{"id":922,"date":"2018-07-05T09:40:09","date_gmt":"2018-07-05T14:40:09","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=922"},"modified":"2024-04-16T21:46:14","modified_gmt":"2024-04-16T21:46:14","slug":"ouch-july-edition-phone-call-attacks-scams","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/ouch-july-edition-phone-call-attacks-scams\/","title":{"rendered":"OUCH! July Edition &#8211; Phone Call Attacks &amp; Scams"},"content":{"rendered":"<div class=\"_n_n3\">\n<div class=\"conductorContent\" role=\"presentation\">\n<div id=\"primaryContainer\" class=\"_n_e\">\n<div>\n<div class=\"conductorContent\" role=\"presentation\">\n<div class=\"_n_T\">\n<div class=\"_n_X\" role=\"main\">\n<div class=\"_n_X\">\n<div>\n<div class=\"_n_X\">\n<div class=\"_n_Y\">\n<div class=\"allowTextSelection\" role=\"document\">\n<div class=\"conductorContent\" role=\"presentation\">\n<div class=\"_rp_k\">\n<div class=\"_rp_k allowTextSelection\">\n<div class=\"_rp_l allowTextSelection customScrollBar scrollContainer\" role=\"region\">\n<div>\n<div>\n<div>\n<div>\n<div class=\"_rp_w6 _rp_x6\">\n<div id=\"Conversation.FossilizedTextBody\" class=\"ms-font-weight-regular ms-font-color-neutralDark rpHighlightAllClass rpHighlightBodyClass _rp_y6\" style=\"font-family: 'wf_segoe-ui_normal','Segoe UI','Segoe WP',Tahoma,Arial,sans-serif,serif,'EmojiFont'\">\n<div class=\"ms-border-color-neutralTertiaryAlt\">\n<div>\n<div>\n<div>\n<div align=\"center\">\n<table class=\" alignleft\" style=\"width: 463px\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 479px\">\n<div align=\"center\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div align=\"center\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div>\n<p><span style=\"color: black;font-family: Arial, sans-serif;font-size: small\">Folks,<\/span><\/p>\n<p>We are excited to announce July&#8217;s edition of the OUCH! newsletter &#8211; Phone Call Scams and Attacks. Led by Guest Editor and Social Engineering expert Jen Fox, we explain how phone call scams work, the easiest ways to detect them and how to respond if you do get attacked. In addition, we are adding more color to the new OUCH! design so key points are easier to identify and understand. I would love your thoughts on what you like and do not like about the new design, drop me an email if you have time. Download and share OUCH! with family, friends and co-workers.<\/p>\n<p><a href=\"https:\/\/click.email.sans.org\/?qs=d31f5535c205b2bc003dfd6d7474bd18210addabafaace701452a5b12e36f66286c4357d88b41112bafddf0fab6a1ec9d96c2f9fb76275a4\" target=\"_blank\" rel=\"noopener noreferrer\"><b>Phone Call Scams \/ Attacks<\/b><\/a><\/p>\n<p><a href=\"https:\/\/click.email.sans.org\/?qs=d31f5535c205b2bc1059099d18ea05dec6cb85bc1315541b4ed8a07d1bce066286ee8eea1ea0379a12715ca4c3bb8a6b2aa8c35c531ec7a8\" target=\"_blank\" rel=\"noopener noreferrer\"><b>OUCH! Archives<\/b><\/a><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div align=\"center\">\n<hr align=\"center\" size=\"2\" width=\"100%\" \/>\n<\/div>\n<div>\n<p><span style=\"color: black;font-family: Arial, sans-serif;font-size: small\"><b>EUROPEAN SECURITY AWARENESS SUMMIT &#8211; CFP<\/b><\/span><\/p>\n<p><a href=\"https:\/\/click.email.sans.org\/?qs=d31f5535c205b2bc0b82b7432323931f361b67cd6f4d56739b526a377d7c108c5999b007633376cdb3098ca6b1e0de07ff7c2a8f4a16ba15\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/image.email.sans.org\/lib\/fe9613727664077577\/m\/2\/c2e664a8-a421-4248-aadc-ac5968540357.png\" width=\"249\" align=\"left\" border=\"0\" \/><\/a>Twice a year we host the world\u2019s leading Security Awareness Summit, every August in United States and every November in Europe. At each event hundreds of security awareness professionals and leading experts come together for two days of intense sharing, learning and networking. The agenda for the US summit is posted and only one month out. Learn more and register for the US summit at <a href=\"https:\/\/click.email.sans.org\/?qs=d31f5535c205b2bc6b4effaea822ed8ca24e42421008659382e0e9d1a20e68ddab067e7d30d7c4f5912a5a3af6265327fd3d0a43409b84a6\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/sans.org\/SecAwareSummit<\/a>. However, we are also excited to announce the Call for Presenters is now open for the European Security Awareness Summit. This summit is 28\/29 November in London. Do you have an amazing story to share about Security Awareness? Submit your talk now at <a href=\"https:\/\/click.email.sans.org\/?qs=d31f5535c205b2bcee8afc0268c0982f045db65c4d77f0c3d09fc0974925b793a18fbca7410fbee0a57f23add2601239c5a26439eb56be61\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/surveymonkey.co.uk\/r\/SANSSAS2018<\/a>.<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div align=\"center\">\n<hr align=\"center\" size=\"2\" width=\"100%\" \/>\n<\/div>\n<div>\n<p><span style=\"color: black;font-family: Arial, sans-serif;font-size: small\"><b>ONLINE TRAINING<\/b><\/span><\/p>\n<p><a href=\"https:\/\/click.email.sans.org\/?qs=d31f5535c205b2bccd04578c16a9d456378e74bb61d01813116d4ecd4ea7d7aec112c73148166c2a449f542f78ea499d8f83583d5c36b905\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/image.email.sans.org\/lib\/fe9613727664077577\/m\/2\/OUCH-OnDemand.png\" width=\"187\" align=\"left\" border=\"0\" \/><\/a>SANS Online Training offers several flexible training options that fit your learning style. Don\u2019t miss this year\u2019s best <a href=\"https:\/\/click.email.sans.org\/?qs=d31f5535c205b2bce642679dd468df32df174260caf0a7567d8c35b0674028a25c46db918332d35ceb0a19f5d2e3a3850d10e7d5aa5ab778\" target=\"_blank\" rel=\"noopener noreferrer\">Online Training Special Offers <\/a>available now with your OnDemand or vLive course purchase. You\u2019ll have options including iPad Pro\u2019s, other laptops and tablets, or $350 or more off with your next SANS OnDemand or vLive course.<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div><span style=\"color: black;font-family: 'Times New Roman', serif;font-size: medium\"><span style=\"font-family: Arial, sans-serif;font-size: small\">\u00a0<\/span><\/span><\/div>\n<div align=\"center\">\n<hr align=\"center\" size=\"2\" width=\"100%\" \/>\n<\/div>\n<div>\n<p><span style=\"color: black;font-family: Arial, sans-serif;font-size: small\"><b>GUEST EDITOR<\/b><\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/image.email.sans.org\/lib\/fe9613727664077577\/m\/2\/9bdf4beb-2f44-49e8-a980-168a2b1d97eb.png\" align=\"left\" \/>Jen Fox was the winner of the DEF CON 23 Social Engineering Capture The Flag competition. When she isn\u2019t asking people for their passwords or gaining unauthorized access to secured areas, she provides awareness training, risk management and compliance services for clients.<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div><span style=\"color: black;font-family: 'Times New Roman', serif;font-size: medium\"><span style=\"font-family: Arial, sans-serif;font-size: small\">\u00a0<\/span><\/span><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Folks, We are excited to announce July&#8217;s edition of the OUCH! newsletter &#8211; Phone Call Scams and Attacks. Led by Guest Editor and Social Engineering expert Jen Fox, we explain how phone call scams work, the easiest ways to detect them and how to respond if you do get attacked. In addition, we are adding [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,6,7,8],"tags":[],"class_list":["post-922","post","type-post","status-publish","format-standard","hentry","category-front-page","category-public-service-announcement","category-published","category-tips"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=922"}],"version-history":[{"count":1,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/922\/revisions"}],"predecessor-version":[{"id":2113,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/922\/revisions\/2113"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}