{"id":96,"date":"2009-02-20T11:30:40","date_gmt":"2009-02-20T11:30:40","guid":{"rendered":"http:\/\/blogs.wabash.edu\/technotes\/2009\/02\/20\/phishing-attacks-on-the-rise-at-wabash\/"},"modified":"2009-02-20T11:30:40","modified_gmt":"2009-02-20T11:30:40","slug":"phishing-attacks-on-the-rise-at-wabash","status":"publish","type":"post","link":"https:\/\/blog.wabash.edu\/technotes\/2009\/02\/20\/phishing-attacks-on-the-rise-at-wabash\/","title":{"rendered":"Phishing Attacks on the Rise at Wabash"},"content":{"rendered":"<p>For several years, financial institutions and large web sites such as Amazon and eBay have been used in &quot;phishing&quot;&nbsp;attacks in an attempt to gain personal information from customers of these sites. &nbsp;While Wabash may not have as large a customer base as these companies, Wabash too is being used in phishing attacks.<\/p>\n<p>In a phishing attack, a person sends an email that pretends to come from a legitimate bank, merchant, organization, or government agency.&nbsp; In reality, the sender is attempting to fraudulently acquire personal information, such as a password, bank account, or credit card.&nbsp; The phishing emails typically claim there is a problem that requires immediate attention; for example, a phishing message may claim the person&rsquo;s account will be closed unless they send their username and password to &ldquo;confirm&rdquo; they are still using the account.<\/p>\n<p>Phishing attacks can be extremely complex.&nbsp; Messages will often use graphics from the legitimate web site, and may even have an associated copy-cat web site that they direct the recipient to.<\/p>\n<p>In recent weeks, we&#8217;ve seen a marked increase in phishing emails that claim to be from Wabash.&nbsp; We&rsquo;ve had reports from students, employees, and Wabash alumni who have received the scam.&nbsp; Many of these emails claim there is a problem with your Wabash email or webmail account, and ask you to send your username and password to avoid having your account deleted or disabled.<\/p>\n<p>Wabash IT Services will NEVER ask for your password via email.&nbsp; If you receive a message asking for your password, you can be sure it is a hoax and an attempt to gain access to your personal information.&nbsp; If you are ever unsure of the validity of a message you receive, feel free to contact the IT Services Help Desk at <a href=\"'+String.fromCharCode(104,101,108,112,100,101,115,107,64,119,97,98,97,115,104,46,101,100,117)+'?subject=Suspected%20Phishing%20Incident'\">helpdesk@wabash.edu<\/a>, or phone 765-361-6400.<\/p>\n<p><a href=\"http:\/\/www.onguardonline.gov\/default.aspx\">OnGuard Online<\/a>, a web site maintained by the Federal Trade Commission with assistance from a number of other government agencies, is a good resource for additional information on phishing scams and other online dangers.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For several years, financial institutions and large web sites such as Amazon and eBay have been used in &quot;phishing&quot;&nbsp;attacks in an attempt to gain personal information from customers of these sites. &nbsp;While [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-96","post","type-post","status-publish","format-standard","hentry","category-help-desk"],"w_featured_image_url":"","_links":{"self":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/posts\/96","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/comments?post=96"}],"version-history":[{"count":0,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/posts\/96\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/media?parent=96"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/categories?post=96"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/tags?post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}