Microsoft has recently provided a partial patch for the critical PrintNightmare Zero-Day exploit for Windows 7 through 10. All Windows users utilizing a machines that…
As the book closes on the Class of 2021, we would like to update the community on 2 recent developments: 1) Billions of email addresses…
We have received word that Google just just patched a major zero day exploit for the Google Chrome browser and there are bad actors currently…
Happy New Year! Here’s hoping for a better, safer, and healthier 2021. Sadly, bad actors and grifters continue to flood our email inboxes and phones…
Users still running Mohave (Mac OS 10.14) or newer should NOT upgrade to Catalina (Mac OS 10.15) or Big Sur (Mac OS 11). They are…
Due to extraordinary real world circumstances our Covid-19 IT support model is now live. https://wikis-mit-edu.ezproxy.canberra.edu.au/confluence/display/shassit/SHASS+Covid-19+IT+Support+Model
In light of increasing reports from local schools and colleges of outside bad actors crashing Zoom classes and sharing inappropriate materials in an attempt to…
We have recently seen a increased uptick in phishing attacks targeting the MIT SHASS Community. These attacks include but are not limited to bad actors…
Just in case anyone needed any more reasons to stop using public USB charging stations. https://www.kcci.com/article/rossen-reports-hackers-taking-advantage-of-public-phone-chargers/30672956
As many of you may have seen this past MLK weekend, SHASS was subject to a large scale phishing attack with bad actors pretending to…