Information Security
Security News
Security News – Beware Coronavirus (COVID-19) Cyber Scams
How can we help you?
- Report a possible phishing attempt
- I need to complete Security Awareness Training
- I need to reset or recertify my CNetID or password.
- I want to know how to use two-factor authentication.
- I need an SSL, code signing, or some other kind of security certificate.
- Report a possible compromise or other security incident
- I have a question about security for my application or have my application reviewed.
- My account was locked for spamming or due to some other security issue.
- I need access to phone records, emails, or other data for an investigation or personnel matter.
- I’m traveling and received an email asking that I contact the security team.
- My computer or phone was blocked from the network due to a virus detection.
- I want to send the security team a report about a security vulnerability or some other issue I discovered.
- A website I tried to visit is blocked and erroneously listed as suspicious. What do I do?
IT Policies
Refer to the University’s official IT policies regarding data security and use of copyrighted material.
Training and User Guides
Complete security training and get user guides for helpful security tips and advice.
Phishing Alerts
Listed below are the latest phishing scams that have been acted upon by Information Security. Think you’ve received a phishing email? Don’t click it, report it.
Email Scam (Apr 15, 2025): Performance Assessment Reports
From: "Connor Creighton" <connor_creighton@charleston.k12.sc.us> Date: Tue, 15 Apr 2025 14:29:27 -0700 Subject: Performance Assessment Reports Dear Team, Please find attached your 2025/26 Performance Assessment Reports Document. This evaluation outlines your...
Email Scam (March 13, 2025): Dr. Paul Alivisatos share a file for review.
Subject: Dr. Paul Alivisatos share a file for review. From: "Wendy Merrick" <wmerrick@isd2342.org> [sender is outside of UChicago] Paul Alivisatos Sent Request To You: Paul Alivisatos For security reasons to securely view this Portfolio, click verify...
Email Scam (Feb 11, 2025): Staff Assessment Report for 2025-2026
From: "Simpson, Marcie" <marcie.simpson@und.edu> Date: Tue, 11 Feb 2025 14:44:37 +0000 Subject: Staff Assessment Report for 2025-2026
Security News
Check here for the latest security alerts that may affect you.
Security Alert: Fake CAPTCHA Compromises on the Rise
Threat actors are constantly evolving their tactics to be more convincing. We want to bring your attention to a sneaky social engineering technique called ClickFix that cybercriminals are using to trick unsuspecting users. Here's what you need to know to stay safe:...
Job Fraud Threats – Employment/Grant/Scholarship Scams Targeting Students
A common misconception about cyber attackers is that they use only highly advanced tools and techniques to hack into peoples’ computers, accounts, lives. Cyber attackers have learned that the easiest ways to steal your information, hack your accounts, or infect your...
Ditch the Post-It Notes and Use a Password Manager
Most of us manage 100 or more passwords for our online accounts and it can be tough to remember so many unique passwords. If you’re like most people, you’re probably using the same password for most of your accounts—and that’s not safe. Once that single password is...
Video: Report Phish With One Click
The Report a Phish button easily allows you to report email you believe is phishing to Information Security directly from your O365 or...
How to Locate the Report Phish Button
IT Services has implemented an easier way to report suspicious emails from your University Outlook or Gmail inbox. This feature, called Report Phish, allows you to report phishing or other suspicious emails with the click of a button. The Report Phish button will...
Text Message Scam ( August 9, 2022 ): SMS Impersonation of University VIPs
Date: August 9, 2022From: +(213)205-5089 The following is part of an example of what a UChicago user saw and responded to the initial scammer message. We have currently observed some scam campaigns through phone text (i.e. smishing) where the attacker tries to...
5 Ways to Outsmart a Social Engineer
“Social engineering” is a newer term for an age-old pursuit: tricking people. Whether you use the modern-day terminology or opt for longer-standing classifications (like conning, hustling, and swindling), the result is the same. Scammers aren’t afraid to tell lies—...
Ransomware Attacks
Ransomware attacks are one of the most serious cybersecurity threats we face at the University of Chicago. Ransomware is a type of malicious software that steals user data, disables the user system, and then demands payment from the victim in order to re-enable system...
3 Facts About the Internet of Things (IoT) and Guide to Best Practices
It’s likely you own one or more items that are part of the Internet of Things (IoT). This collective term is used to describe a growing number of consumer, medical, and business items that are used to sense, control, and communicate data and activities. The IoT has...
3 Wi-Fi Habits to Adopt Today
Studies have shown that most mobile device users — even those who are security-savvy — tend to throw caution to the wind when it comes to connecting to open-access, public Wi-Fi networks. Public networks are displayed in the list of Wi-Fi networks without a lock icon....