Feed on
Posts
Comments

The network maintenance scheduled for tomorrow, Jan 6, between 8 and 10 AM will continue as planned.  There may be brief interruption to internet service during this time.  Please refer to Twitter and Facebook for alerts should there be unexpected downtime.

ITS has, however, rescheduled the PeopleSoft downtime to Saturday, Jan 13 between 6:00 am and noon to accommodate the undergraduate billing schedule.

ITS will be performing quarterly system maintenance this Saturday, January 6.  The PeopleSoft Student, HRMS and Financial Systems will be down for a storage upgrade from 6:00 AM until 8:00 PM.  WesPortal will remain up and functioning.

There will be network maintenance between 8 and 10 AM.  There may be brief interruption to internet service during this time.  Please refer to Twitter and Facebook for alerts should there be unexpected downtime.

From: Susan Miller [rcureton@cox.net]
Sent: Thursday, December 14, 2017 6:33 PM
To: Wesleyan staff member
Subject: RE: Outstanding INVOICE HFWUF/413496/9615

Hi Wes Staff Member!

Please kindly find the purchases list with the details of items as attached.
Sorry last time I forgot to add them.

http://mirabrasil.net/INCORRECT-INVOICE/  —>This address will download malware or a virus

Kind Regards,

Susan Miller

As you may have heard in the media, the latest Mac OS upgrade, High Sierra, has a serious security vulnerability.  We are strongly advising not to do this upgrade at this time.  If you have already done so, please notify us through your portal (ITS Services> Report an Issue) and a Desktop Support person will be in touch promptly to perform a few steps to secure your computer.

Need to check your OS version? From the main menu, click Apple > About this Mac.  The overview tab will indicate the version. High Sierra is 10.13.x.

While Apple is already releasing a possible fix to the issue, we still ask you to wait on doing the upgrade.  IT staff are currently testing High Sierra for any compatibility issues and will test any security patches that are released as well.

Contact Joe Rich, User Services Manager at jrich@wesleyan.edu/685-3103 or Vince Spiars, Operations and Information Security, at vspiars@wesleyan.edu/ 685-3072 if you have questions about this.

From: “Nathan D. Peters” <checkinganna@gmail.com>  –>Not really from Nate as the email address is a gmail account.
Date: Monday, November 27, 2017 at 1:56 PM
To: xxxxx xxxxxx <xxxxx@wesleyan.edu>
Subject: Hello xxxxx.
Are you there? get back to me here as soon as you get this message i have some information to pass across to you.
Bad grammar, missing punctuation and non-capitalized words are all tell-tale signs of a Phish or SPAM (non-legitimate email).
Nathan D. Peters
Vice President for Finance and Administration
237 High Street
Middletown, CT  06459-3208
Phone: (860) 695-2833
Fax: (860) 695-2458
email: npeters@wesleyan.edu
The above information is easily gotten form our website or from our online address book.

11/21/2017

The source address is NOT a Wesleyan address.

The link provided downloads a payload that compromises your machine.

There was an unexpected interruption on the network from 6:40-7:55 am. Connectivity has been restored. We are working with our provider on the root cause of the issue.

From: Al Stillwell [mailto:admin@spinzone.org]
Sent: Tuesday, November 14, 2017 10:59 AM
To: xxxxxxxxx
Subject: Canada Air
 
The blue link actually, takes you to—hxxp://myalohavacation.com/yfhinrse.ee/456
From: NavyFederal [mailto:Navy.as@update.org]  Fake address
Sent: Monday, November 13, 2017 2:56 PM
To: xxxxx, xxxxx <xxxx@wesleyan.edu>
Subject: Important Notice !
 
There were too many fake links on the is email to edit.  Suffice it to say any link you click in this email will send you to a bad site.  Delete this email, please.

From: iasen11@rambler.ru [mailto:iasen11@rambler.ru] —>Not an originating Wesleyan address
Sent: Thursday, November 09, 2017 4:18 AM
To: Szady, Eugenia <xxxxxx@wesleyan.edu>
Subject: Re WesUserID

Whats up xxxxx

You are going to be charged USD 1,881.81 on your Mastercard card instantly.
See attachment for information.
Password is 5558

Respectfully yours,
Lester

 

There was a Word doc attached but it is not really a Word doc.  It is a trojan that will install a payload on your system and infect you with a virus and possible remote access.

« Newer Posts - Older Posts »

Log in