Update Your Browser.. Save Your Computer!

Out of date browser software is a great way to install malware on your computer.  A simple way to help avoid computer “infections” while surfing the web is by keeping your browser up to date (note: this is one of the most common ways that Macs get infected). At the time of this writing, the following are the latest browser versions: Firefox 3.6.17 or 4.0.1 5.0.1 (you should strongly consider upgrading to 5.0.1 unless there’s a specific application you use that requires 3.6.x) Safari  5.0.5 Chrome 12.0.742.100 Opera 11.11 Updates for Internet Explorer are bundled in Windows Automatic Updates.  So, … Continue reading Update Your Browser.. Save Your Computer!

Apple & Other Critical Software Updates

Earlier in the week, Apple announced a number of security updates for multiple software products including Leopard, Snow Leopard, iOS, Safari, etc.  Approximately 56 security vulnerabilities were patched in OS X and 45 are considered critical since Apple states that they can provide “arbitrary code execution” (i.e., someone else running software on your Mac without your knowledge/consent). Please take a moment to run “Software Update” on your Mac and install the available patches as soon as you can. In addition to Apple, Firefox and Adobe (Flash, Reader and Acrobat) also announced the availability of critical software patches.  Firefox and Adobe … Continue reading Apple & Other Critical Software Updates

Electronic Blue Books and Online Testing

Swarthmore ITS supports faculty interested in moving from paper blue books to their electronic equivalents.  Swarthmore uses SecureExam software to allow students to take tests on public area computers while providing a safe and secure way of administering tests.  Many students prefer typing to writing and the software provides a basic word processor and spell checking tools.  Many faculty prefer reading typed papers instead of deciphering handwritten pages.  The software prevents students from accessing other programs while taking the test so it is possible to have a “closed book” exam.  At the end of the exam, students submit their work and … Continue reading Electronic Blue Books and Online Testing

Freshen up your Java!

Ok, I’m not talking about coffee but rather the software that permeates most of our computers.  Sun’s (now Oracle’s) Java is ubiquitous in today’s computing environment.  Unfortunately, as is often the case with widely installed software, it is a major target for attackers and malware writers.  Add to this the fact that Java often has numerous security holes and you’ve got a formula for mass infection.  (Frankly, Java makes it very difficult to keep a computer secure.) What can you do to help the situation? 1) Make sure you’re always running the latest version.  You can find what version you’re … Continue reading Freshen up your Java!

Reading Your Email the Plain Ol’ (Safer!) Way

Many of us receive our email in what’s known as HTML format.  In other words, when you receive an email, it can display multiple fonts, colors, pictures, etc.  It’s nice to look at.  Unfortunately, the technology that allows your email to be formatted in an aesthetically pleasing way also provides holes for malicious attackers to abuse. So, to make your email safer to read, it needs to be uglier!  This is simply accomplished by reading your email in plain text format.  Below is an example of an email (supposedly from Facebook) in HTML format followed by the same exact email … Continue reading Reading Your Email the Plain Ol’ (Safer!) Way

Give Your Computer a Fighting Chance

Regardless of the type of computer you use, someone somewhere is always trying to infect it or break in.  One of the best defenses you have is keeping your operating system and applications up to date.  Today, like it or not, patching is a necessity although many treat it as optional. When software vendors announce patches, miscreants immediately begin reverse engineering (if they weren’t already) the changes to determine where the security holes exist in the software.  They then write code designed to exploit these holes and gain access to your computer.  The number one way to deliver this malicious … Continue reading Give Your Computer a Fighting Chance