AgriLife Information Technology

AIT Security Blog

  • Pig Butchering Crypto Scam
    What is it? The pig butchering scam refers to cases when scammers use fake profiles and infiltrate dating apps and social media in order to target and lure victims into investing in elborate crypto investment scams. The name comes from the way in which the scammers feed the victims with…
  • Software End of Life
    What is End of Life? All software has a lifecycle. It begins when the software is released, continues through the support phase, and ends with the software no longer supported. End of Life (EOL) Software is software that is no longer actively supported by the developer. This means that the…
  • Plus Addressing- Adding Something Extra to your Emails
    About Plus Addressing, also known as sub-addressing, allows you to create a disposable email address that you can use to receive particular emails. It can make sorting messages using Rules in your mailbox much easier. It can also provide added protection as it doesn’t use your actual email address. How…
  • Fixing the Cracks in your Window to the Internet (Web Browser Updates)
    Your web browser is the window that you use to view and interact with websites every day. Naturally, this makes it a frequent target of malicious parties. If the attacker can break and control the browser, then they can manipulate all interactions with websites or even take over the entire…

Want to be notified by email of new blog posts?

You can subscribe to AIT Service Alerts, the Security Blog, and/or From the CIO messages below. You will receive an email every time we post a service alert, on the Security Blog, or when our CIO has a new message.

Subscribe to receive AIT Service Alerts & News

* indicates required
Subscribe to
Updated on July 26, 2021

Was this article helpful?

Related Articles