DON'T BE FOOLED BY A SCAM E-MAIL

Cyberattackers use e-mail as one of their main methods of attack. One of the most prevalent types of e-mail scams are phishing attemptswhen an attacker, masquerading as a trusted entity, dupes a victim into opening an e-mail, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack, or the revealing of sensitive information.

 

Have you received a suspicious message? Help keep UTSA safe!
In your inbox, click "Report" and select "Phishing." 

Unsure about a message? Click here to view common red flags

Already clicked on a suspicious link? Change your passphrase now.

We're here to help you! Protect your computer by installing your UTSA-issued copy of MalwareBytes antivirus software now.

What is Phishing?

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate entity to lure users into providing personally identifiable information, credit card information, passwords, and other private data. The information is then used to access important accounts and can result in identity theft and financial loss.

Phishing emails will attempt to appear trustworthy by imitating a company you know or trust such as a bank, a social networking site, or an online store. These emails will normally include a call to action by imploring you to click on a link or an attachment. 

They may:

  • Say they’ve noticed some suspicious activity or log-in attempts
  • Claim there’s a problem with your account or your payment information
  • Want you to click on a link to make a payment
  • Request your personal information
  • Offer a coupon or free stuff

Are you familiar with the most common phishing red flags