Skip to main content
Learn More
Shearman at dusk

Information Security

Information Security

National Cyber Security Awareness Month

Information Security Issues?

Call
337.475.5995

Submit a Helpdesk ticket
Contact InfoSec

The protection of information resources at McNeese State University is a high priority. The Information Security website is designed to educate the university community about technology policies and information security best practices, and equip students, faculty and staff with the tools needed to protect the information resources of the University, it's members and connected networks. McNeese State University is committed to implementing policies and encouraging best practices that do not impose on the University's established culture of openness, trust, and integrity.


Please read the Policies, Guidelines, and Laws Relating to Information Security.

Information

McNeese will NEVER ask for account information via email. Messages about quotas, upgrades or maintenance are likely Phishing attempts.


Multiple Vulnerabilities in Mozilla Products

CIS ADVISORY NUMBER: 2014-062

Executive Summary

07/23/2014
Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird which could allow for remote code execution. Mozilla Firefox is a web browser used to access the Internet and Mozilla Thunderbird is an email client. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

Threat Intelligence

There are currently no reports of these vulnerabilities being exploited in the wild.

System Affected

  • Mozilla Firefox versions prior to 31
  • Mozilla Firefox Extended Support Release (ESR) version prior to 24.7
  • Mozilla Thunderbird versions prior to 31

Risk

Multiple Vulnerabilities in Apple iOS

CIS ADVISORY NUMBER: 2014-057

Executive Summary

07/01/2014
Multiple vulnerabilities have been discovered in Apple's mobile operating system, iOS. These vulnerabilities can be exploited by an attacker having physical access to the device, or if the user visits a specially crafted webpage. Successful exploitation could result in an attacker executing arbitrary code, cause denial-of-service conditions, gain unauthorized access, acquire sensitive information, bypass security restrictions, and perform other unauthorized actions.

Threat Intelligence

Due to the trivial nature of these vulnerabilities, there is not any known proof-of-concept code available.

System Affected

  • Apple iOS Prior to 7.1.2

Risk

Government
  • Large and medium government entities: High
  • Small government entities: High
Businesses

    Updates for Multiple Vulnerabilities in Adobe Flash Player

    CIS ADVISORY NUMBER: 2014-050

    Executive Summary

    06/10/2014
    A security update has been released to address multiple vulnerabilities in Adobe Flash Player. Adobe Flash Player is a widely distributed multimedia and application player used to enhance the user experience when visiting web pages or reading email messages. Successful exploitation of this vulnerability could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Failed exploit attempts will likely cause denial-of-service conditions.

    Threat Intelligence

    There currently no reports of these vulnerabilities being exploited in the wild.

    Systems Affected

    • Adobe Flash Player 13.0.0.214 and earlier versions for Windows
    • Adobe Flash Player 13.0.0.214 and earlier versions for Macintosh
    • Adobe Flash

    Pages