Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
348 Results
Sep 2023: Phishing Lure Uses Potential Employment Status Theme
Threat Alert: Employment Status-Themed Phishing Lures Cybercriminals have launched a series of phishing attacks using concerns over the recipient’s employment status legality as a lure. The lures contain a link purportedly related to employment status documentation. Key Actions (at Work and at Home)
Microsoft 365: Mendeley Cite for Word
DescriptionSeamlessly insert references and bibliographies into your document using the Mendeley Cite add-in for Microsoft Word.
- Faculty
- Staff
- Student
- Email & Collaboration
Avoiding Spam
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
ProofPoint Quarantine FAQs
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
IT Finance
The IT Finance and Campus Finance teams are responsible for the stewardship of IT’s financial resources (~$300M in annual spend and ~900 FTE). We ensure both IT’s and the institution's fiscal goals are met in compliance with accounting, regulatory, and other policies.
Dec 2022: HIPAA-Related Lures
Threat Alert: What to Watch For Cybercriminals have launched a series of phishing attacks impersonating the legitimate law firm, including Latham & Watkins.
Subscribe to a Listserv
- Faculty
- Staff
- Student
Dec 2023: Christmas-Themed Lures Steal User Credentials
Threat Alert: Christmas-Themed Lures Steal User Credentials Cybercriminals have launched a series of phishing attacks using an allegedly upcoming Christmas party as a theme. The phishing lures contain an HTML attachment that allegedly contains details relevant to the party. Opening the attachment leads to a lookalike Microsoft Outlook login page that steals any entered credentials. Key Actions (at Work and at Home)
Avoid Spam
Overview Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security
Stop You've Been Phished!
But don't close this page!This phish is authorized by UCSF Information TechnologyHowever, this could have been sent by a criminal and scanning the QR code could have led to a criminal: