Another Android Vulnerability:Evil app can replace good app

The last few versions of Android are vulnerable to having a good app replaced by a malicious one.


Benchmarks:Windows 10 vs 8.1 vs 7

TechSpot runs benchmarks on the last few Windows operating systems.


Get Your Devices Ready for Fall 2015

To better accommodate the high demand of IT services in the first two weeks of the Fall 2015 semester, the IT Solutions Center is temporarily opening a secondary location on weekdays between August 13th and August 23rd.

Between 11am and 5pm, students may visit the Game Room in the University Center for help with services such as:

  • Connecting your device to the internet (laptop, mobile, handheld game console)
  • Syncing your email to your device
  • Resetting your UTC password
  • Signing up for UTC Alerts

Between 7:30am and 9pm(5pm on Fridays), students may visit the first floor of Pfeiffer Hall for help with the above services as well as:

  • Removing malware/viruses
  • Installing software
  • Connecting non-handheld game consoles to the internet

For weekend support, visit Room 105 in Pfeiffer Hall between 1pm and 9pm.

For self-help documentation on the above services, use the following links:


Android doesn’t protect your fingerprints.

Unlike the iDevices, most Android devices with fingerprint readers don’t encrypt the scanned print making them easy to steal.


Pwnie winners at BlackHat 2015

OPM of the Fed Govt won the big  award.


Firefox 0day in the Wild

Make sure your Firefox is the latest version as a new vulnerability has been found in the wild.


Windows 10:Protect your Privacy

If you’re worried about Microsoft watching you (If you use Siri or Chrome, someone is already watching you) here is a your guide to prevent it.


Major Android Vulnerability “StageFright” to be patched

Google and other vendors will be releasing security patches for StageFright.


Google may leave France.

A new French law may force Google to reveal its “magic” search algorithm.


New OS X vulnerability being exploited in the wild.

The latest vulnerability is being used to “infect” Macs.  Avoid installing software you don’t need.  Only install from the Mac Store or from big name sources.


Categories