skip to content
  • Calendar
  • Maps

Threats

Hackers commonly use email as a vector to steal information through phishing or by infecting your device with malware. For more information about cyber threats, such as malware and phishing, visit the Cyber Threats page. Please continue to be cautious when opening any email. If you are unsure of an email message, forward the message header to the Information Security Office or the IT Service Desk. This link provides you steps on capturing the header of a suspected email.

Current Threats

Phishing Attempt - Avoid Mail Closure

02/12/2018

Phishing Attempt - WSU Wildcat ID Disabled

01/26/2018

 
In the News

Federal Trade Commission: Tax-Related Identity Theft

The IRS isn't calling you — it's a scam, and here's what to do if it happens to you

National Tax Security Awareness Week No. 3: Victims of Data Breaches Should Consider These Steps

If you're interested in past threats, please take a look at our archive.