On November 11th, 2015, Microsoft released security patches for:
- Windows 10, 8.1, 8, 7, Vista RT, RT8.1
- Windows servers 2012, 2008, 2003
- Microsoft Office 2016; 2013; 2010, 2007
On November 11th, 2015, Microsoft released security patches for:
Zap! Pow! Spoon!
Got a problem with your computer, phone, or UMB web service?
Service Desk Assemble!
The brave men and women at the IT Service Desk are here to fight the never-ending battle for internet access, cyber security, and the good customer service way!
Spoon!
On October 26th, the appearance of the UMass secure login page will change. This page is used to access WISER, HR Direct and other secure web applications.
The new appearance, shown below, will size to fit screens of any size and be accessible on both your computer and mobile device. Nothing else will change, your same password will work as before.
To confirm you are on a trusted, secure page, look for the lock icon in your address bar. This icon will look different depending on the browser and operating system you use. Below are a few examples of what you might see.
A well-crafted phishing attack!
Large communities like UMass Boston are juicy targets for cyber scammers, because time can be spent crafting a convincing con, then used on a large number of potential victims.Today’s Phishing Wall of Shame entry comes from Patty C., who trusted her gut, and protected herself.
This scammer did a pretty good job! They picked a realistic looking (though not technically real) email address and “spoofed” the From address. They also included a URL that looks legit, because it ends in “umb.edu/”, however this URL is also “spoofed”. Learn more about Email and URL Spoofing in a previous Wall of Shame entry.
IT Staff were able to investigate the spoofed URL in a secure way, and saw it directed to a form requesting the user enter their name and Library barcode. Trained IT Staff opened the file to take a picture, however you should avoid clicking a link in a suspicious email, because they could contain phishing attempts, malicious code, or illegal content and could cause harm to your computer. Here is peak what this link contained:
The page that loads looks exactly like the off-campus login page for EZ-Proxy! The scammer was able to match it very closely. If you had filled in this form with your email and password, your account would be in the hands of this scammer!
If you are suspicious of a link, website, or email, you can contact the IT department to ask if it may be a scam. Forward a copy of a suspicious email to abuse@umb.edu.
Always remember…
Don’t take the bait! IT will NEVER ask you for your password. Phishing emails attempt to deceive you into giving up your private information by leading you to fraudulent websites. Learn more at:
http://www.umb.edu/it/getting_services/security/phishing/
On October 13th, 2015, Microsoft released security patches for:
On September 8th, 2015, Microsoft released security patches for:
A trusted name doesn’t always mean trusted content!
If you ever fall victim to a phishing attack, your email account could be compromised by scammers. If this happens, your account can be used to send attacks to your contacts. Even if you see a familiar name in the “From:” field, it’s not a sure fire way to trust the message. Today’s Phishing Wall of Shame entry comes from Rose C. and Hannah L., who both were emailed by a faculty member they knew, but saw a message they didn’t trust:
Our two Security Stars knew the sender, but they knew him as a faculty member without any relation to the IT department. There was no reason to think that he should be informing them about an issue with their email.
The email has a link in it. IT Staff were able to investigate this link in a secure way, and saw it directed to a form requesting the user enter their email username and password. Trained IT Staff opened the file to take a picture, however you should avoid clicking a link in a suspicious email, because they could contain phishing attempts, malicious code, or illegal content and could cause harm to your computer. Here is what this link contained:
The page that loaded is an amature looking form that is clearly not an official UMass Boston communication, however remember that in our last posting we learned to never rely on the incompetence of scammers to keep yourself safe! If you had filled in this form with your email and password, you can bet that your account would soon be sending out attack messages too, or worse!
If you are suspicious of a link, website, or email, you can contact the IT department to ask if it may be a scam. Forward a copy of a suspicious email to abuse@umb.edu.
Always remember…
Don’t take the bait! IT will NEVER ask you for your password. Phishing emails attempt to deceive you into giving up your private information by leading you to fraudulent websites. Learn more at:
http://www.umb.edu/it/getting_services/security/phishing/
A scam with flashy graphics!
Sometimes phishing attacks are obvious because the contents of the email are clearly not professional. However this is not a reliable way to catch scammers! Today’s Phishing Wall of Shame entry comes from Robyn A., who was savvy enough to sniff out this sophisticated scam. Here’s what it looked like:
This is the most sophisticated email layout we’ve seen so far on the Phishing Wall of Shame series. It’s not perfect, but you can see that it wouldn’t have taken too much more work to make it look perfect.
So how did Robyn know this was a scam? The links that the email encourages users to click don’t lead to a URL that she recognized. When you hover your mouse cursor over a link, your browser shows the URL it leads to. If you expect to see “umb.edu” and don’t, this is a warning sign!
If you are suspicious of a link, website, or email, you can contact the IT department to ask if it may be a scam. Forward a copy of a suspicious email to abuse@umb.edu.
Always remember…
Don’t take the bait! IT will NEVER ask you for your password. Phishing emails attempt to deceive you into giving up your private information by leading you to fraudulent websites. Learn more at:
http://www.umb.edu/it/getting_services/security/phishing/
The UMass Boston Document Management System, Xythos, will be down for a scheduled upgrade from July 22nd at 9:00AM until July 23rd at 5:00PM
IT Staff will be performing an upgrade to the Xythos document management, sharing, and collaboration system, to the latest version – 7.2.145. Xythos will be down from Wednesday July 22nd at 9:00AM until Thursday July 23rd at 5:00PM.
We apologize for the inconvenience.
If you have concerns accessing your files during that period,
please contact ITServicedesk@umb.edu or call 617-287-5220.
To learn more about Xythos file sharing, click here.
Visit the IT Status page for the latest updates: umb.edu/it/status