Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • About Us
    • About Us
    • Mission Areas
    • IT Directory
    • Standards and Guidelines
  • Services
    • Services
    • Status
    • Security Announcements
  • Initiatives
    • Initiatives
    • AI at UCSF
    • IT Operating Model (ITOM)
    • Project Echo
    • Project One
    • Lift & Shift | Drupal 7-to-Drupal 10 Update Project
    • Digital Accessibility Compliance Project
  • News & Events
    • News & Events
  • How-To Articles
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (17)
    • Homepage (0)
    • How-To (286)
    • Landing Page (0)
    • News (71)
    • Other Content (160)
    • Service (64)
    • Standard & Guideline (20)
    • Status (37)

    Service Category

    • Access & Identity (18)
    • Business Applications (51)
    • Desktop Support (27)
    • Education Applications (7)
    • Email & Collaboration (116)
    • Health Systems (1)
    • Hosting & Computing (13)
    • Network & Wireless (15)
    • Phones & Pager (8)
    • Research Services (18)
    • Security (24)
    • Web Services (24)

    655 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services
    How-To

    Research Electronic Data Capture (REDCap) Programming

    REDCap software enables investigators to develop online survey instruments and databases. Our team runs an instance of REDCap in our data center that is distinct from the REDCap environment offered by Academic Research Systems (ARS).  

    • Affiliate
    • Research Staff
    • Researcher
    • Staff
    • Student
    • Research Services
    Other Content

    Nov 2024: IRS-THEMED LURES Distribute Remote Management Tool

    Other Content

    Jun 2023: Phishing Attacks Use Compromised Microsoft Office 365 Accounts

    Cybercriminals have launched phishing attacks leveraging compromised Microsoft Office 365 accounts.  The lures include .rpsmg file attachments, as well as embedded URLs hidden behind a “Read the Message” button.    Clicking the malicious link leads to a credential phishing kit that redirects the user to a legitimate login page.

    Other Content

    Mar 2023: Invoice-Themed Phishing Lures Spreading Malware

    Cybercriminals have launched phishing attacks using malicious invoice-themed attachments to spread malicious software (malware).  The phishing attacks hijack legitimate email threads to deliver the phishing lures to further increase the believability of the attacks.

    Other Content

    Feb 2023: Phishing Attacks Use Earthquake-Themed Lures

    Cybercriminals have launched multiple phishing attacks attempting to take advantage of the humanitarian crisis in Turkey and Syria following the earthquake. These attacks are intended to steal recipient’s funds or to lead to the installation of malicious software (malware).  As multiple attacks are exploiting this crisis, lures will appear different.

    How-To

    Subscribe to a Listserv

    • Affiliate
    • Faculty
    • Researcher
    • Staff
    • Student
    Other Content

    Nov 2023: Phishing Attacks Impersonate Philippine Agency

    Threat Alert Phishing Attacks Impersonate Philippine Agency

    Other Content

    Dec 2023: Bonus-Themed Lures Harvest Credentials

    Threat Alert: Bonus-Themed Lures Harvest Credentials 

    How-To

    Avoid Spam

    Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?

    • Technical Partner
    • Security
    Other Content

    May 2023: Phishing Kit Uses Finance-Themed Lures

    Cybercriminals are increasingly using phishing-as-a-service kits to build and distribute lookalike Microsoft Office 365 landing pages via phishing lures.  The phishing lures can be customized to have a variety of different appearances or themes.

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • …
    • Page 20
    • Page 21
    • Page 22
    • Page 23
    • Current page 24
    • Page 25
    • Page 26
    • Page 27
    • Page 28
    • …
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California