In IT Security, the word threat means anyone or anything that
poses a danger to computing resources, or to computer users, or to their
University policy forbids anyone to
ask you for your password, and forbids you to share your password with
anyone. When an account is detected sending spam, the University does not
attempt any contact via that account, but blocks it immediately, as it is
presumed to be under control of a spammer.
Alert - Callers Falsely Representing Major Computer Manufacturers
The University Information Security Office (UISO) has received reports of telephone-based social engineers targeting faculty and staff. Employees have received calls from individuals claiming to be representing Dell in an attempt to solicit financial information such as credit card numbers. Should you receive a similar call from anyone soliciting information, the UISO recommends users immediately terminate the call and record the phone number. Please provide a detailed report of the attempt, including phone number, to firstname.lastname@example.org. It may also be advisable to notify the company the caller claimed affiliation with.
- Alert - Beware of Cryptolocker
Cryptolocker is malware that prevents access to data on local and network drives, including USB drives, by means of file-level encryption. Once the Cryptolocker malware has encrypted files, it will claim to decrypt the files upon payment.
The malware is known to be capable of affecting computers that are running Microsoft Windows 8, 7, Vista and XP.
- Make sure that your antivirus software and definitions are up-to-date.
- DO NOT click links or open attachments within emails unless you know the sender and are expecting an attachment.
- Keep regular backups of your important data.
Any user within the University that feels that they are being affected by the Cryptolocker malware should immediately stop using their machine and contact their local IT Administrator or the Service Desk at email@example.com.
- Phishing: In response to the increase in phishing attacks, USC has
begun to implement several measures intended to reduce the number of
e-mail accounts compromised by phishing. For more information, see the
USC Phishing Response web page.
Back to Top