Several types of attacks are used to steal information and other assets on the internet. The most common ones include phishing, spoofing, and spam.
If you receive any suspicious emails, please forward them to abuse@iup.edu, or use the phish alert button.
Phishing
The act of a malicious user or website to deceive people into revealing personal information, such as account passwords or credit card numbers. A phisher typically uses deceptive email messages or online advertisements as bait to lure unsuspecting users to fraudulent websites, where the users are then tricked into providing personal information. Be aware of phishing attempts and be diligent with regard to identifying an attempt.
Spoofing
Spoofing attacks are commonly used in conjunction with phishing. The spoofed site is usually designed to look like the legitimate site, often using components like company logos from the legitimate site.
Spam
Unsolicited email that could be used to spread email messages as part of a larger phishing scam.