{"id":134,"date":"2013-12-03T09:55:42","date_gmt":"2013-12-03T15:55:42","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=134"},"modified":"2024-04-16T21:46:14","modified_gmt":"2024-04-16T21:46:14","slug":"december-3-2013-phishing-report","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/december-3-2013-phishing-report\/","title":{"rendered":"December 3, 2013 Phishing Report"},"content":{"rendered":"<p>This is the latest phishing email reported to the Information Security Office:<\/p>\n<p><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2013\/12\/Phish_12031213.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-135\" src=\"http:\/\/blogs.luc.edu\/uiso\/files\/2013\/12\/Phish_12031213-300x130.png\" alt=\"\" width=\"300\" height=\"130\" srcset=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2013\/12\/Phish_12031213-300x130.png 300w, https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2013\/12\/Phish_12031213-1024x444.png 1024w, https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2013\/12\/Phish_12031213-768x333.png 768w, https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2013\/12\/Phish_12031213.png 1035w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Clicking the link directs you to enter your credentials into a form.\u00a0<strong>Don\u2019t forget, Loyola will never send you an email containing a link to provide your username and password.\u00a0<\/strong>As always, if you receive a suspicious email, forward it to <a href=\"mailto:datasecurity@luc.edu\">datasecurity@luc.edu<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the latest phishing email reported to the Information Security Office: Clicking the link directs you to enter your credentials into a form.\u00a0Don\u2019t forget, Loyola will never send you an email containing a link to provide your username and password.\u00a0As always, if you receive a suspicious email, forward it to datasecurity@luc.edu.<\/p>\n","protected":false},"author":7,"featured_media":135,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[51],"class_list":["post-134","post","type-post","status-publish","format-standard","hentry","category-phishing","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=134"}],"version-history":[{"count":1,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/134\/revisions"}],"predecessor-version":[{"id":2101,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/134\/revisions\/2101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media\/135"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}