University of Connecticut University of UC Title Fallback Connecticut

You have been redirected to this educational page because you clicked on a link in a verified phishing message.

 

Protect Yourself From Future Phishing Scams

University Information and Technology Services (UITS) was alerted to the phishing scam and blocked access to the malicious website designed to compromise your personal information. The link now points to this page, intended to help you better identify and protect yourself from future phishing scams.

What is Phishing

Phishing is the attempt to obtain sensitive information such as usernames, passwords, social security numbers, and financial information, often for malicious reasons. By leveraging public information, such as email addresses from the University Phonebook, these message can appear legitimate.

Although the University’s spam mail filters and security processes reduce the threat to our community, they cannot eradicate all phishing. The best way to avoid being a victim of a phishing scam is to not fall for it.

How to Detect and Handle Phishing Messages

 
Step 1: Identify the message as a phishing scam.

Some red flags include:

  • Urgent requests. Phishing attacks attempt to induce panic in the receiver and cause the person to act before investigating the authenticity of the request.
  • Bad spelling or grammar.Phishing messages are notorious for containing misspelled words or poor grammar.
  • Mismatched email address information. Make sure the email address displayed in the From: field matches address listed in behind mailto:.
  • Generic signature line. A university message is typically signed by a university official, whose name you can verify, and have credible contact information.
  • Unexpected requests regarding personal information. Be extremely wary of following links or answering questions from contacts you did not initiate.

 
 
phishing-image
 
 
Step 2: Check out links and attachments before you click.

  • Links can direct you to spoofed web pages or download harmful files on your system. You can hover the cursor over the link before you click on it to ensure that the address matches the link that was typed. You can always check the legitimacy of a message by going directly to the company or organization website or contacting them via phone.
  • Hover over an attachment to verify that the title matches the file type.  A document that looks like it has a name “something.pdf” might actually be a file “something.exe.”  An .exe extension means the attachment is actually a software program that you execute and is extremely dangerous; it can cause computer infection and data loss.

 
Step 3: Report and delete

If you suspect that the email is a phishing message, forward it to reportphishing@uconn.edu. Then delete the message from your inbox.

What to Do if You Click on the Links in a Phishing Message

 

After reading this material, we recommend reviewing the phishing message that sent you to this page. Please note the elements within the message that make it suspicious.
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy