天天吃瓜

Phishing and Scams

Phishing is a form of social engineering delivered by email. Phishing scams appear to originate from a trusted source to trick you into entering your credentials, revealing personal identifying information (PII), or sending money to them.

The attacker can then use this information to access your accounts, gather additional private information about you in an attempt to steal your identity, and make purchases or apply for credit in your name.

To learn more about phishing and social engineering, read the information here.

(Click to enlarge)
Phishing Poster

 

Phishing Tips

  • Move your mouse over links in emails and it may show a different URL than the one displayed.
  • If you are encouraged to click a link that claims to lead to a legitimate site (such as Amazon), look online for a trusted URL leading to that site instead.
  • Check the sender address to verify that the email comes from an official source.
  • Check for slight mispellings - in the URL, company name, etc. For example, paypa1.com instead of paypal.com.
  • Use additional software - Many browsers have add-ons/extensions/plug-ins that can help detect phishing sites.
  • Be wary of anything that gives a sense of urgency, or states that it requires immediate action.
  • Don't click anywhere in suspicious emails鈥攅ven in what may appear to be white space.
  • Be wary of too-good-to-be-true offers such as free airline tickets or vacation.
  • Don鈥檛 open attachments in unexpected or suspicious emails or instant messages.
  • Don鈥檛 send passwords, bank account numbers, or other private information in an email.

Note that KSU does not delete @kent.edu accounts and will NEVER ask for your password through email.

For more advice on how to avoid phishing scams, visit our Fight the Phish page!

Have I Been The Victim Of A Phishing Scam?

If you believe that you have been the victim of a phishing scam, change your password immediately and report it to phish@kent.edu or submit a . Also, don't forget to check out this page for tips on how to keep your accounts safe. If you are using Gmail, you can also end all other active sessions. This should stop any unauthorized access to your account. Instructions on how to do this can be found . You can also end active sessions in Outlook by following the instructions .

When a victim of a phishing scam, it's common practice for the hackers to change your signatures, forwards, filters, and other settings. If you believe you fell victim to a scam, we recommend checking the following settings in your mail client.

  • A signature for an email is text that is automatically inserted at the end of an email. It is usually something you choose to set up. Make sure it is not an unfamilar one setup.
  • Forwards can be set up to automatically forward to another email address. Make sure it is not forwarded to unknown address without your permission.
  • Inbox rules/filters can be used to automatically sort or delete anything in your inbox or sent box etc.  Scammers can use it to re-direct/hide their messages.
  • Check all of the folders in your email account - sometimes the malicious actor may create new folder to store messages they sent/receive or put them into the Trash when using your account to perform scams.

(Click to enlarge)
Don't Get Hooked Poster

What Are Scams?

Scams come in many forms and are a type of social engineering to either gain your personal identifiable information (PII), or steal your money. They are getting more and more sophisticated, particularly when it comes to targeting you online and through mobile devices. It鈥檚 important to know how to recognize a scam so you can protect yourself from fraudsters.

Note that KSU does not delete @kent.edu accounts and will NEVER ask for your password through e-mail, so be wary of anything that says otherwise.

Please report any scams you receive to phish@kent.edu. You can learn about additional ways to report phishing scams here: Report Phishing

How To Detect a Scam?

  • Scammers pretend to be from organizations you know
  • They pretend that you won a prize or that there is a problem
  • Scam calls will usually pressure you to act immediately
  • If it sounds too good to be true, then it probably is
  • Scammers will tell you to pay in a specific way

Steps To Avoid Scams

  • Don鈥檛 give out any personal information
  • Resist pressure
  • Block unwanted calls or messages
  • Don't click on any pictures, links, or white spaces in a suspicious email
  • Stop and talk to someone before taking action or giving out any information

Please refer to the site to read more about common scams and how to report them.

 

Identity Theft Awareness Week

January 27 through January 31 is Identity Theft Awareness Week! This time is an excellent opportunity to learn about identity theft. This page will provide resources that explain how identity theft works, steps you can take to recover from identity theft, and how to recognize scams that attempt to steal your identity. Arming yourself with this knowledge can help protect both yourself and everyone you know from this threat. Explore the rest of the SecureIT website for even more information on how to stay safe online!

 

What is Identity Theft?

Identity theft occurs when scammers obtain enough of your personal information to begin performing actions in your name. This is usually done for financial gain, such as stealing money from your bank account, applying for credit in your name, or making purchases on your behalf. Cases of identity theft can cause serious damage to credit and result in a large loss of money if action is not immediately taken to stop the criminals with your information.

Information commonly targeted by scammers attempting to perform identity theft includes:

  • Full legal name
  • Home address
  • Bank account number(s)
  • Social security number
  • Credit card number(s)

With this information, a scammer could attempt to apply for a job in your name, open new bank and credit accounts with you listed as the owner, make large purchases in your name using your credit without paying them back (which will damage your credit), withdraw/transfer funds from your bank accounts, and commit many other criminal activities. An excellent resource with more details about the risks of identity theft can be found on the .

 

How Do I Know If Someone Stole My Identity?

It may be difficult at first to know if your identity has been stolen. However, there are still several warning signs that you can look out for. A common sign that your identity has been stolen is the appearance of new accounts on your credit report that you did not open. This indicates that another individual has enough of your personal information to open lines of credit in your name, and possible make purchases on your behalf. This leads into the next warning sign: receiving bills for purchases that you did not make. While it is worth noting that not every invoice or bill you receive is genuine, receiving a legitimate bill for a purchase that you did not make or authorize is a strong indicator that someone is using your information and money.

The FTC has also prepared a list of warning signs that indicate a stolen identity, which you can read . The United States General Services Administration also maintains a list of common warning signs of identity theft, which can be found .

 

How Can My Identity Be Stolen?

Scammers use a multitude of tactics when attempting to steal your identity. One of the most common methods they use is called social engineering. Social engineering is the act of extracting sensitive information from someone by convincing them that they are interacting with a legitimate source. For example: a scammer calls you and claims to be a representative from your bank. They need you to verify your information by providing your name, social security number, and account numbers.

If you think that example sounds a lot like phishing, you are absolutely correct. Phishing is a popular form of social engineering and is one of the most dangerous types of cyber attacks. There are many types of phishing scams that attackers use to attempt to steal your sensitive information. Phishing scams also target your passwords or multi-factor authentication information in order to gain access to your accounts. They do this in order to steal the personal and financial information associated with your online accounts.

You can read this page to learn more about the various types of phishing scams, including ones that specifically target 天天吃瓜's students, faculty, and staff.

 

What Should I Do If My Identity Was Stolen?

If you believe that your identity has been stolen, you will need to act quickly to recover it. This includes contacting your bank, credit bureaus, and even the federal government in some cases. Our team has created a page with details on how to recover your account, along with resources and guides provided by the government. You can view this page here.

Additionally, the Federal Trade Commission has a website dedicated to helping you recover your identity as quickly as possible. You can read more information . The General Services Administration also maintains a list of resources for identity theft recovery, which can be found .

In the event that your social security number has been compromised, it is best to reach out to the Social Security Administration directly. lists identity theft as a valid reason to request a new social security number.

Types of Phishing and Scams

When people refer to phishing, they are most commonly referring to phishing attempts delivered in an email. However, there are a few other types of phishing. You can read about them, as well as many different scams and techniques, by clicking a topic in the menu below: