News

All News

October 24, 2016

A local privilege escalation vulnerability has been found in the Linux kernel. Nearly all versions of Linux are affected, and when exploited, attackers can escalate local privileges to root. Linux users are advised to patch or implement temporary mitigation immediately.

October 20, 2016

We have detected irregular activity on your account on the date 10/20/2016. For your protection, we have temporary limited your account. In order to regain full access to your account, you must verify this activity before you can continue using your account. We have sent you an attachment , open it and follow the steps to verify your account. Once completed, please allow up to 48h to update. Copyright © 2016 BankOfAmerica, All rights reserve IrregularActivityFile.html

August 24, 2016

Hello, Please sign the attached contract with our technical service company for 2016 � 2017. We would appreciate your quick response. King regards, Cynthia Curtis (Digital-Signature: f0a0e01386d19b03736165288026cc97e325560c78700e95)

July 13, 2016

Highly critical remote code execution vulnerabilities have been announced by the Drupal security team for the third-party modules RESTWS, Coder, and Webform Multiple File Upload. Open Berkeley Drupal sites are NOT affected.

June 29, 2016

Multiple, critical vulnerabilities have been discovered in Symantec products including Symantec Endpoint Protection (SEP), an anti-virus product previously licensed and distributed on campus. Users are advised to remove or upgrade affected Symantec products.

June 13, 2016

Apple has announced that it will no longer support Quicktime on Windows. All users are advised to remove Quicktime on Windows machines as there are multiple zero-day, remote code execution vulnerabilities that Apple has announced they will not be patching.

May 24, 2016

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe is aware of a report that an exploit for CVE-2016-4117 exists in the wild. Please refer to APSA16-02 for additional details.

May 23, 2016

Hello, Please refer to the vital info I've shared with you using Google Drive. Click https://www.google.com/drive/docs/file0116 and sign in to view details.. Regard --

May 20, 2016

Dear User, This message is to inform you that your access to bCourses will soon expire. You will have to log in to your account to continue to have access to this service. You need to reactivate it just by logging in through the following URL. A a successful login will activate your account, and you will be redirected to your bCourses page. http://bcourses.berkeley.cnea.gq/login_0DZbL4B22o0ki22F0IZotK2LqgZijDXvf... If you are not able to login, please contact Mary Patel at mpatel@berkeley.edu for immediate assistance. Sincerely, Mary Patel Berkeley Security University of California, Berkeley 510-643-6927 mpatel@berkeley.edu

May 17, 2016

The US-CERT (US Computer Emergency Readiness Team) has issued a recent alert concerning ransomware.  Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it.  The alert warns that in early 2016, destructive ransomware variants such as Locky and

May 10, 2016

ISP has enabled Google Analytics so that we can better learn how people use our website. As a result, our privacy policy has been updated.

May 5, 2016

Multiple Vulnerabilities have been discovered in ImageMagick, an open-source software library for displaying, converting, and editing a wide range of image types. Attackers may be able to execute arbitrary code remotely by exploiting this vulnerability.

April 28, 2016

Information Security and Policy has received confirmed reports of recent attempts to deliver the "Locky" family of Ransomware via malicious email attachments. Campus users are advised to be vigilant as Ransomware like Locky can be extremely destructive. Please review the full security alert for guidance.

March 22, 2016

We need your help. You account has been suspended, as an error as detected in your informations. The reason for the error is not certain, but for security reasons, we have suspended your account temporarily.

March 14, 2016

A phishing message purporting to be from the International Rescue Committee regarding IT maintenance has been circulating on campus. The message requests that the recipient upgrade their mailbox size by selecting a link that redirects to a malicious website.

March 13, 2016

Hello, We've noticed that some of your account information appears to be missing or incorrect, we need to verify your account information in order to continue using your Apple ID. Please Verify your account information by clicking on the link below. Sign in using your Apple ID to start the process, Verify Now >. Wondering why you got this email? When you don't regularly update your Apple ID information, Apple will require you to sign in by following the link in a verification email and update your information. This is to help protect your identity and keep your account secure. Apple Support

March 10, 2016

Adobe has released security updates for Adobe Flash Player that addresses multiple, critical vulnerabilities that could allow an attacker to take control of an affected system. Microsoft has released an out-of-band patch for Adobe Flash Player when on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.

March 4, 2016

We detected unknown IP access on our date base computer system our security requires you to verify your account for secure security kindly Click Here and verify your account. ​ Help Desk​

March 2, 2016

The OpenSSL development team published a security advisory regarding high-impact TLS/SSL vulnerabilities, which could allow an attacker to decrypt TLS sessions by using a server supporting legacy ciphers (CVE-2016-0800).

February 22, 2016

You have a pending incoming download docs shared with you via Google docs