Skip to main content
This is an example of the type of pop-up warning a malicious attachment may use.

Use caution when opening attachments, even when the source e-mail appears to be from someone you know. Always pay close attention to the  “From” line to ensure that the sender is not impersonating someone you normally interact with.

Example: personwhosnameyouknow.unc.edu@aol.com. Note the use of unc.edu as part of the address to make it appear more legitimate, when in actuality the domain is aol.com in this example.

If an attachment has explicit instructions to enable content, or enable editing, be extra cautious and seek guidance from your local IT support or the ITS Service Desk before proceeding.

As always, the preferred method of sharing documents at UNC Chapel Hill is through the Office 365.

Comments are closed.