Wendy’s Releases Details About Security Breach

In Feb the chain experienced a loss of customer data.   The release details what stores were affected and protections offered.  Six locations in Chattanooga were affected.

Acceptable Use of UT Chattanooga Devices

As you have probably all noticed that over the past several months we have seen an increase in the amount of SPAM in our inboxes. Some of this increase can be attributed to links that people at UTC have clicked on in SPAM emails. It is important for everyone to remember that everyone plays a big role in helping to keep our network safe.
It is also important to remember that your computing devices are state owned property. When using UT owned devices or resources all employees are required to follow UT System Acceptable Use Policies.



For example, you should not use your UT provided device to:
· Download pirated software or other copyrighted content.
· Disrupt services or systems connected to the Internet.
· Run a personal business related operations.
· View pornographic or illegal sites (such as gambling, etc).
· Play video games.
Automated network security devices log such activities and notify the IT security team. Repeat offenders and their supervisors will be notified of any identified unauthorized activity that increases the risk of a security incident involving UTC resources.
In short, use university-provided resources to perform university work. If it doesn’t relate to your job, don’t use UTC-provided resources to do it. We all play a role in securing and keeping our network safe.
Thomas Hoover
Associate Vice Chancellor and Chief Information Officer

You Might Want To Replace Your TP-Link Router

They failed to renew the domain (dns) that is used to update the routers.  Bad guy asking $2m.

Google’s July Android Patch Fixes 108 Bugs

Google has released its batch of patches for Android.  Trickledown to carriers will follow.

Fed Judges Says Sharing Passwords is Hacking

May cause problems for families sharing stuff like Netflix.

HummingBad Malware Infects 10m Android Devices

Mostly Chinese devices.  It displays ads.  To be safe you should only install major software from the Play store and have a decent AV installed.

The Dangers of Wget

Wget can be fooled into overwriting files which could lead to unintentional code execution via .bashrc and others.

Avast To Buy AVG

Forming one giant AV company.

Eleanor, The New Tor-Enabled Mac Malware

Claims to be a document converter but installs a PHP webshell and Tor to provide “hidden” access to the infected Mac.

Samsung Releases July Android Update for Devices

If you own a Samsung, make sure to update your device.