Click on titles to read text of emails

Subscribe to Phishing Listserv

Example-How to spot phishing

phish illustration


Forward email as attachment

Forward the email as an attachment (drag/drop into a new message or click here for instructions) to the ITS Security Operations Center Team.

Don't get reeled in by phony emails!

Information Technology Services is providing this central location of phishing emails that are received by the campus. We make every effort to prevent these types of scams from entering our email gateways and can often block them once they are reported to us.

  • Start of school and tax season are PRIME TIMEs for phishing scams
  • UNL will never ask you for your login or passwords or other personal information.
  • Do not respond to "phishy" emails
  • If you get caught by a phishing email please change you password immediately by visiting TrueYou.


Need additional help?

Contact the Computer Help Center.


In computing, phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. eBay, PayPal and online banks are common targets. Phishing is typically carried out by email or instant messaging,

[1] and often directs users to enter details at a website, although phone contact has also been used.

[2] Phishing is an example of social engineering techniques used to fool users.

[3] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.


Resources on Phishing

Protect Yourself-Safe Computing Guide

"Spam & Phishing"