|Title||Start Date & Time||End Date & Time|
|Service Issue Updated: Northstar||Thursday, May 24, 2018 - 11:28am|
|Service Issue Updated: Campus Wireless||Monday, February 12, 2018 - 10:05am|
|Service Maintenance Scheduled: Wi-Fi in Benson & Math||Wednesday, June 20, 2018 - 7:00am||Wednesday, June 20, 2018 - 7:30am|
|Service Maintenance Scheduled: Networks in Andrews, Buckingham, Smith||Monday, June 18, 2018 - 8:00am||Thursday, June 21, 2018 - 5:00pm|
|Service Maintenance Scheduled: UCB Files (routine monthly maintenance)||Friday, June 22, 2018 - 10:00pm||Friday, June 22, 2018 - 11:59pm|
|Service Maintenance Scheduled: Skillsoft||Saturday, June 23, 2018 - 7:00am||Saturday, June 23, 2018 - 7:00pm|
|Service Maintenance Scheduled: Campus Solutions & Portals||Sunday, June 24, 2018 - 6:00am||Sunday, June 24, 2018 - 6:00pm|
|Service Maintenance Scheduled: Networks in Farrand, Cockerell, Sewall, Brackett, Aden||Monday, June 25, 2018 - 8:00am||Thursday, June 28, 2018 - 5:00pm|
Update: Both Apple and Microsoft have released patches for this WiFi security vulnerability. If your wireless devices are not set to download updates automatically, we suggest you update them immediately. The university’s Office of Information Security strongly suggests that all users enable automatic updates for all applications that offer it. Learn more about the status of vendor patching for this vulnerability.
A vulnerability has been identified which affects almost anyone using Wi-Fi. This attack impacts all modern implementations of current wireless encryption standards (including WPA-1 and WPA-2). These vulnerabilities have been dubbed KRACKs, which stands for key re-installation attacks. Attackers can use this new vulnerability to read information relayed over wireless networks that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks.
The Office of Information Technology (OIT) is monitoring the situation and working with its vendors. It is expected that all devices (e.g., desktops, laptops, smartphones, etc.) will require a security patch to protect against this vulnerability. It is likely that a patch will be required for home wireless devices as well. OIT will send out a notice to the campus when patches are available.
In the meantime, OIT recommends that you use the campus VPN when connecting to wireless hotspots from off-campus. Individuals who handle highly-confidential data (e.g., SSNs, credit card numbers; loan and bank account numbers; protected health information; and student information about disability, race, ethnicity, citizenship, legal presence, visas, or religion) should only do so on trusted wired networks on campus or while using the VPN from off-campus.
If you have questions about this vulnerability or need assistance installing the campus VPN, please contact the IT Service Center at email@example.com or call 303-735-4357 (5-HELP from a campus phone).