2015
Critical - Dell systems running Windows: eDellRoot certificate compromise
Synopsis The eDellRoot certificate installed on certain Dell laptops and PCs has introduced a security vulnerability on those systems with it installed. This threat is that private keys were leaked for a Dell root certificate. This means attackers can use this certificate to modify your browsing experience and steal sensitive information. You can manually remove this certificate, or Microsoft has updated their security software to remove this certificate. Fix Please ensure Windows Defender for Windows 10 and Windows 8.1, or Microsoft Security Essentials for Windows 7 is running and up-to-date. Both these packages are free. If either of those packages are up to date and running, it has probably already removed the vulnerable certificate. Alternatively you can manually remove this certificate. Contact support@cs.ucdavis.edu if you have a Dell PC running Windows and cannot do either of the steps above, help desk can assist you in installing and updating the correct software. Details Win32/CompromisedCert.C is a Dell root certificate for which the private keys were leaked online. The certificates can be found in Dell PCs running these OS: Windows 10, Windows 8.1, Windows 8, Windows 7 If your Dell PC contains this certificate, it most likely vulnerable to this threat. A PC with this certificate could be vulnerable to SSL/TLS spoofing attacks, allowing an attacker to digitally sign binaries so that they are trusted by the affected PC. An attacker could gain control over your PC and browsing experience. An attacker can exploit a certificate using phishing or man-in-the-middle attacks to decrypt, modify or spoof HTTPS websites, such as banking, social media, or email websites. This could allow a malicious hacker to steal your account names, passwords, and confidential data. They could also carry out transactions without your knowledge, even when it seems like you have a secure browser connection to a website. |
Malicious Email with Document.zip - Do Not Open!
From Caryn DeMorna of IET, Sending on behalf of Cheryl Washington, Chief Security Officer….
Security administrators have identified a malicious email that is being delivered via email. The teams are working on blocking the malicious messages. If you receive a message with a zip attachment please do not open the attachment and delete the message from your email. The attachment that has been identified thus far is Document.zip. However, you should not open any .zip attachment.
Caryn DeMoura University of California, Davis Information and Educational Technology |
Campus and CS Wireless Service Changes
Because MoobilenetX will be depreciated in the near future, the Computer Science department now advises eduroam* for wireless needs. Choose your OS from the Campus Wireless Access page, and then use the eduroam instructions. The wireless networks on campus support most wireless devices (802.11 a/b/g/n) and are available to all UC Davis computing account holders, UC Davis Guests, sponsored guests, and Eduroam account holders. We advise that your guests also obtain eduroam accounts, use the UC Davis Guest Wireless, or you can sponsor your guest as a Temporary Affiliate. *eduroam eduroam (education roaming) is the secure, world-wide roaming access service developed for the international research and education community. Having started in Europe, eduroam has gained momentum throughout the research and education community and is now available in 74 territories. eduroam allows students, researchers and staff from participating institutions to obtain Internet connectivity across campus and when visiting other participating institutions by simply opening their laptop. |
University Employee Payroll Scam
Consequences of this Scam:
If you have been a victim of this scam, you may file a complaint with the FBI’s Internet Crime Complaint Center at www.IC3.gov. Please reference this PSA number in your complaint. The IC3 produced a PSA in May 2014 titled “Cyber-related Scams Targeting Universities, Employees, and Students,” which mentioned this scam. The PSA can be viewed at http://www.ic3.gov/media/2014/140505.aspx. Tips on how to Protect Yourself from this Scam
More on Avoiding Social Engineering and Phishing Attacks from the US-Cert.
|