{"id":450,"date":"2020-03-17T11:16:23","date_gmt":"2020-03-17T15:16:23","guid":{"rendered":"http:\/\/blog.uvm.edu\/whysecurity\/?p=450"},"modified":"2020-03-17T11:18:04","modified_gmt":"2020-03-17T15:18:04","slug":"bolo-covid-themed-attacks","status":"publish","type":"post","link":"https:\/\/blog.uvm.edu\/whysecurity\/2020\/03\/17\/bolo-covid-themed-attacks\/","title":{"rendered":"BOLO: COVID-themed Attacks"},"content":{"rendered":"\n<p>As COVID-19 continues to dominate the news cycle and daily life, the UVM Information Security Office would like the community to Be On the Look-Out (BOLO) for cyber criminals using COVID-19 as a theme for phishing emails, scams, and other attacks on the security of your information and that of the University.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">These attacks could take the form of:<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>phishing emails regarding online learning or telecommuting, potentially providing a link to log in to an &#8220;online learning portal&#8221;;<\/li><li>fraudulent donation sites;<\/li><li>news hoaxes;<\/li><li>messages that look like they come from officials (such as WHO representatives or Red Cross workers) and ask for personal information or donations.<\/li><\/ul>\n\n\n\n<p>Remember: Be wary of any email or message that urges you to take swift action, plays on your fears, or involves money. Be skeptical of &#8220;UVM&#8221; communications coming from outside of the UVM community and <strong>remember not to enter your NetID credentials on non-UVM websites.<\/strong><\/p>\n\n\n\n<p>More information on these types of phishing attacks can be found at <a href=\"https:\/\/www.helpnetsecurity.com\/2020\/03\/09\/coronavirus-scams\/\">https:\/\/www.helpnetsecurity.com\/2020\/03\/09\/coronavirus-scams\/<\/a> and more information on UVM\u2019s response to COVID-19 can be found at <a href=\"https:\/\/go.uvm.edu\/covid19\">https:\/\/go.uvm.edu\/covid19<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As COVID-19 continues to dominate the news cycle and daily life, the UVM Information Security Office would like the community to Be On the Look-Out (BOLO) for cyber criminals using COVID-19 as a theme for phishing emails, scams, and other attacks on the security of your information and that of the University. These attacks could &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.uvm.edu\/whysecurity\/2020\/03\/17\/bolo-covid-themed-attacks\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;BOLO: COVID-themed Attacks&#8221;<\/span><\/a><\/p>\n","protected":false},"author":4920,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[628681,628578,351621],"class_list":["post-450","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-bolo","tag-covid19","tag-student_contributor","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Emily","author_link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/econnol2\/"},"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/4920"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/comments?post=450"}],"version-history":[{"count":5,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/450\/revisions"}],"predecessor-version":[{"id":456,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/450\/revisions\/456"}],"wp:attachment":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/media?parent=450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/categories?post=450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/tags?post=450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}