC - Ransomware Attacks Still Active</Title>
  <Tagline>Your Own Computer Held Hostage</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>Many of us lived our lives, at least in part, through computers even before telework and distance learning became the norm.  You may use your computer for writing reports, designing presentations, tracking budgets, email, banking, checking medical records, filing your taxes, and dozens of other necessary work and life-related chores.  Now, suppose someone took your computer and demanded a hundred dollars for its return.  Suppose someone took all the computers in your office or university away and demanded thousands of dollars for their return.  This is what ransomware does.  </span></p><br><p><span>Just to be clear, no one shows up, grabs the computer, and runs out the door.  During a ransomware attack, the computer is still there.  The data on the computer, however, all the email, documents, spreadsheets, bookmarks and whatever else you have stored on it is unusable.  It has been encrypted, and you don’t know the password. The data is, for all intents and purposes, gone.</span></p><br><p><span>Ransomware will leave your computer just functional enough to pop a ransom note up on the screen.  The note directs the victim to pay a specified amount in cryptocurrency in return for the password.  The payment will be effectively untraceable. Like most ransom situations, you have no assurance beyond the word of obvious criminals that you will get that password, or even that they have it.  Two departments at Michigan State University were struck with ransomware around last Memorial Day and have announced the ransom will not be paid. </span></p><br><p><span>Ransomware is delivered in the same way as other malware.  It usually gets a foothold when a computer user opens infected email, clicks on a malicious link, or installs software from an untrusted source.  It is just as likely to strike any computer as any other malicious program.</span></p><br><p><span>Updating your computer regularly with security patches and installing anti-virus protection is always a good idea.  The absolute best defense against ransomware, is to make a backup.  If you have recent copies of your files stored somewhere </span><span>other</span><span> than on your computer, you can restore all your data if ransomware hits.  You don’t need to backup all the information on the computer, just the information that is important and irreproducible.  Documents, pictures, address lists, etc. can all be backed up, either to removable media such as a USB thumb drive or an external drive, or to cloud storage.   Microsoft and Apple have both tried to make automatic backup to cloud storage as easy as possible (see Resources below).  There are other options such as Box storage with Box Sync.</span></p><br><p><span>IMPORTANT</span><span>:  If you are working from home using data belonging to UMBC, there may be restrictions on where that data can be stored.  </span><span>Check with the Division of Information Technology (</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>) to find out what options are available.  It is essential that backups of sensitive data be protected and not breached.  </span></p><h3><span>Resources</span></h3><br><p><span>Windows Backup to Microsoft OneDrive</span></p><p><a href="https://www.microsoft.com/en-us/microsoft-365/onedrive/pc-cloud-backup" rel="nofollow external" class="bo"><span>https://www.microsoft.com/en-us/microsoft-365/onedrive/pc-cloud-backup</span></a></p><br><p><span>Macintosh Backup to iCloud</span></p><p><a href="https://support.apple.com/en-us/HT204025" rel="nofollow external" class="bo"><span>https://support.apple.com/en-us/HT204025</span></a></p><br><br><br><p><span>For more information:</span></p><br><p><a href="https://www.insidehighered.com/quicktakes/2020/06/04/michigan-state-refuses-pay-ransom-hackers" rel="nofollow external" class="bo"><span>https://www.insidehighered.com/quicktakes/2020/06/04/michigan-state-refuses-pay-ransom-hackers</span></a></p></div>
]]>
  </Body>
  <Summary>Many of us lived our lives, at least in part, through computers even before telework and distance learning became the norm.  You may use your computer for writing reports, designing presentations,...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93655/guest@my.umbc.edu/bc9ab72cb5b67dc4a73792313df79f1f/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 08 Jun 2020 10:28:17 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="93600" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93600">
    <Title>College Stimulus Check Scam</Title>
    <Tagline>Another Email Scam Riding the Headlines</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>The Federal Trade Commission warns of a phishing email scam aimed at college students. The malicious actor sends emails out claiming to be from the Financial Department of the student’s university. The email tells readers to click on the provided URL to get messages about their economic stimulus check. Once readers click on the URL it will require a university login to proceed.</span></p><br><p><span>These emails are phishing scams and once the URL is clicked on, the reader is either giving the malicious actors their personal information or even allowing malware to be installed onto their devices.</span></p><br><p><span>To help spot and avoid scams similar to the one above:</span></p><ul><li><p><span>If you have concerns about an email, look up a phone number or website of the sender/department that the email is claiming to be from. This helps to confirm you are calling someone who is real and not a malicious actor.  If there is no contact information, it very likely is a scam.</span></p></li><li><p><span>Look out for bad grammar and spelling as this can be a tip-off that the email might be from a malicious actor. </span></p></li><li><p><span>Look out for wrong department names. For example the article found that one version of this phishing email claimed to be from the Financial Dept instead of the Financial Aid Department.  </span></p></li><li><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span><span><br><br></span></p></li></ul><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>UMBC’s Office of Financial Aid and Scholarship:</span></p><p><a href="https://financialaid.umbc.edu/" rel="nofollow external" class="bo"><span>https://financialaid.umbc.edu/</span></a></p><br><p><span>For more information, please check out:</span></p><p><a href="https://www.consumer.ftc.gov/blog/2020/05/covid-19-scams-targeting-college-students" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/blog/2020/05/covid-19-scams-targeting-college-students</span></a></p></div>
      ]]>
    </Body>
    <Summary>The Federal Trade Commission warns of a phishing email scam aimed at college students. The malicious actor sends emails out claiming to be from the Financial Department of the student’s...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93600/guest@my.umbc.edu/5939449d5fd301cdd5d3670426fbea95/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 04 Jun 2020 11:10:25 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="93591" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93591">
    <Title>College Stimulus Check Scam</Title>
    <Tagline>Another Email Scam Riding the Headlines</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>The Federal Trade Commission warns of a phishing email scam aimed at college students. The malicious actor sends emails out claiming to be from the Financial Department of the student’s university. The email tells readers to click on the provided URL to get messages about their economic stimulus check. Once readers click on the URL it will require a university login to proceed.</span></p><br><p><span>These emails are phishing scams and once the URL is clicked on, the reader is either giving the malicious actors their personal information or even allowing malware to be installed onto their devices.</span></p><br><p><span>To help spot and avoid scams similar to the one above:</span></p><ul><li><p><span>If you have concerns about an email, look up a phone number or website of the sender/department that the email is claiming to be from. This helps to confirm you are calling someone who is real and not a malicious actor.  If there is no contact information, it very likely is a scam.</span></p></li><li><p><span>Look out for bad grammar and spelling as this can be a tip-off that the email might be from a malicious actor. </span></p></li><li><p><span>Look out for wrong department names. For example the article found that one version of this phishing email claimed to be from the Financial Dept instead of the Financial Aid Department.  </span></p></li><li><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span><span><br><br></span></p></li></ul><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>UMBC’s Office of Financial Aid and Scholarship:</span></p><p><a href="https://financialaid.umbc.edu/" rel="nofollow external" class="bo"><span>https://financialaid.umbc.edu/</span></a></p><br><p><span>For more information, please check out:</span></p><p><a href="https://www.consumer.ftc.gov/blog/2020/05/covid-19-scams-targeting-college-students" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/blog/2020/05/covid-19-scams-targeting-college-students</span></a></p></div>
      ]]>
    </Body>
    <Summary>The Federal Trade Commission warns of a phishing email scam aimed at college students. The malicious actor sends emails out claiming to be from the Financial Department of the student’s...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93591/guest@my.umbc.edu/936d10989c317534424f11f7324d124c/api/pixel</TrackingUrl>
    <Tag>notice</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology (DoIT)</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 03 Jun 2020 22:38:27 -0400</PostedAt>
    <EditAt>Wed, 03 Jun 2020 22:46:24 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="93552" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/93552">
  <Title>Protecting Sensitive Data During Telework</Title>
  <Tagline>Some Simple Precautions You Can Take For Secure Teleworking</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>As the global health crisis continues, many organizations are making the decision to continue remote work into the summer, and some are even hiring new employees remotely. Malicious actors are also still working and are capitalizing on uncertainty and preoccupation with other challenges. One of their most common goals is to obtain private information, such as passwords, personally identifiable information like social security numbers, or internal business decisions, all of which can be sold on the dark web or used in future scams targeting both individuals and organizations.  Whether you are already teleworking or simply want to be prepared for any opportunities that may arise, familiarize yourself with these simple tips to keep you, your devices, and your organization safe in the virtual workspace.</span></p><p><span> </span></p><ul><li><p><span> </span><span>Read and follow your organization’s policies on telecommunications and telework. Know what you are and are not allowed to access from your personal devices.</span></p></li><li><p><span> </span><span>Secure your Internet connection. Use a unique password for your home Wi-Fi and avoid accessing private information over public connections.</span></p></li><li><p><span> </span><span>Lock your devices. Use a unique password, facial recognition, etc. to ensure that others cannot access private information through your phone or computer.</span></p></li><li><p><span> </span><span>Keep your devices up to date. Update regularly or enable automatic updates to get the latest security patches as quickly as possible.</span></p></li><li><p><span> </span><span>Use any additional security tools your organization provides. For example, UMBC offers access to the </span><a href="https://wiki.umbc.edu/display/faq/Getting+Connected+with+the+New+UMBC+GlobalProtect+VPN" rel="nofollow external" class="bo"><span>GlobalProtect VPN</span></a><span>  for secure remote connection to the campus network, and </span><a href="https://wiki.umbc.edu/display/faq/Two-Factor+Authentication+with+DUO" rel="nofollow external" class="bo"><span>Duo Two-Factor Authentication</span></a><span>  to help prevent unauthorized logins to your UMBC account.</span></p></li></ul></div>
]]>
  </Body>
  <Summary>As the global health crisis continues, many organizations are making the decision to continue remote work into the summer, and some are even hiring new employees remotely. Malicious actors are...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93552/guest@my.umbc.edu/58b357af1da1cced01e374d13a7c5b4e/api/pixel</TrackingUrl>
  <Tag>notice</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology (DoIT)</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 02 Jun 2020 16:23:37 -0400</PostedAt>
  <EditAt>Tue, 02 Jun 2020 16:24:11 -0400</EditAt>
</NewsItem>
</News>
