6.3.24

AI makes identifying phishing emails trickier than ever

Phishing attacks can feel relentless, and large language models (LLM) or artificial intelligence (AI), like ChatGPT, make them even more challenging to identify. Historically, phishing emails, which often rely on a sense of urgency to steal personal information, were riddled with poor grammar and illogical requests. Now, AI is helping scammers create phishing emails that look genuine. The University’s IT Security team shares a few ways AI is making phishing emails harder to identify:

  • Goodbye Grammatical Errors: AI can write messages with perfect grammar and natural-sounding language.
  • Vishing: Voice cloning technology is emerging, allowing scammers to mimic a real person’s voice. This adds a whole new layer of deception to phishing attempts.
  • Personalization: AI can analyze social media profiles to personalize emails with details specific to you. These tactics can create a powerful sense of legitimacy.
  • Chatbots: Phishing attempts aren’t limited to email anymore. AI chatbots can be used to impersonate customer service representatives or other trusted figures, carrying on conversations to trick you into giving away personal information.

Learn more about how to avoid falling for phishing scams.

6.10.24

Your identity shouldn’t get a vacation

Warm weather is here, summer vacations are booked, and you’re ready to unwind. IT Security reminds you to remain vigilant in securing your identity. Wi-Fi hotspots in coffee shops, airports, and other public areas are convenient—but what you do is also public knowledge to anyone else on the same network. If you’d ensure your belongings are safe and secure, why wouldn’t you do the same with your data? Read the FTC’s advice for securely using public Wi-Fi networks and what device settings you should change, and consider using the University’s VPN to prevent attackers from seeing or modifying your data as it travels across the network.

6.17.24

FBI warns consumers about ‘juice jacking’

Have you ever been out in public only to realize your phone has lost its charge? You may be tempted to take advantage of the public phone charging stations you see at an airport or mall, for instance, but this could put you at risk for “juice jacking.” The FBI warns that bad actors are corrupting the USB ports as a way to introduce malware and monitoring software onto your devices. The University IT security team advises you to make a habit of carrying your own charging cord and use an electrical outlet instead. Most importantly, always be sure your phone is running on the most recent software update.

6.24.24

Secure your mobile device

Did you know more than a third of mobile device users don’t lock or secure their phones? With much of your personal information stored in portable devices, IT Security notes that it is crucial to add extra security to protect your identity from being stolen if your device is lost or stolen. Today’s smartphones and tablets have different security types—including passcodes, fingerprints, and facial recognition. Find out what features you can use on your devices to gain peace of mind, knowing your information is secure. Visit IT Security’s Mobile Device Security page for more information and tips on securing your mobile device, including what to do if your device is lost or stolen.