Robert Morris University made College Choice’s rankings of the Best Online Bachelor’s and Online Master’s in Information Systems Security.
RMU’s Bachelor of Science in Cyber Forensics and Information Security ranked in the top 15 Best Information Systems Security Bachelor’s Online. The BS in Cyber Forensics and Information Security combines the disciplines of technology, business, organizational behavior, and law.
RMU’s Master of Science in Cyber Security and Information Assurance degree program prepares information systems and technology professionals to recognize and combat information systems threats and vulnerabilities. The MS in Cyber Security and Information Asssurance ranked in the top 30 Best I.T. Systems Security Master’s Online.
CollegeChoice also noted, “Even though Robert Morris University’s enrollment is just around 5,000 students, its online capabilities have made a big impression in the world of rankings. In US News & World Report’s ‘Best Online Universities of 2017,’ RMU ranked in the top 10 percent in the nation. Within the state of Pennsylvania, Educemic named it the 3rd Top Pennsylvania Online School.”
IBM is producing a set of videos that are quick conversations with a new generation of coders and creators on the mainframe. Watch RMU alumna Torrie McLaughlin, who works on the mainframe at a large financial institution, describe how COBOL is a key asset to her professional toolkit.
On Tuesday, September 12th, members of the Top Secret Colonials helped prepare supplies for delivery to victims of Hurricane Harvey in Texas. The members helped package dozens of boxes filled with the supplies collected in Wheatley. They delivered the supplies to the Chartier’s Volunteer Fire Department. From there, the boxes were placed on a truck that is headed for Texas.
Pictures of the items and the delivery are shown below.
A recent thing in news, is how taking pictures with either your hands up or having the peace sign up and your finger prints facing the camera can be a dangerous thing if you post them. Most people are out having fun with their friends and are taking a fun, simple photos but with the way the world is now you have to think twice before taking the picture or posting it.
If the lighting and focus is just right then the they hackers can easily recreate your finger prints as long as it 10 feet from the person. It is hard to believe that we have reached the point where we have to be worried about our finger prints being taken from a photo that is being posted. But as time keeps going on, we need to be aware of these things and we need to be aware that these problems do exist and we all need to second guess before taking and posting pictures.
The University of Pittsburgh will be hosting a panel on Russian Hacking on Thursday, February 2nd, from 1:30pm to 4:30pm. At this event, several panelists will discuss a variety of topics, including: Russian activities in cyberspace, U.S. and Russian views on cyber tool usage, U.S. response to Russian activities, and Russia’s possible effect on the U.S. presidential election.
There will four panelists at this event:
- Andrei Soldatov, a Russian investigative journalist and security services expert
- Ellen Nakashima, a national security reporter for The Washington Post
- Luke Dembosky, a former Deputy District Attorney General for National Security and former U.S. Department of Justice representative at the U.S. Embassy in Moscow
- Keith Mularski, a Supervisory Special Agent for the FBI in Pittsburgh
The event will be streamed live at law.pitt.edu/cybertalk. Students can only attend the event at the University of Pittsburgh if they have already registered for it. Registration for the event closed yesterday, January 30th. However, everyone is welcome to watch the event live through the link above.
For more information, there is a flyer posted below.
Russian Hacking Panel Flyer
The Internet Crime Complaint Center (IC3) has issued an alert on employment scams that target college students. The scam involves phony job opportunities that may be advertised via college employment websites or sent via email (targeting bank accounts). For additional information and examples of phony emails, please see here.
For several months, a phishing scam has been tricking Gmail users into sharing their passwords. Recently, the security company WordFence released an alert about this scam.
The attack starts when the attacker sends an email to the victim’s Gmail account. The email address of the “sender” usually belongs to someone that the victim knows; however, the sender’s account has already been compromised by the attacker. The email contains what appears to be an image for the victim to click on.
When the victim clicks on the “image”, they are taken to a new tab which prompts for their Gmail account information. Once the victim signs in on this page, their account is compromised. The attacker then has access to the victim’s emails and personal documents. Once the attacker has access to the victim’s account, they will use this account to send the scam to more victims.
What makes this scam “highly effective” is that it is uses email addresses of people that the victim knows. Also, the fake Gmail sign-in page appears to be legitimate, containing the Google logo and normal entry fields for username and password.
In order to prevent yourself from becoming a victim of this scam, it is important to note the following:
- Although the false attachment contains “accounts.google.com” in its URL, it also has “data:text/htm” at the beginning, which is not found on a normal Gmail URL.
- When signing into any service, you should check the browser bar to verify the protocol and hostname. The URL should begin with “https:” and there should be a green lock icon next to the URL.
- Gmail users can also enable two-factor authentication or “2-step verification” to make their account more secure.
For more information: Don’t fall for this ‘highly effective’ Gmail scam and WordFence Article