"Hey, are you available?"
July 17, 2019
July 9, 2019
July 8, 2019
June 18, 2019
June 3, 2019
Karl Grose, one of the founding fathers of CalNet, is retiring.
May 22, 2019
You may have noticed some changes here at security.berkeley.edu. The Information Security and Policy office has taken a new name and undergone a website redesign. We are now The Information Security Office or ISO. Don't worry, all of our great content is still here. The new layout may take some getting used to, but our search function is better than ever and can help you find what you are looking for.
May 21, 2019
May 14, 2019
A zero-day elevation of privilege vulnerability exists in the way Microsoft Windows Error Reporting (WER) handles files. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
While details about the use of the exploit are not available, it has reportedly been used in limited attacks against specific targets. Successful exploitation has been observed in the wild. 
*** Vulnerable RDP servers should be patched IMMEDIATELY even where there is a potential business impact (unscheduled maintenance). Notify firstname.lastname@example.org if you anticipate any delays in patching. ***
April 10, 2019
Every Windows product has a lifecycle and that lifecycle ends when it no longer receives security updates or fixes, software updates, and/or technical support. On Jan. 14, 2020 Microsoft will discontinue support for the Windows 7 Operating System. Without security, patches these systems will be easy targets for hackers, malware, and viruses.
March 14, 2019
A couple of recent phishing scams, referred to as a “Business Email Compromise (BEC),” have been targeting universities to steal funds through the purchasing process.
The first phishing scam targets suppliers that do business with campus by using Berkeley emails as the hook. These attacks involve purchase orders and requests for quotes that appear to come from the University, but are in fact fraudulent.
March 8, 2019
Starting March 11th services that use Active Directory Federation Services (ADFS) will require CalNet 2-Step Authentication.
Examples of software include CalShare and Microsoft 365.
February 21, 2019
A highly critical bug has been discovered in Drupal that can be used for remote code execution . Drupal is a Content Management System (CMS) commonly used to host websites. In the past this sort of exploit has been used to deliver remote access tools, ransomware, and cryptominers to web servers . Based on similar exploits against various CMS software in the past, we can expect that attackers will begin exploiting this software quickly.
February 20, 2019
Reserve your seat at DataEDGE 2019, the UC Berkeley School of Information's annual data science conference scheduled for April 23, 2019.
We are excited to announce that the Information Security and Policy Office is launching a Security Internship Program for staff. This is a unique opportunity for employees to work alongside the Security Operations and Assessments & Compliance teams. The internship is a chance for current Berkeley employees to develop a professional skill set in the information security domain and achieve breadth and depth of knowledge in the field. Interns will strengthen their career path potential, network with new colleagues, and contribute to the campus mission.
February 12, 2019
Open Containers runc is prone to a local command-execution vulnerability. Runc is a command line utility designed to spawn container systems. It is the container runtime that underpins many open source container management systems including Docker, Kubernetes, containerd, Podman, and CRI-O.  
January 28, 2019
We all exist in digital form on the Internet. While online you leave a trail of your digital self in the form of cookies, GPS data, social media posts, browser searches, email exchanges... the list goes on. Your footprint is vast and once something is online, it can be there forever.
That’s what Data Privacy Day is all about. Recognizing that owning your online presence will help to protect your identity, finances, and reputation – both now and in the future.
January 24, 2019
W-2 wage statements became available online this week and every year several convincing phishing messages are crafted by tax scammers and sent to Campus to trick victims into giving out personal information. Taxpayers should continue to watch out for fake emails and/or websites looking to steal personal information during the 2019 filing season.
January 11, 2019
A widely reported spear phishing scam, termed “Business Email Compromise (BEC),” has been targeting universities and other academic institutions. These attacks are spear phishing scams designed to impersonate someone you know in an attempt to gain access to sensitive information or to encourage you to transfer funds or provide gift cards. There has been an increase of these assaults across the University this new year.