Latest Phishing Attempt
WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include a suspicious link. These are not legitimate emails.
WHAT DO YOU NEED TO DO?
Latest Phishing Attempt
WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include a suspicious link. These are not legitimate emails.
WHAT DO YOU NEED TO DO?
Latest Phishing Attempt
WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include a suspicious link. These are not legitimate emails.
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
Latest Phishing Attempt
WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include a suspicious link. These are not legitimate emails.
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
Many HP Laptops Contain Hidden Keylogger
WHAT'S HAPPENING?
A security researcher discovered key logging code within the Synaptics Touchpad driver of over 460 HP laptop models.
WHEN IS IT HAPPENING?
November 7, 2017, and ongoing.
WHY IS IT HAPPENING?
Code within the Synaptics Touchpad drivers, intended for troubleshooting, could be exploited to enable logging of users' keystrokes. More information can be found at the following sites:
http://www.bbc.com/news/technology-42309371
https://zwclose.github.io/HP-keylogger/
WHO IS AFFECTED?
Latest Phishing Attempt
WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include a suspicious link. These are not legitimate emails.
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
Latest Phishing Attempt
There are emails that are being circulated, an example of which is below, that include a suspicious link. These are not legitimate emails.
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
Latest Phishing Attempt
WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include a suspicious link. These are not legitimate emails.
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
Bluetooth Security Vulnerability
WHAT'S HAPPENING?
A collection of Bluetooth vulnerabilities has been announced, which can be exploited without end-user interaction. The attack has been dubbed “BlueBorne”.
WHEN IS IT HAPPENING?
September 12, 2017, and ongoing.
WHY IS IT HAPPENING?
Pagination
- Previous page
- 2 Page 2
- Next page