The ISO sponsored a SANS Webcast on November 24, 2009, entitled "Security for Windows 7" at the end of the Departmental Computing Forum (DCF) monthly meeting. The Webcast conducted was by Jason Fossen, the sole author of the SANS institute's week-long Securing Windows Course (SEC505).
For information on the Webcast, see SANS Webcast: Security for Windows 7.
Windows computers running Microsoft Windows may be vulnerable to exploits. This vulnerability may allow an unauthorized attacker to take complete control of an affected system that is connected to a network without any end user action.PLEASE UPDATE AND REBOOT ASAP.
For What You Need To Do, see Security Alert - Critical Microsoft October Security Update For Windows Users.
Windows, Mac and Linux users running Adobe Reader and Acrobat 9.1.3 and older are vulnerable to exploits. Without security update, an unauthorized attacker may take complete control of an affected system by convincing the user to open a maliciously crafted PDF file.
For What You Need To Do, see Security Alert - Adobe Reader and Acrobat Security Update.
Windows, Mac, and Linux users running Adobe Reader or Acrobat are vulnerable to exploits. An unauthorized attacker may take complete control of an affected system by convincing the user to open a maliciously crafted Portable Document Format (PDF) file.For What You Need to Do,until a patch is released and applied , see Security Alert: Adobe Reader & Acrobat Unpatched Vulnerability – Attacks Underway.
Security Alert: Virus Emails - You've Received A Hallmark E-Card and You have got a new E-Card from your friend
Virus emails from "email@example.com or firstname.lastname@example.org" asking you to open a postcard.zip or similar attachment. PLEASE DO NOT OPEN THE ATTACHMENT!For What You Need to Do, see Security Alert: Virus Emails - You've received A Hallmark E-Card and You have got a new E-Card from your friend.
Welcome back and Happy New Year! The ISO would like to extend its appreciation to all faculty and staff members who participated in the Identity Theft study.
In order to begin the 2009 spring semester with minimal disruption to your network connectivity while keeping your assets and data protected, Carnegie Mellon University and the Information Security Office would like toremind you of the following safety tips at Welcome Back Faculty and Staff.
In December, the President's Council approved a new University-wide Information Security Policy. This new policy lays a foundation for protecting all institutional data, replacing the Data and Computer Security Policy that has been in effect since 1990.
For information on the new policy and how it will effect business units and colleges, please visit Information Security Policy.