Alerts & Notifications
As a result network maintenance, you may be asked to accept a one-time certificate the next time you connect to Wireless PittNet or a public port.
Phishing scam asks you to click on harmful link to revalidate your mailbox.
December Microsoft Security Bulletins Include Vulnerabilities Affecting Microsoft Windows, Office, and Internet Explorer.Wednesday, December 10, 2014 - 9:10am
Three critical vulnerabilities affect Windows, Office, and Internet Explorer.
Scam asks you to log in to confirm your school profile
Build a list of content that matters to you most with the new “Favorites” feature.
Email scam asks you to click harmful link to print shipping label.
A new way to schedule your web site scans.
Message asks you to respond to learn how to receive a large sum of money
Email scam asks you to click harmful link to avoid the loss of your mailbox.
Vendor maintenance will interrupt viewing sessions and processing new sessions.
Email scam asks you to click harmful link to update your iTunes billing information.
Security Vulnerability Could Allow Hackers to Trick Users into Downloading Fake Apps
November Microsoft Security Bulletin Include Vulnerabilities Affecting Microsoft Windows and Microsoft Internet Explorer.Tuesday, November 11, 2014 - 3:52pm
Four critical vulnerabilities affect Windows and Microsoft Internet Explorer.
Vulnerability could allow potential compromise of Drupal Web sites.
Be on the lookout for email phishing scams using Ebola as a theme.
Read up on the latest technology trends and CSSD services.
A new vulnerability affects the SSL protocol used for web browsing.
October Microsoft Security Bulletin Includes Vulnerabilities Affecting Microsoft Windows, Microsoft Internet Explorer, and Microsoft .NET FrameworkTuesday, October 14, 2014 - 2:28pm
Three critical vulnerabilities affect Windows, Internet Explorer, and .NET Framework.
The Bash vulnerability affects several operating systems.
A grant from the NSF's CC*IIE program will bring new capacity and capabilities to Pitt research computing.