CaTS | Information Technology

CaTS Blog

Social Engineering

Monday, December 8, 2014

Social engineering is the art of people manipulating others so they will give out confidential information. When criminals are selecting targets, they try to design scams that will trick you into giving your passwords, bank information, or access to your computer (usually to install malicious software, such as viruses). Find out more information through the link below in order to protect yourself from this recent security threat. 

https://www.wright.edu/information-technology/security/social-engineering

Enhancements to WSU's Intrusion Prevention System

Monday, October 27, 2014

On the morning of Tuesday, October 28, CaTS will be implementing enhancements to the Wright State's Intrusion Prevention System. These enhancements provide additional protection to the University with a more extensive library of known infected Internet sites and the ability to spot infected content. If you have questions concerning these enhancements please contact the CaTS Help Desk at (937) 775-4827.
 

Warning About Attached Documents With Malicious Code

Friday, October 24, 2014

CaTS recently learned of malicious Microsoft Word, Excel, and PowerPoint documents being sent via email to members of the Wright State community.
The names of these documents may contain references to an invoice, undelivered package, or other business related subject. The documents are designed to run malicious code on systems running the Windows operating system. If you receive an email with a document attached and do not recognize the sender, even if the email indicates the document originates from a legitimate business, do not open or download the document.

If you have questions about whether an email you received is legitimate or not, please contact the Help Desk for assistance. You can contact us at (937) 775-4827 or toll free at 1-888-775-4827.

Urgent: Phishing Scam Notice for 9/30/14

Tuesday, September 30, 2014

The Help Desk was recently notified of another phishing scam that target students, faculty, and staff of Wright State University. This scam tells you that you logged in to "a different device" with your email, and because of that, your account will be disabled. It then gives a link for you to click on to re-enable your account. The subject line of this message is "Login Device" or something similar.

Please be aware that this message is a scam and is NOT BEING SENT BY CaTS. You should not click on the link or reply to the email. If you do so, your information mauy be sent directly to a scammer. You should delete this message immediately.

Always remember that any email claiming to be from CaTS, Wright State University or another business which asks for your login, personal, or financial information is a definite scam. CaTS, Wright State, and other reputable businesses WILL NEVER ask you for any personal information, such as your username and password, via email. CaTS would also like to emphasize that you should never respond to these emails or click links within them, nor should you give out your personal information to anyone via email.

If you receive an email and are unsure if the message is a scam, feel free to contact the CaTS Help Desk. We can help you determine whether the message is real or not. You can reach us at (937) 775-4827, or toll free at 1-888-775-4827.

Urgent: Phishing Scam Notice for 9/23/14

Tuesday, September 23, 2014

The Help Desk was recently notified of another phishing scam that target students, faculty, and staff of Wright State University. This scam looks like it is being sent from Wright State, and claims you have a 'document notification'; it then provides a link to access the document. The subject line of this message is "Employee Documents-Internal Use", or something similar.

Please be aware that this message is a scam and is NOT BEING SENT BY CaTS. If you reply, your information will be sent to an email address of the scammer, not to the CaTS Help Desk. You should delete this message immediately.

Be aware that any email claiming to be from CaTS, Wright State University or another business which asks for your login, personal, or financial information is a definite scam. CaTS, Wright State, and other reputable businesses WILL NEVER ask you for any personal information, such as your username and password, via email. CaTS would also like to emphasize that you should never respond to these emails or click links within them, nor should you give out your personal information to anyone via email.

If you receive an email and are unsure if the message is a scam, feel free to contact the CaTS Help Desk. We can help you determine whether the message is real or not. You can reach us at (937) 775-4827, or toll free at 1-888-775-4827.

Urgent: Phishing Scam Notice for 9/17/14

Wednesday, September 17, 2014

The Help Desk was recently notified of two phishing scams targeting students, faculty, and staff of Wright State University. The first scam shows up in your email informing you that you've received a new fax from EPSON. It then provides a link where you can 'download your fax message'.

The second scam has a subject line titled HELPDESK and the message says you have been upgraded to 4 GB of space. It then provides a link for you to click on.

Please be aware that these messages scams and are NOT BEING SENT BY CaTS. If you reply, your information will be sent to an email address of the scammer, not to the CaTS Help Desk. You should delete these messages immediately.

Be aware that any email claiming to be from CaTS, Wright State University or another business which asks for your login, personal, or financial information is a definite scam. CaTS, Wright State, and other reputable businesses WILL NEVER ask you for any personal information, such as your username and password, via email. CaTS would also like to emphasize that you should never respond to these emails or click links within them, nor should you give out your personal information to anyone via email.

If you receive an email and are unsure if the message is a scam, feel free to contact the CaTS Help Desk. We can help you determine whether the message is real or not. You can reach us at (937) 775-4827, or toll free at 1-888-775-4827.
 

Internet Explorer Security Vulnerability

Thursday, May 1, 2014

Recently, Microsoft announced a security vulnerability that affects Internet Explorer versions 6 through 11. This vulnerability allows an attacker to use Adobe Flash content on a website to install malicious code onto your computer.

As of 1:00pm today, Microsoft has issued a security update for this issue. This update will be available for all versions 6-11 of Internet Explorer, and will be provided for users of Windows 7, Windows 8, and Windows XP, even though Microsoft no longer officially supports XP.

If your computer is connected to the WSU network and your system is setup to receive updates automatically from us, then this security fix will install automatically for you. If you are not connected to WSU’s update server, or if you are using your home computer, you should check your Windows Update setup to make sure it is downloading updates automatically.

If you would like assistance with Windows Update on your computer, feel free to contact the CaTS Help Desk at (937) 775-4827.

For more information about this issue, visit the following website:

http://krebsonsecurity.com/2014/05/microsoft-issues-fix-for-ie-zero-day-...


This list is maintained by Computing and Telecommunications Services.
 

Attention Users of Cisco AnyConnect VPN App on iOS Devices

Friday, April 18, 2014

Important: This message only applies to individuals who are using the Cisco AnyConnect VPN app on iOS devices (iPhones, iPads, and iPods).

CaTS recently learned that the Cisco AnyConnect VPN app for iOS devices was vulnerable to the Heartbleed bug that affects OpenSSL connections on the Internet. Because of this, Cisco released an update to the app, which is now available through the App store. This update fixes the vulnerability to the Heartbleed bug.

CaTS recommends that you update your AnyConnect VPN app through the Apple app store. The Android version of the app, along with the AnyConnect VPN client for Windows, are not affected by this vulnerability and do not need to be updated.

If you have any questions regarding this update, please contact the CaTS Help Desk at (937) 775-4827, or send an email to helpdesk@wright.edu.


This list is maintained by Computing and Telecommunications Services.
 

Current Issues with Search box in OWA and an Email Scam

Monday, April 14, 2014

Macintosh Safari and Firefox search problem in OWA

Clients using Macintosh Safari and Firefox browsers have contacted the
Help Desk with issues searching in Outlook Web Application (OWA.) The
Search box in OWA is grayed out.  It appears that Chrome does work for
searching, and that it is only Safari and Firefox that are experiencing
the problem.

CaTS has opened a case with Microsoft as have other universities.
Microsoft responded to one university with: “The issue that you are
experiencing with Safari and Firefox on MacOS is not unique to you.
Unfortunately, it appears this issue began with the latest update to the
service which was recently rolled out. The issue is currently under
investigation by our product teams.  We do not have an ETA for
resolution yet to provide at this time.  I will certainly update you as
soon as more is known, including an expected resolution date."

If you are a Macintosh client using OWA , Chrome is available for Mac OS
X 10.6 or later.  https://www.google.com/intl/en/chrome/browser/

For questions, please contact the CaTS Help Desk by calling 937.775.4827
or sending an email to helpdesk@wright.edu.

Library Email Scam

Recently, a new email scam has been targeting university faculty, staff,
and students. This message claims that your library account has expired
and that you must reactivate it using the provided link, or your account
will be closed. The message is claiming to be sent by someone in the
University Libraries department. Please note that this is a scam and not
an official notice from Wright State University.

Here’s the text of the message:

-------------------------------

Dear User,

Your access to your library account is expired, therefore you must
reactivate it immediately or it will be closed automatically. If you
intend to use this service in the future, you must take action at once!

To reactivate your account, simply visit the following page and login
with your account. After logging in, your account is reactivated and it
will redirect you to your library account.

Login Page: <LINK REMOVED FOR SECURITY REASONS>

If you can't login, please contact the Access Services Librarian at
lisa.daniels@wright.edu.

Although the university has now blocked the link for this scam (so you
can’t go to the website referenced in the message), this is a good time
to point out that you should never click on a link in an unsolicited
email that is asking you to enter your personal information. No
department at Wright State University will ever send an email asking you
to click a link to enter your personal information.

If you are unsure whether or not a message you receive is spam, contact
the CaTS Help Desk at (937) 775-4827 and we’ll be glad to talk with you.

CaTS Security Alert: Heartbleed Bug

Wednesday, April 9, 2014

Many of you may have heard recently about a security vulnerability affecting secure data transmission on the Internet. This bug, deemed the Heartbleed Bug, affects OpenSSL, the open-source encryption standard used by most websites.

On Monday, April 8, CaTS began a review of the OpenSSL deployment for all CaTS-managed servers. The initial results indicate our servers are not affected by this vulnerability. However, we will be performing a thorough scan of all CaTS-managed servers to ensure no systems have been overlooked.

Although CaTS is looking at web servers owned by the university, the Heartbleed bug has affected many other websites, and your secure information could be compromised. For a general overview of this bug and the steps you should take to secure your information, see the following
website:

http://www.businessinsider.com/heartbleed-bug-explainer-2014-4

If you have questions or concerns about this vulnerability please contact the Help Desk at (937) 775-4827.

 

This list is maintained by Computing and Telecommunications Services.
 

Pages