Search This Site

 

Main menu

Past News Articles

March 12, 2020

Coronavirus-related Malware Alert

Screenshot of the malicious website "Corona-Virus-Map[dot]com pretending to be a legitimate COVID-19 tracker.

Screenshot of the malicious website "Corona-Virus-Map[dot]com pretending to be a legitimate COVID-19 tracker.

Fake online Coronavirus Map delivers well-known malware. Be VERY suspicious and cautious with any emails about the coronavirus. 

Read More...




March 12, 2020

Coronavirus Map Malware Alert

Coronavirus Fake Map tracker alert

Coronavirus Fake Map tracker alert

Fake online Coronavirus Map delivers well-known malware. Be VERY suspicious and cautious with any emails about the coronavirus. 

Read More...




March 04, 2020
February 12, 2020

Get clued in on spotting new hacking methods.

Image of magnifying glasses with the text, "Be a hack detective."

Image of magnifying glasses with the text, "Be a hack detective."

Learn to recognize and prevent new cyber attacks. 

Read More...




February 07, 2020

Taxes aren't fun, and neither is identity theft.

Image of tax returns with the text "No one enjoys doing taxes. But filing your return can get even worse if you don't protect your identity."

Image of tax returns with the text "No one enjoys doing taxes. But filing your return can get even worse if you don't protect your identity."

Learn about how you can prevent fraud during tax season. 

Read More...




February 05, 2020

Microsoft Security Awareness Day

Image of the UVA campus from above with the Microsoft logo and the text, " Microsoft Security Awareness Day / February 12, 2020"

Image of the UVA campus from above with the Microsoft logo and the text, " Microsoft Security Awareness Day / February 12, 2020"

Join University Information Security on February 12  in Zehmer Hall from 8 - 11:30 AM to learn about four new Microsoft Security products that UVA is now licensed for. 

Read More...




Pages

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security office will evaluate the report and provide a full investigation if appropriate.

Complete Report Form