Stay safe online... Don't Take the Bait!
Malware - Short for "malicious software," malware is designed to do damage or other unwanted actions to your computer. Common examples of malware include viruses, worms, trojan horses, and spyware.
Phishing - Phishing is an attempt, usually made through email, to steal your
Don't Get Phished!
CNS has put together this list of off-campus links to help educate about the dangers of phishing and identity theft. We hope they will be both educational as well as entertaining.
Hot Off the Press...
10 Tips for Spotting a Phishing Email
Tech-support scammers are having good luck reaching young victims with pop-up ads
New Windows 10 Scam will encrypt your files for ransom
Florida city almost loses $500,000 after Ransomware attack.
VirRansom - There is now a new Ransomware program that spreads like a virus. This software has been named VirRansom.
CryptoLocker Ransomware - Cryptolocker will encrypt the files on your system. The only way to unencrypt the files is to pay a fee. This is a very real threat. Click on the following link for a more detailed description. Updated 11/23/14.
Cyber Security Awareness, Cut Down - http://www.youtube.com/watch?v=WYMB2kZzYeM&feature=related
I'm Mike - http://www.youtube.com/watch?v=h_LSbm_RKHc
Everyone Can See It - http://www.youtube.com/watch?v=sOkWCenlpsA
Computer Security Tips - http://www.youtube.com/watch?v=QfWTIlhWZUw&feature=related
Get Smart on Phishing, Learn to Read Links - http://www.bustspammers.com/phishing_links.html
Protecting Your Identity from PNC - http://www.muskingum.edu/cns/downloads
Ten Little Things to SecureYour Online Presence - http://www.zdnet.com/blog/security/ten-little-things-to-secure-your-online-presence/9901
Be Smart About Your Money - http://cheapscholar.org/2012/12/14/be-smart-about-your-money-be-smart-online/
IT Security - Additional Links - http://www.itsecurity.com/
The Computer Emergency Response Team (US-CERT) - http://www.us-cert.gov/ncas
Is It Real or Is It Spam? - http://www.itsecurity.com/features/real-or-spam-052908/
The Essential Guide to Spam Control - http://www.itsecurity.com/features/essential-guide-spam-control-062708/
The Essential Guide to Email Security - http://www.itsecurity.com/features/essential-guide-email-security-051508/
Understanding Hidden Threats: Corrupted Software Files - http://www.us-cert.gov/cas/tips/ST06-006.html