!

Alerts

Tableau Maintenance Scheduled for July 22

Friday, July 21, 2017 - 11:07

Computing Services and Systems Development will upgrade Tableau server to version 10.3 during the standard downtime period this weekend from 11:00 p.m. on Saturday, July 22, to 7:00 a.m. on Sunday, July 23. Tableau is data analytics software for exploring and visualizing data. 

Users will be unable to access dashboards and visualizations on the Tableau server (https://analytics.pitt.edu) for approximately two hours while maintenance is underway. Tableau Desktop users will also be unable to publish to the server during this two-hour window.

Please contact the Technology Help Desk at 412 624-HELP [4357] if you have any questions about this announcement.

Network Maintenance Scheduled for July 22 and July 29

Wednesday, July 19, 2017 - 16:18

Computing Services and Systems Development will upgrade network equipment at the University’s Network Operations Center during the standard downtime period on Saturday, July 22 and Saturday, July 29 beginning at 11:00 p.m.

The maintenance should not affect any University services. If an unanticipated service outage were to occur during the maintenance period, the following buildings would be affected:

July 22

  • Chevron Science Center
  • Eberly Hall

July 29

  • Amos Hall
  • Brackenridge Hall
  • Bruce Hall
  • David Lawrence Hall
  • Holland Hall (North & South)
  • Litchfield Tower A
  • Litchfield Towers B/C
  • McCormick Hall
  • William Pitt Union

This maintenance is necessary to ensure the continued reliability and stability of the University’s network. Please contact the Technology Help Desk at 412 624-HELP [4357] if you have any questions about this announcement.

Vendor Maintenance to Affect Electronic Lab Notebooks on July 23

Wednesday, July 19, 2017 - 14:27

LabArchives, the service provider for the Electronic Lab Notebook service, will perform maintenance on Sunday, July 23, during the University’s standard downtime period. The Electronic Lab Notebook service will be unavailable between 1 a.m. and 5 a.m. EST on Sunday while server maintenance is completed. A vendor announcement in LabArchives will provide users with advanced notice about the scheduled maintenance.

Please contact the Technology Help Desk at 412-624-HELP [4357] if you have questions regarding this announcement.

Reminder: Faculty Information System Update Scheduled for July 21 - 24

Wednesday, July 19, 2017 - 13:50

The Faculty Information System (Elements) will undergo a system upgrade during the weekend starting on
Friday, July 21, 2017, at 6 p.m. Work is expected to be completed by 8 a.m. on Monday, July 24. The system
will be unavailable while the upgrade is in progress.

Please contact the Technology Help Desk at 412 624-HELP [4357] if you have any questions about this announcement.

Phishing Alert: Office 365 Security Update Scam Mimics Microsoft Login Page

Wednesday, July 12, 2017 - 20:56

Computing Services and Systems Development (CSSD) is responding to a new email phishing scam that claims you have new Office 365 messages concerning your security update. The email contains a link to a harmful web page that mimics a Microsoft Office 365 login page and attempts to collect your username and password. The message appears to come from quarantine at messaging.microsoft.com.

The following is a sample of the recent fraudulent email. If you receive this message (or any message similar to it), please report it as a phishing scam by forwarding the email message as an attachment to phish@pitt.edu. Detailed instructions on reporting scams are available at http://technology.pitt.edu/phishingscams.

*************************************************************************************

Subject: Email address of recipient

 *************************************************************************************

The link in the phishing email directs readers to a malicious Web page (shown below) that mimics the Microsoft Office 365 login page.

CSSD strongly recommends that you do not reply to unsolicited emails or emails from unverifiable sources. Avoid clicking on links contained in such emails, as these may lead to sites that contain harmful software. If a link looks suspicious, you can hover over the link with your mouse to preview the URL without clicking on it.

In addition, CSSD recommends that all users install Symantec Endpoint Protection software and use the LiveUpdate feature to get the latest virus definitions. As a complement to Symantec Endpoint Protection, CSSD offers Malwarebytes Premium for individuals and departments at no cost. Students, faculty, and staff can download Malwarebytes and Symantec Endpoint Protection at no cost through the Software Download Service at My Pitt. Departments can submit a help requestto obtain Malwarebytes for multiple machines.

Please contact the Technology Help Desk at 412-624-HELP [4357] if you have any questions regarding this announcement.

July Microsoft Security Update

Tuesday, July 11, 2017 - 16:55

Microsoft Corporation has announced security updates for July that affect the following software:

  • Internet Explorer
  • Microsoft Edge
  • Microsoft Windows
  • Microsoft Office and Microsoft Office Services and Web Apps
  • .NET Framework
  • Adobe Flash Player
  • Microsoft Exchange Server

CSSD recommends that users immediately identify and install the security updates necessary to repair these vulnerabilities by using Microsoft's Windows Update feature on their computers as soon as possible. Additional information about the updates is available on Microsoft’s Security TechCenter.

In addition to installing the Microsoft patches, CSSD also recommends that all users install Symantec Endpoint Protection software and use the LiveUpdate feature to get the latest virus definitions. As a complement to Symantec Endpoint Protection, CSSD offers Malwarebytes Premium for individuals and departments at no cost. Students, faculty, and staff can download Malwarebytes and Symantec Endpoint Protection at no cost through the Software Download Service at My Pitt. Departments can submit a help request to obtain Malwarebytes for multiple machines.

Please contact the Technology Help Desk at 412 624-HELP [4357] if you have any questions regarding this announcement.

Phishing Alert: Student Health Services Scam Mimics a Microsoft Office 365 Login Page

Tuesday, July 11, 2017 - 16:44

Computing Services and Systems Development (CSSD) is responding to a new email phishing scam that claims you have an unread message from Student Health Services. The email contains a link to review the message. The link actually takes visitors to a harmful web page that mimics a Microsoft Office 365 login page and attempts to collect their username and password.

The following is a sample of the recent fraudulent email. If you receive this message (or any message similar to it), please report it as a phishing scam by forwarding the email message as an attachment to phish@pitt.edu. Detailed instructions on reporting scams are available at http://technology.pitt.edu/phishingscams.

*************************************************************************************

Subject: Student Health Services

Hello Student, 

You have (1) Unread Messages from the Student Health
Center. Please click on the review now <<LINK REMOVED>> to read it.

 

Thank you.

 *************************************************************************************

The link in the phishing email directs readers to a malicious Web page (shown below) that mimics the Microsoft Office 365 login page.

Microsoft Office 365 phishing login

CSSD strongly recommends that you do not reply to unsolicited emails or emails from unverifiable sources. Avoid clicking on links contained in such emails, as these may lead to sites that contain harmful software. If a link looks suspicious, you can hover over the link with your mouse to preview the URL without clicking on it.

In addition, CSSD recommends that all users install Symantec Endpoint Protection software and use the LiveUpdate feature to get the latest virus definitions. As a complement to Symantec Endpoint Protection, CSSD offers Malwarebytes Premium for individuals and departments at no cost. Students, faculty, and staff can download Malwarebytes and Symantec Endpoint Protection at no cost through the Software Download Service at My Pitt. Departments can submit a help request to obtain Malwarebytes for multiple machines.

Please contact the Technology Help Desk at 412-624-HELP [4357] if you have any questions regarding this announcement.

Phishing Alert: Library Account Expiration Scam Mimics Pitt Passport Login Page

Friday, July 7, 2017 - 09:37

Computing Services and Systems Development (CSSD) is responding to a new email phishing scam that claims your library account has expired and must be reactivated immediately or it will be closed. The email contains a link to reactivate your account. The link actually takes visitors to a harmful web page that mimics the Pitt Passport login page and attempts to collect their username and password. The email scam appears to originate from a Gmail email address that begins with pitlibrary1.

The following is a sample of the recent fraudulent email. If you receive this message (or any message similar to it), please report it as a phishing scam by forwarding the email message as an attachment to phish@pitt.edu. Detailed instructions on reporting scams are available at http://technology.pitt.edu/phishingscams.

*************************************************************************************

Subject: Library Account

Dear User, 

Your library account has expired, therefore you must reactivate it immediately or it will be closed automatically. If you intend to use this service in the future, you must take action at once!
To reactivate your account, simply visit the following page and login with your library account.

Login Page:
<LINK REMOVED>

Sincerely, 

University of Pittsburgh
4200 Fifth Avenue
Pittsburgh, PA 15260
412-624-4141

 *************************************************************************************

The link in the phishing email directs readers to a malicious Web page (shown below) that mimics the Pitt Passport login page. Remember that the real Pitt Passport login page always begins with https://passport.pitt.edu in the address bar.

CSSD strongly recommends that you do not reply to unsolicited emails or emails from unverifiable sources. Avoid clicking on links contained in such emails, as these may lead to sites that contain harmful software. If a link looks suspicious, you can hover over the link with your mouse to preview the URL without clicking on it.

In addition, CSSD recommends that all users install Symantec Endpoint Protection software and use the LiveUpdate feature to get the latest virus definitions. As a complement to Symantec Endpoint Protection, CSSD offers Malwarebytes Premium for individuals and departments at no cost. Students, faculty, and staff can download Malwarebytes and Symantec Endpoint Protection at no cost through the Software Download Service at My Pitt. Departments can submit a help request to obtain Malwarebytes for multiple machines.

Please contact the Technology Help Desk at 412-624-HELP [4357] if you have any questions regarding this announcemen

New Vulnerability Affects WordPress Plugin WP Statistics

Monday, July 3, 2017 - 15:45

A newly discovered vulnerability in a popular WordPress plugin could allow an attacker to take control of an affected website. WordPress is open-source content management software that is used to manage and publish websites. A SQL Injection vulnerability exists in the WP Statistics plugin, which WordPress site administrators can use to view information about the number of visitors to their website and other web page statistics. 

This vulnerability is patched in WP Statistics 12.0.8, the latest version of the WP Statistics plugin. If you administer a WordPress site and use an older version of the WP Statistics plugin, Computing Services and Systems Development recommends that you upgrade to the latest version of WP Statistics as soon as possible.

Please contact the Technology Help Desk at 412 624-HELP [4357] if you have any questions regarding this announcement.

What You Need to Know About the Petya Ransomware Attack

Tuesday, June 27, 2017 - 20:02

 

Computing Services and Systems Development (CSSD) is aware of a new malicious software program named "Petya" that made news yesterday for infecting corporate systems in the U.S. and Europe. "Petya" is a type of ransomware that relies on unsuspecting users to click links or open an infected email attachment to download it. Once it has been opened, it encrypts files on the affected computer and network share drives, and the user is then required to pay a ransom to recover their files. One reason this malicious software has spread so aggressively is that it then attempts to infect other computers on the network that do not have the latest security updates and are not protected against "Petya".

CSSD strongly recommends that you do not reply to unsolicited emails or emails from unverifiable sources. Avoid clicking on or downloading unknown email attachments, as these may lead to sites that contain harmful software. If a link looks suspicious, you can hover over the link with your mouse to preview the URL without clicking on it.

In addition, CSSD urges you to take these steps immediately to protect yourself:

  1. Install the latest Windows patches--especially the MS17-010 critical Windows patch available at https://technet.microsoft.com/en-us/library/security/ms17-010.aspx  and the application patches documented at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199.
  2. Be sure your system is running a recent version of Symantec Endpoint Protection with LiveUpdate enabled.
  3. Be sure your system is running a recent version of Malwarebytes Premium with up-to-date definitions.

With Petya, Symantec Endpoint Protection and Malwarebytes Premium are critical as an infected system will keep attempting to infect machines on the local network even if the Windows vulnerability is patched. Students, faculty, and staff can download Malwarebytes and Symantec Endpoint Protection at no cost through the Software Download Service at My Pitt. Departments can submit a help request to obtain Malwarebytes for multiple machines.

Petya is ransomware that relies on the same Windows vulnerability that was central to the last month’s “WannaCry” attacks. It will encrypt the Master File Table for NTFS partitions and overwrite the Master Boot Record with a custom bootloader. The software will then demand a ransom payment. According to reporting by security researchers, Petya leverages the EternalBlue exploit that was made public in April and used by WannaCry to spread between systems on a network. EternalBlue utilizes a known Server Message Block (SMB) 1.0 vulnerability affecting most versions of Windows.

More information on this exploit it is available at:

https://www.symantec.com/connect/blogs/petya-ransomware-outbreak-here-s-what-you-need-know

and

https://blog.malwarebytes.com/cybercrime/2017/06/petya-esque-ransomware-is-spreading-across-the-world/

 

Please contact the Technology Help Desk at 412 624-HELP [4357] if you have any questions about this announcement.