With Microsoft offering free Windows 10 upgrades to current owners of Windows 7 and 8, Information Technology Services (ITS) has received questions about this new operating system and our plans for the future. ITS currently recommends that individuals do not install Windows 10 if they are prompted to do so on a college-owned machine. Until thorough testing of Windows 10 functionality with College resources has been completed, ITS will continue to install and support Windows 7 on college-owned computers. Windows 10 will be made available on campus computers later on, after any significant issues are resolved and important supporting documentation has been updated.
As we put Windows 10 through its paces, our observations, known issues, and training resources will be gathered for convenient access. Visit http://go/win10 for the latest information.
This week we will be upgrading the Course Hub sites from Drupal 6 to Drupal 7 before the beginning of the fall semesters. These upgrades will cause the Course Hub sites to be offline for approximately 2-3 hours while the database and configuration are upgraded.
The planned schedule is as follows:
Tuesday, August 18th from 8am – 11am EDT (5am – 8am PDT) – http://courses.miis.edu/
Thursday, August 20th from 7am – 10am EDT (4am – 7am PDT) – http://courses.middlebury.edu/
During these upgrades, direct access to Moodle, WordPress, SANSSpace, or other curricular tools will still work however new course spaces will not be able to be provisioned until the upgrades complete.
Middlebury College is retiring the Bombay print server on August 3, 2015, as it is incompatible with our current 64-bit operating systems. Bombay has been replaced by a new print server named Walnut that has all of the same print queues on it.
ITS has worked with the majority of people who were connecting to the old server but if you have been away from campus you may experience an interruption in printing services until you move from Bombay to Walnut printers. If needed, refer to the steps below to restore printing. If you have any questions or need further assistance, please contact the Helpdesk at 802.443.2200 or via email to email@example.com.
Middlebury Information Security received information that fraudulent emails are being sent from a malicious domain, “middleburry.org”, to businesses that might provide equipment and supplies to Middlebury College.
The suspicious emails are crafted such that they appear to come from actual Middlebury College employees, though the contact information provided includes incorrect telephone numbers and email addresses.
Note that suspected bad actors are using a typosquatting technique – there are two R’s in “middleburry.org”, and Middlebury’s domain name ends in .edu, rather than .org. Those details, however, are perhaps an easy thing to miss, especially at a quick glance.
Efforts are underway to takedown the middleburry.org domain, and to suspend the domain holder’s email service.
Please contact InfoSec@middlebury.edu with questions.
A year ago the Internet saw a rash of malware known as ransomware. This malicious form of cyber attack is known for infecting a computer and encrypting a drive. The victim is then unable to recover their data until paying a ransom to the attacker. Middlebury, like many other institutions was not immune to this form of attack.
A week ago the FBI announced a new variant on a common form of these attacks known as CryptoWall. This form of ransomware is known to have four methods of infecting a computer.
Phishing: the attacker may lure a victim into downloading an infected attachment through a phishing campaign and thereby compromising the drive on their system.
Phishing: the attacker lures the victim into clicking on a link to a malicious web site where the victim unknowingly downloads the malicious software onto their system and compromises their drive.
Infected ad: the attacker posts and infected ad on a website which a user might click thereby causing the download of malicious software.
Compromised website: the attacker compromises a website so when a user visits the website they unknowingly download malicious software and compromise their system.
According to the FBI, by far the most common method of attack is phishing, particularly with attachments in the message.
What you can do to protect yourself:
Never open attachments or click links in emails that you do not recognize or trust.