Search Information Security site

 

Main menu

Past News Articles

May 26, 2021

Check your calendar to find out.

Image of a calendar page with the text, "Do you have a date with a hacker?"

Image of a calendar page with the text, "Do you have a date with a hacker?"

Hackers may have access to your online calendar. Learn how to avoid getting schedule-scammed. 

Read More...




May 12, 2021

Adobe vulnerabilties and Zero-Day flaw

Update ASAP to fix flaws in Adobe products

Update ASAP to fix flaws in Adobe products

Adobe announced 43 fixes for 12 of its products, including fixing a zero-day flaw. Update right away!

Read More...




May 06, 2021

Your first vacation in a while shouldn't start with a scam.

A picture of an airplane with the text, "It's probably been a while since you went on vacation, so here's a refresher on how to avoid travel booking scams."

A picture of an airplane with the text, "It's probably been a while since you went on vacation, so here's a refresher on how to avoid travel booking scams."

Learn how to recognize and avoid travel booking scams. 

Read More...




April 14, 2021

Another Chrome Zero-Day flaw CVE-2021-21206 & 21220

Update ASAP to fix two more zero-day flaws in the Chrome web browser

Update ASAP to fix two more zero-day flaws in the Chrome web browser

Two more zero-day vulnerabilities in the Chrome web browser require you to update right away.

Read More...




March 31, 2021

The next big scam is here.

Image of a pixelated glitch with the text, "What the heck is a deepfake?"

Image of a pixelated glitch with the text, "What the heck is a deepfake?"

Click below to learn more about deepfakes, their implications, and how to spot them. 

Read More...




March 16, 2021

Chrome Zero-Day flaw CVE-2021-21193

Update ASAP to fix zero-day flaw in the Chrome web browser

Update ASAP to fix zero-day flaw in the Chrome web browser

A zero-day vulnerability in the Chrome web browser must be updated.

Read More...




Pages

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security office will evaluate the report and provide a full investigation if appropriate.

Complete Report Form