The E-Mail below is being circulated via the Internet. This is not a legitimate E-Mail. This is a Spam/Phishing E-Mail message. This is an attempt to acquire information such as usernames, passwords, credit card numbers and other sensitive and protected information by masquerading as a trustworthy entity such as a bank, online payment center or IT administrators. These messages will contain links to websites that are infected with malware.
What does a phishing email message look like?
Here is an example of what a phishing scam in an email message might look like.
Start of E-Mail Being Circulated
From: Mavhandu-Mudzusi, Azwihangwisi [mailto:firstname.lastname@example.org]
Sent: Wednesday, March 05, 2014 8:18 AM
To: Mavhandu-Mudzusi, Azwihangwisi
Subject: IT SUPPORT
This message (and attachments) is subject to restrictions and a disclaimer. Please refer to http://www.unisa.ac.za/disclaimer for full details.
YOUR ACCOUNT SAFETY IS OUT TOP PRIORITY.
Recently, we have detected some unusual activity on your account and as a result, all email users are urged to update their email account within 24 hours of receiving this e-mail, using the update link: “LINK” to confirm that your email account is up to date with the institution requirement. Do not ignore this message to avoid termination of your webmail account.
Our apologies for any inconvenience this may have caused, but your account safety and privacy is very important to us.
Thanks for your co-operation.
ITS help desk
©Copyright 2014 Microsoft, Inc.
All Rights Reserved
End of E-Mail Being Circulated
If you have any questions or concerns please contact the Customer Service Center at extension 2888 option 2.
Start/Pause/Stop: The start button is used to begin a new search process. By default when Identity Finder is opened, a search is already started, and this button will be replaced with the pause button.
Navigation: Once Identity Finder has discovered any files that contain any Social Security information, the three buttons, Collapse All Rows, Previous Match, and Next Match, will help to navigate through the search results.
Secure: The Secure button is used to encrypt a file so that it cannot be read by other users. After selecting a file, and then clicking on Secure, a Identity Finder will save the file as a .zip file and ask for confirmation. Identity Finder will also ask how heavy of an encryption you wish to use, and what password you wish to use to gain access to the file. Make sure that is a password that is easy to remember, since there is no way to reset the password, or to decrypt it once this is done.
Shred: The Shred button is used to delete a file. Once you shred a file, it is not recoverable. Normally when a file is deleted, all paths to the file are deleted, but it still is on the hard drive, until it is written over by the system. This button will not only delete the file, but will write over the file seven times using all zeros, so that it is completely wiped from the system. Make sure that you want to use this option before deleting a file, because once done, there is no way to recover it. If you think the file might be needed in the future, it’s a good idea to save the file to some other device such as a thumb drive, or CD before shredding the file.
Open: This button will open the selected file so that you may determine whether to secure, shred, or leave the file as is.