Search Google Appliance

security

mitnet image
Critical vulnerabilities discovered in wireless encryption standard

A vulnerability in current wireless encryption standards (WPA2) has been identified.

phishing definition
National Cyber Security Awareness Month (NCSAM): Avoid a phishing scam

Scammers are getting smarter. Learn how to identify and avoid phishing attempts with these tips.

shred it bins
National Cyber Security Awareness Month (NCSAM): Learn to protect yourself

IS&T is hosting events and sharing information about secure computing during National Cyber Security Awareness Month (NCSAM) in October.

laptop with stop tag
Let’s play tag: Get free STOP plates for your laptop and tablet

Protect your laptop and devices by getting them tagged and registered on Sept. 5 from 10 to 4 in the Zesiger Center Lobby (W35).

Free stuff
Incoming Freshmen: Free software and cloud services!

Get free software and cloud-based services from MIT -- and sure to read our earlier article for incoming freshmen: Protecting your computer.

Laptop Security image
Incoming Freshmen: Protecting your computer

Here's what you need to do to avoid attacks and secure your data at MIT. Be sure to read our earlier article for incoming freshmen: Creating an MIT online identity.

laptop image
Counting the ways you can change your Kerberos password

There's more than one way to update your password. IS&T provides several options to help you stay secure.

spear fishing scuba gear
What you should know about “Spear-Phishing” scams

Beware of spear-phishing scams, which use personal information to try and trick you into providing confidential data or transferring funds.

An iPad showing Lynda.com
Lynda.com security breach

Despite a recent security breach of Lynda.com, passwords of users of MIT's lynda.mit.edu gateway have not been compromised.

VMware sign
ALERT: VMware Workstation/Fusion security issue

VMware users at MIT should download updated installers for VMware Fusion Pro and VMware Workstation Pro from IS&T as soon as possible to correct a critical vulnerability.

Pages