<?xml version="1.0"?>
<News hasArchived="false" page="113" pageCount="242" pageSize="10" timestamp="Tue, 28 Apr 2026 01:43:32 -0400" url="https://beta.my.umbc.edu/groups/doit/posts.xml?page=113">
<NewsItem contentIssues="true" id="94493" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94493">
<Title>FA2020 Courses Created in Blackboard on July 27, 2020</Title>
<Body>
<![CDATA[
    <div class="html-content"><p>Blackboard course shells for FA2020 <a href="https://wiki.umbc.edu/x/eYHGAw" rel="nofollow external" class="bo">were created</a> on July 27, 2020.</p><p><span>NOTE: In recognition of the COVID-19 pandemic and ongoing social distancing practices, UMBC’s fall session will mostly be online with some exceptions. Please review the <a href="https://covid19.umbc.edu/fall-2020-course-information/" rel="nofollow external" class="bo">Fall 2020 Course Information</a> and these resources to prepare:</span></p><span><ul><li><span>DoIT’s </span><a href="https://doit.umbc.edu/itnm/academic-continuity/" rel="nofollow external" class="bo"><span>Academic Continuity</span></a><span> &amp; </span><a href="https://doit.umbc.edu/students/" rel="nofollow external" class="bo"><span>Student Technology Resources</span></a></li><li><a href="https://my.umbc.edu/groups/instructional-technology/events" rel="nofollow external" class="bo"><span>Instructional Technology Training</span></a><span>  </span></li><li><span>Faculty Development Center’s </span><span><a href="https://fdc.umbc.edu/resources/keep-on-teaching/" rel="nofollow external" class="bo">Keep On Teaching</a></span></li><li><span>Check our</span><span> </span><a href="http://www.umbc.edu/faq" rel="nofollow external" class="bo">extensive FAQ collection </a></li></ul></span><p><span><strong>About FA2020 Course Shells</strong></span></p><p><span><span>Course development shells were </span><a href="https://doit.umbc.edu/news/?id=93470" rel="nofollow external" class="bo"><span>created for faculty to prepare</span></a><span> earlier this summer. Content </span><a href="https://wiki.umbc.edu/x/sABxAw" rel="nofollow external" class="bo"><span>can be copied</span></a><span> from those development shells into the production sites where student enrollments are populated.</span></span></p><p><span>The </span><a href="https://wiki.umbc.edu/x/VIdnB" rel="nofollow external" class="bo"><span>Ultra Course Preview</span></a><span> setting is again enabled in FA2020 courses to </span><a href="https://doit.umbc.edu/news/?id=82277" rel="nofollow external" class="bo"><span>allow faculty adoption</span></a><span> with an</span><a href="https://doit.umbc.edu/news/?id=88788" rel="nofollow external" class="bo"><span>updated support schedule</span></a><span> of Ultra (</span><a href="https://doit.umbc.edu/news?id=83448" rel="nofollow external" class="bo"><span>see prior announcement</span></a><span>).</span><span> The </span><a href="https://wiki.umbc.edu/x/VIdnB" rel="nofollow external" class="bo"><span>Ultra Course Preview</span></a><span> tool allows faculty to convert an existing Original course and see what it </span><a href="https://wiki.umbc.edu/x/VIdnB" rel="nofollow external" class="bo"><span>looks like in Ultra</span></a><span>. </span></p><p><span><span>Ally, an </span><a href="https://doit.umbc.edu/news/?id=82487" rel="nofollow external" class="bo"><span>accessibility tool</span></a><span>, is also enabled in all course shells as of last summer. Ally automatically scans uploaded and created course content, then performs a series of steps to make that content more accessible. Please review the </span><a href="https://wiki.umbc.edu/x/2IGdB" rel="nofollow external" class="bo"><span>Ally FAQs</span></a><span> for more information about the </span><a href="https://wiki.umbc.edu/x/_YGdB" rel="nofollow external" class="bo"><span>accessibility indicators</span></a><span> on course content and </span><a href="https://wiki.umbc.edu/x/3IGdB" rel="nofollow external" class="bo"><span>alternative formats</span></a><span>.</span></span></p><div><strong>About Course Creation</strong></div><div><span><br></span></div><div><span>Bb shells for FA2020 are available for all courses (designated as lecture, lab, field or discussion) listed in the </span><a href="http://my.umbc.edu/go/schedule" rel="nofollow external" class="bo">UMBC Schedule of Classes (SOC)</a><span>, provided that there is an </span><a href="http://www.umbc.edu/blogs/oit-news/archives/2010/08/how_new_employe_1.html" rel="nofollow external" class="bo">instructor of record</a><span> listed. As new course sections and/or instructors are added to the SOC by </span><a href="https://docs.google.com/a/umbc.edu/document/d/1rwm_adJUvAP3cxL-QCrb56n9ql4xrR8FHd9_1Cw0vJI/edit?usp%3Dsharing" rel="nofollow external" class="bo">Department Scheduling Coordinators</a><span>, corresponding Bb shells are automatically generated overnight. </span></div><ul><li>If you are an instructor, and your name is not associated with the course you are teaching in the <a href="http://my.umbc.edu/go/schedule" rel="nofollow external" class="bo">SOC</a>, please see your <a href="https://docs.google.com/a/umbc.edu/document/d/1rwm_adJUvAP3cxL-QCrb56n9ql4xrR8FHd9_1Cw0vJI/edit?usp%3Dsharing" rel="nofollow external" class="bo">Departmental Scheduling Coordinator</a> to resolve the issue. Once you are listed in the <a href="https://my.umbc.edu/go/schedule" rel="nofollow external" class="bo">SOC</a>, your Bb course shell will be created automatically. </li><li>If you and your <a href="https://docs.google.com/a/umbc.edu/document/d/1rwm_adJUvAP3cxL-QCrb56n9ql4xrR8FHd9_1Cw0vJI/edit?usp%3Dsharing" rel="nofollow external" class="bo">Department Scheduling Coordinator</a> believe you are correctly assigned as the instructor of record in the SOC and you do not see your course shell in Blackboard, please submit a Request Tracker (RT) ticket via <a href="https://my.umbc.edu/help" rel="nofollow external" class="bo">my.umbc.edu/help</a>.</li><li>If you need a Bb shell for a research or independent study course, please submit a <a href="http://www.umbc.edu/doit/blackboard/requestbbshell.html" rel="nofollow external" class="bo">new course request</a>.</li></ul><p>Instructors who teach multiple sections of the same course will find those enrollments merged into one Bb course shell. These sections may be split upon <a href="https://my.umbc.edu/go/request-help" rel="nofollow external" class="bo">request by an RT ticket</a>, which we recommend <a href="https://wiki.umbc.edu/x/d4HGAw" rel="nofollow external" class="bo">submitting at least one week</a> before the semester starts, if not as soon as courses are created in Blackboard.</p><p>Student enrollment in Bb mirrors the official registration in SA and updates hourly. However, courses are not accessible to students by default until the instructor of record <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId%3D1867862" rel="nofollow external" class="bo">makes them available</a>.</p><p>As always, if you have any questions, please consider the following options:</p><ul><li><span><a href="https://doit.umbc.edu/itnm/academic-continuity/" rel="nofollow external" class="bo"><span>Academic Continuity</span></a><span> | </span><a href="https://fdc.umbc.edu/resources/keep-on-teaching/" rel="nofollow external" class="bo"><span>Keep On Teaching</span></a><span> | </span><a href="https://doit.umbc.edu/students" rel="nofollow external" class="bo"><span>Student Technology Resources</span></a></span></li><li><a href="http://www.umbc.edu/faq" rel="nofollow external" class="bo">Check our extensive FAQ collection</a> </li><li><a href="http://my.umbc.edu/go/request-help" rel="nofollow external" class="bo">Open a ticket via RT</a></li><li>Follow the <a href="http://my.umbc.edu/groups/instructional-technology" rel="nofollow external" class="bo">Instructional Technology</a> &amp; <a href="http://my.umbc.edu/groups/doit" rel="nofollow external" class="bo">DoIT</a> myUMBC groups</li><ul><li>Sign up for <a href="https://my3.my.umbc.edu/groups/instructional-technology/events" rel="nofollow external" class="bo">a webinar &amp; other training</a> </li></ul><li><a href="http://doit.umbc.edu/itnm/staff/" rel="nofollow external" class="bo">Request a consult</a> with instructional technology staff</li></ul></div>
]]>
</Body>
<Summary>Blackboard course shells for FA2020 were created on July 27, 2020.  NOTE: In recognition of the COVID-19 pandemic and ongoing social distancing practices, UMBC’s fall session will mostly be online...</Summary>
<Website>https://my3.my.umbc.edu/groups/bbannouncements/posts/94493</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94493/guest@my.umbc.edu/b2010d1cc54a6b4801ea370cf569e9c2/api/pixel</TrackingUrl>
<Tag>blackboard</Tag>
<Tag>course-creation</Tag>
<Tag>fa2020</Tag>
<Tag>fall</Tag>
<Tag>ultra-course-preview</Tag>
<Tag>ultra-experience</Tag>
<Group token="bbannouncements">Blackboard Announcements</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bbannouncements</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/319/f6b35e5217428f5021e113525a55e6f4/xsmall.png?1437137819</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/319/f6b35e5217428f5021e113525a55e6f4/original.png?1437137819</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/319/f6b35e5217428f5021e113525a55e6f4/xxlarge.png?1437137819</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/319/f6b35e5217428f5021e113525a55e6f4/xlarge.png?1437137819</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/319/f6b35e5217428f5021e113525a55e6f4/large.png?1437137819</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/319/f6b35e5217428f5021e113525a55e6f4/medium.png?1437137819</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/319/f6b35e5217428f5021e113525a55e6f4/small.png?1437137819</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/319/f6b35e5217428f5021e113525a55e6f4/xsmall.png?1437137819</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/319/f6b35e5217428f5021e113525a55e6f4/xxsmall.png?1437137819</AvatarUrl>
<Sponsor>Blackboard Announcements</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/493/4cd9668aa14891ce5109d0df28a22e25/xxlarge.jpg?1595899141</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/493/4cd9668aa14891ce5109d0df28a22e25/xlarge.jpg?1595899141</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/493/4cd9668aa14891ce5109d0df28a22e25/large.jpg?1595899141</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/493/4cd9668aa14891ce5109d0df28a22e25/medium.jpg?1595899141</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/493/4cd9668aa14891ce5109d0df28a22e25/small.jpg?1595899141</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/493/4cd9668aa14891ce5109d0df28a22e25/xsmall.jpg?1595899141</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/493/4cd9668aa14891ce5109d0df28a22e25/xxsmall.jpg?1595899141</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 28 Jul 2020 11:23:46 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94486" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94486">
<Title>Zoom-Themed Phishing Campaign</Title>
<Tagline>Phishing Campaign Exploits Remote Meeting Users</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Abnormal Security recently found a Zoom-themed phishing campaign. This campaign is using fake Zoom alerts to steal Microsoft 356 credentials. With the boom in teleworking, workers at many organizations are using products like Zoom.  This has created an opportunity for malicious actors to create phishing campaigns that capitalize on this.</span><span><br></span><span><br></span><span>A malicious campaign is sending out emails claiming to be legitimate Zoom notifications and spoofing the actual Zoom email address. The email claims that the user will not be able to use the platform until they click on the embedded link to reactivate their account.</span></p><br><p><span>On clicking the link, the user is taken to a fake Office 365 login page. Entering any information into this login will not reactivate any account. It will instead give the username and password entered to the malicious actors.</span><span><br></span><span><br></span><span>The article also states that they have seen malicious actors spoof messages from not only Zoom but of WebEx as well. These campaigns are designed to steal credentials or even to</span></p><p><span>distribute malware.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><p><span><br></span><span>For more information, please check out: </span><span><br></span><a href="https://www.bankinfosecurity.com/zoom-themed-phishing-campaign-targets-office-365-credentials-a-14600" rel="nofollow external" class="bo"><span>https://www.bankinfosecurity.com/zoom-themed-phishing-campaign-targets-office-365-credentials-a-14600</span></a></p></div>
]]>
</Body>
<Summary>Abnormal Security recently found a Zoom-themed phishing campaign. This campaign is using fake Zoom alerts to steal Microsoft 356 credentials. With the boom in teleworking, workers at many...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94486/guest@my.umbc.edu/3cf7b8862aff5064f79b0620c45c0724/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 27 Jul 2020 17:53:34 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94444" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94444">
<Title>Quarterly patching downtime on 8/14/2020 and 8/15/2020</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><span>As part of our ongoing commitment to security, the Unix Infrastructure group will be conducting its quarterly system patching on Friday, August 14th and Saturday, August 15th.  While many of the systems will be patched without any service disruption, there are some systems which require the downtime of key services.  The schedule below outlines which key services will be offline and for how long.</span></p><p><span>Friday, 08/14/2020 between 4pm and 10pm (most systems will only be down for a short period during this time): </span></p><ul><li><span><strong>Between 4pm and 5:30pm only:</strong> LDAP-Master and Webadmin will be taken down for system maintenance.  During this time account creations and password changes will be unavailable.  Account authentication and logins will not be affected.</span></li><li><span>Access to Cyrus and UMBC Webmail (accounts not migrated to UMBC Gmail)</span></li><ul><li><span>All mail will be queued up and delivered after the server is patched</span></li></ul><li>All HFS (afs) servers - gl.umbc.edu home directories will be offline</li><li><span><strong>Between 9:15pm and 10pm only: </strong>Certain software licenses will be unavailable (autodesk, cadence, idl, schrodinger, xilinx, mathematica). </span></li><li><span><strong>Between 9:15pm and 10pm only: </strong>The web hosting environments (virthost) will be partially unavailable (pages will be available but any database calls will not work)</span></li></ul><p><span>Saturday, 08/15/2020 between 9am and 11am(most systems will only be down for a short period during this time):</span></p><ul><li><span>myUMBC lite page will be up resulting in reduced myUMBC functionality</span></li><li><span>Wiki will be unavailable</span></li><li><span>The sites (wordpress) web hosting environment will be unreachable</span></li></ul><p><span>Please let us know if you have any concerns or questions.</span></p><p><span>Thanks!</span></p><p><span>Tim Champ</span></p><p><span>Manager of Unix Infrastructure</span></p><p><span>UMBC DoIT</span></p></div>
]]>
</Body>
<Summary>As part of our ongoing commitment to security, the Unix Infrastructure group will be conducting its quarterly system patching on Friday, August 14th and Saturday, August 15th.  While many of the...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94444/guest@my.umbc.edu/c7e3807ac803c2d9c9fbb4f255112c07/api/pixel</TrackingUrl>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 24 Jul 2020 12:09:23 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94421" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94421">
<Title>Phishing Scam Uses Fake Docusign Messages</Title>
<Tagline>Docusign Fakes Target UMBC And Other Universities</Tagline>
<Body>
<![CDATA[
    <div class="html-content">The Division of Information Technology has received notices of a faked Docusign email sent out this week.  The subject line of the fake is:<br><br><div><pre>re:Docusign - Review File - &lt;email address&gt;</pre></div><div><strong><br></strong></div><div>The content is something like:</div><div><br></div><div><pre>Attention &lt;userid&gt;,<br><br>Please DocuSign , - CARES Act.pdf<br>Newest Regulatons for , PUA , PPP , SBA Listed.<br><br>Thank You,<br>umbc.edu<br></pre></div><div><br></div><div><br></div><div><br></div><div>If you received this message and clicked the link, you would have been taken to a malicious website intended for identity theft and/or malware installation on your computer.</div><div><br></div><div>If you went to the website and either downloaded an application or entered your password or other personal information, please let us know by sending email to:</div><div><br></div><div><em><a href="mailto:security@umbc.edu">security@umbc.edu</a></em></div><div><em><br></em></div><div><em><br></em></div><div>If you receive a Docusign message that you think is fake,  please forward it to:</div><br><div><em><a href="mailto:spam@docusign.com">spam@docusign.com</a><br></em></div><div><em><br></em></div><div>You can find out more about Docusign fraud-reporting at:</div><div><br></div><div><a href="https://www.docusign.com/trust/security/incident-reporting#:~:text=Dedicated%20threat%20reporting%20channels&amp;text=DocuSign%2Dthemed%20fraudulent%20emails%20and,com%20and%20delete%20it%20immediately." rel="nofollow external" class="bo">Recognizing and Reporting Suspicious
     Activities Support Site</a><br></div><div><em><br></em></div><div><em><br></em></div><div>Thank you,</div><div><br></div><div>- Andy Johnston<br></div></div>
]]>
</Body>
<Summary>The Division of Information Technology has received notices of a faked Docusign email sent out this week.  The subject line of the fake is:    re:Docusign - Review File - &lt;email address&gt;...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94421/guest@my.umbc.edu/601c02a7164f6ad4f79284f808b49941/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jul 2020 16:12:28 -0400</PostedAt>
<EditAt>Wed, 22 Jul 2020 17:05:27 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94420" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94420">
<Title>Part Time Job Phishing Alert: CORNERSTONE JOB OFFER</Title>
<Tagline>Fake Job Scams Target UMBC Students</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>During the past week, DOIT has received notifications of several phishing emails. Below is a sample of a Phishing message that over 600 UMBC students have received. For privacy purposes the To field was removed.</span></p><br><p><span>From: Summer Woodforest &lt;</span><a href="mailto:summerwoodforest@gmail.com" rel="nofollow external" class="bo"><span>summerwoodforest@gmail.com</span></a><span>&gt; </span></p><p><span>Date: Tue, Jul 21, 2020 at 8:30 AM</span></p><p><span>Subject: CORNERSTONE JOB OFFER.</span></p><br><p><span>Dear student,</span></p><br><p><span>   We got your contact through your school database and I'm happy to inform you that our reputable company Cornerstone® is currently running a student empowerment program. This program is completely school oriented as it has been designed not to deter you from all school activities which is priority for you and this organisation. This program is to help loyal and hardworking students like you secure a part time job with an attractive weekly salary.</span></p><p><span>TO PROCEED WITH THIS JOB OFFER, KINDLY REPLY TO THIS MAIL WITH YOUR ALTERNATE E-MAIL ADDRESS IN ORDER TO RECEIVE THE FULL JOB DESCRIPTION.</span></p><br><p><span>Best Regards,</span></p><br><p><span>Summer Wood,</span></p><p><span>HR Recruit Manager/Consultant</span></p><p><span>Cornerstone®,</span></p><p><span>Staffing-Solutions</span></p><br><p><span>Similar phishing emails were received from the following addresses listed below: </span></p><ul><li><p><span>Gavan Ryan &lt;</span><a href="mailto:ryangavan724@gmail.com" rel="nofollow external" class="bo"><span>ryangavan724@gmail.com</span></a><span>&gt;</span></p></li><li><p><span>Clerk Trevor &lt;</span><a href="mailto:clerktrevor@gmail.com" rel="nofollow external" class="bo"><span>clerktrevor@gmail.com</span></a><span>&gt; </span></p></li></ul><br><p><span>If you have received any message similar to the one listed above, please forward the message to </span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.  Please attach the email headers, information on how to find the email headers can be found here: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>DO NOT RESPOND to this email, if you have done so already please contact us immediately at </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><br><p><span>For more information on scams and phishing handling, please visit </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=36766495</span></a></p><br><p><span>To read more articles published by DOIT visit: </span><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a></p></div>
]]>
</Body>
<Summary>During the past week, DOIT has received notifications of several phishing emails. Below is a sample of a Phishing message that over 600 UMBC students have received. For privacy purposes the To...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94420/guest@my.umbc.edu/afe2db17898b22d485373aa9643dd137/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jul 2020 14:52:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94419" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94419">
<Title>Fake Covid-19 Fund Scam</Title>
<Tagline>No.  The FTC Is NOT Offering You Any Money</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Fake Covid-19 Fund Scam</span></p><br><br><p><span>The FTC posted an article warning of a phishing scam that they recently discovered. In this scam, the malicious actor is sending email claiming to be from the FTC and saying that users could get money from a Covid-19 “Global Empowerment Fund.” All that is required of the user is to respond with their bank account information.</span><span><br></span><span><br></span><span>This email is a scam.</span><span>  It is </span><span>not </span><span>from the FTC, there is </span><span>no </span><span>money and there is </span><span>no </span><span>fund. The FTC says that they will never contact you by phone, email, text message, or by social media to ask for financial information, this includes your social security number. They also state that any stimulus checks will be from the IRS , not the FTC.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.consumer.ftc.gov/blog/2020/06/fake-emails-about-fake-money-fake-covid-19-fund" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/blog/2020/06/fake-emails-about-fake-money-fake-covid-19-fund</span></a></p></div>
]]>
</Body>
<Summary>Fake Covid-19 Fund Scam    The FTC posted an article warning of a phishing scam that they recently discovered. In this scam, the malicious actor is sending email claiming to be from the FTC and...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94419/guest@my.umbc.edu/18d39ec7d1971003e8881366aa63b703/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jul 2020 14:49:56 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94418" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94418">
<Title>Phishing Email Subject Lines</Title>
<Tagline>A Guide To Common Phishing Email Subjects</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>With COVID-19 and associated restrictions remaining prevalent, many malicious actors have used the opportunity to update their phishing email campaigns. The article linked below explains some of the ways malicious actors try and trick people into giving up their information or even into installing malware.</span></p><br><p><span>The article states that many of the emails will use subject lines like coronavirus, work reopening, rescheduled meetings, stimulus payments, and new vacation policies. Malicious actors also craft themed emails to look like popular social media sites like Facebook and LinkedIn.</span></p><br><p><span>For LinkedIn they noticed subject lines "You appeared in new searches this week," "People are looking at your LinkedIn profile," "Please add me to your LinkedIn Network," and "LinkedIn Password Reset."</span></p><br><p><span> Facebook sees phishing emails using subject lines like "Your Friend Tagged a Photo of You" and "Your friend tagged you in photos on Facebook." Phishing campaigns from Twitter were said to try and entice people with subject lines similar to "Someone has sent you a Direct Message on Twitter."</span></p><br><p><span>Other subjects included "A login alert for Chrome on Motorola Moto X," "New voice message at 1:23AM," and "55th Anniversary and Free Pizza". The article also describes some general subjects to look out for:</span></p><br><ul><li><p><span>Password Check Required Immediately</span></p></li><li><p><span>Vacation Policy Update</span></p></li><li><p><span>Branch/Corporate Reopening Schedule</span></p></li><li><p><span>COVID-19 Awareness</span></p></li><li><p><span>Coronavirus Stimulus Checks</span></p></li><li><p><span>List of Rescheduled Meetings Due to COVID-19</span></p></li><li><p><span>Confidential Information on COVID-19</span></p></li><li><p><span>COVID-19 - Now airborne, Increased community transmission</span></p></li><li><p><span>Fedex Tracking</span></p></li><li><p><span>Your meeting attendees are waiting</span><span><br><br></span></p></li></ul><p><span>According to the article, the most common subject lines within phishing emails found “in-the-wild” in the last quarter were:</span></p><br><ul><li><p><span>Microsoft: Abnormal log in activity on Microsoft account</span></p></li><li><p><span>Chase: Stimulus Funds</span></p></li><li><p><span>HR: Company Policy Notification: COVID-19 - Test &amp; Trace Guidelines</span></p></li><li><p><span>Zoom: Restriction Notice Alert</span></p></li><li><p><span>Jira: [JIRA] A task was assigned to you</span></p></li><li><p><span>HR: Vacation Policy Update</span></p></li><li><p><span>Ring: Karen has shared a Ring Video with you</span></p></li><li><p><span>Workplace: [company_name] invited you to use Workplace</span></p></li><li><p><span>IT: ATTENTION: Security Violation</span></p></li><li><p><span>Earn money working from home</span><span><br><br></span></p></li></ul><p><span>At UMBC some of the most common subject lines for phishing emails seen recently have been “UMBC JOB OPPORTUNITY”, “CORNERSTONE STUDENT JOB OFFER”, “CORNERSTONE JOB OFFER”, “UMBC COVID-19 INFORMATION”, “UMBC COVID-19 PART TIME JOB OFFER” and “WORK FROM HOME.”</span><span><br></span><span><br></span><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.techrepublic.com/article/watch-out-for-these-subject-lines-in-email-phishing-attacks/" rel="nofollow external" class="bo"><span>https://www.techrepublic.com/article/watch-out-for-these-subject-lines-in-email-phishing-attacks/</span></a><span> <br></span></p></div>
]]>
</Body>
<Summary>With COVID-19 and associated restrictions remaining prevalent, many malicious actors have used the opportunity to update their phishing email campaigns. The article linked below explains some of...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94418/guest@my.umbc.edu/f495c17d1f174c06aa6488841c31760d/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jul 2020 14:45:53 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94417" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94417">
<Title>Limited Part-Time Offers</Title>
<Tagline>Yet AnotherJob Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>The email below is an example of a recent job scam phishing email that has been going around campus. This email, like many other job scam emails, tries to trick users into giving up their personal information like the users address, phone number, and personal email address.</span></p><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>Jennifer Johnston</span><span> &lt;</span><span><a href="mailto:jenniferjohnston32@gmail.com">jenniferjohnston32@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Fri, Jul 17, 2020, 4:07 PM</span></p><p><span>Subject: Limited Part-Time Offers.</span></p><p><span>To: &lt;</span><span> @umbc.edu</span><span>&gt;</span></p><br><br><p><span>Dear Student,</span></p><p><span>     I'm happy to inform you that our reputable company The Amynta Group® is currently running a part time programme suitable for students. The programme is to help interested students secure a part time job which does not deter you from doing any other. </span></p><p> </p><p><span>KINDLY EMAIL BACK IF INTERESTED IN THIS JOB POSITION.</span></p><p> </p><p><span>Best Regards,</span></p><p><span>Jennifer.</span></p><p><span>Recruiting Manager </span></p><p><span>The Amynta Group®</span></p></td></tr></tbody></table></div><br><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p></div>
]]>
</Body>
<Summary>The email below is an example of a recent job scam phishing email that has been going around campus. This email, like many other job scam emails, tries to trick users into giving up their personal...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94417/guest@my.umbc.edu/853b31f1996cec91d7eb022ccd476d48/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jul 2020 14:38:16 -0400</PostedAt>
<EditAt>Wed, 22 Jul 2020 14:46:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94345" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94345">
<Title>Tips to Help Protect Against Smishing Scams</Title>
<Tagline>Scammer Don't Just Use Email</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Smishing scams are a type of phishing scam which occurs when a malicious actor sends text messages or direct messages. They follow a similar pattern of acting as if they were from a trusted source like banks, government agencies, or even friends and family, trying to trick users into clicking a malicious link or possibly giving personal and financial information.</span></p><br><p><span>In recent years smishing attacks have started to become more numerous and sophisticated. Just like with phishing attacks, smishing also spikes during a crisis like COVID-19. These attacks are designed to exploit the public’s fears and anxieties, making their victims an easier target. </span><span><br></span><span><br></span><span>According to the article below, many more adults and children will open a text message or direct message on average compared to an email. Malicious actors can also automate the sending of text and direct messages to thousands or even millions of phone numbers and, unlike emails, there is no viable way for a user to block or flag suspicious messages.</span><span><br></span><span><br></span><span>These scams are similar to other phishing scams. They will still instruct the user to perform actions that could be harmful. Some of these actions might include: </span></p><ul><li><p><span>Replying to the text or direct message with personal or financial information.</span></p></li><li><p><span>Clicking a link that downloads malicious files or directs them to a website designed to gain the users personal or financial information.</span></p></li><li><p><span>Asking the user to call a ‘customer service’ number.</span></p></li><li><p><span>Asking the user to wire money to the malicious actors.</span><span><br><br></span></p></li></ul><p><span>Tips on how to spot and avoid smishing attacks:</span></p><ul><li><p><span>Do not click on a link or call a number from an unknown number.</span></p></li><li><p><span>Do not submit personal information to an unknown number.</span></p></li><li><p><span>If possible try to verify the authenticity of the message by finding the sender’s website and official contact details online. For example if a message is claiming to be from your bank, check the bank's website to find the real contact information.</span></p></li><li><p><span>If it looks too good to be true, it probably is too good to be true.</span></p></li><li><p><span>Delete all suspicious texts.</span></p></li><li><p><span>If the sender has a ‘5000’ number, the message was sent via email and could be malicious.</span></p></li><li><p><span>If the sender is anything other than a cell phone number, the message may have been sent via email and could be malicious.</span></p></li><li><p><span>Block unknown numbers if possible.</span></p></li></ul><br><br><p><span>For more information, please check out: </span></p><p><a href="https://portswigger.net/daily-swig/what-is-smishing-how-to-protect-against-text-message-phishing-scams" rel="nofollow external" class="bo"><span>https://portswigger.net/daily-swig/what-is-smishing-how-to-protect-against-text-message-phishing-scams</span></a></p></div>
]]>
</Body>
<Summary>Smishing scams are a type of phishing scam which occurs when a malicious actor sends text messages or direct messages. They follow a similar pattern of acting as if they were from a trusted source...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94345/guest@my.umbc.edu/5551cec3c68635f6294850df8d21610f/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 17 Jul 2020 12:40:22 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94318" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94318">
<Title>USM OnTrack Update: Labster will be *NO COST* to Students</Title>
<Tagline>Take Advantage of this Virtual Resource in your Fall Course!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.usmd.edu/cai/usm-ontrack-0" title="https://www.usmd.edu/cai/usm-ontrack-0" rel="nofollow external" class="bo">USM <em>OnTrack</em></a> is now providing a system-wide site license for all USM institutions for Labster. As a result, <strong>it will NOT be necessary to charge students the $45/course fee.</strong></div><div><strong><br></strong></div><div><span>The upgraded agreement will last for a full calendar year (fall, winter, spring, and summer terms) and will provide access to Labster's services including faculty development, access to ALL simulations, tech support, etc.</span></div><div><br></div><div>USM is providing faculty training and inter-institutional coordination of resources to explore the use of virtual reality technologies by Labster for use in lab-based courses. Virtual reality technologies give students access to realistic lab experiences that will let them perform experiments and practice their skills. These tools promise to provide sufficiently high-fidelity simulations for learning lab techniques and inquiry skills, particularly for lower-level lab courses.<br></div><div><br></div><div>Labster has set up a <a href="https://www.labster.com/usm/" title="https://www.labster.com/usm/" rel="nofollow external" class="bo">website for USM <em>OnTrack</em></a> to allow faculty and others to review their catalog of labs/simulations.<br></div><div><br></div><div><div>Here is a  link to the recording of the last demo session on July 7 in case you have faculty/staff who were unable to attend: <a href="https://youtu.be/snf6l0QaQAQ" rel="nofollow external" class="bo">https://youtu.be/snf6l0QaQAQ</a><br></div><div><div><br></div><div><span>Labster</span> will begin offering more in-depth training sessions starting next week, including sessions targeted at biology, chemistry, and physics:</div><div><ul><li><span>Wednesday July 15th - 9-10am</span><span> </span><a href="https://us02web.zoom.us/meeting/register/tZIkduCqrzIvHNKt732heHjSiL9oJKcAR8US" rel="nofollow external" class="bo">Register here</a><span>.</span></li><li><span>Friday July 17th - 9-10am</span><span> </span><a href="https://us02web.zoom.us/meeting/register/tZEkd-yhqjIvGteNfa_lLpuc0Jd_s76_p4Qg" rel="nofollow external" class="bo">Register here</a><span>.</span><br></li><li><span>Tuesday July 21st - 12-1pm</span><span> </span><a href="https://us02web.zoom.us/meeting/register/tZApf-iqrD4rHdY2gcifo4fptDthEKjwhGBH" rel="nofollow external" class="bo">Register here</a><span>.</span><br></li><li><span>Thursday July 23rd (Biology Specific) - 3-4pm</span><span> </span><a href="https://us02web.zoom.us/meeting/register/tZErd-mhqT0oGNUCeG5oMFxDG_8_jQ3n8UEL" rel="nofollow external" class="bo">Register here</a><span>.</span><br></li><li><span>Monday July 27th (Chemistry Specific) - 9-10am</span><span> </span><a href="https://us02web.zoom.us/meeting/register/tZApfuCvqz8pHNdFhsDGfH_FocUwaPrJ0QPX" rel="nofollow external" class="bo">Register here</a><span>.</span><br></li><li><span>Tuesday July 28th (Physics Specific) - 12-1pm</span><span> </span><a href="https://us02web.zoom.us/meeting/register/tZIsceihpj0rHdVBjqKHQG4KL_29dx2-wqt8" rel="nofollow external" class="bo">Register here</a><span>.</span><br></li></ul></div><div>You can also find these trainings and registration links on the USM OnTrack <span>Labster</span> website: <a href="https://www.labster.com/usm/" rel="nofollow external" class="bo">https://www.<span>labster</span>.com/usm/</a></div></div></div></div>
]]>
</Body>
<Summary>USM OnTrack is now providing a system-wide site license for all USM institutions for Labster. As a result, it will NOT be necessary to charge students the $45/course fee.     The upgraded...</Summary>
<Website>https://www.labster.com/usm/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94318/guest@my.umbc.edu/cf75574472ba39e6500f8c99b183f09a/api/pixel</TrackingUrl>
<Tag>online-learning</Tag>
<Tag>simulations</Tag>
<Tag>virtual-labs</Tag>
<Tag>virtual-reality</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/318/e4d4bc5b74947b6a00dcfd35b5d1c943/xxlarge.jpg?1594910337</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/318/e4d4bc5b74947b6a00dcfd35b5d1c943/xlarge.jpg?1594910337</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/318/e4d4bc5b74947b6a00dcfd35b5d1c943/large.jpg?1594910337</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/318/e4d4bc5b74947b6a00dcfd35b5d1c943/medium.jpg?1594910337</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/318/e4d4bc5b74947b6a00dcfd35b5d1c943/small.jpg?1594910337</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/318/e4d4bc5b74947b6a00dcfd35b5d1c943/xsmall.jpg?1594910337</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/318/e4d4bc5b74947b6a00dcfd35b5d1c943/xxsmall.jpg?1594910337</ThumbnailUrl>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 16 Jul 2020 10:45:30 -0400</PostedAt>
<EditAt>Thu, 16 Jul 2020 10:49:24 -0400</EditAt>
</NewsItem>

</News>
