- GNU Bourne-Again Shell (Bash) ‘Shellshock’ Vulnerability (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE 2014-6278)
- Backoff Point-of-Sale Malware
- GameOver Zeus P2P Malware
- OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)
- Review your credit reports routinely
- Don't buy anything from a spammer
- Use common sense when reviewing your email
- Five Security Tips
"SPAM" is an unsolicited e-mail to your account. This can be equated to a telemarketing phone call. The best way to handle it is simply delete the message. As tempting as it may be, responding to the message generally indicates that your account is actively read and you'll wind up with more spam instead of less.
What we're doing to help protect you:
- Network Operations maintains a filtering system which limits the amount SPAM messages that you receive.
How can I protect myself?
- Take a moment to forward the message to email@example.com. We use these sample messages to adjust the settings which helps keep spam out of everyone's mailbox.
- Delete the message from your mailbox.
- Protect your email address. Think about if you know and trust a company before giving your information out online.
- Click links inside of SPAM messages. Often these links contain viruses or spyware, which can steal your information and lead to more SPAM!
- Reply to the message. It may be tempting to tell the sender how you really feel, but you'll really just be telling them that the account is actively read by someone.
- List your email address on your personal website. Spammers use tools to "harvest" addresses from websites.