Search

Recent Post

Archives

Mykael Baig


Potential Risk for Gmail Users On iOS Devices

July 14th, 2014

What It Is A vulnerability has been reported for Google’s Gmail iOS app that would allow for an attacker to intercept all email communications through a Man-in-the-Middle (MitM) attack. The MitM attack allows a third party to intercept your data before it is received by the designated recipient. Additionally, if an attacker can trick your device into […]


November 11, 2014 Phishing Report

November 11, 2014 Phishing Report

November 11th, 2014

Over the past week or so, the UISO has noticed an increased amount of these phishing e-mails, stating that the receiver’s password is about to expire, and they need to validate his or her e-mail account.  These e-mails are coming from seemingly random senders, and not from within Loyola’s network, as you can see by their […]


December Edition of OUCH!: Anti-virus

December 4th, 2014

SANS has released their December edition of OUCH!, covering the functions and limitations of anti-virus. “We are excited to announce the December issue of OUCH! This month, led by Guest Editor Jake Williams, we explain what anti-virus is, how it works and its limitations.  Ultimately, our goal is for people to understand that while anti-virus helps […]


January Edition of OUCH!: Mobile Apps

January 14th, 2015

SANS has released their January edition of OUCH!, covering how to securely use mobile apps. “We are excited to announce the January issue of OUCH! This month, led by Guest Editor Chris Crowley, we cover how to securely use mobile apps.  Since many of you have new mobile devices after the holidays, we figured this was a perfect time […]


University Employee Payroll Scam

University Employee Payroll Scam

January 15th, 2015

Earlier this week the Internet Crime Complaint Center (IC3) and FBI sent out a report regarding a phishing scam targeting university employees. Users are receiving e-mails about a change in their human resource status and are sent to a link to website to address this change. The link sends the victims to a page that looks […]


January 15, 2015 Phishing Report

January 15, 2015 Phishing Report

January 15th, 2015

Recently the Information Security Office has noticed many instances of a phishing scam requesting users to download a document from Drop-Box for their financial records. The e-mail contains many different sections that may seem legitimate, but you should NOT open the link or respond to the e-mail. Please note that the download link in the body […]


February Edition of OUCH!: Staying Secure on the Road

February 5th, 2015

SANS has released their February edition of OUCH!, covering “how to securely stay online and get work done while traveling.” “We are excited to announce the February issue of OUCH! This month, led by Guest Editor Steve Armstrong, we cover how to securely stay online and get work done while traveling.  With more and more people […]


March 17, 2015 Phishing Report

March 17th, 2015

Over the past several weeks, the Help Desk and Information Security Office have received complaints of numerous spam e-mails claiming that “Your e-mail account was LOGIN today by Unknown IP address:”. The subject line is generally “Support” and the e-mail instructs the user to “click on the Administrator link below and LOGIN”, which then provides a bogus link […]


April Edition of OUCH!: Passphrases

April 1st, 2015

SANS has released their April edition of OUCH!, covering passphrases, and why they are better than passwords. “We are excited to announce the April issue of OUCH! This month, led by Guest Editor Guy Bruneau, we cover passphrases.  Specifically, what passphrases are, why they are better than passwords and how to use them securely.  As always, […]


November Edition of OUCH!: Social Engineering

November 11th, 2014

SANS has released their November edition of OUCH!, covering social engineering. “We are excited to announce the November issue of OUCH! This month, led by Guest Editor Alissa Torres, we cover Social Engineering.  Specifically, we explain what it is, how cyber attackers use social engineering to get what they want and the different ways people […]