NEWS
4/17/2018
6/28/2017
5/13/2017
1/13/2017
According to the United States Computer Emergency Readiness Team there have been a number of personal and professional routers that are being targeted for Mass Exploitation. The objective is a campaign for information gathering.
The alert identified multiple stages in the hacker campaign. They included:
reconnaissance, in which the hackers identify Internet-exposed network ports used for telnet, simple network management protocol, Cisco Smart Install, and similar services
weaponization and delivery of traffic to vulnerable devices that cause them to send configuration files that contain cryptographically hashed passwords and other sensitive data
exploitation, in which attackers use previously obtained credentials to access the devices
installation, using the Cisco Smart Install technology
command and control, where the attackers masquerade as legitimate users or establish a connection through a previously installed backdoor
Please ensure that your router is up to date and that all passwords have been changed from defaults.
For more information - https://www.us-cert.gov/ncas/alerts/TA18-106A
Just released is a new revision of the Wcry infection now named Petya. This system runs on the same exploit as the Wcry infection. Please be sure to follow the directions released by Microsoft to prevent infection.
Microsoft released MS17-010 to address this SMB vulnerability on March 14th. Seton IT recommends that everyone update their personal computers to the LATEST version. This will essentially patch the hole that this infection uses and prevent infection.
If you have any questions please feel free to email helpdesk@setoncatholic.org.
Earlier this week it was revealed that the United Kingdom’s National Health Service was targeted by ransomware known as “WannaCry.” or Wcry. This potentially file destroying infection takes advantage of SMB (File Sharing Protocol) vulnerabilities within Windows, using the ETERNALBLUE exploit which was publicly released in April. This SMB vulnerability is “wormable”, which means it will spread to each computer it comes into contact with. Microsoft released MS17-010 to address this SMB vulnerability on March 14th.
Seton IT recommends that everyone update their personal computers to the LATEST version. This will essentially patch the hole that this infection uses and prevent infection.
If you have any questions please feel free to email helpdesk@setoncatholic.org.
Hello All,
A recent notification went out about the risks of using AutoFill features in web browsers. The autofill systems in browsers like Google Chrome, Safari, and Opera, can be tricked into giving away your information on web pages. This can lead to potential security and privacy risks. It is the recommendation of Seton IT to disable this feature.
If you want to stay safe you can turn off autofill completely in your browser of choice:
In Chrome, click the three-dot “More” button in the top right > Settings > Show advanced settings > then uncheck “Enable Autofill to fill out web forms in a single click” under “Passwords and forms.”
In Safari, go to Preferences > AutoFill > deselect all types of information you want Safari to automatically fill in.
In Opera, click the Opera button, go to Settings > Privacy & security > scroll down to “Autofill” > uncheck “enable auto-filling of forms on webpages.”
Mozilla Firefox is currently immune to this phishing exploit because it doesn’t have a multi-box autofill system yet. If you need any help review our video Below
11/3/2016
Starting December 30th All Alumni, Retired Staff, Coaches and vendors utilizing Seton Email will be required to use two-step verification on accounts. READ MORE...
Seton Online Safety Vision
Seton's Information Security Vision:
Embed information security into the culture of Seton Catholic
Ensure alignment of Education and technology with safe online practices
Increase visibility into the School's security objectives
Our Mission!
Seton Catholic Preparatory's IT Department is committed to preserving the availability, confidentiality, and integrity of its information while continuing to provide high quality resources and a safe environment to nurture the learning of students through technology.