Tag Archives: Phishing

Does That Suspicious Email Contain A QR Code?

In some cases, suspicious emails might contain QR codes to take you to a web site for further action :- For example :- In general, QR codes can contain web site addresses, but because they are encoded, it makes it … Continue reading

Posted in Active Attacks, Email | Tagged , | Comments Off on Does That Suspicious Email Contain A QR Code?

Phishing Attacks Against Academics with an Interest in Russia/Ukraine

We have been alerted to the activities of a politically-motivated phishing “crew” targeting (amongst others) the Higher Education sector with particular reference to academics with interests in Russia and Ukraine. The attacks look to be targeted to specific individuals with … Continue reading

Posted in Active Attacks, Email | Tagged , , | Comments Off on Phishing Attacks Against Academics with an Interest in Russia/Ukraine

Detecting Suspicious Emails

This blog post is going to be somewhat longer and more technical than usual. It is intended as documentation for the use of IS staff, but may be more widely useful (at least in parts). To start with emails come … Continue reading

Posted in Email, Malware | Tagged | Comments Off on Detecting Suspicious Emails

Spam: Mail Quotas and Bitcoin

Recently we have become aware of an issue in relation to one of our cloud service providers which is weakening one of our email security measures – specifically the mechanism put in place to make it harder to impersonate UoP … Continue reading

Posted in Active Attacks, Email | Tagged , , , | Comments Off on Spam: Mail Quotas and Bitcoin

What Are “Homoglyph” Attacks?

As the phrase has started becoming more widely used, it seems worthwhile to explain just what exactly “homoglyph attacks” are. It is perhaps a bit extreme to call them “attacks” as they are effectively used to deceive … especially in … Continue reading

Posted in General, Technical | Tagged , , | Comments Off on What Are “Homoglyph” Attacks?

Dealing With Suspicious Emails

From time to time, we all receive emails at work that we regard as a little suspicious (if you do not, it is quite possible that your suspicion level needs to be increased). What should we do with those emails? … Continue reading

Posted in Email | Tagged , | Comments Off on Dealing With Suspicious Emails

Who Is mikemeredith@hotmail.com?

Short answer: No idea! And yes that is my name. We have received a couple of reports of phishing attempts using look-alike names – in this example (which isn’t real), the email address mikemeredith@hotmail.com was used in an email purporting … Continue reading

Posted in Active Attacks, Email | Tagged , , | Comments Off on Who Is mikemeredith@hotmail.com?

Security At Home

As most of us are now working from home, it is time to consider security in the home; because you are working from home, security at home is important to the university (in addition to yourself). Indeed there are new … Continue reading

Posted in Active Attacks | Tagged , , , , | Comments Off on Security At Home

Diagnosing a Phishing Attack

I was clearing out some older emails today and encountered an attempt to phish Apple credentials; although this one was specific to Apple, the general lessons apply to all phishing attacks … and indeed more general malicious spam. The attack … Continue reading

Posted in Active Attacks, Email | Tagged , | Comments Off on Diagnosing a Phishing Attack

The Latest Phishing Attack

I have just been alerted to yet another phishing attack that works by sending web links via email to a “secure message” (or in the example no words at all). The link of course takes you to a malicious site … Continue reading

Posted in Email, Passwords | Tagged | Comments Off on The Latest Phishing Attack