Search

Recent Post

Archives

Archive for the ‘Published’ Category


Microsoft warns of a Windows zero-day security hole that is being actively exploited

September 10th, 2021

In a security advisory, Microsoft has warned that malicious hackers are exploiting an unpatched vulnerability in Windows to launch targeted attacks against organizations. According to Microsoft, attacks exploiting the vulnerability have targeted companies via boobytrapped Microsoft Office documents. In short, a typical timeline of infection might go something like this: One of your users downloads […]


Potential Risk for Gmail Users On iOS Devices

July 14th, 2014

What It Is A vulnerability has been reported for Google’s Gmail iOS app that would allow for an attacker to intercept all email communications through a Man-in-the-Middle (MitM) attack. The MitM attack allows a third party to intercept your data before it is received by the designated recipient. Additionally, if an attacker can trick your device into […]


December Edition of OUCH!: Anti-virus

December 4th, 2014

SANS has released their December edition of OUCH!, covering the functions and limitations of anti-virus. “We are excited to announce the December issue of OUCH! This month, led by Guest Editor Jake Williams, we explain what anti-virus is, how it works and its limitations.  Ultimately, our goal is for people to understand that while anti-virus helps […]


January Edition of OUCH!: Mobile Apps

January 14th, 2015

SANS has released their January edition of OUCH!, covering how to securely use mobile apps. “We are excited to announce the January issue of OUCH! This month, led by Guest Editor Chris Crowley, we cover how to securely use mobile apps.  Since many of you have new mobile devices after the holidays, we figured this was a perfect time […]


University Employee Payroll Scam

University Employee Payroll Scam

January 15th, 2015

Earlier this week the Internet Crime Complaint Center (IC3) and FBI sent out a report regarding a phishing scam targeting university employees. Users are receiving e-mails about a change in their human resource status and are sent to a link to website to address this change. The link sends the victims to a page that looks […]


February Edition of OUCH!: Staying Secure on the Road

February 5th, 2015

SANS has released their February edition of OUCH!, covering “how to securely stay online and get work done while traveling.” “We are excited to announce the February issue of OUCH! This month, led by Guest Editor Steve Armstrong, we cover how to securely stay online and get work done while traveling.  With more and more people […]


March issue of OUCH!: Online Gaming

March 5th, 2015

SANS has released their February edition of OUCH!, covering “how you and your family can game online, but do it securely and safely.” “We are excited to announce the March issue of OUCH! This month, led by Guest Editor Jake Williams, we cover online gaming.  Specifically, how you and your family can game online, but […]


March 17, 2015 Phishing Report

March 17th, 2015

Over the past several weeks, the Help Desk and Information Security Office have received complaints of numerous spam e-mails claiming that “Your e-mail account was LOGIN today by Unknown IP address:”. The subject line is generally “Support” and the e-mail instructs the user to “click on the Administrator link below and LOGIN”, which then provides a bogus link […]


April Edition of OUCH!: Passphrases

April 1st, 2015

SANS has released their April edition of OUCH!, covering passphrases, and why they are better than passwords. “We are excited to announce the April issue of OUCH! This month, led by Guest Editor Guy Bruneau, we cover passphrases.  Specifically, what passphrases are, why they are better than passwords and how to use them securely.  As always, […]


November Edition of OUCH!: Social Engineering

November 11th, 2014

SANS has released their November edition of OUCH!, covering social engineering. “We are excited to announce the November issue of OUCH! This month, led by Guest Editor Alissa Torres, we cover Social Engineering.  Specifically, we explain what it is, how cyber attackers use social engineering to get what they want and the different ways people […]