Skip to main content
Learn More
Shearman at dusk

Information Security Blog

Information Security Blog

Toner Phoner Scams

Telephone Scam About Printer Cartridges

phone scamsPlease be advised that a telephone scam is making its way around the campus offices. The caller identifies themselves as calling from purchasing and asks what type of printer and/or fax machine the office is using. Toner cartridges and an invoice are then sent to the McNeese Post Office. Departments are then responsible for returning the cartridges and receive notifications about unpaid invoices.
Please notify all staff and student workers that answer telephones about this scam. The McNeese Purchasing Department is not taking an inventory of printer/fax machine ink cartridges. Do not provide information and ask for a name and call back phone number.

Update: POODLE Vulnerability in SSLv3

CIS ADVISORY NUMBER: 2014-089 - Update

Subject

Vulnerability in SSLv3 Could Allow Information Disclosure

Executive Summary

10/15/2014

A vulnerability exists within the SSL version 3.0 protocol allowing an attacker to hijack and decrypt session cookies that are utilized between a user's web browser and the web site. Secure Sockets Layer (SSL) is a cryptographic protocol that is designed to provide secure network communication using X.509 certificates. This could lead to attackers temporarily impersonating web site visitor account logins and/or online payment systems.

Threat Intelligence

There are currently no reports of these vulnerabilities being exploited in the wild.

System Affected

  • Any client or Web Server supporting SSLv3 protocol

Risk

Government
  • Large and medium government

ALERT: Microsoft Security Bulletins - October 2014

Microsoft Security Bulletin Summary for October 2014

Microsoft has released updates to address vulnerabilities in Windows, Office, Office Services and Web Apps, Developer Tools, .NET Framework, and Internet Explorer as part of the Microsoft Security Bulletin Summary for October 2014. These vulnerabilities could allow remote code execution, elevation of privilege, or security feature bypass.

US-CERT encourages users and administrators to review the bulletins and apply the necessary updates.

Critical Bulletins:

(MS14-056) - Cumulative Security Update for Internet Explorer (2987107)
Severity: Critical
Primary Attack Vector: Specially crafted webpage
Publicly Disclosed: No
Assumptions: Some of these vulnerabilities would have to be used in conjunction with another vulnerability that allow remote code execution
Recommendations: Patch immediately after appropriate testing
Advisory Candidate: Yes

Pages