- Phishing Campaign Linked with “Dyre” Banking Malware
- Crypto Ransomware
- SSL 3.0 Protocol Vulnerability and POODLE Attack
- GNU Bourne-Again Shell (Bash) ‘Shellshock’ Vulnerability (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE 2014-6278)
- Just because your company's spam filter, virus filter and other defenses let an email through, doesn't mean it's harmless
- Hackers aren't the only threat to your computer
- Use Google's cached mode to avoid spyware
- Be skeptical and trust your instincts
"SPAM" is an unsolicited e-mail to your account. This can be equated to a telemarketing phone call. The best way to handle it is simply delete the message. As tempting as it may be, responding to the message generally indicates that your account is actively read and you'll wind up with more spam instead of less.
What we're doing to help protect you:
- Network Operations maintains a filtering system which limits the amount SPAM messages that you receive.
How can I protect myself?
- Take a moment to forward the message to email@example.com. We use these sample messages to adjust the settings which helps keep spam out of everyone's mailbox.
- Delete the message from your mailbox.
- Protect your email address. Think about if you know and trust a company before giving your information out online.
- Click links inside of SPAM messages. Often these links contain viruses or spyware, which can steal your information and lead to more SPAM!
- Reply to the message. It may be tempting to tell the sender how you really feel, but you'll really just be telling them that the account is actively read by someone.
- List your email address on your personal website. Spammers use tools to "harvest" addresses from websites.