Information about TTUnet firewall malware and phishing lists


Explanation

Texas Tech University uses third party malware and phishing lists for its Internet firewall. When someone on the network attempts to visit a website on one of these lists, they are redirected to a page describing what happened. These lists are actively maintained, and sites that are no longer infected with malware or are no longer hosting phishing websites are removed from the list.

Additionally, Enterprise IT Security may add websites to either list as need. For example, when a website is mentioned in a phishing email but is not already on the blacklist, Enterprise IT Security can add it to the list.

When a website needs to be removed, Enterprise IT Security can run a Qualys malware and web application scan to check for malware; once it is confirmed that no detectable malware threat exists, Enterprise IT Security can submit a request to have the website removed from the blacklists.