{"id":1688,"date":"2022-01-25T13:53:44","date_gmt":"2022-01-25T18:53:44","guid":{"rendered":"https:\/\/technews.simmons.edu\/?p=1688"},"modified":"2022-01-25T13:53:44","modified_gmt":"2022-01-25T18:53:44","slug":"phishing-and-imposter-websites","status":"publish","type":"post","link":"https:\/\/technews.simmons.edu\/?p=1688","title":{"rendered":"Phishing and Imposter Websites"},"content":{"rendered":"\n<p>Cybercriminals are adept at creating imposter websites that look like standard login pages for Google, Microsoft Live, and even Simmons&#8217; own login page.&nbsp; <strong>Simmons login page url will always begin with \u201cidp.simmons.edu\u201d and any other url even if it contains \u201csimmons.edu\u201d later in the text is not our login page.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/technews.simmons.edu\/wp-content\/uploads\/2022\/01\/Yes.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"800\" src=\"https:\/\/technews.simmons.edu\/wp-content\/uploads\/2022\/01\/Yes-1024x800.png\" alt=\"Make sure URL containing idp.simmons.edu before you proceed with username and password\" class=\"wp-image-1681\" srcset=\"https:\/\/technews.simmons.edu\/wp-content\/uploads\/2022\/01\/Yes-1024x800.png 1024w, https:\/\/technews.simmons.edu\/wp-content\/uploads\/2022\/01\/Yes-300x234.png 300w, https:\/\/technews.simmons.edu\/wp-content\/uploads\/2022\/01\/Yes-768x600.png 768w, https:\/\/technews.simmons.edu\/wp-content\/uploads\/2022\/01\/Yes.png 1260w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption><strong>Any<\/strong> other site is not Simmons login page.<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are adept at creating imposter websites that look like standard login pages for Google, Microsoft Live, and even Simmons&#8217; own login page.&nbsp; Simmons login page url will always begin with \u201cidp.simmons.edu\u201d and any other url even if it contains \u201csimmons.edu\u201d later in the text is not our login page.<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[26,3],"tags":[87,38,89,12],"class_list":["post-1688","post","type-post","status-publish","format-standard","hentry","category-special-news","category-technews","tag-87","tag-cybersecurity","tag-idp-simmons-edu","tag-information-security"],"_links":{"self":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1688"}],"version-history":[{"count":2,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1688\/revisions"}],"predecessor-version":[{"id":1692,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1688\/revisions\/1692"}],"wp:attachment":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}