A wave of malicious e-mail has recently come to our attention. Different variants have been seen, but all of them attempt to trick users into following a link which leads to a site used to install malware. A typical example is shown below: Good Day [User], Thanks for the mail. Pay your invoice here: ...link... We can help if you have any question related to this invoice. Thank you, [User] If you have received a similar e-mail and clicked the link please contact your local IT support immediately. See our guidance on spotting scam e-mail and...
Microsoft has announced the end of life for Windows Phone 8.1, as of 11th July 2017. As result, there will no longer be any security updates provided. The IST recommend that devices still using Windows Phone 8.1 should not be used for storing or processing University data, effective immediately. Some handsets can be updated to Windows 10 mobile, which is supported. You can find out if your specific model is supported at https://www.microsoft.com/en-gb/windows/windows-10-mobile-upgrade. For units using the IST's mobile device Security On A Page, available at https://sharepoint.nexus... Continue reading
Microsoft have released critical security updates for all currently supported versions of Windows, as well as for the otherwise unsupported XP, Vista and Server 2003. This is in response to a series of vulnerabilities exploited by the NSA and subsequently released by the hacking group Shadow Brokers. Given the issues posed recently by the outbreak of the NSA derived ransomware WannaCrypt/WannaCry, we strongly recommend patching all systems immediately. Further details are available on the Microsoft website, including instructions for manually patching XP, Vista and Server 2003:... Continue reading
The WannaCrypt ransomware worm targets computers which do not have the latest security updates installed. We remind users to install MS17-010 as soon as possible, if they have not already done so. Microsoft released additional security updates for for older platforms including Windows XP, Windows 8, and Windows Server 2003. This attack type may evolve over time, so any additional defense-in-depth strategies will provide additional protections. For example, to further protect against SMBv1 attacks, network operators should consider blocking legacy protocols on their networks... Continue reading
We are aware of reports of a wide-scale ransomware attack targeting users computers in the NHS. The NHS have published a statement and it is likely that this threat will spill over into other sectors, including education. Early indications are showing that this may be a variant of the malware is exploiting MS17-010 which is a vulnerability in Microsoft Server Message Block 1.0 SMBv1 dating from March 2017. Further information on this particular issue is available here https://technet.microsoft.com/en-us/library/security/ms17-010.aspx Recommended best practice... Continue reading