{"id":260,"date":"2018-02-13T15:22:48","date_gmt":"2018-02-13T20:22:48","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=260"},"modified":"2018-02-16T10:15:34","modified_gmt":"2018-02-16T15:15:34","slug":"phishing-scam-2-13-08-email-membership-update","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2018\/02\/13\/phishing-scam-2-13-08-email-membership-update\/","title":{"rendered":"Phishing Scam &#8211; 2\/13\/18 &#8211; Email Membership Update"},"content":{"rendered":"<p><em>URL is blocked at the border. Web host has been notified.<\/em><\/p>\n<p><strong>Email Membership Update<\/strong><\/p>\n<p>Due to recent IP routine check; we have reasons to believe that your account has been signed in to from a new Windows device and access by a third party.\u00a0 Click on\u00a0<strong>SUPPORT\u00a0<\/strong>and verify your\u00a0<strong>STUDENT.UML.EDU\u00a0<\/strong>Mailbox to avoid deactivation.<\/p>\n<p>Warm Regards,<\/p>\n<p>2018 University of Massachusetts Lowell -Help-Desk-Administrator.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>URL is blocked at the border. Web host has been notified. Email Membership Update Due to recent IP routine check; we have reasons to believe that your account has been signed in to from a new Windows device and access &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2018\/02\/13\/phishing-scam-2-13-08-email-membership-update\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":273,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/260"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/273"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=260"}],"version-history":[{"count":2,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/260\/revisions"}],"predecessor-version":[{"id":263,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/260\/revisions\/263"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}