Apple & Other Critical Software Updates

Earlier in the week, Apple announced a number of security updates for multiple software products including Leopard, Snow Leopard, iOS, Safari, etc.  Approximately 56 security vulnerabilities were patched in OS X and 45 are considered critical since Apple states that they can provide “arbitrary code execution” (i.e., someone else running software on your Mac without your knowledge/consent). Please take a moment to run “Software Update” on your Mac and install the available patches as soon as you can. In addition to Apple, Firefox and Adobe (Flash, Reader and Acrobat) also announced the availability of critical software patches.  Firefox and Adobe … Continue reading Apple & Other Critical Software Updates

Electronic Blue Books and Online Testing

Swarthmore ITS supports faculty interested in moving from paper blue books to their electronic equivalents.  Swarthmore uses SecureExam software to allow students to take tests on public area computers while providing a safe and secure way of administering tests.  Many students prefer typing to writing and the software provides a basic word processor and spell checking tools.  Many faculty prefer reading typed papers instead of deciphering handwritten pages.  The software prevents students from accessing other programs while taking the test so it is possible to have a “closed book” exam.  At the end of the exam, students submit their work and … Continue reading Electronic Blue Books and Online Testing

Freshen up your Java!

Ok, I’m not talking about coffee but rather the software that permeates most of our computers.  Sun’s (now Oracle’s) Java is ubiquitous in today’s computing environment.  Unfortunately, as is often the case with widely installed software, it is a major target for attackers and malware writers.  Add to this the fact that Java often has numerous security holes and you’ve got a formula for mass infection.  (Frankly, Java makes it very difficult to keep a computer secure.) What can you do to help the situation? 1) Make sure you’re always running the latest version.  You can find what version you’re … Continue reading Freshen up your Java!

Reading Your Email the Plain Ol’ (Safer!) Way

Many of us receive our email in what’s known as HTML format.  In other words, when you receive an email, it can display multiple fonts, colors, pictures, etc.  It’s nice to look at.  Unfortunately, the technology that allows your email to be formatted in an aesthetically pleasing way also provides holes for malicious attackers to abuse. So, to make your email safer to read, it needs to be uglier!  This is simply accomplished by reading your email in plain text format.  Below is an example of an email (supposedly from Facebook) in HTML format followed by the same exact email … Continue reading Reading Your Email the Plain Ol’ (Safer!) Way

Give Your Computer a Fighting Chance

Regardless of the type of computer you use, someone somewhere is always trying to infect it or break in.  One of the best defenses you have is keeping your operating system and applications up to date.  Today, like it or not, patching is a necessity although many treat it as optional. When software vendors announce patches, miscreants immediately begin reverse engineering (if they weren’t already) the changes to determine where the security holes exist in the software.  They then write code designed to exploit these holes and gain access to your computer.  The number one way to deliver this malicious … Continue reading Give Your Computer a Fighting Chance

Would You Put Sensitive Information on a Postcard?

Probably not… When you send someone a postcard (remember “snail mail”?), whatever you wrote is visible to anyone who handles it from where it was mailed all the way to the final recipient.  So, of course, you wouldn’t want to put sensitive or personal information on a postcard. Very similar to a postcard, email can generally be read by anyone along the path from where it was sent to its final destination.  In fact, multiple copies of the same email might be stored by mail servers transferring the message along the way. In general, just like a postcard, sensitive and … Continue reading Would You Put Sensitive Information on a Postcard?