|Title||Start Date & Time||End Date & Time|
|Service Issue Reported: HCM is experiencing a service interruption||Friday, June 23, 2017 - 12:53pm|
|Service Maintenance Scheduled: Campus Solutions & Portals||Sunday, June 25, 2017 - 6:00am||Sunday, June 25, 2017 - 6:00pm|
|Service Maintenance Scheduled: Biotechnology Building Wireless||Monday, June 26, 2017 - 6:00am||Monday, June 26, 2017 - 7:00am|
|Service Maintenance Scheduled: Williams Village Wireless||Wednesday, June 28, 2017 - 6:00am||Wednesday, June 28, 2017 - 7:00am|
|Service Maintenance Scheduled: CASA Building Network||Thursday, June 29, 2017 - 5:00am||Thursday, June 29, 2017 - 7:30am|
A new web browser flaw is being used in phishing attacks to make malicious phishing websites appear to have the same web address as known and trusted websites. In the past, OIT encouraged individuals to check URL addresses in the address bar or pop-up text when a mouse hovers over a URL. However, this new flaw allows attackers to craft a URL which will trick the web browser into displaying a trusted URL rather than the address of the malicious website. Attackers are even able to forge websites which are HTTPS protected.
The IT Security Office advises users of Chrome, Firefox, and Opera to manually type URLs for sensitive sites (e.g., your bank or financial institution, Mycuinfo, and sites which require a login) rather than clicking links in emails or on untrusted websites. Within Firefox, one can mitigate this threat by disabling support for Punycode by navigating to about:config and setting “network.IDN_show_punycode” to "true".
Additional information about these vulnerabilities can be viewed at:
If you have any questions, please contact the IT Service Center at 303-735-4357 (or 5-HELP from an on-campus phone) or email@example.com. IT Service Center Hours: https://oit.colorado.edu/support/it-service-center.
OIT has defined the following categories to describe the severity of security risks:
URGENT severity represents a broad threat to the entire campus community.
SEVERE severity included remote exploits and worms.
IMPORTANT severity includes virus and local exploits for commonly used services.