Chain letters are familiar to anyone with an e-mail account, whether they are sent by strangers or well-intentioned friends or family members. Try to verify the information before following any instructions or passing the message along. There are two main types of chain letters: Hoaxes: …
News
Reporting internet incidents/problems
Report suspicious cyber incidents to the U.S. Computer Emergency Readiness Team Incident Hotline: 1-888-282-0870 You can report phishing by sending email to [email protected] If you think your computer has malware, the Federal Trade Commission wants to know. File a complaint. If …
Meta data stored in digital images
Digital cameras often save "hidden information" (also known as metadata tags) along with the image. This information may include information about the image, camera, photographer and location. The data are saved in various formats. The most common include: Exif, GPS, IPTC, and XMP. We request …
Sign Up for Free Cyber Alerts
The National Cyber Alert System (NCAS) is America’s coordinated alert system for identifying, analyzing, and prioritizing emerging threats and vulnerabilities. We encourage you to register for technical and/or non-technical alerts by visiting the US-CERT website. …
National Environmental Health Association Career Center
Visit the National Environmental Health Association Career Center for more job postings. …