<?xml version="1.0"?>
<News hasArchived="false" page="111" pageCount="242" pageSize="10" timestamp="Fri, 24 Apr 2026 10:53:41 -0400" url="https://beta.my.umbc.edu/groups/doit/posts.xml?page=111">
<NewsItem contentIssues="false" id="94779" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94779">
<Title>Powerball Scam Emails</Title>
<Tagline>A New Example Of An Old Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>DoIT Security has received a new variation of a classic get-rich-quick scam, this time claiming to be from a Powerball winner who wishes to distribute millions of dollars, supposedly to lessen the impact of COVID-19. Over 5000 UMBC addresses received emails from this sender, most likely containing the same message.</span></p><p><span>From: "Bill and Helene" &lt;<a href="mailto:kkt-co@beige.plala.or.jp">kkt-co@beige.plala.or.jp</a>&gt;</span></p><p><span>Subject: We Have Private For Donation</span></p><p><span>Date: Tue, 11 Aug 2020 14:26:21 +0900</span></p><p><span> </span></p><p><span>--</span></p><p><span>The Corona Virus (COVID-19) Outbreak isn't just a major health</span></p><p><span>crisis -- It's also a large economic disruption leading to people</span></p><p><span>Losing their Jobs and making it harder to take care of their</span></p><p><span>Families.</span></p><p><span> </span></p><p><span>We know that a little financial support can go a Long Way.</span></p><p><span> </span></p><p><span>I'm Bill Lawrence from Sacramento California the Winner of 150 million</span></p><p><span>United State Dollars Jackpot from the Power ball lottery held on</span></p><p><span>December 16, 2019. My Jackpot was a gift from God to me.</span></p><p><span>Hence my entire Family has agreed to do this.</span></p><p><span>We are donating $75 million to Help individuals and Small Scale</span></p><p><span>Businesses around the world.</span></p><p><span>I write to inform you that Google in alliance with Microsoft and Yahoo has submitted your</span></p><p><span>"Email" to my request to receive a donation amount of $5,000,000</span></p><p><span>Please accept this Token as a Gift From me and My Family.</span></p><p><span>We await your urgent response Via email <a href="mailto:heleneandbill97@gmail.com">heleneandbill97@gmail.com</a></span></p><p><span> </span></p><p><span>Bill and Helene Lawrence</span></p><p><span><a href="https://www.powerball.com/winner-story/150-million-powerball-ticket-claimed">https://www.powerball.com/winner-story/150-million-powerball-ticket-claimed</a></span></p><p><span> </span></p><p><span>Messages like these, which promise large amounts of money, are most likely advance-fee scams. Also known as Nigerian Prince scams, or 419 scams, advance-fee scams promise a large amount of money that can be claimed after paying a comparatively small fee. After a victim pays the fee, the scammer may claim to need another fee, or may vanish. Either way, victims will never receive any money in return.</span></p><p><span>In addition to the irregular grammar and capitalization, note the From address with a .jp domain, and the time zone, UTC+0900. Both of these indicate that the message originated in Japan, not California. Although the URL provided appears to be legitimate, it does not indicate that the message is really from the Powerball winner. It is always best not to click links in suspicious emails, as they may contain malware, steal personal information, or, as in this case, simply provide misleading information when used in the context of a scam email.</span></p><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><p><span> </span></p><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span> </span></p><p><span>To read more articles published by DoIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. <br></span></p></div>
]]>
</Body>
<Summary>DoIT Security has received a new variation of a classic get-rich-quick scam, this time claiming to be from a Powerball winner who wishes to distribute millions of dollars, supposedly to lessen the...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94779/guest@my.umbc.edu/fc85e5da18b9dd15ed396330d7c8776a/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776995010</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1776995010</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776995010</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1776995010</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776995010</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 22:18:23 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94778" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94778">
<Title>Government Imposter Scams</Title>
<Tagline>Scammers Pretend To Be From Government Agencies</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In  the article linked below, the Better Business Bureau is warning of government imposter scams. In these scams, a malicious actor will call or even message the victim claiming to be from a government agency. Their goals are usually to steal the victim’s personal and financial information, to steal the victim’s  money or or to persuade the victim to install malware. </span></p><br><p><span>According to the article, most Americans have encountered this scam before. Research done by the Better Business Bureau found that the Social Security Administration, Service Canada, the Internal Revenue Service (IRS) and the Canada Revenue Agency are among the most impersonated. </span><span><br></span><span><br></span><span>Some examples of Social Security-related impersonation scams:</span><span><br><br></span></p><ul><li><p><span>Increase a benefit</span><span>: In this scam the malicious actor will claim that the victim is eligible for increased benefits, typically due to a cost of living increase. The malicious actor will request bank account details so that the money can be deposited into the victim’s account. Once the malicious actor has the banking information they are able to steal money from the account.</span></p></li><li><p><span>Restoring Social Security Number</span><span>: Some malicious actors will claim the victim's Social Security Number has been suspended. The malicious actor will ask the victim to pay for it to be restored. They may also ask for the victim's Social Security account information, which allows them to apply for benefits under the victims name.</span></p></li><li><p><span>Social Security Number used in a crime</span><span>, in this scam the malicious actor will threaten arrest if the victim does not respond immediately.</span><span><br><br></span></p></li></ul><p><span>When the IRS is used as a cover instead of the Social Security Agency the scams vary, though they have many similarities to the Social Security scams.  For instance,  the malicious actor may claim to be an IRS agent and threaten the victim with arrest for unpaid taxes or even fraud. </span></p><br><p><span>The only way to avoid being arrested, the victim is told,  is by paying a fine (or the unpaid taxes) immediately.  Victims are told to buy gift cards and to provide the caller with the number on the back of each card. But of course these threats are fake, and these are just scammers trying to use fear to get the victims money or information. </span></p><br><p><span>Just as with phishing scams, the malicious actors follow the headlines and change their scams with thet latest news. During the Covid-19 pandemic and after the passage of the Coronavirus Aid, Relief, and Economic Security (CARES) Act, scammers started to claim to be from the CDC or the United States Treasury Department in order to manipulate and steal personal and financial information from victims.</span></p><br><p><span>Some examples of Covid-19 related impersonation scams are: </span></p><br><ul><li><p><span>Relief benefits</span><span>: Malicious actors claiming to be from the IRS and offering to expedite benefits under the CARES Act.</span></p></li><li><p><span>Fake donations</span><span>: Malicious actors claiming to be from the CDC requesting donations. Email and text messages making these claims may arrive with malware or URLs that could cause harm to the victim's device.</span></p></li><li><p><span>Contact tracing scams</span><span>: Email, texts, or messages on social media claiming to be from contact tracers informing the victim that they have come in contact with someone who has tested positive for Covid-19. These scammers seek personal information and/or send messages that may contain malware. For official information on contact tracing efforts in Maryland please visit </span><a href="https://coronavirus.maryland.gov/pages/contact-tracing" rel="nofollow external" class="bo"><span>https://coronavirus.maryland.gov/pages/contact-tracing</span></a><span>.</span></p></li></ul><br><p><span>Scammers have also threatened arrest for missing jury duty, impersonated immigration officials threatening to deport the victim, and offered free money in the form of government grants.</span></p><br><p><span>Some red flags to watch for to see if the person claiming to be from a government agency is actually a malicious actor:</span></p><br><ul><li><p><span>The IRS generally first contacts people by the postal mail. Never provide your bank account or other personal information to anyone who calls you.</span></p></li><li><p><span>Don’t pay by gift cards. The IRS and other government agencies will not idemand or even accept payment using iTunes cards, gift cards, prepaid debit cards, money order, bitcoin or cash.</span></p></li><li><p><span>The IRS will never request personal or financial information by email, text, or any social media platform. Do not click on any links in unsolicited emails or text messages.</span></p></li><li><p><span>Social Security numbers are never “suspended”.</span></p></li><li><p><span>Caller ID cannot be trusted to confirm that the source is from a government agency. Look up the phone number for the agency and call to see if they are really trying to contact you.</span></p></li><li><p><span>The Social Security Administration will never threaten to arrest you because of an identity theft problem. </span></p></li></ul><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.bbb.org/article/news-releases/22775-government-impostors-study" rel="nofollow external" class="bo"><span>https://www.bbb.org/article/news-releases/22775-government-impostors-study</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>In  the article linked below, the Better Business Bureau is warning of government imposter scams. In these scams, a malicious actor will call or even message the victim claiming to be from a...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94778/guest@my.umbc.edu/0f76579417510b4e52653664556d6502/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776995010</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1776995010</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776995010</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1776995010</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776995010</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 21:35:32 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94777" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94777">
<Title>Amazon Account Phishing Scam</Title>
<Tagline>Contact By A Fake Amazon Rep About A Fake Account</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>According to the article linked below, malicious actors have been  recently noticed in the UK. The actors pose as an Amazon customer service representative. The goals of this phishing campaign is to steal personal and financial information from Amazon users.</span><br><p><span>The article warns that users are being contacted through emails and/or phone calls claiming that they have opened an Amazon Prime account. The malicious actor then will inform the users that the account was opened fraudulently through a security flaw on their computer.</span></p><br><p><span>The malicious actor then asks the user for remote access to their computer to fix the breach. Allowing this will let the malicious actor steal personal and financial information, including passwords and even banking information.</span></p><br><p><span>Another version of this scam is very similar but claims there is an Amazon-Music subscription instead of an Amazon Prime subscription.</span></p><br><p><span>Amazon has stated that that they will never cold-call a customer, and will never ask for remote access to a computer or payment over the phone. </span><span>Never give any details to an unknown caller</span><span>, and if you’re not sure if the call is legitimate or not, log into your official Amazon account and contact customer support through there.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="http://www.irishnews.com/magazine/technology/2020/07/17/news/warning-issued-over-amazon-prime-phishing-scam-2008855/" rel="nofollow external" class="bo"><span>http://www.irishnews.com/magazine/technology/2020/07/17/news/warning-issued-over-amazon-prime-phishing-scam-2008855/</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><br><br><br></div>
]]>
</Body>
<Summary>According to the article linked below, malicious actors have been  recently noticed in the UK. The actors pose as an Amazon customer service representative. The goals of this phishing campaign is...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94777/guest@my.umbc.edu/ab0205fb3f452f797b4af1677ac26bdc/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776995010</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1776995010</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776995010</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1776995010</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776995010</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 21:14:19 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94776" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94776">
<Title>How to setup an account recovery email address</Title>
<Tagline>A Backup If You Forget Your Password</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><br><br><p><span>Don't have a recovery email on your UMBC account? </span></p><p><span>Follow these steps to set up your recovery email. Please use an email address that is <strong><u><em>not</em></u></strong> your UMBC email.</span></p><br><ol><li><p><span>Login to your myUMBC account: </span><a href="http://my.umbc.edu/account" rel="nofollow external" class="bo"><span>http://my.umbc.edu/account</span></a></p></li><li><p><span>Go to </span><a href="https://webadmin.umbc.edu/admin//Security/Setup/View" rel="nofollow external" class="bo"><span>https://webadmin.umbc.edu/admin//Security/Setup/View</span></a></p></li><li><p><span>Click </span><span>Account security setup</span></p></li><li><p><span>At the top of the page, enter your alternate email address</span></p></li><li><p><span>Scroll down to the bottom of the page and click </span><span>Update my security settings</span></p></li></ol><br><p><span>Don’t have a secondary email address?</span></p><br><p><span>Create one with Google or Yahoo. Instructions can be found here: </span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867956" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867956</span></a></p><br><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for displaying the headers (you normally don't see them) so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>Don't have a recovery email on your UMBC account?   Follow these steps to set up your recovery email. Please use an email address that is not your UMBC email.     Login to your myUMBC account:...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94776/guest@my.umbc.edu/16d6c0be3e248a816b1595d450bb4a06/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776995010</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1776995010</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776995010</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1776995010</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776995010</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 21:05:31 -0400</PostedAt>
<EditAt>Tue, 11 Aug 2020 21:06:12 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94775" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94775">
<Title>Account Data Breach: Wattpad</Title>
<Tagline>Major Data Breach: Wattpad</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>In June 2020, Wattpad suffered a data breach that exposed approximately 270 million records. These records include, names, usernames, email and IP addresses, genders, birth dates and passwords. This information was sold and then published on a public hacking forum. </span><br><p><span>234 UMBC accounts suffered from this breach; DOIT is currently notifying these individuals via their UMBC emails and/or alternate emails. However, if you have a Wattpad account don't wait; contact the site to see if your information has been exposed.</span></p><br><p><span>If you don’t have a alternate email address listed on your UMBC account, follow these instructions below:</span></p><ol><li><p><span>Login to your myUMBC account: </span><a href="http://my.umbc.edu/account" rel="nofollow external" class="bo"><span>http://my.umbc.edu/account</span></a></p></li><li><p><span>Go to </span><a href="https://webadmin.umbc.edu/admin//Security/Setup/View" rel="nofollow external" class="bo"><span>https://webadmin.umbc.edu/admin//Security/Setup/View</span></a></p></li><li><p><span>Click </span><span>Account security setup</span></p></li><li><p><span>At the top of the page, enter your alternate email address</span></p></li><li><p><span>Scroll down to the bottom of the page and click </span><span>Update my security settings</span></p></li></ol><br><p><span>DOIT has been notified of this breach via Have I Been Pwned(HIBP).</span></p><br><br><p><span>More about Wattpad data breach visit: </span></p><p><a href="https://www.bleepingcomputer.com/news/security/wattpad-data-breach-exposes-account-info-for-millions-of-users/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/wattpad-data-breach-exposes-account-info-for-millions-of-users/</span></a></p><br><p><a href="https://bestofprivacy.com/data-breaches/wattpad-data-breach-exposes-account-info-for-millions-of-users/#:~:text=Wattpad%20data%20breach%20exposes%20account%20info%20for%20millions,user-generated%20stories%20on%20a%20variety%20of%20different%20topics." rel="nofollow external" class="bo"><span>https://bestofprivacy.com/data-breaches/wattpad-data-breach-exposes-account-info-for-millions-of-users/#:~:text=Wattpad%20data%20breach%20exposes%20account%20info%20for%20millions,user-generated%20stories%20on%20a%20variety%20of%20different%20topics.</span></a></p><br><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In June 2020, Wattpad suffered a data breach that exposed approximately 270 million records. These records include, names, usernames, email and IP addresses, genders, birth dates and passwords....</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94775/guest@my.umbc.edu/7a6c7bd768d58c2f9716d0ce3f7190f2/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776995010</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1776995010</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776995010</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1776995010</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776995010</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 11 Aug 2020 21:01:34 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94748" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94748">
<Title>USM OnTrack: Support Available for High Enrollment Courses!</Title>
<Tagline>Partner with Lumen Learning for adaptive courseware adoption</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>There is still time to consider an adaptive courseware adoption for the fall semester!  <a href="https://www.usmd.edu/cai/usm-ontrack-0" title="https://www.usmd.edu/cai/usm-ontrack-0" rel="nofollow external" class="bo"><span><u>USM </u></span><em>OnTrack</em></a>  has partnered with Lumen Learning to provide free professional development and support services to faculty teaching high-enrollment courses (either large lecture or multi-section) and decide to use one of Lumen’s adaptive course solutions this Fall.  Learn more at </span><span><a href="https://info.lumenlearning.com/ontrack" rel="nofollow external" class="bo"><span>https://info.lumenlearning.com/ontrack</span></a></span><span>.  Interested faculty should schedule some time with a Maxim Asher Young from Lumen to discuss next steps: </span><span><a href="https://calendly.com/maximlumen" rel="nofollow external" class="bo"><span>https://calendly.com/maximlumen</span></a></span><span> </span><span> </span></div><div><span><span><br></span></span></div><div><span><span><a href="https://info.lumenlearning.com/ontrack" rel="nofollow external" class="bo">Learn more about the partnership here!</a></span></span></div><div><span><span><br></span></span></div><div><br></div></div>
]]>
</Body>
<Summary>There is still time to consider an adaptive courseware adoption for the fall semester!  USM OnTrack  has partnered with Lumen Learning to provide free professional development and support services...</Summary>
<Website>https://info.lumenlearning.com/ontrack</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94748/guest@my.umbc.edu/22fc93068a18f5a4a2c44849e5fa14d4/api/pixel</TrackingUrl>
<Tag>adaptive-courseware</Tag>
<Tag>online-learning</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/748/28d5cf7fcdaaee24c24754704d0094ad/xxlarge.jpg?1597097225</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/748/28d5cf7fcdaaee24c24754704d0094ad/xlarge.jpg?1597097225</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/748/28d5cf7fcdaaee24c24754704d0094ad/large.jpg?1597097225</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/748/28d5cf7fcdaaee24c24754704d0094ad/medium.jpg?1597097225</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/748/28d5cf7fcdaaee24c24754704d0094ad/small.jpg?1597097225</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/748/28d5cf7fcdaaee24c24754704d0094ad/xsmall.jpg?1597097225</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/748/28d5cf7fcdaaee24c24754704d0094ad/xxsmall.jpg?1597097225</ThumbnailUrl>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 10 Aug 2020 18:11:07 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94746" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94746">
<Title>Free 3-day Conference on Labs for Online STEM Announced</Title>
<Tagline>Attend Innovating STEM Education 2020 online August 19-21</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><p><strong><em><span>OLC Ideate Labs for Online STEM: Innovating STEM Education 2020 </span></em></strong><strong><em><span> </span></em></strong></p><p><br></p><p><strong><em><span><br></span></em></strong></p><p><span>With COVID pandemic, virtual labs are now a requirement rather than a "nice to have".  There are many technologies and strategies that can complement and substitute for face-to-face STEM labs that are no longer viable due to the COVID-19 pandemic.  </span><span> </span></p><p><span> </span><span> </span></p><p><span>To help higher education institutions and faculty successfully respond to this new requirement.   MERLOT and OLC will be offering for <em><u>FREE</u></em>, a 3-day </span><a href="https://onlinelearningconsortium.org/learn/olc-ideate-labs-online-stem/" rel="nofollow external" class="bo"><span>OLC Ideate Labs for Online STEM: Innovating STEM Education 2020 </span></a><span><span>c</span></span><span>onference on August 19-21, 2020 on strategies for teaching STEM labs online with various technologies. This free virtual expo will showcase a wide range of virtual and distance labs designed to support online STEM education, offered by both commercial and open educational resource (OER) providers.  </span><span> </span></p><p><span><br></span></p><p><span><a href="https://onlinelearningconsortium.org/learn/olc-ideate-labs-online-stem/" rel="nofollow external" class="bo">Click here to register today</a>!</span></p></div></div>
]]>
</Body>
<Summary>OLC Ideate Labs for Online STEM: Innovating STEM Education 2020          With COVID pandemic, virtual labs are now a requirement rather than a "nice to have".  There are many technologies and...</Summary>
<Website>https://onlinelearningconsortium.org/learn/olc-ideate-labs-online-stem/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94746/guest@my.umbc.edu/69a377dca17bfae6f0dfb973407844bd/api/pixel</TrackingUrl>
<Tag>online-labs</Tag>
<Tag>online-learning</Tag>
<Tag>stem</Tag>
<Tag>virtual-labs</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/746/a6eb67d255b47dd7b282d557132525c3/xxlarge.jpg?1597095866</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/746/a6eb67d255b47dd7b282d557132525c3/xlarge.jpg?1597095866</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/746/a6eb67d255b47dd7b282d557132525c3/large.jpg?1597095866</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/746/a6eb67d255b47dd7b282d557132525c3/medium.jpg?1597095866</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/746/a6eb67d255b47dd7b282d557132525c3/small.jpg?1597095866</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/746/a6eb67d255b47dd7b282d557132525c3/xsmall.jpg?1597095866</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/746/a6eb67d255b47dd7b282d557132525c3/xxsmall.jpg?1597095866</ThumbnailUrl>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 10 Aug 2020 17:49:50 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94745" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94745">
<Title>USM OnTrack: New Online Teaching Resources Page Announced</Title>
<Tagline>Check out this updated content on the OnTrack website!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>The <a href="https://www.usmd.edu/cai/usm-ontrack-0" title="https://www.usmd.edu/cai/usm-ontrack-0" rel="nofollow external" class="bo">USM <em>OnTrack</em></a> <span>website has been updated to include new </span><span><a href="https://www.usmd.edu/cai/online-teaching-resources" rel="nofollow external" class="bo"><span>Online Teaching Resources</span></a></span><span>. USM has revamped the emergency remote teaching web resources shared last spring to focus on the pivot to online/hybrid, and hyflex models for the fall. The resources include four new topical areas: Ensuring Equity and Inclusion, Assessing Student Learning, Humanizing Online Courses, and Supporting High-Enrollment Courses. In addition, the USM has updated the existing topical areas with resources relevant to the Fall 2020 semester. </span></div><div><span><br></span></div><div><span>Check out these new</span><span> </span><span><span><a href="https://www.usmd.edu/cai/online-teaching-resources" rel="nofollow external" class="bo">Online Teaching Resources</a> now!</span></span></div></div>
]]>
</Body>
<Summary>The USM OnTrack website has been updated to include new Online Teaching Resources. USM has revamped the emergency remote teaching web resources shared last spring to focus on the pivot to...</Summary>
<Website>https://www.usmd.edu/cai/online-teaching-resources</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94745/guest@my.umbc.edu/71966ada28c425bb6906fbd346861e36/api/pixel</TrackingUrl>
<Tag>assessment</Tag>
<Tag>hybrid</Tag>
<Tag>hyflex</Tag>
<Tag>online-learning</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/745/5137c6787e16aaff35d1b2aaf7941969/xxlarge.jpg?1597095395</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/745/5137c6787e16aaff35d1b2aaf7941969/xlarge.jpg?1597095395</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/745/5137c6787e16aaff35d1b2aaf7941969/large.jpg?1597095395</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/745/5137c6787e16aaff35d1b2aaf7941969/medium.jpg?1597095395</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/745/5137c6787e16aaff35d1b2aaf7941969/small.jpg?1597095395</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/745/5137c6787e16aaff35d1b2aaf7941969/xsmall.jpg?1597095395</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/745/5137c6787e16aaff35d1b2aaf7941969/xxsmall.jpg?1597095395</ThumbnailUrl>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 10 Aug 2020 17:43:56 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94676" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94676">
<Title>Be Wary Of These Covid-19 Scams</Title>
<Tagline>Some Of The Scams Coming Over Email, Phone, and Text</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In the article linked below, BBC News warns of different Covid-19 themed frauds and scams. Many malicious actors follow the headlines just like the rest of us, and when they see a crisis like Covid-19, they take the opportunity to jump on the fear and try to scam as many people as they can. </span></p><br><p><span>The article warns of these scams to be wary of:</span></p><br><ul><li><p><span>Covid-19 Financial Support Scams</span></p></li><ul><li><p><span>Fake government emails, which look to be from a government department and offer financial grants. The emails contain a link which can steal both personal and financial information.</span></p></li><li><p><span>Scam emails offering access to a “Covid-19 relief fund”, and encouraging users to fill in a form and hand over personal information.</span></p></li><li><p><span>Official-looking emails offering “tax reductions.” The email is reported to contain a link that takes users to a fake government website which can harvest users personal and financial information.</span></p></li><li><p><span>E-mails offering to help Benefit recipients in applying for universal credit, but which fraudsters will grab some of the payment as an advance for their "services".</span></p></li><li><p><span>Email about claiming fake school meal funds and fake government grants.</span><span><br><br></span></p></li></ul><li><p><span>Health Related Scams</span></p></li><ul><li><p><span>Phishing emails claiming that the user has been in contact with someone who has been diagnosed with Covid-19. The links lead to fake websites that are used to steal personal and financial information or even infect the device with malware. </span><span><br></span><span>For official information on contact tracing efforts in Maryland please visit </span><a href="https://coronavirus.maryland.gov/pages/contact-tracing" rel="nofollow external" class="bo"><span>https://coronavirus.maryland.gov/pages/contact-tracing</span></a><span>.</span></p></li><li><p><span>Fake ads for non-existent Covid-19 related products, such as hand sanitizer and face masks. They simply will take the users’ money and send them nothing.</span></p></li><li><p><span>Offers of fake Covid-19 test kits and hand sanitizer, or even products claiming to treat or prevent Covid-19.</span><span><br><br></span></p></li></ul><li><p><span>Social Distancing Related Scams</span></p></li><ul><li><p><span>Fake emails and texts claiming to be from “TV Licensing”, telling people they are eligible for six months of free TV because of Covid-19. Users are then told there has been a problem with their card and are asked to click on a link that takes them to a fake website designed to steal users persona and financial information.</span></p></li><li><p><span>Emails asking people to update their TV subscription services payment details by clicking on a link which is designed to steal credit card information.</span></p></li><li><p><span>Fake profiles on social media sites designed to try and manipulate users into giving them their money. </span></p></li><li><p><span>Fake investment advertisements on social media sites encouraging users to “take advantage of the financial downturn.” Bitcoin platforms are using emails and adverts on social media platforms to encourage users to put money into fake companies using fake websites.</span></p></li><li><p><span>Malicious actors cold-calling home residents offering to do shopping errands.</span></p></li><li><p><span>Messages telling the user that they have been fined for leaving their home more than once a day. Links in these messages are designed to steal a victim’s personal and financial information or to install malicious software onto the user’s device.</span><span><br><br></span></p></li></ul><li><p><span>What We See at UMBC</span></p></li><ul><li><p><span>At UMBC, DoIT is getting reports of work-from-home phishing emails. These phishing emails follow a similar pattern of offering a work-from-home opportunity and ask for personal information like personal email and home address. They will then send a fraudulent check to the user which should not be cashed. </span></p></li><li><p><span>Recently DoIT has also seen phishing emails attempting to impersonate UMBC staff and asking for gift cards or phone numbers.</span></p></li></ul></ul><br><p><span>For more information on these and other phishing attempts at UMBC please visit the DoIT Security page which can be found here </span><a href="https://itsecurity.umbc.edu/" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/</span></a><span>.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please visit: </span></p><p><a href="https://www.bbc.com/news/business-53573408" rel="nofollow external" class="bo"><span>https://www.bbc.com/news/business-53573408</span></a></p><br><p><span>To read more articles published by DoIT Security please visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>In the article linked below, BBC News warns of different Covid-19 themed frauds and scams. Many malicious actors follow the headlines just like the rest of us, and when they see a crisis like...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94676/guest@my.umbc.edu/236ccbcd1893176b192d2ab2f0ea31f7/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776995010</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1776995010</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776995010</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1776995010</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776995010</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Aug 2020 18:12:32 -0400</PostedAt>
<EditAt>Wed, 05 Aug 2020 18:14:26 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94675" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94675">
<Title>Gift Cards Phishing Scams</Title>
<Tagline>Another Variant Of A Common Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently DoIT has been notified of a phishing email scam where the malicious actor is impersonating a UMBC staff member. The name has been removed from the From for privacy reasons, but an example of the email can be seen below:</span><span><br><br></span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>Forged Name</span><span> &lt;</span><span><a href="mailto:hjacj00909@gmail.com">hjacj00909@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Mon, Aug 3, 2020 at 1:20 PM</span></p><p><span>Subject: Urgent</span></p><p><span>To: &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><br><br><p><span>I have a task I need you to get done for me Asap,  I want to send out</span></p><p><span>a couple gifts cards to some selected staffs, even though we all put</span></p><p><span>in all our best to move this organization forward, some individuals</span></p><p><span>really stand out and I want to surprise them with a little gifts.this</span></p><p><span>is really urgent and important,  Please let me know if you can head</span></p><p><span>out to purchase the gift cards so I can advise certain product and</span></p><p><span>denominations.</span></p><br><p><span>Thanks</span></p></td></tr></tbody></table></div><br><p><span>The phishing email above not only is impersonating a UMBC staff member, but the email has many grammatical mistakes, and there is a feeling of urgency with the subject line “Urgent” and words like “ASAP” being used. These are just some of the examples of the red flags for identifying this and other phishing email scams.</span><span><br><br></span></p><p><span>The main goal of this phishing email scam is to get the users to purchase the gift cards and give the gift codes to the malicious actors. Other scams similar to this one might ask for products like iTunes cards, gift cards, prepaid debit cards, or even bitcoin.</span></p><br><p><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p><br><p><span>For more information on a similar scam to the one above:</span><span><br></span><a href="https://itsecurity.umbc.edu/critical/?id=94550" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94550</span></a></p><br><br></div>
]]>
</Body>
<Summary>Recently DoIT has been notified of a phishing email scam where the malicious actor is impersonating a UMBC staff member. The name has been removed from the From for privacy reasons, but an example...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94675/guest@my.umbc.edu/d44c17a5fdf99b5cc9b2372eedcd518d/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776995010</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776995010</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1776995010</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776995010</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1776995010</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776995010</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776995010</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Aug 2020 17:59:00 -0400</PostedAt>
</NewsItem>

</News>
