Information Security

Security News

Security News – Understanding and responding to Log4Shell and other Log4j-Related vulnerabilities.

Information Security Training

Read our FAQ for more information about Core Information Security Awareness training.

Phishing Alerts

Listed below are the latest phishing scams that have been acted upon by Information Security. Think you’ve received a phishing email? Don’t click it, report it.

Email Scam (Jan 6, 2022): “Help desk”

From: The University of Chicago <fbgrhrfd@gmail.com> Date: Thursday, January 6, 2022 at 5:49 PM Subject: Help desk There are some technical errors that have affected our server because of undelivered emails from your account, therefore you are advised to confirm...

read more

Email Scam (Jan 6, 2022): Employment Opportunity

From: "Dr. Phillip Arslan " <perrywilliam793@gmail.com> Date: Thu, 6 Jan 2022 16:51:17 +0800 Subject: Employment Opportunity I am Dr. Phillip Arslan and I work as clinical counselor for the department of Disability Resources and Educational Services (DRES). I...

read more

Email Scam (Nov 3, 2021): “Job”

From: Richard A Olshen <olshen@stanford.edu> Sent: Friday, December 3, 2021 9:26:24 AM Subject: Job I am sharing job opportunity information to students and staff who might be interested in a paid UNICEF Part-Time job with a weekly pay of $500.00 (USD). Attached...

read more

Security News

Check here for the latest security alerts that may affect you.

Cybersecurity First – Oct 25, 2021

Cybersecurity is a Team Sport Cybersecurity is a shared responsibility, and the University of Chicago’s security efforts will only be successful when all members of the campus community understand the risks and take steps to avoid them. We offer the following tips to...

Cybersecurity Career Awareness Week

Cybersecurity is a dynamic and rapidly growing field, with new threats and challenges emerging each day. And with that, there is a huge push being undertaken by both business and education sectors to attract individuals toward a degree and career in cyber. Whether...

Protecting Yourself Against Ransomware Attacks

In week 1 of Cybersecurity Awareness Month, we focused on educating you on the different types of phishing attacks we have seen and that many have reported receiving in the UChicago community. The most important element in a successful phishing attack is the human...

5 Ways to Outsmart a Social Engineer

“Social engineering” is a newer term for an age-old pursuit: tricking people. Whether you use the modern-day terminology or opt for longer-standing classifications (like conning, hustling, and swindling), the result is the same. Scammers aren’t afraid to tell lies—...

Ransomware Attacks

Ransomware attacks are one of the most serious cybersecurity threats we face at the University of Chicago. Ransomware is a type of malicious software that steals user data, disables the user system, and then demands payment from the victim in order to reenable system...

3 Steps to Fight Phishing

Chances are good that at some point you’ve received a suspicious email urging you to click on a link or open an attachment. This email was most likely an example of the cybercrime known as phishing. Phishing is when cybercriminals send malicious emails designed to...

3 Facts About the Internet of Things (IoT) and Guide to Best Practices

It’s likely you own one or more items that are part of the Internet of Things (IoT). This collective term is used to describe a growing number of consumer, medical, and business items that are used to sense, control, and communicate data and activities. The IoT has...

3 Wi-Fi Habits to Adopt Today

Studies have shown that most mobile device users — even those who are security-savvy — tend to throw caution to the wind when it comes to connecting to open-access, public Wi-Fi networks. Public networks are displayed in the list of Wi-Fi networks without a lock icon....

Beware Coronavirus (COVID-19) Cyber Scams

We would like to warn everyone to remain vigilant for scams related to coronavirus 2019 (COVID-19). Cyber criminals may send phishing emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information or donating to...