- Targeted Destructive Malware
- Regin Malware
- Microsoft Windows Kerberos KDC Remote Privilege Escalation Vulnerability
- Microsoft Windows OLE Automation Array Remote Code Execution Vulnerability
- Don't use unauthorized software
- If you print it, go get it right away!
- Don't click on links in pop-ups or banner advertisements
- Don't give away your data when you give away your handheld device
Information Security Blog
#ChatDPD Week 3 RecapRecap of the DPD week 3 Twitter Chat on privacy on the go (practicing better privacy practices with mobile devices). Find on our blog.
#ChatDPD Week 2 RecapRecap of the DPD week 2 Twitter Chat on how good privacy protection is good for business. Find on our blog.
#ChatDPD Week 1 RecapRecap of the first week's DPD Twitter Chat on protecting your health information. Find on our blog.
Data Privacy Day (and Month) 2015!Wentworth is once again championing Data Privacy Day. Find out more about this on our blog.
Securing Your New DevicesSome useful security tips you should follow for those new devices you may have been gifted or purchased over the holidays. Find these tips on our blog.
Protect Yourself from Scams This Holiday SeasonTips on how to protect yourself from cyber criminals this holiday season. Find the tips on our blog.
NCSAM Week 4 RecapWeek four theme was “Cybersecurity for Small and Medium-Sized Business and Entrepreneurs.” Find a few good links on our blog.
Week 3 Recap – The Internet of ThingsWeek 3 Twitter chat was on the widely-used term and concept of the “Internet of Things.” Find out more on our blog.
#ClickSmart Twitter ChatAs part of National Cyber Security Awareness Month, there are Twitter chats taking place throughout the month of October on various topics. The topic of yesterday’s chat, was on the#ClickSmart awareness effort spearheaded by Intel. Read more on our blog.
What you need to know about BadUSB.Recently, there’s been some news coverage regarding a vulnerability found on USB devices. The vulnerability involves the small computer chip on USB devices that allows the attached device, usually a computer, to detect the type of USB device that was attached and then connect it for use. Read more on our blog.
Secure Development of IT ProductsIt is week two of National Cyber Security Awareness Month (NCSAM). This week’s topic is “Secure Development of IT Products.” Read more on our blog.
11th Annual National Cyber Security Awareness MonthCelebrated every October, National Cyber Security Awareness Month was created as a collaborative effort between government and industry to ensure everyone has the resources needed to stay safer and more secure online. As an official Champion, Wentworth Institute of Technology recognizes its commitment to cybersecurity and online safety. Read more on our blog.
Bash Vulnerability (aka “Shellshock”)Shellshock is the name given to a collection of vulnerabilities present in a widely distributed component of Unix-based operating systems, called Bash. Read more about this vulnerability on our blog.
October is National Cyber Security Awareness MonthThis year marks the 11th anniversary of National Cyber Security Awareness Month (NCSAM). NCSAM is observed throughout the month of October to increase the awareness of cyber security threats and techniques to safeguard against them. As a NCSAM Champion, Wentworth has some things planned for increasing cyber security awareness. Read more on our blog.
Fall Projects - 2014
The Information Security Office (ISO) will be working with others within Technology Services and across Wentworth to continue our efforts to improve the information security posture. Find out what we have planned. Read more on our blog.
Summer Projects - 2014Along with the rest of Technology Services, the Information Security Office (ISO) has been busy working on projects to improve the overall information security posture at Wentworth. As we start the new academic year, we want to share some of what we have been working on. Read more on our blog.
Cool Security Find of the SummerOver the last few months, a frequently referenced site caught the attention of many security professionals as it provides an interesting visualization of the cyber attacks that traverse the globe every second of every day. Read more on our blog.
New Phishing StatisticsNew studies have found that 1/3 of all phishing attempts last year went after bank accounts or other financial information directly. Read more on our blog.
The Evolution of Anti-Virus SoftwareLearn how breach detection systems are the future of current anti-virus protection. Read more on our blog.
Summer Security TipsKeep these tips in mind this summer to protect yourself and your information. Read more on our blog.
Facebook's Dino Security StepsFind out what changes Facebook have made to protect user privacy. Read more on our blog.
The Heartbleed BugGet more information on the recently discovered Heartbleed bug and what you need to do. Read more on our blog.
Wireless Network Security ImprovementsLearn about changes to the wireless networks that will help secure the campus. Read more on our blog.
Tax Season ScamsProtect yourself and your tax return from phishing. Read more on our blog.
Phishing in FocusTake a closer look at how phishing scams are becoming smarter. Read more on our blog.
Data Privacy Month Wrap-upMiss anything during Data Privacy Month? Catch up with our blog.
Staying Safe on Social NetworksDid you know that up to 11% of Facebook accounts are fake? Read more on our blog.
Protect Yourself Against PhishingPrevent your data from getting stolen by learning more about phishing. Read more at our blog.
Dangers of Using Public Wi-FiStay safe while you're browsing on the go. Read more on our blog.
Understanding the Importance of Identity TheftKeeping your data secure and private can save you money and hassle. Read more on our blog.
January 28th is Data Privacy Day!Today is dedicated to a topic that has been on the news and a lot of our minds for the past year, data privacy. Read more on our blog.
Phishing Used to Compromise AccountsRecently, researchers at Trustwave found a botnet controller that contained roughly 2 million credentials (passwords). Read more on our blog.
A Computer Security Tips for Preventing Malware InfectionsA few tips to prevent malware infections from compromised websites or that are intended to exploit browser plug-ins. Read more on our blog.
Password Best PracticesLearn about how to create strong passwords and how to manage them. Read more on our blog.
Data Privacy and Security for Institutional DataSome tips for practicing good data stewardship of institutional data. Read more on our blog.
Social Networking Security TipsSocial networking sites have changed the way we communicate and keep track of one-another. Read this blog for security tips for social networking sites. Read more on our blog.
Anatomy of a Spear Phishing Email
This post covers a real spear phishing attack against WIT members. Read more on our blog.