{"id":45,"date":"2012-04-30T14:11:41","date_gmt":"2012-04-30T19:11:41","guid":{"rendered":"http:\/\/blog.uvm.edu\/compute\/?p=45"},"modified":"2015-09-30T09:24:43","modified_gmt":"2015-09-30T14:24:43","slug":"is-this-email-legit","status":"publish","type":"post","link":"https:\/\/blog.uvm.edu\/compute\/2012\/04\/30\/is-this-email-legit\/","title":{"rendered":"Is This Email Legit?"},"content":{"rendered":"<p>Is this email legitimate or a hoax? \u00a0This is the single most frequently asked question we have. \u00a0The answer is almost always no but people still ask and occasionally one of our clients will fall for a scam and end up with a compromised account.<\/p>\n<p>The basic rule of thumb should be: if you want to ask someone about a particular email, then chances are the email is a scam and you should just delete it.<\/p>\n<p>In general here&#8217;s what to look for:<\/p>\n<ul>\n<li>Is the email coming from a UVM email address? \u00a0If not, it&#8217;s fake.<\/li>\n<li>If there is a link in the email, does the link appear to be going to a UVM website (i.e. does the host name end in &#8220;uvm.edu&#8221;)? \u00a0If not, it&#8217;s fake.<\/li>\n<li>Does the link in the email go to same place that the email says it does (e.g. the link says &#8220;www.uvm.edu&#8221; but actually goes somewhere else). \u00a0If it doesn&#8217;t, it&#8217;s fake.<br \/>\nYou do not have to click the link to find out where it&#8217;s actually going. \u00a0Instead you can right click (control click under MacOS) and select &#8220;Copy Link Location&#8221;, then you can paste the link into any web browser and &#8220;see where it&#8217;s going&#8221; before actually clicking.<\/li>\n<li>If you do click the link does the site ask you for personal information (account and password, or worse, SS#)? If yes, it&#8217;s fake.<\/li>\n<li>Does the email threaten dire measures if you don&#8217;t comply? \u00a0If yes, it&#8217;s probably fake.<br \/>\nAny security measure imposed by UVM (e.g. expiring your UVM netID every 365 days), will not be executed without ample warning (two weeks at least) and can always be reversed.<\/li>\n<\/ul>\n<p>Here is an ebay website on the subject:<\/p>\n<p>http:\/\/pages.ebay.com\/education\/spooftutorial\/spoof_2.html<\/p>\n<p>Here&#8217;s another:<\/p>\n<p>http:\/\/www.antiphishing.org\/consumer_recs.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is this email legitimate or a hoax? \u00a0This is the single most frequently asked question we have. \u00a0The answer is almost always no but people still ask and occasionally one of our clients will fall for a scam and end up with a compromised account. The basic rule of thumb should be: if you want &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.uvm.edu\/compute\/2012\/04\/30\/is-this-email-legit\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Is This Email Legit?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":157,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-45","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Arts &amp; Sciences Computing Services Office","author_link":"https:\/\/blog.uvm.edu\/compute\/author\/compute\/"},"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/compute\/wp-json\/wp\/v2\/posts\/45","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/compute\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.uvm.edu\/compute\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/compute\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/compute\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":4,"href":"https:\/\/blog.uvm.edu\/compute\/wp-json\/wp\/v2\/posts\/45\/revisions"}],"predecessor-version":[{"id":95,"href":"https:\/\/blog.uvm.edu\/compute\/wp-json\/wp\/v2\/posts\/45\/revisions\/95"}],"wp:attachment":[{"href":"https:\/\/blog.uvm.edu\/compute\/wp-json\/wp\/v2\/media?parent=45"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.uvm.edu\/compute\/wp-json\/wp\/v2\/categories?post=45"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.uvm.edu\/compute\/wp-json\/wp\/v2\/tags?post=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}