Created by James Welcher, last modified by Jay Krous on Oct 17, 2018 Poodle Resources Vulnerability Description and Assessment: The "Poodle" vulnerability is a protocol weakness in SSL 3.0. An attacker sitting between a client browser and a webserver could issue a man-in-the-middle attack … [Read more...] about Poodle Resources
Cyber Security
CCleaner Hacked
By Tammera E Campbell on 2018-04-16T21:02:57Z Problem Some CCleaner installers were found to have third party malware embedded. Though CCleaner fixed their installers quickly, some of users downloaded and unknowingly installed malware. A project in IT User Support was initiated to identify these … [Read more...] about CCleaner Hacked
Why Use a Password Manager Like LastPass?
By Tammera E Campbell on 2018-01-10T16:25:47Z Generating, remembering and maintaining unique passwords is challenging and nearly impossible today. As the number of mandatory passwords, password length, and password complexity increases, it becomes harder to remember them without relying on … [Read more...] about Why Use a Password Manager Like LastPass?
MacKeeper Introduces More Problems Than It Is Worth
By Tammera E Campbell on 2017-12-19T19:59:49Z MacKeeper is a well-known utility suite for macOS, which is typically installed by users looking to improve the performance of their system. MacKeeper is known to use aggressive marketing techniques, and has a very poor track record in terms of … [Read more...] about MacKeeper Introduces More Problems Than It Is Worth
Apple MacOS High Sierra Security Bug
By Tammera E Campbell on 2017-11-30T18:11:40Z Problem As reported yesterday, there's a major security flaw in Apple's newest operating system, High Sierra. The bug allows anyone to gain complete administrative access to the computer when using “root” as the username with a blank password. … [Read more...] about Apple MacOS High Sierra Security Bug
Password Requirements Have Changed
By Tammera E Campbell on 2017-10-19T23:06:01Z Cyber Security recently changed Berkeley Lab Identity password requirements. The changes included: Your passphrase must be at least 14 characters Your passphrase must pass a strength check that disallows repeated / sequential characters, … [Read more...] about Password Requirements Have Changed
TREX Will Require VPN for Offsite Access Starting June 29 2017.
By Mark Dedlow on 2017-06-08T02:29:57Z As part of the Laboratory’s ongoing efforts to improve cyber security, TREX will require VPN for off site access beginning June 29th 2017. Users can get more information about VPN installation at http://go.lbl.gov/vpn and get assistance at … [Read more...] about TREX Will Require VPN for Offsite Access Starting June 29 2017.
MalwareBytes Security Software Available at software.lbl.gov
Nina Lucido posted on Sep 02, 2015 Berkeley Lab IT's Cyber Security and Workstation Support groups recommend installing MalwareBytes Anti-Malware for Business on all Windows laptops and workstations. MalwareBytes is able to detect and remove many forms of malicious software that … [Read more...] about MalwareBytes Security Software Available at software.lbl.gov
OPM Data Breach
Adam Stone posted on Jun 04, 2015 On June 4, the Office of Personnel Management in the Federal Government announced a major breach of data on 4 million individuals. Since Berkeley Lab employees are not Federal employees, most LBL employees and affiliates are not included in the scope of … [Read more...] about OPM Data Breach
Heartbleed security bug and Berkeley Lab
Adam Stone posted on Apr 11, 2014 The recently announced Heartbleed bug has been making the rounds in the media. Visit go.lbl.gov/heartbleed for an assessment of impact on Berkeley Lab systems, to find more information on the bug and to get recommendations from Cyber Security regarding … [Read more...] about Heartbleed security bug and Berkeley Lab
Was this page useful?

