The E-Mail below is being circulated via the Internet. This is not a legitimate E-Mail. This is a Spam/Phishing E-Mail message. This is an attempt to acquire information such as usernames, passwords, credit card numbers and other sensitive and protected information by masquerading as a trustworthy entity such as a bank, online payment center or IT administrators. These messages will contain links to websites that are infected with malware.
What does a phishing email message look like?
Here is an example of what a phishing scam in an email message might look like.
Start of E-Mail Being Circulated
From: Mavhandu-Mudzusi, Azwihangwisi [mailto:email@example.com]
Sent: Wednesday, March 05, 2014 8:18 AM
To: Mavhandu-Mudzusi, Azwihangwisi
Subject: IT SUPPORT
This message (and attachments) is subject to restrictions and a disclaimer. Please refer to http://www.unisa.ac.za/disclaimer for full details.
YOUR ACCOUNT SAFETY IS OUT TOP PRIORITY.
Recently, we have detected some unusual activity on your account and as a result, all email users are urged to update their email account within 24 hours of receiving this e-mail, using the update link: “LINK” to confirm that your email account is up to date with the institution requirement. Do not ignore this message to avoid termination of your webmail account.
Our apologies for any inconvenience this may have caused, but your account safety and privacy is very important to us.
Thanks for your co-operation.
ITS help desk
©Copyright 2014 Microsoft, Inc.
All Rights Reserved
End of E-Mail Being Circulated
If you have any questions or concerns please contact the Customer Service Center at extension 2888 option 2.
Password Vault: This feature is used to create, store, and manage passwords for Identity Finder.
Secure File: This option will allow the user to secure any file that Identity Finder discovers, or . Encrypting files, using their choice of encryption method and storing the encrypted file within a Zip file if it does not already support its own encryption method. Most files do not have an encryption method, and will be stored within Zip Files so that they can be. When selecting a password for this option make sure, that it is something that can easily remembered. Since no one will be able to reset or remember your password but the one who encrypts the file.
Open Secure Zip File: This is the other side to the coin of Secure File. Once a file has been secured and password protected, Identity Finder is needed to open and decrypt the file that has been secured through Identity Finder.
Shred Files or Folders: This will delete either a single file, or the contents to an entire folder. If a folder is selected, it will delete all the files within the folder but will not delete the folder itself. Since shredding will overwrite the file several times with zeros, the file will be unrecoverable. Take care when selecting this option that you are absolutely sure that you wish to preform this option.
Secure/Shred Microsoft IE: These two buttons will either secure or shred files found in Microsoft Internet Explorer files and residual data found from Microsoft Internet Explorer files. It will examine your browser history and eliminate any files that might contain sensitive information.
Secure/Shred Firefox: These two options will secure or shred files, found in Mozilla Firefox files and residual data found from Mozilla Firefox files. It will examine your browser history and eliminate any files that might contain sensitive information.
Scheduling: You can set Identity Finder to automatically scan your computer at any time you desire, without having to run the program manually each time. Identity Finder will run in the background without interfering with work, and taking system resources that other programs may need.