Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include a suspicious link. These are not legitimate emails.

 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include a suspicious link. These are not legitimate emails.
 
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

Latest Phishing Attempt

Submitted by admin on

UPDATE:
The malicious attachment in this phishing campaign has been determined to be ransomware.  The message appears to come from different copier@*.gatech.edu addresses.  Upon opening the attached .docm file, the ransomware in question encrypts files on local, fixed and removable, and network filesystems.  If you received a message like this and opened the document, shut down your system and contact the TSO Help Desk immediately.


WHAT'S HAPPENING?

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

Removing Stored Passwords on OS X

OS X has password storage features, which can be accessed or managed using the Keychain Access application.  When updating account passwords, issues can arise related to the storage of old or outdated passwords.  In the following example, Keychain Access will be used to delete an outdated entry so the new credentials can be saved.

New Mac Malware

Submitted by admin on

WHAT HAPPENED?
There have been reports of a new Mac malware in the wild that allows attackers full access of infected Mac systems.


WHEN DID IT HAPPEN?
First reported Wednesday, July 6, 2016.


WHY DID IT HAPPEN?

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.