{"id":5401,"date":"2023-12-15T01:59:47","date_gmt":"2023-12-15T06:59:47","guid":{"rendered":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/?p=5401"},"modified":"2023-12-23T18:01:49","modified_gmt":"2023-12-23T23:01:49","slug":"how-not-to-get-scammed-at-hunter","status":"publish","type":"post","link":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/2023\/12\/how-not-to-get-scammed-at-hunter\/","title":{"rendered":"How Not to Get Scammed at Hunter"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cell phones, computers, and other online devices are essential parts of our daily routine at Hunter College. Many software apps, such as Instagram, LinkedIn, and Adobe Cloud, offer their products and services to consumers. And to use these third-party services, users have to sacrifice their privacy and provide their personal information. This breach of privacy can trigger data leaks to unwanted users, often in the form of scam emails. Hunter College students receive these phishing emails frequently enough for faculty to take action. The mass email sent on September 22, by Eija Ayravainen, Vice President of Student Affairs, offered tips to identify what a potential scam email could look like by giving these examples: \u201c$800 weekly part-time job offer\u201d and \u201cI am giving out my antique piano for free.\u201d Emails like this are often scam emails, where the offer appears too good to be true.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Jonathan Montoya, a sophomore student majoring in history education at Hunter College, \u201cThese scam emails do not include an \u2018unsubscribe\u2019 option from the emailing list. You can&#8217;t really stop these emails to be honest, they just keep coming,\u201d said Montoya. \u201cSome of these emails are very funny because of how unrealistic the offer in the email is.\u201d<\/span><\/p>\n<figure id=\"attachment_5567\" class=\"wp-caption aligncenter\" style=\"max-width: 1256px\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5567 size-full\" src=\"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.07-PM.png\" alt=\"\" width=\"1246\" height=\"702\" srcset=\"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.07-PM.png 1246w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.07-PM-300x169.png 300w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.07-PM-1024x577.png 1024w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.07-PM-768x433.png 768w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.07-PM-310x175.png 310w\" sizes=\"auto, (max-width: 1246px) 100vw, 1246px\" \/><figcaption class=\"wp-caption-text\">Cunyfirst, the online resources and service tool has all the private records of student information. Address, direct deposit information, school emails are included among this information pool. Photo: cuny.edu<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">According to the United States Federal Communications Commission, the CAN-SPAM Act protects individuals from unwanted commercial emails. <\/span><span style=\"font-weight: 400;\">Specifically, Section 14 of the CAN-SPAM Act requires the Commission to develop rules to protect consumers from \u201cunwanted mobile service commercial messages.\u201d All commercial email communications also are required to include a \u201cunsubscribe\u201d or \u201cunsubscribe from the emailing list\u201d hyperlink somewhere in the email. This act protects email recipients from mass unwanted emails.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Another Hunter College student, Victor Franco, a junior who majors in human biology says, \u201cI get one of these scam-like emails to my school email account at least once a week.\u201d Many of these emails seem realistic enough to provoke follow-up questions. In this instance, Victor tried to contact an email sender who left their phone number in hopes of getting an internship. \u201cI thought it was a real internship opportunity but it won\u2019t let me take too long to realize it\u2019s only a scam once they want me to give them my social security email over text message.\u201d<\/span><\/p>\n<figure id=\"attachment_5571\" class=\"wp-caption aligncenter\" style=\"max-width: 620px\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5571 size-large\" src=\"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.31-PM-1024x635.png\" alt=\"\" width=\"610\" height=\"378\" srcset=\"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.31-PM-1024x635.png 1024w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.31-PM-300x186.png 300w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.31-PM-768x477.png 768w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.31-PM-310x192.png 310w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.31-PM.png 1212w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><figcaption class=\"wp-caption-text\">A phishing email sent by scammers using the Hunter email system.<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">How these scammers have access to Hunter College school emails is still unknown. Another Hunter College student, Helen Moran, a sophomore majoring in pre-med, thinks that cyber-hackers may have tapped into the Hunter College database to gain access to all student emails. \u201cOnline hackers probably hack the school system to get student emails. Since Baruch College got all of its data stolen by hackers, I think it is a possibility,\u201d said Moran.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On September 25, Baruch College had a <\/span><a href=\"https:\/\/theticker.org\/12210\/news\/breaking-baruch-remains-remote-amid-malware-shutdown\/#:~:text=In%20a%20meeting%20with%20faculty,until%20they%20provide%20a%20payment.\"><span style=\"font-weight: 400;\">ransomware attack<\/span><\/a><span style=\"font-weight: 400;\"> that forced the students and faculty to switch to remote learning. The attack forced Baruch College to close its campus to \u201cnon-essential faculty members\u201d for the following day, September 26. Services like internet connection on campus, VPN access, on-campus remote desktops, Microsoft OneDrive, and DropBox were unavailable due to the ransomware attack.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another way online scammers may have access to student emails is through purchasing data. Many third-party platforms collect our information and go on to sell it. According to the <\/span><span style=\"font-weight: 400;\">Stored Communications Act of the United States Federal Communications Commission, any information an individual provides to a third party is no longer private information and no longer under the protection of the 4th Amendment of the Constitution of the United States. <\/span><span style=\"font-weight: 400;\">Therefore, any third-party service may legally sell its users\u2019 data.\u00a0<\/span><\/p>\n<figure id=\"attachment_5573\" class=\"wp-caption aligncenter\" style=\"max-width: 620px\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5573 size-large\" src=\"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.56-PM-1024x1019.png\" alt=\"\" width=\"610\" height=\"607\" srcset=\"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.56-PM-1024x1019.png 1024w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.56-PM-300x300.png 300w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.56-PM-260x260.png 260w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.56-PM-768x764.png 768w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.56-PM-310x309.png 310w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/Screenshot-2023-12-15-at-1.04.56-PM.png 1242w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><figcaption class=\"wp-caption-text\">The Undergraduate Student Government of Hunter College published a \u201cHow to Not Get Scammed\u201d guide on their instagram account to educate their students on October 2.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The Undergraduate Student Government of Hunter College published a guide on its <\/span><a href=\"https:\/\/www.instagram.com\/p\/Cx6LkwBu6VD\/?utm_source=ig_web_copy_link&amp;igshid=MzRlODBiNWFlZA==\"><span style=\"font-weight: 400;\">Instagram<\/span><\/a><span style=\"font-weight: 400;\"> account to increase awareness against scam emails. A few preventative tips included in the guide are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ask you to click a link in an email to \u201cupdate your password.\u201d<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ask you for your bank routing number or bank information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ask you to cash a check, conduct a wire transfer, or purchase a gift card.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ask you to click a link or provide personal information for an unsolicited internship or job opportunity.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\u201cChecking the email sender\u2019s address and avoiding unrecognizable attachments helps keep your information safe,\u201d USG adds in their scam guide. \u201cStudents can report any suspicious emails to campus public safety by emailing to <\/span><span style=\"font-weight: 400;\">itsecurity@hunter.cuny.edu<\/span><span style=\"font-weight: 400;\">.\u201d <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cell phones, computers, and other online devices are essential parts of our daily routine at Hunter College. Many software apps, such as Instagram, LinkedIn, and Adobe Cloud, offer their products and services to consumers. And to use these third-party services, users have to sacrifice their privacy and provide their personal [&hellip;]<\/p>\n","protected":false},"author":124,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[325,1],"tags":[355,567,564,184,568,565,212,566],"class_list":["post-5401","post","type-post","status-publish","format-standard","hentry","category-multimedia","category-news","tag-hunternews","tag-campus-security","tag-communications","tag-cuny-hunter-college","tag-cyber","tag-email","tag-scam-emails","tag-security"],"_links":{"self":[{"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/posts\/5401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/comments?post=5401"}],"version-history":[{"count":7,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/posts\/5401\/revisions"}],"predecessor-version":[{"id":5589,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/posts\/5401\/revisions\/5589"}],"wp:attachment":[{"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/media?parent=5401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/categories?post=5401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/tags?post=5401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}