Security Alerts

The e-mails posted below are malicious attempts received by members of the University community, and approved for posting by Iowa State’s Information Security Office. Select the Title to view the full text of the phishing e-mail.

If you believe you have received a scam e-mail not posted below, forward the message to the Iowa State Security Team at

If you have responded to a suspected scam e-mail, you should reset your NetID password immediately and call the Solution Center at 515-294-4000 to report the bogus e-mail.

Phishing Attempt - New Web-mail Upgrade

Jul 10, 2018

Subject: ALERT


This is a reminder that the New Web-mail Upgrade will begin at 1:00pm, Monday, July 9th, ending at 6:00am, Wednesday, July 11th. During this time, you will experience delay in receipt of mails. Please carefully fill in your information below to enable us upgrade your account.


During this implementation, the HELPDESK team will be on site viewing logs and to resolving server issues.

We appreciate your patience while this important maintenance is being performed.



Update from Information Technology

May 07, 2018

Dear Employees,

Recently we updated Iowa State University Email Servers to improve security and efficiency, hence all users are advised to update their account to comply with the new server requirements.

Kindly update your account HERE

Failure to update might process your account as inactive, and you may experience interruption of services or undue errors. Please comply.


Technology Help Desk

Early January Phishing Run

Jan 06, 2018 has received multiple reports of a recent phishing campaign targeting our user community. If you receive a message similar to the one listed below, forward the e-email to

Meltdown and Spectre

Jan 05, 2018

What to know about Meltdown and Spectre

On Tuesday, 3 January 2018, a vulnerability was announced affecting Intel and ARM chips. More information on Iowa State's plan as well as the vulnerabilities are described below.

What is Iowa State IT doing?

With the start of classes looming patches are being tested and carefully rolled out to enterprise systems (HPC, AccessPlus, Virtual servers, and virtual desktops). The patch may potentially impact performance by up to 30% and in testing, this has been experienced. 

Telegram RAT Escapes Detection via Cloud Apps

Dec 18, 2017
Netskope discovers a new RAT using Dropbox for its payload host and Telegram Messenger for command and control.

Vector attack affecting all devices with Bluetooth enabled including Linux and IoT systems.

Dec 18, 2017
The Armis Lab has discovered a new vector attack affecting all devices with Bluetooth enabled including Linux and IoT systems.

Phishing Attempt - Masquerading as Google Voicemail Notice

Dec 08, 2017

Do not follow links requesting information