Internet Explorer Vulnerability

The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer.

Open SSL “Heartbleed” security flaw

Many of you may have already read or heard about the “Heartbleed” web bug. The following information was posted on the West Lafayette Information Technology at Purdue (ITaP) website by the West Lafayette ITaP Interim Chief Information Security Officer. It is being provided for your information.

Phishing E-mail Alert: IT SUPPORT

This is not a legitimate E-Mail. This is a Spam/Phishing E-Mail message. This is an attempt to acquire information such as usernames, passwords, credit card numbers and other sensitive and protected information by masquerading as a trustworthy entity such as a bank, online payment center or IT administrators. These messages will contain links to websites that are infected with malware.

Fake E-mail Alert: New Webmail Update.

The message below is being circulated via the Internet. This is not a legitimate message. Please do not respond to this message or click on any of the links. Please delete the message.

If you have any questions or concerns please contact the Customer Service Center at extension 2888 option 2.

Malicious E-mail Alert: Your account has been temporarily blocked

Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer. Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses.

Phishing E-mail Alert: EMERGENCY

The malicious E-Mail message below is being circulated via the Internet. This is a Phishing E-Mail. Please delete this message.


Phishing email messages, websites, and phone calls are designed to steal money.

Malicious e-mail: Mailbox Violation Routine

The malicious E-Mail message below is being circulated via the Internet. This is a Phishing E-Mail. Please delete this message.

Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.

Phishing Scam Alert: Email Account Re-Activation

The e-mail, “Email Account Re-Activation” is being circulated via the Internet. This is a Phishing Scam. Do not respond to this E-Mail and do not click on the link. Please delete this message.

Email Security Alert: A message with potentially dangerous attachments

The following message is being circulated via the Internet along with attachments. This is not a legitimate message. Do not open attachments and delete the message.

Email Security Alert: Contaminated Email Attachment

An email message is being circulated via the Internet. The message includes a contaminated attachment. Please do not respond to this message or click on the attachment.

Phishing Email Alert: Annual Form – Authorization to Use Privately Owned Vehicle on State Business

The message below was published October 8, 2013 to SecurePurdue. Purdue West Lafayette is seeing a lot of collateral damage as a result of this. Most of the users are experiencing encrypted files in shared drives and many on their local machine. Do NOT attempt to open the attached zip file delivered with

A fraudulent Phishing attempt circulating across the internet

A message is circulating across the Internet. This is a perfect example of a fraudulent Phishing attempt. This is not a legitimate E-Mail. Please do not respond to this E-Mail, do not click on any links and delete this E-Mail.

Security Alert! Another Phishing Attempt

This is not a legitimate E-Mail message. This is a Phishing attempt. The sender is trying to acquire protected or sensitive information such as usernames, passwords, credit card details and social security numbers by masquerading as a trustworthy entity.

Security Alert: Phishing attempt

The E-Mail below is being circulated. This is not a legitimate request. This is a Phishing attempt falsely claiming to be an established legitimate enterprise in attempt to scam the user into surrendering private and protected information that will be used for identity theft. The E-Mail can