News

  • Like Us -- Follow Us!

    UA Information Security Facebook and Twitter
    Monday, November 10, 2014
      Are you concerned about the latest security threats?  Do you want to stay up-to-date on the latest security trends?  Do you wonder if that email you received could be phishing?  We have a solution:  "follow" us on Twitter, and "like" us on Facebook! We scour security news on a daily basis and post updates on our pages.  We cross-post all information, so whether you are a fan of all social media or prefer to use one or the other, you will receive up-to-date information. Go ahead -- LIKE US!  You will be glad you did! Spotlight ArchivesRead More
  • Don't Get Hooked by Phishing Attacks

    Phishing -- Don't Get Hooked!
    Tuesday, October 21, 2014
      UA Information Security has a guest column in the October 22 issue of Lo Que Pasa entitled "Don't Get Hooked By Phishing Attacks."  Please take a few minutes to read the article! Please visit our phishing page for more information.   Spotlight Archives  Read More
  • Security Awareness Day 2014

    Security Awareness Day 2014
    Wednesday, October 15, 2014
    Last Friday's Tent on the Mall was a great success, and we thank all who came out to check out our new THINK! Campaign.  Please check our our photo album on our Facebook page.     Spotlight Archives  Read More
  • CIO Insights on Cybersecurity -- Free webinar

    Thursday, October 9, 2014
    In recognition of National Cyber Security Awareness Month, Educause is hosting a free webinar featuring UA's Michele Norin, along with CIOs from the University of Maryland-Baltimore and the University of Oregon. For more information, please visit our events page.Read More
  • Critical Bourne Again SHell (BASH) Vulnerability

    Thursday, September 25, 2014
    TLP: WHITECIS CYBER SECURITY ADVISORY    CIS ADVISORY NUMBER: 2014-080 DATE(S) ISSUED: 09/24/2014 SUBJECT: Critical Bourne Again SHell (BASH) Vulnerability Allows for Remote Code Execution   OVERVIEW:A recent vulnerability has been discovered affecting the Bourne Again SHell (BASH). BASH is the default command-line shell processor that is often run in a text window on Linux and UNIX systems. BASH allows users to type commands that cause actions. In addition, BASH has the ability to read commands from a scripted file. Based on the wide use of Linux and UNIX systems, it can be assumed that most...Read More

Pages