News

  • Microsoft has recently provided a partial patch for the critical PrintNightmare Zero-Day exploit for Windows 7 through 10. All Windows users utilizing a machines that…


  • As the book closes on the Class of 2021, we would like to update the community on 2 recent developments: 1) Billions of email addresses…


  • We have received word that Google just just patched a major zero day exploit for the Google Chrome browser and there are bad actors currently…


  • Happy New Year! Here’s hoping for a better, safer, and healthier 2021. Sadly, bad actors and grifters continue to flood our email inboxes and phones…


  • Mac OS UpGRADE Advisory

    Users still running Mohave (Mac OS 10.14) or newer should NOT upgrade to Catalina (Mac OS 10.15) or Big Sur (Mac OS 11). They are…


  • Due to extraordinary real world circumstances our Covid-19 IT support model is now live. https://wikis.mit.edu/confluence/display/shassit/SHASS+Covid-19+IT+Support+Model


  • Zoom Session Security

    In light of increasing reports from local schools and colleges of outside bad actors crashing Zoom classes and sharing inappropriate materials in an attempt to…


  • We have recently seen a increased uptick in phishing attacks targeting the MIT SHASS Community. These attacks include but are not limited to bad actors…


  • Just in case anyone needed any more reasons to stop using public USB charging stations. https://www.kcci.com/article/rossen-reports-hackers-taking-advantage-of-public-phone-chargers/30672956


  • As many of you may have seen this past MLK weekend, SHASS was subject to a large scale phishing attack with bad actors pretending to…