OIT’s latest Security Report is now available.

OIT Security Report Cover

Our first edition of the newly revised OIT Security Report is now available to the SMU community. We have revamped the layout and content to allow us to go more in-depth on specific issues and provide more detailed metrics in an easy to read format. We hope you enjoy it.To access the report, click the link below.

View Report

Authenticating to Box@SMU is required before viewing or downloading the report. This report is confidential and not intended for distribution outside the University.

Security Holes in iOS 9 Patched with Update

iOS HomescreenApple just released the iOS 9.3.3 update, the final version for iOS 9 before the new iOS 10 this fall. For this reason, Apple allowed for extra testing time taking over two months with five separate betas to ensure the OS is as secure and stable as possible. With this update, Apple patches security holes in iOS 9‘s Calendar, CoreGraphics, FaceTime, and Safari apps. Each of these fixes addresses the ability for hackers to run unauthorized code or expose private information. Continue reading Security Holes in iOS 9 Patched with Update

Web links rewritten by new anti-spam feature

AnitPhish (Anti-Phishing Campaign)On Tuesday, July 2, SMU implemented a new feature as part of our anti-spam defense to rewrites web links considered questionable, included in inbound emails. The purpose of the rewrite is to prevent phishing and malware scams by forwarding certain web requests to a proxy service for analysis. While some benign links might be overwritten, the service protects against “zero-hour” exploits where the threat could be unknown. If a link is still considered suspect at the time it is clicked, the you will receive a prompt to either decline or proceed to the website in question.

The URL rewrite policy was recently adjusted on Thursday, July 7, and our team will continue to monitor the service to ensure that the policy is neither too lenient, nor too aggressive when rewriting the web links. Please contact the IT Help Desk at help@smu.edu if you have any questions regarding this change.

End of support for QuickTime for Windows

QuickTime for WindowsRecently it was announced that Apple will no longer offer patches and will end support for QuickTime for Windows, their multimedia software package for the Microsoft OS. This move came about shortly after several vulnerabilities were detected in the software. For over five years, Windows has supported popular media formats, such as H.264 and AAC, that were enabled by the installation of Quicktime. Also, all Windows web browsers support online video without the need for plug-ins like QuickTime. Due to these new vulnerabilities, the lack of need for QuickTime for video, and the fact that Apple will not patch the software, OIT is moving to disable QuickTime for Windows on all SMU managed Windows computers starting on June 14th.

For those using video software that requires QuickTime being installed on Windows to enable video codecs, most notably Apple ProRes, this move might affect your workflow. Adobe has been working to remove the dependency on QuickTime for the past couple of years, and their software will now run without the need for QuickTime for Windows. The Abobe Creative Cloud Team had been working to support the missing codecs and only last month was able to announce the support for the native reading of ProRes. The fixes will soon be included in updates to the relevant Creative Cloud software. More information will be on the Creative Cloud blog as it becomes available.

If you need to remove QuickTime for Windows from your home computer, follow the instructions for uninstalling QuickTime 7 for Windows on the Apple support site.

For more information, please see below:

Note: This move will not affect Macintosh OS computers, only Windows OS computers.

Phishing Alert: Help Desk Server Maintenance

Phishing AlertAnother phishing email just hit a number of SMU email addresses.  The message asks you to sign in to the Help Desk server for maintenance. It is sent from an address that is listed as the “Mailbox Helpdesk”. This is not a legitimate message.

Phishing Attempt Email

DO NOT click the link or provide your credentials.

If you do, please contact the Help Desk immediately at 214-768-4357.

Please remember to be on the lookout for these types of phishing emails, and always guard your password carefully.