<?xml version="1.0"?>
<News hasArchived="false" page="3" pageCount="4" pageSize="10" timestamp="Tue, 28 Apr 2026 23:22:49 -0400" url="https://dev.my.umbc.edu/groups/itsecurity/posts.xml?page=3&amp;tag=covid19">
  <NewsItem contentIssues="false" id="93246" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/93246">
    <Title>COVID-19 Phishing Attacks</Title>
    <Tagline>A review of different attacks exploiting COVID-19 fears</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Tripwire has released an article warning of these COVID19-related phishing scams. This article can be found at this link: </span><a href="https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-11-2020/" rel="nofollow external" class="bo"><span>https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-11-2020/</span></a></p><br><br><p><span>(Fake) Work From Home Offers</span></p><br><p><span>PhishLabs discovered a phishing email attack aiming to entice people laid off due to COVID-19 with a work from home opportunity. The one email they found offered $5000 a month for a fake position. If the reader replies, they are asked for personal and financial information and will be given a more detailed job description involving transfering money through the readers accounts. The malicious actors might not only steal money from the readers account, but also could use the reader as a money mule meaning that they could be held liable for the stolen money that passes through their account. </span></p><br><br><p><span>(Fake) IRS Page</span></p><br><p><span>Researchers at SecureWorks discovered malicious actors targeting readers with a phishing page designed to look like a tax form given by the IRS. The attack is believed to be distributed through email attacks, and the goal of this attack is stealing the readers tax information. Once the malicious actor has the information, they can then impersonate the reader on the official IRS tax form meaning that they will collect not only their tax return but their stimulus checks as well.</span><span><br><br></span></p><p><span><br></span><span>Impersonating Institute of CPAs</span></p><br><p><span>The Microsoft Security Intelligence team discovered that some digital attackers were using COVID-19 themed attack campaigns to distribute malware. One example they found showed a malicious actor impersonating the Institute of CPAs. In their emails they were claiming to be delivering COVID-19 related updates to its members as well as containing a ZIP file. The file is instead an executable that will allow the malicious actor to take control of the affected machine.</span></p></div>
      ]]>
    </Body>
    <Summary>Tripwire has released an article warning of these COVID19-related phishing scams. This article can be found at this link:...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/93246/guest@my.umbc.edu/fd27aef2c212c3511943930f04cf4c82/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 18 May 2020 18:17:39 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="92998" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92998">
    <Title>Email Attacks</Title>
    <Tagline>A Review Of Recent Email Trying To Infect Your Computer</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><span>Email Attacks</span></p><br><br><p><span>Tripwire has released an article warning of these COVID-19 related email scams. The article can be found at this link: </span><a href="https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-4-2020/" rel="nofollow external" class="bo"><span>https://www.tripwire.com/state-of-security/security-awareness/covid-19-scam-roundup-may-4-2020/</span></a></p><br><h3><span>(FAKE) Failed Delivery Notice</span></h3><br><p><span>They report on a finding from Kaspersky Labs, where they warn of a spam email campaign informing recipients that a delivery attempt had failed because their shipment details were incorrect and the reader needs to update their details. An image of a receipt is included in the message.  The receipt is too small to read easily, so the recipient will probably click on it for a better look. Clicking on the attachment will load spyware onto the user's device.</span></p><br><br><h3><span>(FAKE) Donation to WHO</span></h3><br><p><span>A malicious actor sent out emails urging recipients to consider donating to the World Health Organization. The email has a from address of “support@covid-19[.]world” and includes a link at the bottom saying “Help Us Fight”.  Clicking the link will take the reader to a malicious domain help-who[.]com. For readers to donate they must click on the embedded link which allows the malicious actors to steal the reader’s payment information.</span></p><br><br><h3><span>(FAKE) Update to Family and Medical Leave Act</span></h3><br><p><span>Finally the article reports that IBM X-Force discovered a phishing email campaign that seemed to be from the US Department of Labor. The email states they have made changes to the “Family and Medical Leave of Act” as a result of COVID-19. This email then asks readers to review the attached word document. The attachment will install malware which puts the reader’s computer under the control of a botnet.</span></p></div>
      ]]>
    </Body>
    <Summary>Email Attacks    Tripwire has released an article warning of these COVID-19 related email scams. The article can be found at this link:...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92998/guest@my.umbc.edu/912d4576f63daa6d0f96033f10a9d408/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 08 May 2020 12:31:45 -0400</PostedAt>
    <EditAt>Fri, 08 May 2020 12:32:40 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="92997" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92997">
  <Title>COVID-19 Job Scam in Email</Title>
  <Tagline>New Scam Subject: UMBC COVID-19 INFORMATION</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>The UMBC Division of Information Technology received notification of a new job scam variant on 08may2020.  The subject is: </span><strong><span>UMBC COVID-19 INFORMATION</span></strong></p><br><br><blockquote><p><strong><span>From: </span><span>Koyepes Michael</span><span> &lt;<a href="mailto:michaelkoyepes199@gmail.com">michaelkoyepes199@gmail.com</a>&gt;</span></strong></p><p><strong><span>Date: Fri, May 8, 2020 at 9:54 AM</span></strong></p><p><strong><span>Subject: UMBC COVID-19 INFORMATION</span></strong></p><strong><br></strong><p><strong><span>Dear students,</span></strong></p><strong><br></strong><p><strong><span>University of Maryland, Baltimore County health professionals have been closely monitoring the spread of COVID-19 over the past two months.Therefore the university is organizing an online part time job to sustain the students living.I'm happy to inform you that our reputable company CORESTAFF SERVICES Inc®,is currently running a student empowerment program.</span></strong></p><p><strong><span>    KINDLY EMAIL BACK WITH YOUR  PERSONAL EMAIL ADDRESS IF INTERESTED IN THIS JOB POSITION.</span></strong></p><strong><br></strong><p><strong><span>Kind Regards</span></strong></p><p><strong><span>Koyepes Michael</span></strong></p><p><strong><span>HR Manager/Consultant</span></strong></p><p><strong><span>CORESTAFF SERVICES Inc®</span></strong></p></blockquote><br><br><h3><strong><em><span>This is a scam!  DO NOT REPLY TO IT!</span></em></strong></h3><br><p><span>A reply confirms that your UMBC email address is active.  That is an invitation to get more spam.  You are also asked to provide your personal address.  That’s two addresses for spamming.   You may then be asked to fill out a form with personal information which can then be added to your email address.  That means, at least, that the spam can be targeted to you.  If you provide information such as your birthdate, address, or social security number, the information can also be used for identity theft.  </span></p><br><br><p><span>Even if you are tempted to send the scammer a hostile, insulting message,</span></p><h3><span>DO NOT REPLY!</span></h3><p><span>You will not hurt the scammer’s feelings.  You will simply provide information about yourself directly or indirectly.</span></p><p><span><br></span></p><p><span>E-mail fraud is in the rise.  The Division of Information Technology is tracking it.  If you get suspicious email, please forward it to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.   If you are not sure whether it is suspicious, forward it anyway.  We will investigate it and get back to you.<br></span></p></div>
]]>
  </Body>
  <Summary>The UMBC Division of Information Technology received notification of a new job scam variant on 08may2020.  The subject is: UMBC COVID-19 INFORMATION     From: Koyepes Michael...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92997/guest@my.umbc.edu/f645a745d90822bcdf375dcead134bfa/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 08 May 2020 12:12:25 -0400</PostedAt>
  <EditAt>Fri, 08 May 2020 12:15:55 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="92402" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/92402">
  <Title>Guide for Recognizing COVID-19 Scams and Risks</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><div><span>The Center for Internet Security (CIS) posted a guide, on April 13, 2020, about online scams exploiting people’s concerns about the COVID-19.  The guide is available at: <a href="https://www.cisecurity.org/newsletter">https://www.cisecurity.org/newsletter</a></span></div><div><span><br></span></div><div><span>In brief, the guide gives some examples of commonly reported scams such as:</span></div><div><ul><li><span>Fake tests and cures for you to buy,</span></li><li><span>Fake health organizations and websites that try to collect personal information about you and/or infect your computer, and </span></li><li><span>Fake charities requesting donations.</span></li></ul></div><div><span><br></span></div><div><span>The guide also makes some suggestions.  Briefly:</span></div><div><span><br></span></div><div><ul><li><span>Don’t click on strange web links in expected or unusual messages.</span></li><li><span>Get your information from known, trusted sources, preferably ending in ‘.gov’. </span>For example: </li><ul><li><span><a href="https://www.coronavirus.gov/">https://www.coronavirus.gov/</a></span></li><li><span><a href="https://www.cdc.gov/coronavirus/2019-nCoV/index.html">https://www.cdc.gov/coronavirus/2019-nCoV/index.html</a></span></li><li><span><a href="https://www.ftc.gov/coronavirus">https://www.ftc.gov/coronavirus</a></span></li><li><span><a href="https://www.irs.gov/coronavirus-tax-relief-and-economic-impact-payments">https://www.irs.gov/coronavirus-tax-relief-and-economic-impact-payments</a></span></li><li><span><a href="https://www.fbi.gov/news/stories/protect-yourself-from-covid-19-scams-040620">https://www.fbi.gov/news/stories/protect-yourself-from-covid-19-scams-040620</a></span></li><li><span><a href="https://www.justice.gov/coronavirus">https://www.justice.gov/coronavirus</a></span></li></ul><li><span>Don’t give out personal information (including your SSN and bank information) over the phone or over email.</span></li><li><span>Verify a charity before donating anything to it.  You can get more guidance about this at <a href="https://www.consumer.ftc.gov/articles/0074-giving-charity">https://www.consumer.ftc.gov/articles/0074-giving-charity</a> (Federal Trade Commission or FTC)</span></li></ul></div><div><br></div></div>
]]>
  </Body>
  <Summary>The Center for Internet Security (CIS) posted a guide, on April 13, 2020, about online scams exploiting people’s concerns about the COVID-19.  The guide is available at:...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/92402/guest@my.umbc.edu/dafab692cac5f0da4e8c9e2145d4e27a/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 21 Apr 2020 10:13:04 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="91940" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/91940">
  <Title>Scammers Want Your Information and Money</Title>
  <Tagline>Scammers are finding new ways to get your info and money.</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div>Any good scam, electronic or otherwise, works best when the victim is outside of their normal patterns of life.  A phishing scam has been circulating that claims that you have been exposed to Covid-19 through “a colleague/friend/family member”.  You are asked to print a form attached to the message, which appears to be pre-populated with all your relevant information, and take the printed form to the nearest emergency clinic.  </div><div><br></div><div>If the thought that you have been exposed to COVID-19 doesn’t upset you, the idea that your personal information has been magically entered in the form probably should.  Either way, when you open the attachment, an Excel spreadsheet, you are asked to ‘Enable Content’.  Doing so downloads malware which will do its best to collect all the information possible from your computer, potentially including passwords for online accounts, and send the information back to its controller.</div><div><br></div><div>In general, if you receive email that immediately appeals to fear, anger, or any other powerful emotion, be wary.  Contact the organization claiming to send the message to you and check out the claims.  Any legitimate message like this should include contact information other than an email return address.  You can also find contact information from the official websites of any organization that is contacting you.  </div><div><br></div><div>If you get email with an attachment that you are not expecting, be cautious.  Don't click on an attachment before you know it is legitimate.  Find a way to check the validity of the email before opening the attachment.  </div><div><br></div><div>If you receive any email that asks for money or a donation, spend time to check out the sender before sending any money.  Sometimes this may come in the form of people collecting money to help doctors and nurses on the front lines.  Sometimes, scammers may claim to be a hospital caring for a sick relative of yours and asking for you to help cover their hospital expenses.  </div><div><br></div><div>Scammers are everywhere, and they are working hard to trick you and get your information and money.  Following your intuition, checking out messages, and being cautious may prevent a big headache.  </div><div><br></div><div><br></div><div>Links for more information:</div><div><a href="https://www.bleepingcomputer.com/news/security/phishing-attack-says-youre-exposed-to-coronavirus-spreads-malware/">https://www.bleepingcomputer.com/news/security/phishing-attack-says-youre-exposed-to-coronavirus-spreads-malware/</a></div><div><br></div><div>If you want Covid-19 information, try these:</div><div>NIH - <a href="https://www.nih.gov/health-information/coronavirus">https://www.nih.gov/health-information/coronavirus</a></div><div>CDC - <a href="https://www.cdc.gov/coronavirus/2019-ncov/cases-updates/summary.html">https://www.cdc.gov/coronavirus/2019-ncov/cases-updates/summary.html</a></div><div>Maryland Department of Health - <a href="https://coronavirus.maryland.gov/">https://coronavirus.maryland.gov/</a></div><div>Virginia Department of Health - <a href="http://www.vdh.virginia.gov/coronavirus/">http://www.vdh.virginia.gov/coronavirus/</a></div><div><br></div></div>
]]>
  </Body>
  <Summary>Any good scam, electronic or otherwise, works best when the victim is outside of their normal patterns of life.  A phishing scam has been circulating that claims that you have been exposed to...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/91940/guest@my.umbc.edu/c4f9e1605c98197ef1b3d52aa81d8a77/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 07 Apr 2020 17:05:44 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="91934" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/91934">
  <Title>Fake Advertisements and CDC References</Title>
  <Tagline>Just because it's on the web or offered doesn't make it real</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div>The Digital Citizens Alliance (DCA) has issued a report on the presence of advertisements for medical supplies, including a vaccine for Covid-19 (as of 4/7/2020 there is no such vaccine).   These advertisements frequently appear on YouTube and try to add authenticity to their design by including a link to the website of the Center for Disease Control (CDC).   Advertising a non-existent product is a pretty clear tip-off that something is wrong, but some vendors may offer things that actually exist, such as surgical masks.  It is also important to note that even if a vendor offers a real product on their website, it doesn’t mean they have any in stock to ship to you.  </div><div><br></div><div>After contacting some of the vendors,  the DCA noted other peculiarities.  One vendor, for instance, refused payment by credit cards but offered to accept other payment methods such as PayPal, gift cards, and BitCoin.  Generally, purchasing with credit cards is safer than using many other payment methods.  Most credit cards provide purchase protection against many forms of fraud and allow you to dispute charges when you don't receive an item or the wrong amount is charged.  </div><div><br></div><div>The CDC link under the videos was valid and took the viewer to the latest information from the CDC.  The concern is that people may take this link as some sort of certification by the CDC.  Please note that anyone can insert a link to anything on their website, and the presence of a link on a a web page does not indicate a relationship, certification, or endorsement.  Links to trusted institutions are useless for authentication.</div><div><br></div><div>For more information, please check out:  </div><div><a href="https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/DCA_Corona_YouTube_Vaccines.pdf">https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/DCA_Corona_YouTube_Vaccines.pdf</a></div><div><br></div></div>
]]>
  </Body>
  <Summary>The Digital Citizens Alliance (DCA) has issued a report on the presence of advertisements for medical supplies, including a vaccine for Covid-19 (as of 4/7/2020 there is no such vaccine).   These...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/91934/guest@my.umbc.edu/63968b8e7d3a7780c81cc9ff76aa62a0/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 07 Apr 2020 14:36:26 -0400</PostedAt>
  <EditAt>Tue, 07 Apr 2020 14:44:49 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="91736" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/91736">
    <Title>Fake DocuSign Phishing Message</Title>
    <Tagline>Look out for fake DocuSign Messages</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><span><p><span>Yesterday morning, between 8:45am and 10:00am, several UMBC users received DocuSign messages offering access to a document called “News Update.pdf” with a button labeled “View Document Now”.  </span></p><br><p><span>The From address of the email “</span><a href="mailto:dse_docusign2@docusign.umbc.edu" rel="nofollow external" class="bo"><span>dse_docusign2@docusign.umbc.edu</span></a><span>” was forged.  This message did not originate from the UMBC’s DocuSign system.  It is, however, an unusually good design for a phishing attack.</span></p><br><p><span>In the current work climate, it is easy to overlook unusual features of messages we get in our UMBC email inboxes.  We are also using tools, like Docusign, more than ever.  There are people who will try to take advantage of that.  While the source of this message is currently under investigation, DoIT wanted to share some of the key features of this message that raise suspicions about its origin.</span></p><br><br><p><span>Example of </span><span>Malicious DocuSign Forgery</span><span>:</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh5.googleusercontent.com/pf7f-GQkMLl5bslm69aYUUHK7qbHgtSnZRhoWsLXkKzvGau2LE7-dnBBujZ9lUThFiX7Zo71l3MWtoAiYcOOMLtxqsJRZ5iUOlhecoApumNy1LXuSds-pD4x30-TbMOvOVWSNWl2" width="610" height="240" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><br><p><span>In the example above there are some tell-tale signs that should raise suspicions.  </span></p><br><ul><li><p><span>The message begins with the salutation “DocuSign,” and is from “The DocuSign Team”.  They seem to be addressing themselves.</span></p></li><li><p><span>There is no “DocuSign Team”.  DocuSign notifications are from UMBC staff.</span></p></li><li><p><span>The From: header in the upper left says “</span><a href="mailto:dse_docusign2@docusign.umbc.edu" rel="nofollow external" class="bo"><span>dse_docusign2@docusign.umbc.edu</span></a><span>”.  In an actual docusign message, that header would be something like “</span><span>Andy Johnston via DocuSign &lt;<a href="mailto:dse_na2@docusign.net">dse_na2@docusign.net</a>&gt;</span><span>”</span></p></li><li><p><span>DocuSign message subjects normally start with the words “Please DocuSign”.  This one does not.</span></p></li><li><p><span>The point of DocuSign is to be able to verify, by signing, that you have received a document.  There is no reason to do that for a news update.  UMBC News is sent out in regular email messages.</span></p></li></ul><h3><span>Did You Click on the Button?</span></h3><p><span>If you are one of the people who got this message and clicked on the button, you should have gotten this message:</span></p><br><p><span><span><img src="https://lh4.googleusercontent.com/Uux4FYix2Ex-T7YqaV8r4CJgGLHzJYc0xmXrg9RHe7i3mLvbRCh2q2bmz4AjlshFYc5YwAflolmofpITX8Q5mnrcpq8CDfRmjoicVp1smOsBxsGVCnhUESo7v6QQEZFYyj-Uusee" width="624" height="484" style="max-width: 100%; height: auto;"></span></span></p><br><span>If you selected ‘Proceed’, you would probably have gotten a message that the page was unreachable or the link was invalid.  If you got anything else, please submit a ticket to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> so that we can contact you.</span></span></div>
      ]]>
    </Body>
    <Summary>Yesterday morning, between 8:45am and 10:00am, several UMBC users received DocuSign messages offering access to a document called “News Update.pdf” with a button labeled “View Document Now”.  ...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/91736/guest@my.umbc.edu/815dcbac850730795560e529bbcf3828/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 31 Mar 2020 16:35:38 -0400</PostedAt>
    <EditAt>Tue, 31 Mar 2020 16:36:06 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="91732" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/91732">
  <Title>Home Network Security</Title>
  <Tagline>As we all work and study at home, we need to stay secure.</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div>If you are part of the UMBC community and are reading this in the spring of 2020, then you are very likely working and/or teaching and/or learning from home over the Internet.  In most cases, you have an Internet provider such as Comcast or Verizon and you have a router in your home to connect to them.  The router is your gateway to the Internet.  It is also the Internet’s gateway to you. (See links below for information about  recently discovered vulnerabilities in home routers.)</div><div><br></div><div><u>The Basics</u></div><div>For most people, the home router does two things.  </div><div><ol><li>It creates a small network that your devices can access either through WiFi or through a cable physically connected to the router.</li><li>It also connects that little network to your provider and, through them, to the Internet.</li></ol></div><div>Your router comes out of the box pretty much ready to go to work for you, but it’s not usually as secure as it could or should be.  There are a number of settings, especially in older routers, that should be verified or changed to make sure that:</div><div><ul><li>No one joins your small home network without your knowledge and permission.</li><li>No one out on the Internet can tell the router to behave in ways you don’t want it to.</li></ul></div><div>How you view and change these settings will vary with the make and model of your router.  There are some links at the end which may help you, but your best bet is to get the make and model of your router (usually printed on the back or the bottom) and search for them on Google, Bing, or some other search service.  Include terms like “setup”, “manual” and “secure”.  Try to use a site belonging to the router’s manufacturer.  (You will probably be accessing your router through a web browser on your home network.)</div><div><br></div><div>Here is an initial to-do list:</div><div><ul><li>Secure your wireless connection</li><ul><li>This is the connection between your wireless devices (laptop, tablet, etc.) and your router on the “small network” in your house.  Make sure encryption is enabled and set to WPA2 or WPA3.  If there is an option for WPS encryption, disable it if possible.  If not possible, consider getting a new router.</li></ul><li>Change the router’s administrative password</li><ul><li>There are two different passwords associated with your router.  There’s your WiFi password that is entered in every device on your home WiFi network, and there’s that administrative password that you use to go into your router to view and change its settings.  Modern routers often come with pre-set WiFi passwords.</li></ul><li>Update your router’s firmware</li><ul><li>If you’re a Windows user, you have dealt with software updates since you first booted the machine.  This is much the same.   Precisely how you update your router depends on its make and model. If your router has an auto-update feature, you should probably use it.</li></ul><li>MAC filtering</li><ul><li>This is not about Apple computers.  Each wifi device, that connects with your router, no matter what kind of device it is, has a unique MAC address that you normally don’t see but can discover.  This allows you to refuse access to all devices other than those whose MAC addresses you explicitly ‘whitelist’ (allow) in your router.  If you’re comfortable doing this, consider implementing it..  WARNING: There’s a security vs. convenience trade-off here. You will have to whitelist every new device that you want to appear on your home network.  </li></ul><li>If your router has a ‘remote management’ setting, turn it off.</li></ul></div><div><br></div><div>Links for more information:</div><div><ul><li><a href="https://www.wired.com/story/secure-your-wi-fi-router/">https://www.wired.com/story/secure-your-wi-fi-router/</a></li><li><a href="https://lifehacker.com/how-to-make-your-wifi-router-as-secure-as-possible-1827695547">https://lifehacker.com/how-to-make-your-wifi-router-as-secure-as-possible-1827695547</a></li><li><a href="https://www.consumer.ftc.gov/blog/2020/03/online-security-tips-working-home">https://www.consumer.ftc.gov/blog/2020/03/online-security-tips-working-home</a></li><li><a href="https://www.cisecurity.org/white-papers/cis-controls-telework-and-small-office-network-security-guide/">https://www.cisecurity.org/white-papers/cis-controls-telework-and-small-office-network-security-guide/</a></li></ul></div><div>Links for more information about recently discovered vulnerabilities in home routers:</div><div><ul><li><a href="https://arstechnica.com/information-technology/2020/03/new-attack-on-home-routers-sends-users-to-spoofed-sites-that-push-malware/">https://arstechnica.com/information-technology/2020/03/new-attack-on-home-routers-sends-users-to-spoofed-sites-that-push-malware/</a></li><li><a href="https://labs.bitdefender.com/2020/03/new-router-dns-hijacking-attacks-abuse-bitbucket-to-host-infostealer/">https://labs.bitdefender.com/2020/03/new-router-dns-hijacking-attacks-abuse-bitbucket-to-host-infostealer/</a></li><li><a href="https://www.bleepingcomputer.com/news/security/hackers-hijack-routers-dns-to-spread-malicious-covid-19-apps/">https://www.bleepingcomputer.com/news/security/hackers-hijack-routers-dns-to-spread-malicious-covid-19-apps/</a></li></ul></div><div><br></div></div>
]]>
  </Body>
  <Summary>If you are part of the UMBC community and are reading this in the spring of 2020, then you are very likely working and/or teaching and/or learning from home over the Internet.  In most cases, you...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/91732/guest@my.umbc.edu/5359b0cf8623ce3a26a5ae8ef53ac62d/api/pixel</TrackingUrl>
  <Tag>covid19</Tag>
  <Tag>notice</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 31 Mar 2020 16:16:36 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="91731" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/91731">
    <Title>Telework Security Resources</Title>
    <Tagline>Here are some good resources for securing your telework...</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">More people throughout the United States are teleworking now, including many who have never done so before.  The UMBC community is no exception as many of us work, learn and teach from our keyboards.  All this remote work is opening up new avenues of exploitation for unscrupulous scammers.  DoIT will be posting resources and suggestions to help you maintain security as more of your life moves on-line.<div><br></div><div><div>The SANS Institute is offering the SANS Security Awareness Work-from-Home Deployment Kit.</div><div><ul><li><a href="https://www.sans.org/security-awareness-training/sans-security-awareness-work-home-deployment-kit">https://www.sans.org/security-awareness-training/sans-security-awareness-work-home-deployment-kit</a></li></ul></div><div><br></div><div>As part of the kit, SANS has posted a five-step guide to teleworking security.  You can find it (in several languages) here:</div><div><ul><li><a href="https://www.sans.org/security-awareness-training/fact-sheet">https://www.sans.org/security-awareness-training/fact-sheet</a></li></ul></div><div><br></div><div>LinkedIn is offering registered users several LinkedIn Learning courses that focus on being productive while working from home, including tips on using virtual meeting tools to build relationships in a new working environment. </div><div><ul><li><a href="https://www.linkedin.com/learning/paths/remote-working-setting-yourself-and-your-teams-up-for-success">https://www.linkedin.com/learning/paths/remote-working-setting-yourself-and-your-teams-up-for-success</a></li></ul></div><div><br></div><div>NIST has posted a well-designed graphic to help organizations secure conference calls.</div><div><ul><li><a href="https://www.nist.gov/image/conference-call-security-graphic">https://www.nist.gov/image/conference-call-security-graphic</a></li></ul></div><div><br></div><div>INFOSEC has published an article that discusses remote working security, including a brief description of VPN technology.</div><div><ul><li><a href="https://resources.infosecinstitute.com/category/enterprise/securityawareness/security-awareness-roles/security-awareness-issues-for-remote-workers/#gref">https://resources.infosecinstitute.com/category/enterprise/securityawareness/security-awareness-roles/security-awareness-issues-for-remote-workers/#gref</a></li></ul></div><div><br></div><div>The National Cyber Security Alliance (NCSA) has posted the “COVID-19 Security Resource Library” of security links for teleworkers.</div><div><ul><li><a href="https://staysafeonline.org/covid-19-security-resource-library/">https://staysafeonline.org/covid-19-security-resource-library/</a></li></ul></div></div><div><br></div></div>
      ]]>
    </Body>
    <Summary>More people throughout the United States are teleworking now, including many who have never done so before.  The UMBC community is no exception as many of us work, learn and teach from our...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/91731/guest@my.umbc.edu/5953a0b0826f029855bc77da1d65b6e8/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 31 Mar 2020 15:47:52 -0400</PostedAt>
    <EditAt>Tue, 31 Mar 2020 15:48:15 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="91621" important="false" status="posted" url="https://dev.my.umbc.edu/groups/itsecurity/posts/91621">
    <Title>Unexpected Calendar Invites and Meeting/Class Messages</Title>
    <Tagline>Beware of Unexpected Calendar Invites and Meeting Messages</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">As we have all begun to work and attend classes remotely, we are receiving more and more meeting messages and calendar invites.  Almost all of these messages and calendar entries include links to Webex, Google Hangouts, or Blackboard Collaborate sessions.  <div><br></div><div>Email messages can be easily faked and anyone can send a calendar invitation that could pop up on your google calendar.  Neither email nor Google Calendar validate the identity of the sender of a message or invite.  It is essential that we be on the lookout for hackers potentially sending fake messages for meetings/classes and calendar invites with links that could include malware.  </div><div><br></div><div>Some signs to look out for include:</div><div><ul><li>A meeting/class or calendar entry that you did not expect.</li><li>An invitation or meeting/class message from outside of UMBC.</li><li>A meeting/class on a service other than Webex, Google, or Blackboard Collaborate.</li><li>A meeting/class at a strange time.</li><li>An unusual list of guests for meetings/classes you typically attend.</li></ul></div><div>Also, please be wary of messages with poor grammar, punctuation, spelling, or other telltale signs of phishing.  See our FAQ Collection for more details on spotting spam and phishing.  <a href="https://wiki.umbc.edu/x/HwMxAg" rel="nofollow external" class="bo">Phishing &amp; Spam</a></div><div><br></div><div>As always, if a message or calendar invite looks suspicious, please contact the meeting host or professor directly to validate the meeting <strong><u>before clicking on the meeting link</u>.  </strong></div><div><br></div><div>If you see a suspicious meeting/class related message or calendar entry, please notify <a href="mailto:security@umbc.edu">security@umbc.edu</a> immediately.  </div></div>
      ]]>
    </Body>
    <Summary>As we have all begun to work and attend classes remotely, we are receiving more and more meeting messages and calendar invites.  Almost all of these messages and calendar entries include links to...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/91621/guest@my.umbc.edu/f98a8ddcd68e5c2797c5444edb881d92/api/pixel</TrackingUrl>
    <Tag>covid19</Tag>
    <Tag>notice</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 27 Mar 2020 00:45:09 -0400</PostedAt>
  </NewsItem>
</News>
