Page tree

University of Tartu IT wiki

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.

In this guide, you will find instructions on data phishing.

classbutton button1

(info) Eesti keeles

Data phishing seeks to gather sensitive information from computer users, including access details, passwords, and credit card numbers.

Users often encounter fraudulent data charts via email or email links that seem to be genuine and identical to legitimate websites. For instance, a message stating that your inbox is full and that you must push someplace to preserve access may be delivered by email.


The University of Tartu will never ask for your passwords by email!


titleExamples of data phishing (websites and emails)

excludephishing_2.png, english_flag.png

titleHow to recognize data phishing letters?
  • Mismatch. The email address of the sender of the email has not come from the domain address of the relevant institution or the message has been sent as a secret. However, major changes to the University of Tartu have always been coordinated and certainly can be read on the UT internal website. The email addresses of the University of Tartu usually end
  • Suspicious links. The website does not belong to the corresponding organisation, ie the links are related to another domain. Also, the website does not use the HTTPS protocol. The UT's domain address is usually
  • Spell and grammar errors. The email message contains letter or language errors or is strange.

titleHow to behave when I have received a data phishing letter?


If you have provided your UT user account password and other access information to strangers, you should immediately change your UT user account password in the environment You should definitely avoid cross-use of your password, but if you have the same password in your environment (Gmail, Facebook, etc.), it should be replaced there! Contact computer help for more information and problems.


To announce the data phishing fraud, submit the resulting email to and preferably as an attachment. This ensures that the email comes with all the necessary spellings that are necessary for more accurate analysis. Guide: Send mail as attachment.

  • Do not open letters that have come from unknown and suspicious recipients.
  • Do not download attachments that come with the letters;
  • Do not click on web links in the letter;
  • Do not answer the letter.

If something seems suspicious, always contact Helpdesk.