Intercom

intercom home  |  advanced search  |  about intercom  |  alerts  |  faq  |  help     Search Intercom

Anatomy of a Phish
One of the most common attacks used by cyber criminals is phishing. Phishing is a way cyber criminals attempt to acquire sensitive information by pretending to be a trustworthy entity in some form of electronic communication, the most common one being email.

Keep in mind that some of these emails have links to websites that look much like the site they are trying to mimic. Never click a link from an email you think is suspicious! On our information security website (www.ithaca.edu/icinfosec) we dissect an example of an actual phishing email, and some common things to look for to help you spot them.

Become a Fan of the ITS Information Security Office Facebook page at:
www.facebook.com/pages/IC_INFOSEC/118787124832433

Follow us on Twitter at: twitter.com/ic_infosec

 

National Cyber Security Awareness Month - Weekly Tip #2 | 0 Comments |
The following comments are the opinions of the individuals who posted them. They do not necessarily represent the position of Intercom or Ithaca College, and the editors reserve the right to monitor and delete comments that violate College policies.