Skip to Navigation | Skip to Content

January 2010

« December 2009 | Main | February 2010 »

January 28, 2010

"WEBMAIL" phishing scam targeting NYU community

There are new reports about a sophisticated phishing message that purports to come from "Webmaster Online Department NYU.EDU-MAIL". The message claims that NYU is "currently verifying our subscriber's webmail accounts in other to increase the efficiency of our webmail features" and requests your password, name, and other personal information to avoid shutting down your NYU email account. The fraudulent message requests that the recipient reply back to non-NYU email accounts, and in this case, a "@ucla.edu" or "webmaster.XXX@live.com" email addresses.

NYU community members should NEVER REPLY TO ANY email that requests the recipient's email login name and password. Instead, forward phishing messages as an attachment to our email filtering account phishing@nyu.edu. Doing so trains our email filters to prevent such types of spam from arriving into inboxes.

Please note: It is very important to forward the message as an attachment, otherwise our email filters will not be able to parse through the message correctly.

As a reminder of better security practices, always remember that:

  • No NYU community member will ever ask for your account password, especially not over email.
  • Do not reply back to emails from unidentified, untrusted sources.
  • Forward all phishing messages as an attachment to phishing@nyu.edu. This helps train our email filters to block such messages in the future.
  • Messages that request personal information over plaintext email should be regarded as being suspicious. If it is spam, forward it to is.spam@nyu.edu. If you are unsure about the legitimacy of a message, contact the ITS Client Services Center at askits@nyu.edu or 212-998-3333.
  • If a message informs you of an impending "account closure" unless you comply with its demands, it is often a sign that the message is a phishing scam. Do not comply with its requests.

The following sites also provide several useful tips on defending against these types of phishing attacks:


Example Phishing Message


Dear NYU.EDU mail account user,

We are currently verifying our subscriber's webmail accounts in other to increase the efficiency of our webmail features. During this course you are required to provide the verification desk with the following details so that your account could be verified;

CONFIRM YOUR EMAIL IDENTITY BELOW
Email Username: ....................
EMAIL Password: ....................
Date of Birth: .....................

Kindly send the above details to avoid the cancellation of your webmail.NYU.EDU account.

Thanks, Webmaster Online Department NYU.EDU-MAIL The Best Database Ce

January 06, 2010

Symantec misreporting virus definitions date (U: 1/28)

An issue has been identified in the Symantec Endpoint Protection (SEP11) product line, whereby all types of virus and proactive threat protection definitions appear to date from December 31, 2009, 11:59pm. As a result, Windows XP, Vista, and 7 Security Centers may report that the definitions are out of date.

Clients running SEP11 are still protected, and Symantec will continue to release updated definitions as normal. However, for the time being, SEP definitions will display a date of December 31, 2009, with increasing revision numbers. The current revision number as of this writing is "r117."

Symantec is working on a solution and will update customers when a solution becomes available. Please check back on this site for the latest information.

For further information please see:

Symantec Knowledge Base Article

Symantec Support Forum: OFFICIAL STATUS: SEPM Definitions stay at 31-12-2009

01-28-2010 (Updated): Symantec has resolved an issue in SEP11 that caused the software to incorrectly report recent virus defintions as dating from 12/31/2009. Virus and Proactive Threat definitions should now appear as dating from at least 1/12/2010 or more recently. If you are still seeing virus definitions dating before 1/12/2010, run the LiveUpdate feature in SEP11 to update.