|Title||Start Date & Time||End Date & Time|
|Service Maintenance Scheduled: VoiceThread||Friday, July 31, 2015 - 10:00pm||Saturday, August 1, 2015 - 12:01am|
|Service Maintenance Scheduled: CU-SIS and Portals||Sunday, August 2, 2015 - 6:00am||Sunday, August 2, 2015 - 10:00am|
|Service Maintenance Scheduled: MyCUInfo||Monday, August 3, 2015 - 4:00am||Monday, August 3, 2015 - 6:00am|
|Service Maintenance Scheduled: Campus Cable Television||Tuesday, August 4, 2015 - 8:00am||Tuesday, August 4, 2015 - 5:00pm|
|Service Maintenance Scheduled: Desire2Learn (D2L)||Saturday, August 8, 2015 - 11:00pm||Sunday, August 9, 2015 - 5:00am|
|Service Maintenance Scheduled: SIS-managed Linux Servers||Sunday, August 9, 2015 - 11:00pm||Thursday, August 13, 2015 - 7:00am|
Adobe has released updates for Adobe Flash Player. These updates address vulnerabilities that could cause an application or system crash and potentially allow an attacker to take control of an affected system.
The IT Security Office advises that users update affected software, listed below.
Security bulletin names:
APSB13-04– Security updates available for Adobe Flash Player
Adobe Flash Player 11.5.502.146 and earlier versions for Windows and Macintosh
Adobe Flash Player 184.108.40.2061 and earlier versions for Linux
Adobe Flash Player 220.127.116.11 and earlier versions for Android 4.x
Adobe Flash Player 18.104.22.168 and earlier versions for Android 3.x and 2.x
Released: February 7, 2013
Additional information about this vulnerability can be viewed at: http://www.adobe.com/support/security/bulletins/apsb13-04.html
If you have any questions, please contact the IT Service Center at 303-735-4357 (or 5-HELP from an on-campus phone) or firstname.lastname@example.org. Email and phone help is available Mondays through Thursdays, 7:00 a.m. to 10:00 p.m.; Fridays 7:00 a.m. to 7:00 p.m.; and Saturdays and Sundays, noon to 6:00 p.m.
OIT has defined the following categories to describe the severity of security risks:
URGENT severity represents a broad threat to the entire campus community.
SEVERE severity included remote exploits and worms.
IMPORTANT severity includes virus and local exploits for commonly used services.