News & Events
Follow our Featured News to stay current with service changes, new service releases, awareness and education on current services and technology.
Wednesday, September 23, 2020
Job Offer Scams Target Undergraduate StudentsAs the new school year begins, the Information Security Office (ISO) would like to bring attention to a string of fake job offer scams that have been targeting undergraduate students at Carnegie Mellon University.
Tuesday, September 08, 2020
Back to School CybersecurityThe start of the school year brings changes for everyone, whether you’re a student, a staff member, or an educator. You may need to navigate new digital environments, create new online accounts, and safely share data, documents, and personal details. The following security tips can help you— and any students in your care—start the year strong.
Wednesday, July 29, 2020
How to Identify Email Spoofed Phishing AttacksDid you know that email scammers can easily forge the email from address? It’s called email spoofing and it can make the job of spotting scams more difficult.
Monday, June 29, 2020
How to Protect Personal Information OnlinePeople have protected their personal information and sensitive documents for centuries. Historically that involved mostly physical protections, but in a digital world, physical protections are not enough. Physical protection of sensitive documents can occur by locking them away in a drawer or renting a safety deposit box at the bank. However, protecting a person’s digital information can be more difficult.
Wednesday, May 27, 2020
The Power of UpdatingYou may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. This software may run your laptop, could be the mobile apps you use on your smartphone, or perhaps even the software in your baby monitor or other devices in your home. Bad guys take advantage of these software weaknesses, allowing them to remotely break into devices around the world.
Monday, May 04, 2020
May the Force Be With You in Protecting Your Data and DevicesMonday, May 4th is National Star Wars Day. Millions of science fiction fans of the Star Wars movie franchise may find themselves uttering a pun on the famous catchphrase “May the Force be with You”, which means wishing someone good fortune. Now you may not be a Jedi master like Obi-Wan Kenobi, but here’s how to use the force so you can protect your data and devices from cyber threats and Sith Lords.
Wednesday, April 22, 2020
Keep Your Mobile Devices SecureMobile devices, such as smartphones and tablets, aren’t exempt from cybercrime. When a mobile device is connected to the Internet, the user of that device faces the same threats as a desktop computer user. Fortunately, you are not powerless when it comes to cyber threats. Taking a few preventative measures will go a long way in stopping a cyber-attack before it begins.
Monday, April 13, 2020
Scammers Request Electronic Gift Card Purchases Due to CoronavirusScammers are taking advantage of the coronavirus pandemic by finding new ways to trick users into giving up their money. There have been reports of coronavirus-related scams such as fake donations to hospitals for Personal Protective Equipment (PPE), unemployment benefits scams, fake charity scams, and scams offering coronavirus cures. Though the scams are new, these criminals are still attempting to collect cash through an old and reliable method ― gift cards.
Monday, March 30, 2020
Be Aware of Your Surroundings While Working RemotelyMany of us are working remotely these days in open or shared environments such as the kitchen table, the living room couch, the back porch, or even squirreled away in an unused bedroom. We may have roommates, significant others, or kids coming in and out of our work area. We may also have smart assistants in our homes, such as Alexa, Cortana, Google, and Siri. These devices are always listening and reacting to your commands.
Thursday, March 19, 2020
Tips for Securely Working From HomeJust as our university is a target, so too are you at home. Your personal information, accounts, emails, and even your systems at home are valuable to cyber attackers. The university network block protections are not effective on non-campus networks. Not only can remote workers have their own privacy put at risk, working from home could result in breaching company security as well. This is why it is essential that when working from home, you follow the security procedures in the Guides for Remote Learning and Work. Read on for some simple steps you can take to create a more cyber secure home environment.
Monday, March 09, 2020
Digital Spring CleaningMost of us are so looking forward to spring! The landscape starts to take shape, flowers start to bloom, and, for many, there’s a desire to spring clean. While it might be easy to see the need to purge and tidy up, realizing the need to also digitally declutter isn’t so apparent. Here are some quick tips to get your digital life in order and establish new digital habits.
Thursday, February 20, 2020
Social Engineering: Pretexting and ImpersonationPretexting is a form of social engineering where a criminal creates a fictional backstory that is used to manipulate someone into providing private information or to influence behavior. Criminals will often impersonate a person of authority, co-worker, or trusted organization to engage in back-and-forth communication prior to launching a targeted spear phishing attack against their victim.
Friday, February 07, 2020
The Dangers of Security TailgatingOne of the most common and widespread security breaches affecting organizations today is a social engineering attack known as tailgating (also referred to as piggybacking). Tailgating is a physical security breach in which an unauthorized person follows an authorized individual to enter a typically secured area.
Monday, January 27, 2020
Data Privacy DayJanuary 28th is Data Privacy Day! Most people believe that control of their personal data is broken, but don't know what to do to fix it, or worse, think they can’t do anything to fix it. This Data Privacy Day choose to follow these quick steps which will make a huge difference in protecting your privacy: from reducing your exposure to privacy risks, to adding extra protection to your passwords and accounts.
Wednesday, January 08, 2020
Phishing: Don't Be the Latest CatchEmail and other forms of messaging services such as Instagram, Skype, WhatsApp, and Facebook are primary methods of communication. These services are utilized by individuals daily for work, as well as to communicate with friends and family in their private lives. Unfortunately, since so many people rely on these messaging services, they have become a primary attack vector used by cyber criminals to gain access to sensitive information in a scheme known as phishing.
Monday, December 16, 2019
Phishing vs Spam: How to Determine the DifferenceWhile there are many tools in place to filter and block a large volume of phishing or spam emails, some of these messages may be delivered to your inbox. Make sure you understand the difference between a spam and phishing email and how to handle each type of message.
Friday, December 06, 2019
Stay Safe from Online Threats This Holiday SeasonAs the holiday season approaches, the Information Security Office (ISO) encourages users to be aware of potential holiday scams and malicious cyber campaigns, particularly when browsing or shopping online.
Friday, November 22, 2019
Using a Password Manager to Easily Secure Your AccountsIn 2019 almost everything a person does online requires an account. Whether it’s for shopping, socializing, playing games, or even listening to music; there is an account and password that needs to be created in order to utilize the service. Since the average user has dozens, if not hundreds of accounts, it can be overwhelming to create and remember strong, unique passwords for each one. This can lead to weak passwords that can be cracked in a matter of seconds, or password reuse.
Thursday, November 07, 2019
Fake Job Opportunity for Students is the Latest Gift Card ScamGift cards are a popular and convenient way to provide someone a gift, especially during the holiday season. However, gift card scams have become an increasingly popular tactic used by criminals in recent years to steal money from unknowing victims. The latest gift card scam involves a bad actor posing as a professor of the university who is sending emails to students with a supposed job opportunity.
Wednesday, October 23, 2019
Spooky Social Media Cyber ThreatsCyber security threats can be scary and even downright frightful when you don’t know what to look for. This Halloween the Information Security Office wants to make sure that unlike your favorite horror movie, you are prepared to defend yourself against these types of spooky social media cyber threats before it’s too late!
Thursday, October 03, 2019
Password Reuse Leads to Andrew Account CompromiseCMU users who have used the textbook rental company Chegg or the fashion and sneaker trading platform StockX may have been affected by a recent security breach.
Wednesday, October 02, 2019
Cyber Circus to Kickoff NCSAMThe National Cyber Security Alliance and the US Department of Homeland Security launched National Cyber Security Awareness Month (NCSAM) in 2004 to promote cyber awareness. This year’s theme “Own IT. Secure. IT. Protect IT.” encourages personal accountability and proactive behavior in digital privacy, security best practices, common cyber threats and cybersecurity careers.
Wednesday, September 25, 2019
Multi-Factor Authentication: What It Is and Why You Need ItStrong web security relies on a variety of tools and policies. It’s important not to rely on any single method for comprehensive protection. Multi-factor Authentication (MFA) adds another layer of account security, supplementing the username and password model with another factor that only the specific user has access to.
Friday, September 13, 2019
How to Create, Remember, and Secure a Strong PasswordPasswords have become a big part of our lives in the digital age. We use them so often that it is easy to overlook the importance of creating a strong one. Almost every bit of private information about us is stored behind a password. If that password were to fall into the wrong hands, it could jeopardize our personal and financial livelihood. This article will provide helpful tips on how to create and remember a strong password—and more importantly, how to keep it secure.
Wednesday, August 28, 2019
How to Handle and Report Information Security ConcernsWe know that students, staff, and faculty care about protecting their computers and mobile devices and take steps to secure them. However, no matter how securely we use technology, cybercriminals are constantly utilizing new attack methods to compromise accounts and steal personally identifiable information. This article will review how users should report security concerns here at Carnegie Mellon.
Thursday, August 15, 2019
Using a Virtual Private Network at CMUSurfing the web or making transactions on an unsecured network, such as public Wi-Fi, means you could be exposing your private information. A cybercriminal could eavesdrop on a user’s network activity if not using encrypted communications protocols such as HTTPS. One way to protect online activity is to use a Virtual Private Network (VPN).
Thursday, August 01, 2019
Email Impersonation Scams on the Rise at CMUEmail is the primary form of communication for students, staff, and faculty here at Carnegie Mellon University. Email provides users a quick and reliable way to effectively communicate with coworkers, friends, and family. Though email communication is essential in a digital world, it can also be dangerous. Cybercriminals are taking advantage of email based communication by creating and delivering impersonation based scams to Carnegie Mellon users.
Tuesday, July 16, 2019
How to Spot and Avoid Common ScamsHave you ever gotten an email from someone claiming to be royalty? In their email, they tell you that they will inherit millions of dollars, but need your money and bank details to get access to that inheritance. You know this email isn’t legitimate, so you delete it, yet there are many more scams being perpetrated by criminals that sound more believable and aren’t as easy to spot.
Friday, June 28, 2019
On-Demand Security Awareness Training Available at CMUSecurity awareness has a critical role in minimizing serious cyber threats posed by advances in information technology and innovations by cyber criminals. Proofpoint’s Wombat Security Education platform features 36 interactive training modules in over 35 different languages which focus on the most prevalent issues in cyber security today.
Wednesday, June 12, 2019
Protect Your Personal DevicesWith an increasing amount of sensitive data being stored on personal devices, the value and mobility of smartphones, tablets, and laptops make them appealing and easy targets. These simple tips will help you be prepared in case your laptop is stolen or your smartphone is misplaced.
Tuesday, May 21, 2019
Voice Phishing Phone Scams Hit Home and OfficeIn this digital day and age, the average Carnegie Mellon user is likely familiar with the techniques cybercriminals use to get ahold of personal data and money. However, cybercriminals have become smarter and therefore their attacks have become more complex.
Monday, May 06, 2019
World Password Day!Thursday, May 2nd was World Password Day! Password Day falls on the first Thursday in May each year and is intended to raise awareness of password best practices and the need for strong, unique passwords.
Wednesday, April 24, 2019
Take Control of Your Personal Info to Help Prevent Identity TheftIdentity theft has become a fact of life during the past decade, however there is a lot we can do to protect ourselves from identity theft and to make recovery from cyber incidents quicker and less painful.
Monday, March 11, 2019
Gift Card Scam Uses Phony Academic and Administrative Leadership EmailsCyber criminals use a variety of attack methods in order to obtain personal or financial information. One of the more sophisticated types of attacks is known as spear phishing. Spear phishing is a targeted attack towards a specific individual, organization, or business.
Monday, February 25, 2019
New CMU Phishing E-Mail is Double TroubleA recent staff-wide phishing e-mail that had been circulating throughout the University contained two different ways malware could infect your system. The author of this phishing e-mail was hoping to lure unsuspecting users to open the PDF attachment or click the link and download the PDF file as both were laced with malware.
Monday, July 16, 2018
Extortion campaign leverages passwords stolen from third-partiesExtortion campaign leverages passwords stolen from third-parties. There is no need to be alarmed.
Friday, June 01, 2018
FBI recommends everyone reboot home routersOn May 25, 2018, the FBI issued a public service announcement recommending that everyone reboot (power cycle) home and office routers to disrupt malware known as as "VPNFilter".
Thursday, March 29, 2018
March 2018 Phishing: Security Alert on You AccountThis past weekend, a targeted phishing e-mail was sent to campus community members. This phish presented a screen that looks like the CMU web login page. If you had entered your credentials, the attackers attempted to log into Workday, but were luckily foiled by Duo, our two-factor authentication.
Tuesday, May 16, 2017Load more articles