<?xml version="1.0"?>
<News hasArchived="false" page="4" pageCount="5" pageSize="10" timestamp="Sun, 26 Apr 2026 08:05:40 -0400" url="https://beta.my.umbc.edu/groups/doit/posts.xml?page=4&amp;tag=security">
<NewsItem contentIssues="false" id="52209" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/52209">
<Title>Locating Our Confidential Data</Title>
<Tagline>Identity Finder is being installed to help reduce our risk.</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In an effort to try and detect confidential data on university-owned systems and reduce the risk that UMBC will be the source of a data breach, UMBC has worked with the university system to purchase a program called Identity Finder.  Identity Finder is a program that runs in the background on computers and looks for information like SSNs and credit card numbers.  The program will make a list of the files that contain this information, but will </span><strong><u>not</u></strong><span> modify or delete the files.  Once we receive the lists of files that possibly contain confidential data, we </span>will<span> work with each machine's owner to </span>determine<span> how to best manage data.</span></div><div><br></div><div>We have been running the program, for almost a year, in the departments that process and store SSNs and credit cards as a standard part of their business.  Starting this week, we are pushing the program out to all centrally managed UMBC machines.  The software will be installed automatically on each system, through Active Directory,  and members of the UMBC community should not need to do anything.  If anyone sees an impact from the installation of Identity Finder or has any questions, they should contact the DoIT Technology Support Center at x53838.  </div><div><br></div><div>Mark Cather</div><div>DoIT / UMBC</div><div><br></div></div>
]]>
</Body>
<Summary>In an effort to try and detect confidential data on university-owned systems and reduce the risk that UMBC will be the source of a data breach, UMBC has worked with the university system to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/52209/guest@my.umbc.edu/fb0acceac21cd8b2fc84c338f2d9b69d/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 09 Jun 2015 10:01:48 -0400</PostedAt>
<EditAt>Sat, 26 Mar 2016 00:11:39 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="51604" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/51604">
<Title>Recent Phishing Email Messages</Title>
<Tagline>How to Identify and Report Phishing Messages.</Tagline>
<Body>
<![CDATA[
    <div class="html-content">UMBC has recently been the target of an increasing number of <a href="http://en.wikipedia.org/wiki/Phishing" rel="nofollow external" class="bo">phishing</a> messages.  These phishing messages <a href="http://my.umbc.edu/groups/doit/documents/7910" rel="nofollow external" class="bo">appear</a> to come from the UMBC Division of Information Technology or another university official, but they are actually coming from hackers.  Over the last few weeks, we have received many reports of phishing messages asking for people to verify their UMBC account by providing their UMBC username and password.  Messages have also been received asking for instructions related to wiring money to a bank account.  <div><br></div><div>In almost all phishing messages, there are some typical clues that should cause us all to be suspicious:</div><div><ul><li>The messages look official but are <strong><u>not</u></strong> sent from a "umbc.edu" email address. </li><li>Some of the messages list a copyright at the bottom.</li><li>Some of the messages include the phrase "All Rights Reserved".  </li><li>The messages include a link to a web page that is not on a "umbc.edu" server.  </li><li>The message comes from a department that we do not have at UMBC or a person who does not work at UMBC.  One of the recent messages claimed to be from the "Security Alert Office".  UMBC does not have a department by that name.</li></ul><div>All of these are signs of a message that is likely a phishing message.  </div><div><br></div><div>One last big clue that a message is a suspicious phishing message is in content of the message.  DoIT will <strong><u>NEVER</u></strong> ask for a person's username and password as a part of a legitimate support request.  We do not need a person's username and password in order to provide assistance or verify an account.</div></div><div><br></div><div>If you do receive a message that you believe is a phishing message, there are a few things that you can do:</div><div><ul><li>Forward a copy of the message to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.  This will send the message directly to the DoIT IT Security Department.  We will review the message and determine if any action is needed.</li><li>Call the group that the message appears to come from on the phone and ask if the message is legitimate.  In the case of messages that appear to come from DoIT, please contact the DoIT Technology Support Center at x53838.</li></ul><div>If anyone has additional questions about phishing messages or any other computer security topic, please feel free to contact the UMBC IT Security Department at <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</div><div><br></div><div>Mark Cather</div></div><div>Chief Information Security Officer</div><div>Division of Information Technology / UMBC</div></div>
]]>
</Body>
<Summary>UMBC has recently been the target of an increasing number of phishing messages.  These phishing messages appear to come from the UMBC Division of Information Technology or another university...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/51604/guest@my.umbc.edu/281686a4ac072160edfe24fc20f270e5/api/pixel</TrackingUrl>
<Tag>itsecurity</Tag>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/xxlarge.jpg?1430335389</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/xlarge.jpg?1430335389</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/large.jpg?1430335389</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/medium.jpg?1430335389</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/small.jpg?1430335389</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/xsmall.jpg?1430335389</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/xxsmall.jpg?1430335389</ThumbnailUrl>
<PawCount>6</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 28 Apr 2015 22:08:16 -0400</PostedAt>
<EditAt>Sat, 26 Mar 2016 00:12:34 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="49518" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/49518">
<Title>Critical Security Flaw in Core Linux Library</Title>
<Tagline>Allows for complete control of a system with no credentials</Tagline>
<Body>
<![CDATA[
    <div class="html-content">Earlier this week a critical security flaw in the gethostbyname() function of glibc in Linux was exposed. This effects many major linux distributions including Redhat 5 and Redhat 6 Enterprise. This vulnerability has the potential to allow a fairly simple attack to gain complete control of a server. Any vulnerable servers should be patched and rebooted as soon as possible. <div><br></div><div>DoIT has been patching and rebooting our systems and we are now protected from this on all centrally managed accessible servers. We would encourage any linux admins to check out the posting below to see if your system is vulnerable and patch accordingly. I've also included a link to a PCworld article with a new exploit that just came out showing how this flaw can be used. </div><div><br></div><div>Its being referred to as the GHOST vulnerability because it uses the GetHost function. Besides the obvious security issue, this one has some marketing behind it as well, its even got a cute logo (see below), so I think you may see it around the news at some point. </div><div><br></div><div>List of vulnerable glibc versions:</div><div><a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0235" rel="nofollow external" class="bo">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0235</a></div><div><br></div><div>For information:</div><div><a href="http://www.pcworld.com/article/2878252/ghost-linux-vulnerability-can-be-exploited-through-wordpress-other-php-apps.html" rel="nofollow external" class="bo">http://www.pcworld.com/article/2878252/ghost-linux-vulnerability-can-be-exploited-through-wordpress-other-php-apps.html</a></div><div><br></div><div><img src="https://dum21w3618van.cloudfront.net/images/blogs/laws/ghost-vulnerability.svg" style="max-width: 100%; height: auto;"></div></div>
]]>
</Body>
<Summary>Earlier this week a critical security flaw in the gethostbyname() function of glibc in Linux was exposed. This effects many major linux distributions including Redhat 5 and Redhat 6 Enterprise....</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/49518/guest@my.umbc.edu/6d632f23938175dcab67b98178404d40/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 31 Jan 2015 10:59:20 -0500</PostedAt>
<EditAt>Sat, 26 Mar 2016 00:13:47 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="44704" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/44704">
<Title>DoIT Taking Steps to Protect Sensitive Data on our AD server</Title>
<Body>
<![CDATA[
    <div class="html-content"><div>Over the weekend of May17-18, DoIT will be copying  files found on our Active Directory (AD) servers that have sensitive information in them and encrypting those files and storing them in a special location.  DoIT will be glad to work with anyone that requires access to these files for their work or scholarship, we ask you submit a help request ticket or email <a href="mailto:security@umbc.edu">security@umbc.edu</a>.  Before giving you these files back we will have one of our staff contact you and go over procedures for how to safely store and work with files that contain sensitive information in a way that protects the university and individuals. </div><div><br></div><div>We want to thank everyone for your cooperation to date, as DoIT has been working with departments to remediate other places that have this information we have seen great cooperation. We very much appreciate the way the UMBC community has supported the efforts to better protect the information of our students, alumni, staff, and faculty. We know this is abrupt but felt that getting the data in a secure state was of the greatest importance. </div><div><br></div><div>Below is some information to explain this further.</div><div><br></div><div><strong>Why is DoIT removing these files from AD at this time?</strong></div><div><br></div><div>Due to the data breach at UM-College Park, the Regents have instructed all institutions to take additional steps to identify and protect personal information, such as SSN, from being released. The Regents have asked that campuses undertake an inventory to find where this information is stored and take all appropriate measures to protect this information. Under Maryland law, file encryption is one of the recognized measures for protecting information. </div><div><br></div><div><strong>Why the sense of urgency?</strong></div><div><br></div><div>Over the years, DoIT has consistently increased space for users and departments in our Active Directory environment.  The totality of the number of files makes the Active Directory (AD) server critical to protect. Because we feel most of these files were used in the past and most will not be needed immediately, we feel acting quickly is the best course of action to ensure we are protecting the university and each others information.</div><div><br></div><div><strong>What kind of files are being scanned?</strong></div><div><strong><br></strong></div><div>The software that we have scans word, excel, pdf, and images looking for SSN's. Most of the files it will find are old reports dating back many years ago when SSN was regularly used. In many cases, the files may contain on a few SSN's in them.</div><div><strong><br></strong></div><div><strong>How can I find out what files were taken from my account?</strong></div><div><strong><br></strong></div><div>Please submit a ticket, <a href="http://my.umbc.edu/help">http://my.umbc.edu/help</a>, and we will send you back the list of files associated with your names. If you don't notice any files missing it is likely the files we protected were no longer needed.</div><div><strong><br></strong></div><div><strong>How do I get access to my files with SSNs in them?</strong></div><div><br></div><div>You should submit a ticket through <a href="http://my.umbc.edu/help">http://my.umbc.edu/help</a>, we will have someone work with you go over the best way to do this. If you have a time critical issue, please note that in the ticket and we will expedite this.</div><div><br></div><div><strong>What will I do if I need to do if I regularly deal with files that have SSNs in them as part of my job?</strong></div><div><br></div><div>There are options available (encrypted hard drives, UMBCs Box.com service) for securely working with these kinds of files. DoIT will sit down with your staff and understand what your needs are and come up with a solution that meets your units needs but at the same time ensures you are protecting the information and the university.</div><div><br></div><div><strong>Will you continue to scan for sensitive files in my account?</strong></div><div><br></div><div>Yes. We intend to run the process on a regularly basis and scan, at least monthly, all files on Active Directory and remove and encrypt files with sensitive information in them..</div><div><br></div><div><strong>Will DoIT delete these files at some point in the future?</strong></div><div><br></div><div>There are no immediate plans to do this right now. Our plan is to work with units over the next fiscal year to review the files and discuss the best ways to safely handle sensitive data. As part of that process we will ask departments if there are any files that can be safely deleted.</div><div><br></div><div><br></div></div>
]]>
</Body>
<Summary>Over the weekend of May17-18, DoIT will be copying  files found on our Active Directory (AD) servers that have sensitive information in them and encrypting those files and storing them in a...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/44704/guest@my.umbc.edu/1f725cafc713ff1be5f36da3d7bbb860/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 16 May 2014 09:50:33 -0400</PostedAt>
<EditAt>Sat, 26 Mar 2016 00:16:26 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="43444" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/43444">
<Title>Warning: Email Phishing Attacks Targeting Faculty &amp; Staff</Title>
<Tagline>Never give out your username or password</Tagline>
<Body>
<![CDATA[
    <div class="html-content">DoIT continues to receive reports of faculty and staff receiving that is part of a targeted "phishing" attack to steal your username and password information or infect your computer. <div><br></div><div>One recent email that a number of faculty received appeared to come from Blackboard, and is listed below. DoIT will not give out our email lists to 3rd parties and it would always come from someone in DoIT.</div><div><br></div><div>The message below does not have the Link active, however, in the original message if you took your mouse and hovered it over the link for "Click here to sign in and revier this article now." you would see the web site is not Bloackboard.com</div><div><br></div><div><br></div><div><br></div><div><table border="0"><tbody><tr><th>Subject:</th><td>New School Article - Important</td></tr><tr><th>Date:</th><td>Sat, 5 Apr 2014 12:35:05 -0700 (PDT)</td></tr><tr><th>From:</th><td>Blackboard Articles <a href="mailto:articles@www.blackboard.com" rel="nofollow external" class="bo">&lt;articles@www.blackboard.com&gt;</a></td></tr><tr><th>To:</th><td><span>SOMEONE@UMBC</span></td></tr></tbody></table><br><p>Hello,<br><br>Your school has uploaded an article with your information tagged in the content.<br><br>Please sign in immediately to review your information.<br><br><strong><a href="http://radiocentrodolores.com.ar/media/web/login.blackboard.com.htm" rel="nofollow external" class="bo">Click here to sign in and review the article now</a></strong><br><br>Comment/Notifications of articles that are published will be delivered to you.<br><br><br><strong>Black board Articles.</strong></p></div></div>
]]>
</Body>
<Summary>DoIT continues to receive reports of faculty and staff receiving that is part of a targeted "phishing" attack to steal your username and password information or infect your computer.     One...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/43444/guest@my.umbc.edu/0a7813c2bedef30ca0fa131baf6be237/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 10 Apr 2014 00:48:42 -0400</PostedAt>
<EditAt>Sat, 26 Mar 2016 00:17:18 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="43403" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/43403">
<Title>UMBC Response to Heartbleed Security Incident</Title>
<Tagline>Issue potentially affects "https" web sites using Open SSL</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>A major security vulnerability named </span><span>Heartbleed</span><span> was disclosed Monday night.  The vulnerability affects a large portion of websites on the Internet, and here at UMBC, that use the "<strong>https:" </strong>protocol for secure web traffic. Many servers that support "<strong>https:"</strong>  utilize a package named OpenSSL to encrypt webpages.  The <strong>"https:" </strong>protocol, which is referred to as SSL or secure socket layer, is a cryptographic protocol which is designed to provide secure communication over the Internet. The vulnerability could allow usernames and passwords being exchanged over the web to be stolen.</span><br><div><span><br></span><span>Starting with the announcement on Monday evening, DoIT staff have been working to understand the risks, determine which systems are vulnerable, and take the necessary steps to remediate or lessen the risk. DoIT classifies system risk from 0 - very low to 3 (very high).  Over the last two days we have patched or remediated all of our level 2 and 3 servers. We expect to have all systems patched this week.  In addition, we are working with departmental IT staff to identify and address issues in the departments. We also continue to work closely with commercial partners to patch devices and equipment that may be impacted</span><br>
    <br>
    <span>Prior to this event occurring, DoIT was planning to move forward with a <a href="http://my.umbc.edu/groups/doit/news/43156" rel="nofollow external" class="bo">mandatory password change</a> for all users starting the end of April. As a precaution, we are looking at expediting this process and will be sending out another message on this early next week to expedite that process. </span><br>
    <br>
    <span>If you are wondering if a site is vulnerable, there is a web site created that you can use to test: </span><span><a href="http://filippo.io/Heartbleed/">http://filippo.io/Heartbleed/</a></span><span> and type in a web site.. </span><span>Any questions or concerns may be directed to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><br>
    <br></div></div>
]]>
</Body>
<Summary>A major security vulnerability named Heartbleed was disclosed Monday night.  The vulnerability affects a large portion of websites on the Internet, and here at UMBC, that use the "https:" protocol...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/43403/guest@my.umbc.edu/71f0bbcd8992e838302107c10be9bfcf/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/xxlarge.jpg?1397069998</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/xlarge.jpg?1397069998</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/large.jpg?1397069998</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/medium.jpg?1397069998</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/small.jpg?1397069998</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/xsmall.jpg?1397069998</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/xxsmall.jpg?1397069998</ThumbnailUrl>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 09 Apr 2014 19:40:51 -0400</PostedAt>
<EditAt>Sat, 26 Mar 2016 00:17:42 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="43156" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/43156">
<Title>Everyone Must Reset Password and Create Security Questions</Title>
<Tagline>Deadline: May 23, 2014</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><strong>Update:</strong></p><p>Given recent <a href="http://my.umbc.edu/groups/doit/news/43403" rel="nofollow external" class="bo">IT security threats</a> generally, DoIT has decided to force the password change to <strong>May 23, 2014</strong>, the day after Undergraduate Commencement. Thank you in advance for your patience and understanding. </p><p>--------------------------------------------</p><p>In an effort to improve campus security and better protect user information, DoIT is requiring that everyone with a UMBC account must change his or her password by <strong>June 9, 2014</strong>, unless this has already been done this calendar year. This will apply to all myUMBC account holders -- students, faculty, staff and alumni. We know people hate changing their account passwords, but with the rise of emails targeting people to share their account and password, called phishing, we feel it is necessary for security.</p><p>As part of this effort, everyone will also be required to provide an alternate email address and create account security questions. Once in place, all users will then be able to reset their password through a self-service page. We have had these account security questions in place for the <a href="http://my.umbc.edu/groups/doit/news/13849" rel="nofollow external" class="bo"><span>last two years</span></a> for students and the program has been very successful in reducing the number of time-consuming, manual password resets performed by our <a href="http://doit.umbc.edu/tsc" rel="nofollow external" class="bo"><span>Technolgy Support Center</span></a> (TSC). We expect that by expanding self-service password resets to all account holders, everyone will benefit.</p><p>A notice will appear to all faculty and staff when they login on <strong>Wednesday, April 23</strong>, informing them they need to change their password and establish their security questions, if they have not done so already in 2014. While the final date for password changes is June 9th, DoIT especially recommends that faculty make this change before they leave for the summer. We will also be sending out regular reminders.</p><p>To create your own security questions, visit the following Frequently Asked Question (FAQ):</p><p><span><a href="https://wiki.umbc.edu/x/hIAc" rel="nofollow external" class="bo">How do I create my security questions to reset a forgotten password?</a></span></p><p>If you have any questions or need help, please <a href="http://my.umbc.edu/help" rel="nofollow external" class="bo"><span>submit an RT Ticket</span></a> or contact the <a href="http://doit.umbc.edu/tsc" rel="nofollow external" class="bo"><span>TSC</span></a> at 410.455.3838.</p></div>
]]>
</Body>
<Summary>Update:  Given recent IT security threats generally, DoIT has decided to force the password change to May 23, 2014, the day after Undergraduate Commencement. Thank you in advance for your patience...</Summary>
<Website>http://doit.umbc.edu/tsc</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/43156/guest@my.umbc.edu/2ed428be40a2cd3dfd502f2933a09b23/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/xxlarge.jpg?1396493740</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/xlarge.jpg?1396493740</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/large.jpg?1396493740</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/medium.jpg?1396493740</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/small.jpg?1396493740</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/xsmall.jpg?1396493740</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/xxsmall.jpg?1396493740</ThumbnailUrl>
<PawCount>57</PawCount>
<CommentCount>4</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 02 Apr 2014 22:57:22 -0400</PostedAt>
<EditAt>Sat, 26 Mar 2016 00:18:19 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="38221" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/38221">
<Title>Phishing Scam Alert - Subject: IT Service Help Desk</Title>
<Tagline>UMBC would never ask "users are to verify there accounts."</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>A new phishing scam is threatening to deactivate email accounts. This email is not from UMBC. <strong>Do not click this link.</strong></p><p><br></p><p>Here's what's being received:</p><p><br></p><p>"This E-mail is sent by the HelpDesk Expert for IT Support system for Mailbox notification and update purposes. We are conducting an email sweep upgrade due to our new login home page that is coming up soon for your better and faster server. So we are removing all unused email and registration of all active Student/Staff mail account to enable the University create new logins for our 2013/2014 students and staff. So all users are to verify there accounts.</p>
    <p><br></p>
    <p><strong>CLICK HERE:</strong> To go to verification page and follow the instructions on the popup page</p>
    <p><br></p>
    <p>IMPORTANT NOTICE: ACCOUNT OWNER THAT REFUSES TO VERIFY/UPGRADE HIS/HER ACCOUNT WILL LEADS TO YOUR ACCOUNT DE-ACTIVATION WITHIN 48 HOURS PRIOR TO THE URGENT THAT CONTAINED IN THIS SHEET.</p>
    <p><br></p>
    <p>Copyright@2013 Help-desk Technical Support Centre."</p><p><br></p><p><br></p><p><strong>Again: Do Not Click The Link. If you already did, please change your password immediately.</strong></p></div>
]]>
</Body>
<Summary>A new phishing scam is threatening to deactivate email accounts. This email is not from UMBC. Do not click this link.     Here's what's being received:     "This E-mail is sent by the HelpDesk...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/38221/guest@my.umbc.edu/f7dbd1d0dd47e16dc9b7046b2ac56402/api/pixel</TrackingUrl>
<Tag>phishing</Tag>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/038/221/c9ae486d4193a28218ebcf092e1a1659/xxlarge.jpg?1384191638</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/038/221/c9ae486d4193a28218ebcf092e1a1659/xlarge.jpg?1384191638</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/038/221/c9ae486d4193a28218ebcf092e1a1659/large.jpg?1384191638</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/038/221/c9ae486d4193a28218ebcf092e1a1659/medium.jpg?1384191638</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/038/221/c9ae486d4193a28218ebcf092e1a1659/small.jpg?1384191638</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/038/221/c9ae486d4193a28218ebcf092e1a1659/xsmall.jpg?1384191638</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/038/221/c9ae486d4193a28218ebcf092e1a1659/xxsmall.jpg?1384191638</ThumbnailUrl>
<PawCount>84</PawCount>
<CommentCount>7</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 11 Nov 2013 12:48:18 -0500</PostedAt>
<EditAt>Fri, 25 Mar 2016 11:47:31 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="36838" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/36838">
<Title>Phishing Scam Alert: Fake Blackboard Notifications</Title>
<Tagline>Blackboard email notifications do not require you to sign in</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>A new phishing scam is attempting to fool people into providing personal information by claiming that there is a Blackboard notification waiting for them, and provides a link for logging into Blackboard. <strong>Do not click this link.</strong></p><p>Blackboard email notifications <strong>do not require you to sign in to Blackboard to read them</strong>, the information is provided in the email itself.  Always visit <a href="http://my.umbc.edu">http://my.umbc.edu</a> directly to log into Blackboard or by typing it in the address bar, or using your own bookmarks/favorites.</p><p>Here is an example of the phishing email to watch out for:</p><blockquote><p>Good Morning,</p><p>Your school has posted an important information regarding a course for you.</p><p>You are required to immediately sign in to Blackboard Learn.</p><p><span><span>Click here to sign in to Blackboard Learn</span></span></p><p>Thank you.</p><p>Blackboard Learn Notifications.</p></blockquote><p>Here is another example:</p><blockquote><p>Good Morning,</p><p>An important course form has been posted to you on the Blackboard Learn System.</p><p><span><span>Click here to confirm the form</span></span></p><p>Thank you.</p><p>Blackboard Learn Notifications.</p></blockquote></div>
]]>
</Body>
<Summary>A new phishing scam is attempting to fool people into providing personal information by claiming that there is a Blackboard notification waiting for them, and provides a link for logging into...</Summary>
<Website>https://wiki.umbc.edu/display/faq/Blackboard</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/36838/guest@my.umbc.edu/41839a0b7fb959b2549be619f82a9ad5/api/pixel</TrackingUrl>
<Tag>blackboard</Tag>
<Tag>phishing</Tag>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/036/838/b210d3789a96350fb4b8e79720ea5976/xxlarge.jpg?1381428514</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/036/838/b210d3789a96350fb4b8e79720ea5976/xlarge.jpg?1381428514</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/036/838/b210d3789a96350fb4b8e79720ea5976/large.jpg?1381428514</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/036/838/b210d3789a96350fb4b8e79720ea5976/medium.jpg?1381428514</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/036/838/b210d3789a96350fb4b8e79720ea5976/small.jpg?1381428514</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/036/838/b210d3789a96350fb4b8e79720ea5976/xsmall.jpg?1381428514</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/036/838/b210d3789a96350fb4b8e79720ea5976/xxsmall.jpg?1381428514</ThumbnailUrl>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 10 Oct 2013 14:09:44 -0400</PostedAt>
<EditAt>Fri, 25 Mar 2016 11:48:04 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="13849" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/13849">
<Title>All Students Required to Create Account Security Questions by May 22</Title>
<Body>
<![CDATA[
    <div class="html-content">To facilitate self service, all students will be required to create security questions only they can answer by Tuesday, May 22, so they can access their account and reset their own password. A notice will appear to all students without security questions starting on April 19.
    
    Typically, more than half of DoIT’s weekly Request Tracker (RT) tickets involve a manual password reset by three full time staff members at the Technology Support Center (TSC). Most of these tickets are from students without security questions. As a result, TSC staff can ONLY reset someone’s password with verbal confirmation of secure data in real time, which is often preceded by several “phone tag” voice mail messages to schedule an appointment to do so. Since DoIT resolved more than 23,000 tickets last year (37 percent within a day or less), improving user self-service should increase our capacity to help resolve more complex issues.
    
    To create your own security questions, visit the following Frequently Asked Question (FAQ):
    
    How do I create my security questions to reset a forgotten password?
    <a href="https://wiki.umbc.edu/x/hIAc">https://wiki.umbc.edu/x/hIAc</a>
    
    If you have any questions or need help, please submit an RT Ticket or contact the Technology Support Center (TSC) at 410.455.3838.</div>
]]>
</Body>
<Summary>To facilitate self service, all students will be required to create security questions only they can answer by Tuesday, May 22, so they can access their account and reset their own password. A...</Summary>
<Website>http://www.umbc.edu/blogs/oit-news/archives/2012/04/all_students_re.html</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/13849/guest@my.umbc.edu/871b6ad403e7c3ed739dd367b5bc0571/api/pixel</TrackingUrl>
<Tag>general</Tag>
<Tag>password</Tag>
<Tag>security</Tag>
<Tag>umbc</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 17 Apr 2012 13:07:14 -0400</PostedAt>
<EditAt>Tue, 17 Apr 2012 13:07:14 -0400</EditAt>
</NewsItem>

</News>
