01.20.17

Page 1

DI L LI N GER DAYS DW

} d n e k e e {W

TUCSON’S MOST INFAMOUS GANGSTER COMES TO LIFE AGAIN pg. 15

DAILYWILDCAT.COM Friday January 20, 2017 – Sunday, January 22, 2017 VOLUME 110 ISSUE 48

SCIENCE | PAGE 9

FOUR RESEARCH PROGRAMS FOR SCIENCE-MINDED UNDERGRADS, FROM ANATOMY TO ZOOLOGY

SPORTS | PAGE 11 ‘CATS FIGHT OF HARDCHARGING TROJANS IN THE SECOND HALF TO TAKE THE WIN IN L.A.

REBECCA NOBLE/THE DAILY WILDCAT

RNOBLEPHOTO

LEE MCKECHNIE LEFT, RON Jensen (center) and Jerry Woods (right), all actors playing members of Dillinger’s gang, make a toast to a successful bank robbery during a re-enactment at a Dillinger Days event. These events mark John Dillinger’s 1934 Tucson arrest.

Phishing email brings UA web security to light BY JAMIE VERWYS @DailyWildcat

An email designed to look like it was sent from UA President Ann Weaver Hart was identified as a threat on Jan. 12. At the beginning of the fall 2016 semester, an email sent to some university employees appearing to be from the UA president turned out to be a phisher in Belgium. The UA’s Office of Information Security receives hundreds of reports of potentially dangerous emails on campus every year.

So far, there have been over 30 posted alerts of suspicious emails found in student and faculty inboxes this semester alone. Phishing is a social engineering technique to acquire login information and personal and banking details under the guise of legitimacy. The sender of a phishing email attempts to lure a user into giving up key facts of their digital identity. Information Security Manager Teresa Banks is in charge of online awareness and training at the UA. She said that students are viable

/DAILYWILDCAT

targets for hackers. “Now that campus is more active, students are looking at their email,” she said. “This generation isn’t always keyed in to their email. When it looks like something that could be coming from the university, you’re clicking on it, you’re making sure you know what’s going on and it’s easy to use a few buzz words and trick you.” There are a few different ways a phish attack can snare a victim. Opening the initial email can infect someone’s computer with

@DAILYWILDCAT

viruses or ransomware, which blocks a user from their own data until they pay money to get back in. Opening a link can direct a user to a fake website with malware. Finally, when a person actually submits their information, the logins for their accounts are saved and can be used to phish. Computer Sciences student Andrew Boring said he always feels comfortable opening emails that look like they’re from the university.

CYBERSECURITY, 4

@DAILYWILDCAT


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.