Highly-Critical Linux Vulnerability

Submitted by admin on

WHAT'S HAPPENING?
A highly critical vulnerability in the GNU C Library (glibc) affecting versions between 2.2 and 2.17 has been announced.  Dubbed the GHOST vulnerability, it allows attackers to remotely take complete control of a vulnerable system without needing any prior knowledge of system credentials.


WHO IS AFFECTED?

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
 

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
 

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that
include suspicious links. These are not legitimate emails.

WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or
spam email makes its way into your inbox, please forward it according to the
directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email
to improve the accuracy of GT's filters.

Latest Phishing Message

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that
include suspicious links. These are not legitimate emails.

WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or
spam email makes its way into your inbox, please forward it according to the
directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email
to improve the accuracy of GT's filters.

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
 

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
 

Latest Phishing Attempt

Submitted by admin on

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
 

Critical Bash Vulnerability

Submitted by admin on

WHAT'S HAPPENING?
A critical Bash vulnerability was announced yesterday that allows an unauthenticated, remote attacker to inject and execute arbitrary commands on a targeted system.  A successful exploit could result in a complete system compromise.


WHO IS AFFECTED?
Users managing any UNIX-like system.


WHAT DO YOU NEED TO DO?
Affected users should check with their operating system vendor for patches and patch immediately.

Additional information is available at:
CVE-2014-6271 (Shellshock) bash vulnerability

Zero-Day Internet Explorer Vulnerability

Submitted by admin on

WHAT'S HAPPENING?
Attackers are actively exploiting a previously unknown vulnerability in versions 6-11 of Internet Explorer (IE) that allows them to surreptitiously hijack vulnerable computers.


WHY IS IT HAPPENING?
When an affected version of IE is used to access a malicious web site, attackers can silently take over the user's computer. Further details regarding this vulnerability are available at the following URL's:

http://arstechnica.com/security/2014/04/active-0day-attack-hijacking-ie-users-threatens-a-quarter-of-browser-market/