We experienced another credentials-guessing attack overnight (10 – 11th January), resulting in several accounts being temporarily locked for 30min (which they do to protect themselves against brute-forced attacks like this). The attack tailed off just as working hours started, which is a common attempt to avoid detection, however we now have systems to monitor and […]
We have noticed that attackers are trying to compromise approximately 100 Medschl accounts, using remote login attempts against our email server. By default, Medschl accounts lock for 30 minutes once a password has been incorrectly entered 5 times as a protective measure, meaning these accounts have had problems accessing our services (e.g. logging on to […]
Past virus outbreaks have affected over 100 systems and 100,000’s of files across the CSCS networks and have typically relied on the recipient of an email trusting that the attachment was a legitimate file, and not a virus. We have learnt a number of lessons as a result of these security incidents, including that we need to […]
Apple Macs that have been configured by CSCS are NOT susceptible to the recently reported “Root User” vulnerability. If you have a personal Mac that was not configured by us, then we strongly recommend following the following guide to protect your computer: https://www.macrumors.com/how-to/temporarily-fix-macos-high-sierra-root-bug/
There have been several incidences lately of University and Medschl email accounts being targeted with spam that has made it through our spam filters. Please be suspicious and vigilant about all messages and follow our guidelines on our User FAQ and our Tips for keeping yourself safe on the Internet.