Malicious e-mail: Mailbox Violation Routine

The malicious E-Mail message below is being circulated via the Internet. This is a Phishing E-Mail. Please delete this message.

Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.

Security Alert! Another Phishing Attempt

This is not a legitimate E-Mail message. This is a Phishing attempt. The sender is trying to acquire protected or sensitive information such as usernames, passwords, credit card details and social security numbers by masquerading as a trustworthy entity.

Security Alert: Phishing attempt

The E-Mail below is being circulated. This is not a legitimate request. This is a Phishing attempt falsely claiming to be an established legitimate enterprise in attempt to scam the user into surrendering private and protected information that will be used for identity theft. The E-Mail can

Security Alert! Opening an infected PDF file

A trusted third party information source has notified Purdue University that we have been explicitly targeted in an active, targeted, persistent spear phishing campaign. The attacker’s attempt to trick users into opening an infected PDF file in order to compromise a system.

Latest scam circulating around campus

The following scam is being circulated on the Internet. Please do not respond to this message or click on any of the associated links imbedded in the message. If you suspect you have a virus on your computer please contact the Customer Service Center as soon as possible.

Latest Phishing Email Circulating AroundCampus

There is currently an email circulating around campus with the subject line “Your e-mail box has reached its maximum of 50MB”

This is not from anyone at Purdue University Calumet and you should delete it. The message is designed to steal your login and password.

Safe Email Practices

Recently our campus email system has been hit by several phishing attempts that are devised to acquire your login and password. Hackers then use your email address to flood the Internet with millions more email messages that attempt to get the credentials of others.