Please deal with Security Issues.
UTokyo-CERT has released the following information on security issues (available on campus only). Please refer to the following update / handling method (available from off-campus) and make sure to deal with them quickly.
Please refer to the following JPCERT/CC information from off-campus.
2024/06/12 Microsoft Releases June 2024 Security Updates (Reference information : JPCERT/CC)
(Handling Method) How to update Microsoft products
2024/05/15 Alert Regarding Vulnerabilities in Adobe Acrobat and Reader (APSB24-29) (Reference information : JPCERT/CC)
(Handling Method) How to update Adobe Acrobat
2024/01/17 Oracle Releases Critical Patch Update, January 2024 (Reference information : JPCERT/CC)
(Handling Method) How to update Oracle Java
(Handling Method) How to update Google Chrome, How to update Microsoft Edge
2023/03/23 Alert Regarding Re-emergence of Emotet Malware Infection Activities (Only in Japanese)
(Handling Method) How to deal with Emotet Malware
2022/11/02 Alert Regarding Vulnerabilities (CVE-2022-3602, CVE-2022-3786) in OpenSSL (Reference information : JPCERT/CC)
(Handling Method) How to update OpenSSL
2022/06/14 Attention about Jupyter notebook (Only in Japanese)
2021/12/20 Alert Regarding Arbitrary Code Execution Vulnerability (CVE-2021-44228) in Apache Log4j (JPCERT/CC)
2021/09/13 Alert Regarding Command Execution Vulnerability (CVE-2021-3781) in Ghostscript (Reference information : JPCERT/CC)
(Handling Method) *How to deal with CVE-2021-3781
Please keep Your Software Updated.
Please refer to the following update / handling method and take care to keep your software updated on your computer routinely.
When using a computer connected to UTokyo network, please make sure to follow “Guidelines for Information Ethics and Computer Use, UTokyo”. (Please read those guidelines repeatedly.)
Please note that software for which support ended cannot be used.