CIS ADVISORY NUMBER: 2014-057
Multiple vulnerabilities have been discovered in Apple's mobile operating system, iOS. These vulnerabilities can be exploited by an attacker having physical access to the device, or if the user visits a specially crafted webpage. Successful exploitation could result in an attacker executing arbitrary code, cause denial-of-service conditions, gain unauthorized access, acquire sensitive information, bypass security restrictions, and perform other unauthorized actions.
- Apple iOS Prior to 7.1.2
- Large and medium government entities: High
- Small government entities: High
Updates for Multiple Vulnerabilities in Adobe Flash Player
CIS ADVISORY NUMBER: 2014-050
A security update has been released to address multiple vulnerabilities in Adobe Flash Player. Adobe Flash Player is a widely distributed multimedia and application player used to enhance the user experience when visiting web pages or reading email messages. Successful exploitation of this vulnerability could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Failed exploit attempts will likely cause denial-of-service conditions.
- Adobe Flash Player 184.108.40.206 and earlier versions for Windows
- Adobe Flash Player 220.127.116.11 and earlier versions for Macintosh
- Adobe Flash
Phishing Attempts Continue To Plague Universities
Ignore and Delete Suspicious Email
McNeese State University is often the subject of phishing attempts in which an email claims to be from a group or person at MSU or claims to be specifically related to University business. Some of the recent attempts claim that your email has exceeded its quota or that you need to verify your account due to a service upgrade. Various other models are seen from time to time, as well. These are fraudulent and should be deleted.
If you received the below email or similar, please ignore and delete it. This is a phishing attempt.
From: "Technical Support"
Reply To: email@example.com
You are required to click on the link to verify your email account because we are upgrading our webmail.
Webmail Technical Support Copyright 2012. All Rights Reserved