|June 2014||Bots, Botnets, and Zombies|
|May 2014||Protecting Against Mobile Malware|
|April 2014||Hacked! Now What?|
|January 2014||Cyber Security Outlook|
SUNY NY-Alert Faculty/Staff
HOW TO SUBMIT YOUR EMERGENCY CONTACT INFORMATION
Go online to http://www.suny.edu/sunyalertsec and select Cortland from the college drop-down box.
Under enter user ID, type in the same name you use to log on to your office computer and also enter the same password you use on campus.
A SUNY Emergency Alert page will appear. Enter your appropriate contact information, then choose submit. If all the fields have been correctly filled, you will be able to select confirm and sign-off.
NOTE: We recommend that you supply at least one email address and cell phone number. There is no need to provide a fax number. Please do not supply a text-messaging number if your carrier is not listed on the menu. NY-Alert continues to expand its services to other carriers and we will have regular updates to the system.
How to recognize phishing email messages, links, or phone calls
Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.
Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.
What might a phishing email message consist of?
- Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling.
- Beware of links in email. If you see a link in a suspicious email message, don't click on it. Links might also lead you to .exe files. These kinds of file are known to spread malicious software.
- Threats. Have you ever received a threat that your account would be closed if you didn't respond to an email message?
- Spoofing popular websites or companies. Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows.
Beware of phishing phone calls
Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license. Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes.
Once they've gained your trust, cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.
Treat all unsolicited phone calls with skepticism. Do not provide any personal information.
To read the entire document: How to Recognize Phishing Email messages, links, or phone calls
For even more information follow this link: http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
Online Shopping Security Links
What to do if you encounter problems with online shopping sites:
If you have problems shopping online, contact the seller or site operator directly. If those attempts are not successful, you may wish to contact the following entities:
For additional information about safe online shopping, please visit the following sites: