Apply     Visit     Give     |     Alumni     Parents     TCNJ Today

tcnj wordmark

Multiple Vulnerabilities in Apple iOS

Multiple vulnerabilities have been discovered in Apple’s mobile operating system, iOS.  These vulnerabilities can be exploited by an attacker having physical access to the device, or if the user visits a specially crafted webpage.  Successful exploitation could result in an attacker executing arbitrary code, cause denial-of-service conditions, gain unauthorized access, acquire sensitive information, bypass security…Continue Reading

eBay data breach May 21, 2014

From Security Researcher Brian Krebs Blog – In a blog post published this morning, eBay said it had “no evidence of the compromise resulting in unauthorized activity for eBay users, and no evidence of any unauthorized access to financial or credit card information, which is stored separately in encrypted formats. However, changing passwords is a…Continue Reading

Vulnerability in Adobe Flash Player Could Allow Remote Code Execution

A vulnerability has been discovered in Adobe Flash Player. Successful exploitation of this vulnerability could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Failed…Continue Reading

Vulnerability in Internet Explorer Could Allow Remote Code Execution

A vulnerability has been discovered in Microsoft’s web browser, Internet Explorer, which could allow an attacker to take complete control of an affected system. Successful exploitation of this vulnerability could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then…Continue Reading

0 day exploit targeting Word & Outlook

  Reported by Brian Krebs:  Microsoft warned today that attackers are exploiting a previously unknown security hole in Microsoft Word that can be used to foist malicious code if users open a specially crafted text file, or merely preview the message in Microsoft Outlook. In a notice published today, Microsoft advised: “Microsoft is aware of a…Continue Reading

University Direct Deposit Account Credentials Targeted by Phishing Emails

In at least three separate incidents in 2014, malicious actors sent phishing emails with malicious links to University employees; employees who clicked on the link were taken to fraudulent websites that collected single sign-on credentials, which were used to modify the employee’s direct deposit account information. By changing this information, the malicious actors rerouted the…Continue Reading

Multiple Vulnerabilities in Google Chrome Could Allow Remote Code Execution

Multiple vulnerabilities have been discovered in Google Chrome that could result in several issues including remote code execution.  These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the affected application. Depending…Continue Reading

Java version 7 update 51

Oracle has released an update yesterday that patches 36 security holes in the previous version (7u45).  Please visit www.java.com to update your Java runtime environment. For more information:  http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.htmlContinue Reading

7ads6x98y Top