Skip to content
IT Connect | UW Information Technology
Get Help
  • Tools, Services & Support
    • Academic Planning
    • Access & Authentication
    • Administrative Systems
    • Data & Reporting
    • Email, Calendars, & Events
    • IT Systems Infrastructure
    • Networks & Connectivity
    • Software & Computers
    • Storage & Hosting
    • Teaching & Learning
    • Voice & Video
  • Guides by Topic
    • Accessibility & Usability
    • Computers & Printing
    • Email & Calendaring
    • Emergency Preparedness
    • Identity, Diversity & Inclusion
    • IT Sourcing & Standards
    • Online Storage & Publishing
    • Research
    • Security & Authentication
    • Technology Facilities
    • Working Remotely
  • Getting Started
    • Students
    • Faculty / Instructors
    • Staff
    • Researchers
    • Visitors
  • IT at the UW
    • About UW-IT
    • IT across the UW
    • IT Governance & Policies
    • News & Announcements
    • Services, Fees & Rates
  • Get Help
Get Help
  • Tools, Services & Support
    • Academic Planning
    • Access & Authentication
    • Administrative Systems
    • Data & Reporting
    • Email, Calendars, & Events
    • IT Systems Infrastructure
    • Networks & Connectivity
    • Software & Computers
    • Storage & Hosting
    • Teaching & Learning
    • Voice & Video
  • Guides by Topic
    • Accessibility & Usability
    • Computers & Printing
    • Email & Calendaring
    • Emergency Preparedness
    • Identity, Diversity & Inclusion
    • IT Sourcing & Standards
    • Online Storage & Publishing
    • Research
    • Security & Authentication
    • Technology Facilities
    • Working Remotely
  • Getting Started
    • Students
    • Faculty / Instructors
    • Staff
    • Researchers
    • Visitors
  • IT at the UW
    • About UW-IT
    • IT across the UW
    • IT Governance & Policies
    • News & Announcements
    • Services, Fees & Rates
  • Get Help
  • IT Connect
  • Security & Privacy
  • Learn how the Emotet malware works so you can protect yourself

Learn how the Emotet malware works so you can protect yourself

Hacker in a blue hoody standing in front of a code background with binary streams and information security terms

Find out how malicious hackers have used Emotet to target universities and get some tips for how to protect yourself from their tactics.

Posted in Security & Privacy

Post navigation

Previous:
More storage available in UW OneDrive for Business
Next:
Increased storage for SharePoint Online sites, Microsoft Teams and Office 365 Groups
UW Information Technology logo

Connect with UW-IT:

  • Twitter
  • YouTube
  • Get Help
  • My Requests
  • Service Status
  • About IT Connect
  • Sitemap
  • UW-IT Jobs
  • UW-IT Internal
  • Accessibility
  • Campus Safety
  • ISC
  • My UW
  • Privacy
  • Security
  • Terms

© 2023 University of Washington | Seattle, WA