Alerts

Fraudulent bank accounts hit UCI community

Sent on 8/30/2023 to All Campus Employees and Students by the Office of Data and Information Technology UCI Information Security reports “a new wave of fraudulent activity” tied to Chime and Go2Bank. Unauthorized accounts have been opened using UCI members’ personal...

Chime and Go2Bank Fraudulent Activity

We have seen a new wave of fraudulent activity related to UCI members coming from Chime and Go2Bank. This includes accounts being opened using a UCI member's personal information by unauthorized individuals, and getting notified of that via their UCI email, personal...

Critical MacOS and iOS Patches 04/2023

Apple has released critical patches for iPhones, iPads, and Macs to address zero-day flaws being actively exploited that can result in complete device compromise and data breach. Details of the vulnerabilities are tracked as CVE-2023-28206 and CVE-2023-28205. Please...

Critical Microsoft Outlook Vulnerability 03/2023

There is a critical Microsoft Outlook vulnerability for Windows (CVE-2023-23397) that allows hackers to remotely steal hashed passwords by simply receiving an email, and is actively being exploited. Please ensure system and application updates are initiated and...

LastPass Security Incident – Actions to Take

Update 3/1/2023: LastPass provided more technical details about the incident and more recommendations to take, see more information below. LastPass, the provider of a password manager & vault security product used by some at UCI, experienced a cybersecurity...

Log4j Critical Vulnerability Information

(last updated 1/11/2022) Issue On 12/9/2021, a critical vulnerability was reported in a widely used Java software called Log4j.  Log4j is not an application itself, but a software component commonly used by many commercial, open-source, and UCI-developed...

Meltdown and Spectre Information Page

Issue Recently-published research articles have demonstrated a new class of vulnerabilities (dubbed "Meltdown" and "Spectre") that exist in most modern computer processors. At best, the vulnerabilities could be leveraged by malware and hackers to more easily exploit...