A new host of risks emerge in busy college environments, including the physical safety of your devices, unique opportunities for hackers to spread malware, and risks associated with communal computers.

Currently Playing

CyberTip: How to avoid phishing scams


Cyberbullying is bullying or harassment that happens online. It can happen in an email, a text message, an online game, or comments on a social networking site. It might involve rumors or images posted on someone’s profile or passed around for others to see, or creating a group or page to make a person feel left out.

  • While browsing, you might have noticed that some website addresses begin “HTTP,” while others begin with “HTTPS.” That single letter makes a huge difference. HTTPS websites encrypt user communications and data.
  • Unsecure HTTP sites enable hackers to view transferred information, including login credentials, in plain text format. Torrent websites like The Pirate Bay host massive digital repositories of content including movies, music, video games, and software. Anyone can gain access to this content at no cost, but torrenting is not risk-free. Dangers include malware infection, penalties from your internet service provider, and legal settlements from copyright holders.
  • Today’s phishing scams use sophisticated replicas of login pages. Before accessing your school email, Canvas account, or online banking, make sure the web address is correct. Never submit sensitive information like usernames, passwords, or credit card numbers through an HTTP website.
  • Remember that your online activities can put other students at risk. Cyberattacks that originate on your computer can spread to other devices — even throughout the entire university system.

  • Whether you plan to throw away, resell, recycle, or trade in your old computer or phone, you must take steps to ensure your data is permanently erased, overwritten, and inaccessible.
  • Avoid taking or storing private photos on your devices. No matter how secure you think your files are, someone may still gain access to them.
  • Before ditching your old computer, consider downloading antitheft apps or software to help overwrite your data. On a Mac, the built-in Disk Utility app can wipe and overwrite a drive.





In the field of computer security, is the process of attempting to hack into a person's webcam and activate it without the webcam owner's permission.

Read more




Welcome Back!

Login to your account below

Retrieve your password

Please enter your username or email address to reset your password.

Add New Playlist