This support page will guide you through the steps to attach a suspicious email “as an attachment” to an octomail message. This will be necessary if you were trying to report a phishing attempt without having forwarded the suspicious email “as an attachment”. If you have forwarded normally the email in question to us, you […]
So you’ve landed on an email that seems suspicious. The best thing to do is to forward the email to the ITS helpdesk however, it’s not your usual forwarding. Below are the steps on how to forward the email properly so the ITS helpdesk can properly verify the email. But first, let’s look at the […]
This is a tutorial to guide you through the steps of reporting spam and phishing emails to us.
Tech Support Scams are scams claiming to be technical support services offering to clean out your computer. These attacks can have a serious financial impact on the user and can appear on any webpage, on Windows or Mac OS. As with most forms of digital attack, the best defense against these is being aware of […]
Computer attacks occurs on a daily basis. The most common forms of these attacks are: Phishing: a malicious attempt to acquire sensitive information such as usernames, passwords or credit card details by impersonating a trustworthy entity in an electronic communication. Malware: short for “malicious software”, is software that, among other things, can cause data loss, be […]