网络钓鱼诈骗 & IT Security Alerts

Phishing scams are one of the most common ways for data to be breached. Phishing uses fake emails or websites to collect 用户名 and 密码 as well as bank account numbers, social security numbers, and other personal information. These emails and websites may look real, but they are actually designed to fool you into divulging information. Below are current and past alerts.

Remember: Austin 社区 College District will never request personal information, 用户名, 密码, or money from you via email.

Recent Phishing Alerts and Scams

The following is an example of a phishing scam received by the ACC community. Review this example to familiarize yourself with various phishing messages. 

2023年7月26日: Warning on fraudulent internship offers

What Is Phishing?

Criminals use malicious emails and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware. Phishing email often uses urgent language, asks for personal information, and has grammatical, 印刷, or other obvious errors. Learn how to recognize phishing and other malicious email to protect yourself and ACC.

How to Spot Phishes

You can identify a phishing scam by looking for email messages that:

  • Come from a sender you don’t know
  • Use unknown email addresses or suspicious or misleading domain names
  • Include grammar and spelling errors
  • Create a sense of urgency
  • Invoke strong emotions, like greed or fear
  • Request sensitive data (like 用户名 and 密码)
  • Contain suspicious or unknown links. Do not click on links or attachments from senders that you do not recognize. Be especially wary of .zip, shared Google Docs, or other compressed or executable file types.
  • Include attachments or links to unknown files. Be especially cautious when opening attachments or clicking links if you receive an email containing a warning banner indicating that it originated from an external source. Pay special attention to Google Docs that are shared with you or that you are tagged in. Hackers may use a Google account to create a Google Document and then comment on it to mention the target with an @. This triggers a legit Google notification and may contain malicious content.
    • Pay special attention to Google Docs that are shared with you or that you are tagged in. Hackers may use a Google account to create a Google Document and then comment on it to mention the target with an @. This triggers a legit Google notification and may contain malicious content.

Remember: Legitimate companies and organizations will never ask for 密码, social security numbers, and other sensitive data via email.

报告网络钓鱼

If you can’t tell if an email is legitimate or not, please contact ACC Student Help desk.

To report a phishing email, take these simple steps:

From the original email:

  1. Select the three dots next to the “Reply” arrow.
  2. Select “Report phishing.”
  3. Delete the email.

If It Happens to You

If you gave personal information in response to a phishing email or on a suspicious webpage, your account may be compromised.

  • Change your 密码 and 使MFA.
  • 提醒 ACC Police Department
  • If you feel your bank account or credit card has been compromised, reach out to your bank and issuing credit card company immediately.