緊急通知: 提防假冒 ICTO 服務中心發出之釣魚郵件

各位用戶:

您可能會收到一些類似以上的欺詐電郵,這些電郵看起來像是由資訊及通訊科技部發送的。

請勿回應此類查詢您的帳戶名稱及密碼的郵件,資訊及通訊科技部絕對不會要求您以電郵或通過網頁發送這類信息。

 

Phishing_20150817

如需要協助請聯絡我們的服務中心:

服務中心聯絡
位置 :中央教學樓東5座(E5)2085室
電話 :8822 8600
電郵 :@

資訊及通訊科技部

VeraCrypt – TrueCrypt 的替代加密軟件

正如較早前發佈,TrueCrypt 可能含有未修復的安全問題

目前,已有幾種開源軟件可替代 TrueCrypt,其中之一是加密軟件 VeraCrypt。它提供一個全面的安全問題解決方案。此軟體不僅能夠解決許多 TrueCrypt 中的漏洞和安全問題,而且它還適用於 Windows 、Mac 和 Linux 系統。

VeraCrypt 支援高度安全的 AES 和 Serpent 、Twofish 三種加密演算法以及它們的組合來加密數據。用戶可以使用它來創建加密區或加密磁碟分區和整個磁碟。

資訊及通訊科技部網頁上有提供 Windows 和 Mac 作業系統內建加密工具的使用教學,詳情請參閱: http://www.umac.mo/icto/intranet/security/encrypt_veracrypt_c.html

如有任何疑問,請與我們的服務中心聯絡:

服 務 中 心
位置 : 中央教學樓東5座(E5)2085室 (電子地圖)
電話 : 8822 8600
電郵 : @
資訊及通訊科技部

提提您: 請勿回應欺詐郵件

欺詐郵件樣本

欺詐郵件樣本

各位用戶:

您可能會收到一些類似以上的欺詐電郵。這些電郵看起來像是由資訊及通訊科技部發送的。

請勿回應此類查詢您的帳戶名稱及密碼的郵件。資訊及通訊科技部絕對不會要求您以電郵或通過網頁發送這類信息。若您不小心回應了一些可疑郵件,請儘快重設您的帳戶密碼。

如需協助,請聯絡我們的服務中心:

服務中心聯絡
位置 : 中央教學樓東5座 (E5) 2085室
電子地圖 : 電腦版本, 手機版本
電話 : 8822 8600
電郵 : @

資訊及通訊科技部

Please Do Not Respond to Phishing Email (24-Feb-2015)

Dear Users,

You may have received email similar to the above phishing email, which seems to be sent by ICTO.

Please DO NOT RESPOND to this kind of emails which purposely asking for your user name and password. ICTO will NOT ask you for these information through email or web page. If you have responded to the suspicious email accidentally, you are advised to reset your password at once.

If you have any further queries, please feel free to contact our Help Desk (Ext. 8600, Email: @)

Thanks for your attention.

Information and Communication Technology Office

Be aware of the email with suspicious attachment named “A letter of complaint on University of Macau.rar”

To: All Users

Many users reported that they received a suspicious email with password protected attachment named “A letter of complaint on University of Macau.rar”. Please DO NOT OPEN this attachment. This attachment contains a suspected Trojan. Usually, to compress an attachment with password can be used to bypass Anti-virus system. If you open it, your computer may be infected.

If you have any further queries, please feel free to contact our Help Desk (Ext. 8600, Email: @)

Thank your your attention.

Information and Communication Technology Office

Please Do Not Respond to Phishing Email (31-Mar-2015)

Dear Users,

You may have received email similar to the above phishing email, which seems to be sent by ICTO.

Please DO NOT RESPOND to this kind of emails which purposely asking for your user name and password. ICTO will NOT ask you for these information through email or web page. If you have responded to the suspicious email accidentally, you are advised to reset your password at once.

If you have any further queries, please feel free to contact our Help Desk (Ext. 8600, Email: @)

Thanks for your attention.

Information and Communication Technology Office

Critical Security Notice for OpenSSL Heartbleed Vulnerability

To All Users,

The US Computer Emergency Readiness Team (US-CERT) have issued warnings on the vulnerability that found in OpenSSL versions 1.0.1 through 1.0.1f, and version 1.0.2-beta including version 1.0.2-beta1.

 

Original release date

8 April 2014

Description

This vulnerability allows remote hackers to retrieve sensitive information without authentication through incorrect memory handling in the TLS heartbeat extension. User authentication credentials and secret keys may then be disclosed to hackers.

The sensitive information that may be retrieved using this vulnerability include:

  • Primary key material (secret keys)
  • Secondary key material (user names and passwords used by vulnerable services)
  • Protected content (sensitive data used by vulnerable services)
  • Collateral (memory addresses and content that can be leveraged to bypass exploit mitigations)

 

Systems Affected

  • OpenSSL 1.0.1 through 1.0.1f
  • OpenSSL 1.0.2-beta (including 1.0.2-beta1)

 

Solution

Step 1: You can check if your web server is affected by this vulnerability through https://www.ssllabs.com/ssltest/.  A warning as show below will be displayed if the webserver is affected:

cid:image001.png@01CF54B3.62800530

Step 2: OpenSSL has released the latest patches to address this vulnerability, you can download the patched update fromhttps://www.openssl.org/source/.

  • For OpenSSL version 1.0.1 (including 1.0.1f): Update to version 1.0.1g
  • For OpenSSL version 1.0.2-beta (including 1.0.2-beta1) : To be fixed in version 1.0.2-beta2.  Users unable to immediately upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS .
  • Details: https://www.openssl.org/news/secadv/20140407.txt

Step 3: Any keys generated with a vulnerable version of OpenSSL should be considered compromised, they should be regenerated and deployed after the patch has been applied.

 

References

 

Thank you for your attention. For further inquiries, please feel free to contact our Help Desk (Ext. 8600, Email: @).

Information and Communication Technology Office

 

Important System Security Update for Shellshock

To All Users,

Please be informed that a high security vulnerability in UNIX Bash shell (Shellshock, also known as Bashdoor) was
disclosed on 24 Sept. 2014, which would eventually let remote attackers bypass system authentication and execute
arbitrary commands.

Affected systems:
– CentOS
– Mac OS
– Redhat Enterprise Linux
– Ubuntu
– And any systems which utilize BASH as the default system shell

System administrators and users of UNIX / Linux / Mac are advised to update the BASH of their system to the latest available version.

For CentOS, Redhat Enterprise Linux users, detailed update information can be found:
https://access.redhat.com/articles/1200223

Mac OS
For Mavericks 10.9.5 – http://support.apple.com/kb/DL1769
For Mountain Lion – http://support.apple.com/kb/DL1768
For Lion – http://support.apple.com/kb/DL1767

Ubuntu
http://www.ubuntu.com/usn/usn-2363-1/
http://www.ubuntu.com/usn/usn-2364-1/

More general information can be found here
CVE-2014-6271 – http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271
CVE-2014-6277 – http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6277
CVE-2014-7169 – http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169
CVE-2014-7186 – http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7186
CVE-2014-7187 – http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7187

Thank you for your attention. For further inquiries, please feel free to contact our Help Desk (Ext. 8600, Email: @).

Information and Communication Technology Office