Tech Documentation

'Information Security' Archive

SCAMALOT! Part VI

Posted June 7, 2017
Password Expiry Email

Welcome to a special edition of SCAMALOT! In this post, we change course from our usual mission of providing tips and tricks for recognizing phishing attacks to learn how to assess automated emails you’ll encounter in your inbox. At times, you will receive automated messages from Bryn Mawr College or Bi-College software, like the password […]

SCAMALOT! Part V

Posted May 2, 2017

In this edition of SCAMALOT, we’ll take a closer look at an email that raises a number of common phishing flags. Scam emails aren’t always as easy to identify as you might think; it may have been a while since you’ve been asked to wire money to a foreign prince! The most dubious attacks have […]

Recommended Chrome Settings

Posted April 5, 2017

If you’re using your College computer  and you are new to Chrome (you haven’t set up bookmarks or customizations), go to Software Center and double-click on the chrome installer.  This install is pre-configured with all the LITS-recommended options. These settings are as per Chrome version 57.  Chrome updates often and settings may change.  Feel free […]

SCAMALOT! Part IV

Posted March 29, 2017

Welcome back to SCAMALOT! In this spring 2017 edition, we continue to closely examine aspects of scam emails to help you identify similar attacks in the future. There is usually more than one way to determine if a message is legitimate or not, and by taking the time to look for phishy evidence in your […]

Email Spam & Phishing

Posted May 20, 2016

Spam email is unsolicited email sent to your email address. Here are some tips and tricks on how to avoid spam, as well as how to block it, and what to do if important emails are being marked as spam. What is spam? Spam is unsolicited email. Much like junk mail from the post office, […]

Password Safety

Posted October 1, 2015

Your College password allows you access to and ensures the protection of many on-campus services. It locks your computer which, when you log in, gives you access not only to the hard drive, but also your network drives, including your personal drive and any departmental or shared folders to which you have access. It keeps […]

SCAMALOT! Part III

Posted May 10, 2014
MsgList

Welcome back to SCAMALOT!, the series where you can learn to be a better spam detective. In Part II, our heroes dove into two messages claiming to be from popular shipping companies and found a treasure trove of scam. This time, we explore a false message claiming to be from within our institution — those […]

SCAMALOT! Part II

Posted January 18, 2013

Welcome to SCAMALOT!  In Part I, our heroes explored the anatomy of a scamtastic message claiming to be from Facebook.  In our continuing adventures, we will take a closer look at two messages which claim to be from popular shipping companies. Example 1 Let’s start with an easy one.  In our first example, we will […]

SCAMALOT!! Part I

Posted December 14, 2012
fake facebook notification

Welcome to SCAMALOT!  This is part I of an ongoing series of posts devoted to helping you (yes, you!) become better email scam detectives. Scammers are clever, and some of them are pretty good at making an email look like the real thing, at least on the surface. So how do we distinguish a fake […]

Internet Safety and Email Etiquette: Tips and Resources for Students

Posted August 29, 2010

Staying safe and legal while on the Internet is an important responsibility for all internet users. We offer some tips and tricks for keeping yourself safe and your identity protected while on the Internet, as well as steps for recovering from a compromised account or online identity. For an easily printable .PDF version, please see […]

« Previous Page