Monday, November 10, 2014
Are you concerned about the latest security threats?
Do you want to stay up-to-date on the latest security trends?
Do you wonder if that email you received could be phishing?
We have a solution: "follow" us on Twitter, and "like" us on Facebook!
We scour security news on a daily basis and post updates on our pages. We cross-post all information, so whether you are a fan of all social media or prefer to use one or the other, you will receive up-to-date information.
Go ahead -- LIKE US! You will be glad you did!
Spotlight ArchivesRead More
Tuesday, October 21, 2014
UA Information Security has a guest column in the October 22 issue of Lo Que Pasa entitled "Don't Get Hooked By Phishing Attacks." Please take a few minutes to read the article!
Please visit our phishing page for more information.
Wednesday, October 15, 2014
Last Friday's Tent on the Mall was a great success, and we thank all who came out to check out our new THINK! Campaign. Please check our our photo album on our Facebook page.
Thursday, October 9, 2014
In recognition of National Cyber Security Awareness Month, Educause is hosting a free webinar featuring UA's Michele Norin, along with CIOs from the University of Maryland-Baltimore and the University of Oregon.
For more information, please visit our events page.Read More
Thursday, September 25, 2014
TLP: WHITECIS CYBER SECURITY ADVISORY
CIS ADVISORY NUMBER: 2014-080
DATE(S) ISSUED: 09/24/2014
SUBJECT: Critical Bourne Again SHell (BASH) Vulnerability Allows for Remote Code Execution
OVERVIEW:A recent vulnerability has been discovered affecting the Bourne Again SHell (BASH). BASH is the default command-line shell processor that is often run in a text window on Linux and UNIX systems. BASH allows users to type commands that cause actions. In addition, BASH has the ability to read commands from a scripted file. Based on the wide use of Linux and UNIX systems, it can be assumed that most...Read More