Difference between revisions of "Phishing"

From The University of Akron Support Wiki
Jump to: navigation, search
(added checklist)
(If your account has been deactivated due to Phishing)
Line 11: Line 11:
 
==If your account has been deactivated due to Phishing ==
 
==If your account has been deactivated due to Phishing ==
 
You must understand the following:
 
You must understand the following:
1) how to recognize phishing attacks
+
# how to recognize phishing attacks
2) settings in webmail must be carefully reviewed, including signature, name, and reply-
+
# settings in webmail must be carefully reviewed, including signature, name, and reply-
 
to address.
 
to address.
3) password must be changed and previous password cannot be reused.
+
# password must be changed and previous password cannot be reused.
  
 
If you need assistance with any of these points please contact or visit the ZipSupport Center.  
 
If you need assistance with any of these points please contact or visit the ZipSupport Center.  
Line 22: Line 22:
  
 
'''Failure to follow any of these items may lead to their account being locked again.'''
 
'''Failure to follow any of these items may lead to their account being locked again.'''
 
  
 
==Phishing targeting UA==
 
==Phishing targeting UA==
 
===Fraudulent Example===
 
===Fraudulent Example===
 
===Legitimate Example===
 
===Legitimate Example===

Revision as of 17:16, 2 October 2008

Exclaim.png Critical!
The University of Akron will never e-mail you and ask you to disclose or verify your UA password. If you receive a suspicious e-mail with a link to update your account information, do not click on the link--instead, report the e-mail to The University of Akron for investigation. Go to http://www.uakron.edu/its/hoss/helpdesk/index.php or call 330.972.6888
Notice.png Notice
Passwords expire every 180 days. You can reset the password yourself at https://gozips.uakron.edu or by contacting us

What is Phishing

From Wikipedia, the free encyclopedia

In computing, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from PayPal, eBay, Youtube or online banks are commonly used to lure the unsuspecting. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a website. Phishing is an example of social engineering techniques used to fool users

If your account has been deactivated due to Phishing

You must understand the following:

  1. how to recognize phishing attacks
  2. settings in webmail must be carefully reviewed, including signature, name, and reply-

to address.

  1. password must be changed and previous password cannot be reused.

If you need assistance with any of these points please contact or visit the ZipSupport Center.

Once you have understood these points, contact the ZipSupport Center to have your account reactivated.


Failure to follow any of these items may lead to their account being locked again.

Phishing targeting UA

Fraudulent Example

Legitimate Example