Spam is unsolicited, irrelevant, or inappropriate messages sent on the Internet to a large number of recipients. Sometimes, spam comes from corporate advertisements. Other times, spam comes from cyber criminals.
Phishing is a scam where you are tricked into revealing personal and sensitive information such as login credentials and banking details. Attackers usually do this by pretending to be someone you know or trust.
Spear Phishing is when the attack is personalized to you or your organization.
You can be tricked into thinking an email is really from someone you know, but the sender address has been forged. It is commonly used to mislead you (such as in a phishing attempt), but can be used as a prank.
Avoid and Reduce: Be careful about where you share your email address. If your email appears on a public directory or social media, it can easily be found by scammers.
Block: Make use of your Quarantine Inbox's block feature. Sign in with the following credentials:
Username: Your full @ufv.ca email address (NOT your AD username)
Password: Your network/email password
Once logged in, go to PREFERENCES > Whitelist/Blacklist. To add an entry, type an email address into the blacklist field and click the Add button.
Most importantly... Report suspicious emails to email@example.com so that we can take action.
UFV's cybersecurity team is constantly monitoring our email system to detect spam before it reaches you. We stay up to date on the latest email security threats to ensure our systems are current. However, cybercriminals are getting smarter in the ways they avoid detection so we need your help if something gets through.
Malware is short for "malicious software". They are computer programs that are specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
There are many types of malware. We understand... all the different terminologies can be confusing. Here are six common types of malware you might encounter:
Virus: Like a biological virus, computer viruses are able to replicate and spread on their own. They typically have a detrimental effect, such as corrupting your computer or destroying your data.
Trojan Horse: Trojan horses are designed to infiltrate your computer system while masquerading as a benign program. One of the most common types of trojan horse viruses are ones which pretend to be anti-virus software, but they are really viruses themselves. Clever!
Ransomware: Ransomware is designed to block access to your computer or files until a sum of money is paid, usually via non-refundable wire transfer or bitcoin transactions.
Spyware: Spyware is designed to covertly transmit your data (files, key strokes, and data) to the attacker's computer. True to its name, it spies on your activity.
Macro: A macro virus is written in a program's macro language (a language used to automate tasks within the program). As such, macro viruses are commonly distributed through documents and other files. Once you open it, macro viruses will use the program's macro language to automatically perform a sequence of tasks. These can modify your documents, delete them, send a copy of the virus from your email, and other things.
Bot: A malicious bot ("robot") is a self-propagating malware that is designed to infect computers and the perform some task it receives from an attacker. A number of bot computers is collectively called a botnet. If your computer is part of a botnet, it may send scam and phishing emails or perform attacks against other computers without your knowledge.