UMBC Cybersecurity and IT Compliance

Hacker Posing as Graduate Program Director - Phishing Scam

Today the Security team at DoIT received reports of a phishing scam targeted at the Physics Department.  We have decided to make this a campus-wide announcement, as hackers could potentially send...

Posted: July 15, 2019, 10:56 AM

"Department Admin" Phishing Scam

This past week, UMBC users have reported an increase in the occurrence of a particular phishing attack from a specific domain. This phishing email content is as follows: “From: UMBC...

Posted: June 14, 2019, 11:45 AM

"Part-Time Job Opportunity" Phishing Scam

Recently, UMBC users have reported the increased receipt of a specific phishing attack stemming from a particular domain. The phishing email content is as follows: “From: Guthrie, Melinna...

Posted: May 24, 2019, 1:00 PM

Recent Phishing Attempts At UMBC

Whether you are a student, teacher, or any other faculty member, we all have different goals and aspirations in our everyday lives at UMBC. What we all have in common in this community is making...

Posted: April 3, 2019, 10:58 AM

Backing Up Data

What is Backup? Backup is for recovery from hardware failure or recent data corruption or loss. Why Backup is needed? A Backup is copy of your data that is made in order to protect...

Posted: December 18, 2018, 11:33 AM

Hotspots and Public Wi-Fi

Public Wi Fi is famous with its easily availability and free access. Any person with their computer or other devices can access Public Wi -Fi. Public Wi -Fi could be found in convenient places...

Posted: December 10, 2018, 10:48 AM

Social Engineering

 Definition of Social Engineering. In social engineering, a cybercriminal is basically relying on social activities (and interactions) of human beings to collect information by tricking them....

Posted: November 6, 2018, 9:33 AM

RISKS OF DIGITAL DEVICES LEFT UNATTENDED.

The topic is about pros and cons for leaving a digital device unattended, such as a cell phone, a laptop or a desktop computer. It does not matter whether devices are personally owned or business...

Posted: October 31, 2018, 1:31 PM

Camera Breach!

Introduction - pros and cons of security cameras. We are living in an age of an Internet-Of-Things (IOT). We know that cyber risk exists whenever a device is connected to an Internet. And,...

Posted: October 23, 2018, 10:39 AM

Hack Yourself!

Security! What is it needed for?

Today we are relying on our devices more and more. Cyber risks associated with smartphones are increasing day by day.   Here is the summary of cyber risks related to smartphones: Covering...

Posted: October 10, 2018, 1:59 PM