Cybersecurity

Understanding Phishing Emails

Understand How to Report Phishing Attempts Your Content Goes Here In February 2020, Indian TV journalist Nidhi Razdan announced that she was leaving her 21-year-old job with New Delhi based English TV news channel NDTV 24*7 to be an associate professor at Harvard University, or so she thought. [...]

By |2023-06-29T11:09:56-05:00February 14th, 2022|Cybersecurity, Training|0 Comments

Cybersecurity Foundations Course | April 9-13, 2018

The Division of Student Affairs Department of Information Technology is hosting a Cybersecurity Foundations Course April 9-13, 2018. Please register online as seating is limited. The Cybersecurity Foundations course will be a five-day private, group training course. You will gain a global perspective of the challenges of designing a secure system, touching on all the cyber [...]

By |2018-03-13T15:28:18-05:00March 13th, 2018|Cybersecurity|0 Comments

Meltdown and Spectre

What is it? Meltdown and Spectre are two closely related security vulnerabilities that affect virtually all computers in the world. They stem from a flaw in the design of computer processors. The flaw has been present for years, but the discovery and exploit of the flaw was only just revealed last week (1/3/2018). Meltdown and [...]

By |2018-01-26T15:19:16-06:00January 9th, 2018|Cybersecurity|0 Comments

Cybersecurity Panel Provides Good Insights

Technology Services - Student Affairs recently sponsored an event for Cybersecurity Month in cooperation with the Brazos Valley Project Manager's Institute and the Information Systems Security Association (ISSA) - a panel of local experts who talked about how got into a career in cybersecurity. Scott Smith from BTU actually started off playing baseball, while Jose Quintana [...]

By |2018-01-26T15:19:17-06:00October 19th, 2017|Cybersecurity|0 Comments

Ransomware is BIG Business

Higher education has been targeted by the booming business of ransomware. Ransomware is, "...computer malware that installs covertly on a victim's computer, executes a cryptovirology attack that adversely affects it, and demands a ransom payment to restore it. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to [...]

By |2018-01-26T15:19:17-06:00August 1st, 2016|Cybersecurity|0 Comments

CryptoLocker Threat and Response

A new computer malware program called CryptoLocker is spreading across campus. Several individuals' computers and even some college share drives have been attacked. The program will make all of your files inaccessible and ask for a ransom to access them again. CryptoLocker disguises itself as a pdf or zip file attached to an email. When the [...]

By |2018-01-26T15:19:19-06:00October 29th, 2013|Cybersecurity|0 Comments
Go to Top