What is Phishing?
Phishing is a deceptive technique where users are directed, often through official-looking emails, to provide personal information under false pretenses. These fraudulent messages may impersonate banks, police agencies, friends, coworkers, or other legitimate entities. The information requested can include credit card numbers, social security numbers, ATM PINs, passwords, and more. Recipients are typically asked to provide this information via email or by visiting official-looking websites, with threats of service discontinuation for non-compliance.
Note: Legitimate businesses and government entities are aware of phishing scams and would not ask you to send sensitive information in response to unsolicited e-mail. You should treat these messages like spam and never reply to them. Information Technology Services advises people to never send any passwords via an e-mail message for any reason.
Protect yourself: For Students, Faculty and Staff
- Change Your Password: Ensure your password is unique, at least 12 characters long, and consider using a password manager.
- Stay Informed: Review the ITS PHISH TANK, Information Security page, and the about Phishing page to stay safe and updated on phishing scams.
- Report spam or phishing Emails: In Gmail next to reply click more (three dots) and select "Report Phishing" or "Report Scams". Contact email security@binghamton.edu
Common Phishing Attacks
- Scam Alerts
Phishing scams come in various forms, from enticing users to "click here" for more information to fraudulent job offers with fake checks. There are also scams involving gift cards, false fines, phone-related schemes, and other job-related deceptions. It's crucial to stay informed and report any suspicious activity to the Help Desk and security@binghamton.edu.
– Should you ever get any requests in print, please bring them to the ISSS Office or Financial Aid immediately, and they will review them and advise accordingly. - Protecting Your Personal Information
It's crucial to be cautious, especially when asked for personal information over the phone. If someone claims to work for a U.S. government agency, always verify their identity. They will probably tell you that your only opportunity to resolve the issue is at the time of the call and that you have to take action now. Do not believe them. Ask for the person's full name, agency they are working for and a telephone number to call the person back. Never release personal information over the phone. For questions or concerns, contact the Help Desk. - Tuitions and Scams
Some students have been targeted in scams promising better exchange rates for tuition payments. Never share your ßÙßÇÂþ» login information. Make all payments through Student Accounts using the official Flywire service for currency conversion.
Start with the DON'Ts
1. DON'T fall for fake emails: Never disclose financial or personal information via email, regardless of how legitimate it may appear. Always research the email's authenticity. ßÙßÇÂþ» will direct any personal information requests through the myßÙßÇÂþ» portal ONLY.
2. DON'T click on random links: Don't turn into a fish out of water! Avoid randomly clicking links in emails and websites. Hover over links and senders first to ensure their legitimacy.
3. DON'T apply to suspicious job postings: Red fish, green fish, BLUE PHISH. You will be BLUE if you don't research job openings posted on Handshake or any others sent to you via Bmail.
4. DON'T connect to public Wi-Fi off campus: Avoid using public Wi-Fi, which can be a hotspot for hackers. Utilize ßÙßÇÂþ»'s VPN (virtual private network) for enhanced security. It's easy, and it's peace of mind.
And Apply the DO's for Online Security
1. DO use 2-factor authentication: Add an extra layer of security beyond your username and password. Learn more about
2. DO run malware and virus protection: Keep your devices secure by using up-to-date browsers, virus protection, malware detection, software, and apps. Regularly check for updates for peace of mind. Learn more about malware and virus protection.
3. DO backup your work: Protect your valuable data by regularly creating backups. It's an extra layer of security and peace of mind. Learn more about how to backup your data.
4. DO protect your credentials: ßÙßÇÂþ» or any reputable organization will NEVER SEND EMAILS requesting your usernames, passwords, or other personal information.
MOST OF ALL - Stay in tune with the latest advice and assurance to avoid phishing scams by following ßÙßÇÂþ» ITS (@ßÙßÇÂþ»ITS) via .
Social Engineering: Protecting Yourself from Deceptive Tactics
What is Social Engineering?
Social engineering encompasses a wide range of malicious activities accomplished through human interactions. It leverages psychological manipulation to trick individuals into making security mistakes or divulging sensitive information. This differs from social engineering within the social sciences, which does not contain the divulging of confidential information. It's basically when a hacker uses social contact techniques in a way to trick you into providing them with personal information that can break your security barrier. Whether it be in person, by email, by text message, on the web, or over the phone.
Stay Alert When Dealing with Unfamiliar Individuals:
Be prepared when someone you do not know:
- Asks you for information they're not authorized to access.
- Uses urgency or pressure to obtain what they want, employing tactics like emotion, threats, fear, or rushing.
- Utilizes technical jargon, confusing terms, grandiose offers, and other strategies to prompt a response
- Requests you to bypass or ignore standard security policies and processes.
- Pretends to be someone you know, even if their tone doesn't sound similar to that person.
If in doubt, report it to the Help Desk and security@binghamton.edu. Remember, we can only help you remain secure if you take measures to help yourself.
For a deeper understanding, review these of social engineering tactics:
Additional Guidance and Useful Links for Phishing Scam Avoidance
- Phishing Techniques: Stay informed about phishing scams and their evolving methods by following @binghamtonITS on and .You can also take advantage of training for more insights.
- Think Before You Click: Never click on a link unless you are certain of its authenticity. Hover over links to preview their destinations before clicking.
- Install an Anti-Phishing Toolbar: Adding an to your browser is a simple and effective way to protect yourself from malicious links.
- : Always check that a website's URL begins with "https" and features a lock icon and certificate. This additional verification step is essential for your online safety.
- Regularly Check Your Online Accounts: Be vigilant and monitor your online accounts for any suspicious activity. Early detection is key to preventing security breaches.
- Keep Your Browser Up to Date: Outdated web browsers can harbor serious security vulnerabilities. Regularly update your browser to stay protected. Learn more about how to keep your
- Use Firewalls for Added Protection: act as a barrier or shield, safeguarding your devices from data-based malware threats. Learn more about Firewall.
- Exercise Caution with Pop-Ups: A single click on a malicious can lead to serious consequences. Always proceed with caution.
- Never Share Personal Information: Safeguard your to reduce the risk of identity theft.
- Employ Antivirus Software: Ensure your devices' security by running up-to-date antivirus software, browser protection, malware prevention, and security applications. Regularly check for software and app updates to maintain your peace of mind
- Implement 2-Step Verification: Enhance your account security by adding an extra layer of protection. Utilize to safeguard your accounts effectively. The provided link offers guidance on implementing 2-step verification for your Bmail Google account.
For more comprehensive information on each of these steps and additional ways to avoid falling victim to phishing scams, you can visit .
Helpful Links and Tips to Avoid Phishing Scams
Stay Informed
How Phishing Works, Information Phishing Sites May Ask For and Reporting Phishing Sites
: Avoid Phishing Attacks:
Key Tips for Your Safety
Be Cautious with Suspicious Emails: When you receive an email asking for personal information, follow these steps:
-
- Don't click any links or provide personal information until you've verified the email's legitimacy.
- If the sender has a Bmail address, report the to Google and/or contact the Help Desk.
When you get an email that looks suspicious, here are a few things to check for:
-
- Check that the email address and the sender name match.
- Check if the .
- Hover over links before clicking to confirm their destination. Be cautious of misleading URLs.
- to ensure the "from" header isn't suspicious.
Secure Your Gmail (Bmail) Account: If you suspect your Gmail (Bmail) account has been compromised, take these steps:
-
- before opening or sending any other emails.
- If issues persist, and seek support from the page or contact the Help Desk at 607-777-6420.
Beware the Latest Scams
-
- Stay ahead of the curve by watching out for the most recent scam emails. To learn more, read Adam Rowe's insightful article on .
Additional Security Hints
Exercise Caution: Do not respond to emails requesting personal information.
Verify Website Authenticity: Refrain from providing personal information on websites
unless you're certain about their legitimacy.
Be Wary of Clicking: If you're asked to "click here" to view a message or follow a
link, always double-check with the sender. Hover over the link to scrutinize the URL.
Compromised Computer Accounts
There have been several e-mail phishing scams from accounts claiming to be ßÙßÇÂþ»
University e-mail addresses and asking recipients to send their passwords via a reply
e-mail, or to "CLICK HERE..." Some in our campus community have taken the bait and
provided sensitive, personal material to unknown parties. Identity theft is a growing
national issue. Phishing is one method for unscrupulous persons to gain access to
personal or computer account information and launch either spam attacks or hacking
attacks on others in the internet community. The account owner is usually not aware
of this improper use. Explore examples of phishing scams targeting ßÙßÇÂþ» accounts.
ITS performed a spot check of outgoing e-mail and found that almost 100 people responded to one of these scams, which purported to be a request from the "ßÙßÇÂþ» Technical Support Team" and threatened to cut off e-mail service unless the recipient responded with user ID, password and birth date. We notified those people that they responded to the scam and urged them to change the passwords on their accounts to strong passwords (8-character minimum with a mix of small letters, capitals, numbers and special characters). It is good practice to change your password frequently.
If you have doubts about requests to send sensitive information via e-mail or web page, DO NOT REPLY! Call the office or email the person/party responsible for the request and verify that the request is legitimate and that the data collected is handled securely during transit and at the recipient site. University offices must adhere to this high standard as well. Please consult the University policy on Internet privacy for details.
Stay Vigilant
Recognize that it's impossible to monitor every phishing scam that users may encounter. Reputable institutions, including the University, will never request personal or password information via unsolicited emails. Therefore, never respond to such requests, regardless of how legitimate they appear.
If you have doubts about the validity of a message, verify the contact information
from verifiable sources, such as paper correspondence or the telephone book. Users
should also report any suspicious messages to the ITS Help Desk (helpdesk@binghamton.edu or 607-777-6420) and/or security@binghamton.edu, as not all scams may be immediately apparent.
If you've fallen victim to a phishing scam, promptly. Additionally, please report any suspicious emails or phishing scams at
security@binghamton.edu and contact the Help Desk if you require further assistance.