55 posts tagged

infosec

  

Scammer Claus Returns—New and Improved with AI and Deepfakes Beware of Cyber Santa 2.0!

November 25, 2025 by Keith Barros | IS&T

December is here again, and while we’re busy with holiday cheer, finals, and festivities, cybercriminals are busy upgrading their toolkits. As the Chief Information Security Officer (CISO) at Chapman, my goal is to keep our community safe online throughout the season.  Last year, we met Scammer Claus—the holiday trickster who lured victims with fake emails and festive scams. This year, Scammer Claus has

Balancing Productivity with Security and Privacy Risks

November 19, 2025 by Keith Barros | IS&T News

As higher education institutions increasingly adopt AI-powered tools to enhance productivity and digital experiences, it’s essential to remain vigilant about the security and privacy implications of these emerging technologies. This article examines the leading AI browsers and highlights their unique risks and considerations for academic environments. Most of these browsers offer powerful AI-driven features that

The Dancing Turkey Incident: A Cybersecurity Thanksgiving Special

October 31, 2025 by Keith Barros | IS&T

On Thanksgiving Eve, while the rest of Plymouth Rock Institute of Technology (PRIT) was bustling with students heading home and staff shutting down their offices, one employee lingered at their desk, catching up on emails. Among the usual clutter sat a message with the cheerful subject line: “Happy Thanksgiving!” It looked harmless enough, festive, even.

Recognizing and Reporting Phishing, Deepfakes, and Job Scams

October 27, 2025 by | IS&T

Cybercriminals are constantly refining their tactics, and phishing remains the most prevalent and dangerous form of social engineering. With the rise of AI, these attacks are becoming more convincing, harder to detect, and increasingly personalized. We would like to share some tips on how to detect and report the most prevalent phishing emails and scams.

Keep Your Devices Safe: The Importance of Software Updates

October 16, 2025 by | IS&T

Operating system and software updates are more than just routine maintenance—they’re your device’s first line of defense. While they often improve performance and introduce new features, their vital role is patching vulnerabilities that cybercriminals could exploit. By regularly updating your apps and operating systems, you reduce your exposure to threats and ensure your technology runs

Strengthen Your Security:  The Power of Two-Factor Authentication

October 9, 2025 by | IS&T

Every account is a potential target for cyber threats, from campus portals to personal email and social media. That’s why enabling Two-Factor Authentication (2FA) across university systems and personal devices is a smart, proactive step toward protecting your data. What is Two-Factor Authentication (2FA)? Two-Factor Authentication (2FA), also known as Multifactor Authentication (MFA), adds an

Use Strong Passwords and a Password Manager

October 1, 2025 by | IS&T

Passwords are the keys to our digital lives. From class registration and email accounts to banking and social media, every online service requires them. Unfortunately, weak or reused passwords remain one of the biggest reasons for compromised accounts. With so many data breaches, stale, old passwords are prime material for the hackers lurking in the

Stay Safe Online: Easy Steps to Supercharge Your Digital Security

September 25, 2025 by Keith Barros | IS&T

In today’s digital age, personal digital security is not just an individual responsibility but a collective one. At Chapman University, we understand that the security of our digital infrastructure is intrinsically linked to the security practices of each member of our community. When individuals protect their digital environments, they contribute to the overall security of

Scattered Spider Email Bombing: A Ruthless Hacker’s Playbook

September 2, 2025 by | IS&T

Cybercriminals are getting bolder, and few groups have gained as much notoriety as Scattered Spider. Known for their clever social engineering and relentless tactics, these hackers have been using email bombing (a flood of junk messages designed to overwhelm an inbox) as the first domino in a chain of attacks that ends with full control of a

Log In
Open Main Menu