Information Security

Phishing Alerts

Listed below are the latest phishing scams that have been acted upon by Information Security. Think you’ve received a phishing email? Don’t click it, report it.

Email Scam (Sep 19, 2024):

Date: Wed, 19 Sep 2024 From: "gary.budd@sti-help.com" <gary.budd@sti-help.com> Subject: Hello Student/Staff, Can you work remotely from 8pm to 9pm for our company daily? Salary $500 weekly. Contact the company secretary Mrs. Sarah Denis with your personal email...

read more

Security News

Check here for the latest security alerts that may affect you.

Ditch the Post-It Notes and Use a Password Manager

Most of us manage 100 or more passwords for our online accounts and it can be tough to remember so many unique passwords. If you’re like most people, you’re probably using the same password for most of your accounts—and that’s not safe. Once that single password is...

Video: Report Phish With One Click

The Report a Phish button easily allows you to report email you believe is phishing to Information Security directly from your O365 or...

How to Locate the Report Phish Button

IT Services has implemented an easier way to report suspicious emails from your University Outlook or Gmail inbox. This feature, called Report Phish, allows you to report phishing or other suspicious emails with the click of a button. The Report Phish button will...

5 Ways to Outsmart a Social Engineer

“Social engineering” is a newer term for an age-old pursuit: tricking people. Whether you use the modern-day terminology or opt for longer-standing classifications (like conning, hustling, and swindling), the result is the same. Scammers aren’t afraid to tell lies—...

Ransomware Attacks

Ransomware attacks are one of the most serious cybersecurity threats we face at the University of Chicago. Ransomware is a type of malicious software that steals user data, disables the user system, and then demands payment from the victim in order to re-enable system...

3 Facts About the Internet of Things (IoT) and Guide to Best Practices

It’s likely you own one or more items that are part of the Internet of Things (IoT). This collective term is used to describe a growing number of consumer, medical, and business items that are used to sense, control, and communicate data and activities. The IoT has...

3 Wi-Fi Habits to Adopt Today

Studies have shown that most mobile device users — even those who are security-savvy — tend to throw caution to the wind when it comes to connecting to open-access, public Wi-Fi networks. Public networks are displayed in the list of Wi-Fi networks without a lock icon....

Beware Coronavirus (COVID-19) Cyber Scams

We would like to warn everyone to remain vigilant for scams related to coronavirus 2019 (COVID-19). Cyber criminals may send phishing emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information or donating to...

Urgent? Are you available? Assistance needed immediately.

Have you received an email with this as a subject? Seemingly from your manager or department chair. Information Security wants to make you aware of an active, persistent scam that is targeting the University as well as many other institutions. These types of email...