Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

Removing Stored Passwords on OS X

OS X has password storage features, which can be accessed or managed using the Keychain Access application.  When updating account passwords, issues can arise related to the storage of old or outdated passwords.  In the following example, Keychain Access will be used to delete an outdated entry so the new credentials can be saved.

New Mac Malware

Submitted by admin on

WHAT HAPPENED?
There have been reports of a new Mac malware in the wild that allows attackers full access of infected Mac systems.


WHEN DID IT HAPPEN?
First reported Wednesday, July 6, 2016.


WHY DID IT HAPPEN?

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.

 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
 

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.

 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
 

Latest Ransomware

Submitted by admin on

WHAT HAPPENED?
A CoC computer was compromised and encrypted by the Locky ransomware virus.

 
WHEN DID IT HAPPEN?
It was discovered Thursday, April 28, 2016, at 8:30 AM.

 
WHY DID IT HAPPEN?
An un-requested email with an attached Word document was opened, which started the attack.  The email associated with this virus typically contains the following subject line: ATTN: Invoice_J-<8 digit string>

 
WHAT DO YOU NEED TO DO?