{"id":337,"date":"2014-07-14T11:27:55","date_gmt":"2014-07-14T16:27:55","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=337"},"modified":"2024-04-16T21:46:14","modified_gmt":"2024-04-16T21:46:14","slug":"july-14-2014-phishing-report","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/july-14-2014-phishing-report\/","title":{"rendered":"July 14, 2014 Phishing Report"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2014\/07\/phish.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-338\" src=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2014\/07\/phish.png\" alt=\"phish\" width=\"450\" height=\"482\" srcset=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2014\/07\/phish.png 733w, https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2014\/07\/phish-280x300.png 280w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>A new phishing attack attempts to acquire a users Apple ID information through a fake verification link. The email looks fairly genuine, and the verification link directs you to a near identical version of Apple&#8217;s sign-in page. Apple IDs are tied to iTunes, iCloud, email, and more Apple services making them a valuable target.<\/p>\n<p>If you think that your account has been compromised, or you haven&#8217;t changed your Apple ID password in a while, you can change your password by following the instructions from Apple&#8217;s <a href=\"http:\/\/support.apple.com\/kb\/PH2617\">support page<\/a>.<\/p>\n<p>If you would like detailed information as to how this email was identified as a phishing attempt, you can view the source material from the <a href=\"http:\/\/vrt-blog.snort.org\/2014\/07\/apple-id-harvesting-now-this-is-good.html\">Vulnerability Research Team&#8217;s post<\/a>.<\/p>\n<p><strong>Don\u2019t forget, Loyola will never send you an email containing a link to provide your username and password.\u00a0<\/strong>As always, if you receive a suspicious email, forward it to\u00a0<a style=\"color: #a30046\" href=\"mailto:datasecurity@luc.edu\">datasecurity@luc.edu<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; A new phishing attack attempts to acquire a users Apple ID information through a fake verification link. The email looks fairly genuine, and the verification link directs you to a near identical version of Apple&#8217;s sign-in page. Apple IDs are tied to iTunes, iCloud, email, and more Apple services making them a valuable target. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-337","post","type-post","status-publish","format-standard","hentry","category-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=337"}],"version-history":[{"count":1,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/337\/revisions"}],"predecessor-version":[{"id":2110,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/337\/revisions\/2110"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}