Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • Status
    • Security Announcements
  • Services
  • How To
  • News & Events
  • About Us
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

Log in to see all content. Some content is hidden to the public.

Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

Type

  • Event (0)
  • How-To (8)
  • Landing Page (0)
  • News (4)
  • Other Content (21)
  • Service (2)
  • Standard & Guideline (0)
  • Status (0)

Service Category

  • Access & Identity (0)
  • Business Applications (0)
  • Desktop Support (0)
  • Education Applications (0)
  • Email & Collaboration (2)
  • Health Systems (0)
  • Hosting & Computing (0)
  • Network & Wireless (0)
  • Phones & Pager (0)
  • Research Services (0)
  • Security (6)
  • Web Services (0)

35 Results

Other Content

Jan 2023: Compensation-Themed Phishing Lures Harvest Microsoft Credentials

Threat Alert: What to Watch For Cybercriminals have launched a series of phishing attacks using timely email phishing lures related to annual compensation reviews and bonuses.  The phishing emails encourage recipients to click a lure to confirm a payment-related change.

How-To

Report a Security Incident

Steps to follow Report anything that causes concern Immediately contact the UCSF Service Desk to report an information security problem or a possible or potential information security problem. Phone: 415-514-4100​​​​​ Email: [email protected] Web: http://help.ucsf.edu

Other Content

Nov 2022: Amazon-Themed Lures Distributed Via Zoom

Threat Alert: What to Watch For Cybercriminals have launched a series of malicious email attacks impersonating an Amazon package order confirmation. The attack uses Amazon-branded emails delivered from a Zoom sending address, as threat actors are abusing Zoom’s infrastructure. The emails prompt recipients to click a link to download an invoice for order details.

Other Content

Dec 2022: HIPAA-Related Lures

Threat Alert: What to Watch For Cybercriminals have launched a series of phishing attacks impersonating the legitimate law firm, including Latham & Watkins.

Other Content

Nov 2022: Twitter-Themed Lures Used in Credential Phishing Attacks

Threat Alert: What to Watch For Cybercriminals have launched phishing attacks impersonating Twitter Services. The emails include links to lookalike landing pages that are designed to steal Twitter credentials and phone numbers. While the email display names make it appear the messages come from “Twitter Services,” the actual sending address is a Gmail account. The emails use the proposed change at Twitter of charging verified users a monthly fee to maintain their verification status.

Other Content

Nov 2022: Recruitment Company Michael Page Impersonated in Job-Themed Lures

Threat Alert: What to Watch For Cybercriminals have launched a series of phishing attacks against individuals in the UK impersonating the recruitment company Michael Page.

Other Content

Nov 2022: Shopping and Shipping Themed Mobile Attacks Likely to Ramp in Coming Weeks

Holiday-Related Phishing Attacks: What You Need to Know Every year, as the holiday shopping season approaches, holiday-themed phishing attacks rise. Attackers know the season brings a high volume of ecommerce activity—and related notifications.

How-To

Email Tagging

  • Affiliate
  • Faculty
  • Staff
  • Student
  • Technical Partner
  • Volunteer
How-To

Avoid Spam

Overview Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?

  • Affiliate
  • Faculty
  • Staff
  • Student
  • Technical Partner
  • Security
How-To

How Do I Protect My Computer from Ransomware

If you receive a ransomware pop-up or message on your device alerting you to an infection: Take immediate action to avoid any additional infections or data loss:

Pagination

  • First page « First
  • Previous page ‹ Previous
  • Page 1
  • Page 2
  • Current page 3
  • Page 4
  • Next page Next ›
  • Last page Last »
Home

Footer Col 1

  • Status
  • Services
  • How To
  • News & Events

Footer Col 2

  • About
  • IT Directory
  • Standards & Guidelines

Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2023 The Regents of the University of California