Search for tag: "fishing"
It all Started with a Phish: Protecting Sensitive Information from Cyber Criminals(InfoSec 101) Most of us receive a large volume of email and instant messages, often scanning through hundreds a week. These numerous online communications make us susceptible to cybercrime. Did you…
From Stefanie Clerkin
0 likes
14 plays
|
|
"Catching Naomi's Daughter": Grief, Magical Realism, and the Power of Fables, Cassandra James, UG '23 (2306927)“Some day you will be old enough to start reading fairy tales again.” - C.S. Lewis For generations, deceptively simple fables have cut to the heart of the human condition, exposing our…
From Research Princeton Research Day
2 likes
126 plays
|
|
Safe Computing VideoThis video discusses resources available on the Safe Computing webpage: https://informationsecurity.princeton.edu/safecomputing
From Tara Schaufler
0 likes
2,228 plays
|
|
Webinar: Spotting and Preventing Social Engineering Attacks(InfoSec 101) Millions of dollars are lost every year due to scams. But why would anyone willingly give away their personal information? Social engineering is the art of influencing a person to…
From Tara Schaufler
0 likes
69 plays
|