Home » Blog » IT Alert: Osama-Themed Phishing Attempts

IT Alert: Osama-Themed Phishing Attempts

May 6, 2011
‎ |‎ Axxys Technologies
‎ |‎ Alerts

The United States Computer Emergency Readiness Team (https://www.us-cert.gov) reports that Internet criminals often take advantage of high-profile news stories, such as the recent death of Osama Bin Laden, by launching a mass phishing attack, termed “spear phishing.” Embedded links (allegedly used to access video coverage, photos, or other multimedia) and attachments are used to lure you into providing confidential information and/or to infect your computer system, or draw you to a Web site designed to infect your computer or network.

While there have been no reports of these email phishing attacks yet, similar attacks have already begun to appear on popular social media sites such as Facebook. Axxys Technologies recommends the following safe computing practices to protect yourself and your IT resources from email scams:

 

  1. Do not click on links contained within an email unless you are certain of the sender’s identity and expecting the information;
  2. Do not open attachments unless you are certain of the sender’s identity and expecting the information;
  3. If absolutely unsure of an email, and you are suspicious, email a “screenshot” of the email message (NOT the actual email) to your IT support contact for review;
  4. Delete and do not reply to any of these emails;
  5. Update your desktop, laptop, and/or mobile device anti-virus software; and
  6. Keep current on critical system updates:

 

Windows Users: https://windowsupdate.microsoft.com

Mac Users: Use Software Update in System Preferences

 

We encourage you to be vigilant in practicing safe computing. For more information or questions, please contact your Axxys Technologies support personnel.

Recent Posts

 Image Alt

Addressing the IT talent gap in North Texas

Businesses across North Texas continue to feel the pressure of a shrinking IT labor pool. Finding qualified professionals is difficult. Keeping them is even harder. Wages are rising. Turnover is common. Internal teams are stretched thin and critical projects often get...

 Image Alt

How Smart DFW Businesses Address IT Budgeting

Most small and midsize businesses approach IT budgeting the same way they did ten years ago. They wait for problems to pop up. They replace hardware in emergencies. They treat cybersecurity as a one-time purchase instead of an ongoing responsibility. The result is...