Apply     Visit     Give     |     Alumni     Parents     Offices     TCNJ Today     

Author Archives: bowen

Least vulnerable operating system of 2014 was…


According to GFI Blog –

A tie between Windows 8 and Windows 8.1 with 36 total vulnerabilities (24 high, 12 medium, 0 low)

However, the author, Cristian Florian from GFI Blog, has grouped the operating systems together in a dubious manner and has left out major/monolithic components that cannot be removed from the OS.  Where’s Android?  Where’s Windows Phone?  Additionally, each version of Mac OS or Linux should be listed separately as is Windows.

I wouldn’t take this comparison seriously, however, the vulnerability information is accurate and interesting and continues to require our diligence in combating threats.

Top 6 operating systems with most vulnerabilities were:
1.  Apple Mac OS X – 147 total  (64 high, 67 medium, 16 low)
2.  Apple iOS – 127 total  (32 high, 72 medium, 23 low)
3.  Linux Kernel – 119 total  (24 high, 74 medium, 21 low)
4.  Windows 7 – 36 total  (25 high, 11 medium, 0 low)
5.  Windows 8 – 36 total  (24 high, 12 medium, 0 low)
6.  Windows 8.1 – 36 total  (24 high, 12 medium, 0 low)

This doesn’t include third party applications or web browsers. Internet Explorer registered 242 vulnerabilities which is almost double than the next entry, Google Chrome (126), followed by Mozilla Firefox (117). The OS results should have accounted for this in some way.

Approximately 19 new vulnerabilities per day were added to the National Vulnerability Database in 2014.

See the full article and more info about application vulnerabilities and draw your own conclusions at GFI Blog.

Cyber Security Outlook 2015

From The Center for Internet Security, below are some highlights for 2015. To read more from CIS experts about this year’s trends and threats, visit the CIS blog. Distributed Denial of Service (DDoS) Attacks A Denial of Service (DoS) attack is an attempt to make a system (such as a website) unavailable to its users.… Continue Reading

College student “Work-from-home” scam

January 12, 2015 – College students across the United States have been targeted to participate in work-from-home scams. Students have been receiving e-mails to their school accounts recruiting them for payroll and/or human resource positions with fictitious companies. The “position” simply requires the student to provide his/her bank account number to receive a deposit and… Continue Reading

College Employee Scam

January 12, 2015 – College and University employees are receiving fraudulent e-mails indicating a change in their human resource status. The e-mail contains a link directing the employee to login to their human resources website to identify this change. The website provided appears very similar to the legitimate site in an effort to steal the… Continue Reading

University Direct Deposit Account Credentials Targeted by Phishing Emails

In at least three separate incidents in 2014, malicious actors sent phishing emails with malicious links to University employees; employees who clicked on the link were taken to fraudulent websites that collected single sign-on credentials, which were used to modify the employee’s direct deposit account information. By changing this information, the malicious actors rerouted the… Continue Reading

Tech Support Call Scam Leads to Malware & Financial Loss

Tech Support Call Scam Leads to Malware & Financial Loss The Risk:  Malicious actors use call centers to cold call victims in an attempt to gain access to the victim’s computer, install malware, steal personally identifiable information (PII), and receive monetary gain. The Threat: A malicious actor, claiming to work for a well-known software, technology,… Continue Reading

Security breach at EDUCAUSE

Many of you received a message this afternoon from EDUCAUSE detailing a server breach that may have exposed your EDUCAUSE website profile password.  This message originally triggered many phishing email scam filters but, unfortunately, this message is accurate and the incident occurred as described. Please follow the instructions provided in that email to reclaim access… Continue Reading