Franklin Mint Federal Credit Union Phishing Emails

On occasion, Swarthmore College email users are subjected to focused phishing attacks appearing to originate from the Franklin Mint Federal Credit Union. Phishing involves sending a bogus email, appearing to originate from a legitimate source, which attempts to get the recipient to click on a malicious URL. Phishing emails typically try to steal a user’s logon credentials, or other private information, by getting them to enter information into a malicious site that can look exactly like the authentic site. These emails rely on social engineering to mislead, cause panic, and/or coerce the user into thinking the email is legitimate. According … Continue reading Franklin Mint Federal Credit Union Phishing Emails

Security Issue with Apple QuickTime (and iTunes) — Update

UPDATE 12/14/07 A fixed version of Apple QuickTime is now available, 7.3.1, that resolves the RTSP vulnerability described below. The update can be downloaded from: http://www.apple.com/quicktime/download/ The new version supports Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5 or later, Windows Vista, and Windows XP SP2. QuickTime and iTune users should upgrade at their earliest convenience. ~~~~~~~~~~~~~~~~~~~~~~ Users of QuickTime are advised to only access QuickTime files from known, trusted sources until a fix is available from Apple. Apple QuickTime currently has a significant security issue within its Real Time Streaming Protocol (RTSP) capability. … Continue reading Security Issue with Apple QuickTime (and iTunes) — Update

Phishing

One kind of Internet piracy is called “phishing.” It is pronounced “fishing,” and that is exactly what these thieves are doing: “fishing” for your personal financial information. What they want are account numbers, passwords, Social Security numbers, and other confidential information that they can use to loot your checking account or run up bills on your credit cards. In the worst case, you could find yourself a victim of identity theft. With the sensitive information obtained from a successful phishing scam, these thieves can take out loans or obtain credit cards and even driver’s licenses in your name. How phishing … Continue reading Phishing