Phishing Attempt at CPS

An email with the message “Are you still Available?” from a fraudulent sender posing as a principal or other trusted source has been distributed around the District. The message is a phishing email attempting to get you to send the fraudster a gift card. Do not carry out the sender’s request or provide them with any personally identifiable information.

We are aware of this fraudulent email and have taken steps to block it and its sender. 

If you receive an email that you think might be a phishing attempt, forward the e­mail to reportphishing@cps.edu.

Lessons from four

social media scams

Sources: FBI, Zynga, Verizon, PCMag

Click the image below 

to download and print these examples.

The Dark Web

The vast hidden area of the internet called the "Dark Web", where many hackers hang out, is rarely visited by the average computer user.

How much of the web is accessible when you search for something? 

The clear web: all the public websites available via Google and other search engines

The deep web: requires passwords to view; includes webpages such as your bank and bill pay and private intranets.

The dark web: content viewable only by using a special web browser called "TOR." Good and bad deeds happen here.

8%

Georgia State University's Dr. Don Hunt is an expert in electronic crime, digital payments and cyber policy. Hunt says users of the dark web remain anonymous, which is dangerous when criminals use it to attack organizations, but useful for people who want to alert authorities to wrongdoing.

Click on the links below to listen. 

Helping those in need: by reading anonymous posts on the dark web, relief agencies can find out what items are needed to help people. In one case, what people needed was a link to the outside world. 

Cybercrime as a service: bad things do exist on the dark web. Dangerous software that damages computers and costs organizations huge financial losses often originates here.

Think before you click: hackers are not all-powerful! The most important step in avoiding them is to pay attention before clicking a link in an email or downloading an attachment. 

One Last Thing

In the upcoming edition of Cybersecurity News
from the IT team at Chicago Public Schools:
5 ways to keep critical information safe from hackers

Cyber Cartoon:

PEARLS BEFORE SWINE © 2015 Stephan Pastis. Reprinted by permission of

ANDREWS MCMEEL SYNDICATION. All rights reserved.

Outlook is a trademark of Microsoft Corporation. 

April 2019 b • Edition #68

Original content and design © 2019 Aware Force LLC

Aware Force trademark © 2019 Aware Force LLC