NOTE: EDEM is in the process of getting the updated version packaged and will be deploying it to all CoreImage devices in the coming days - there is no action CoreImage users need to take. However, it will be of interest to individuals who have Chrome installed on their own devices.
Protect your team’s hard work. Incorporate these offboarding practices for a secure and seamless transition.
Sunday, December 3, 2 - 4 a.m., an upgrade will occur to the Enterprise Service Bus (ESB) which interfaces with all external systems (e.g. medication orders, ADT orders, X-rays, EKGs, etc).
This will prevent the transmission of orders within MiChart to other systems such as laboratory, medications, ADT orders.
The in-person services will be closed for the holiday.
There has been an increase in phishing scams that utilize or imitate legitimate U-M services, such as Duo and DocuSign. Please be aware of these ongoing scams and share this information with faculty, staff and students in your unit.
On Thursday, November 16th at 6:00 a.m., HITS will implement the ability to view Outlook calendars across Michigan Medicine, Sparrow, and U Health-West.
Newsweek calculated scores for each hospital by weighing recommendations from peers, patient experience data, hospital quality metrics and patient-reported outcome measures implementation.
Duo Remember Me for seven days is now available across applications where you sign in with your Michigan Medicine (Level-2) credentials.
VMware has released updates to address a critical vulnerability in VMware vCenter Server that could lead to possible remote code execution. Affected VMware servers and components should be updated as soon as possible after appropriate testing. Because of the severity of the vulnerability and the lack of workaround to mitigate it, VMware has released patches for some legacy versions of their products, as noted below.
Help spread awareness of student ticket scams
ITS Information Assurance recently has seen an increase in the sophistication of student football ticket scams. Please be aware of these ongoing scams and share this information with your student population, student advisors, and faculty.
The scammers use GroupMe or other social media to offer U-M football tickets for sale. Then the scammers follow up by sending forged emails that appear to come from real students’ @umich.edu email addresses. The emails:
Claim to prove the legitimacy of the ticket sellers.
Ask the recipients to send payment through CashApp, Venmo, or other methods.
Promise to transfer the tickets once payment is made.
Students should be suspicious of offers for football tickets and should send a new, separate email to the seller’s @umich.edu email address to verify their identity. If they reply to a message they received, the reply-to address will most likely be another email address and they may not notice if they are not paying attention.
Refer to How to Spot a Spoof for tips on recognizing clues that indicate an email might be spoofed or forged.
Students who have fallen victim to one of these scams, which resulted in loss of money, should contact the University of Michigan Police Department at 734-763-1131.
An update to address a high-severity vulnerability in curl and libcurl, a command line tool and library for transferring data, has been released with curl 8.4.0. Apply the patch as soon as possible after appropriate testing to affected systems, especially those using SOCKS5 proxies.
Sunday, October 22, 2 - 4:30 a.m., the Fall MiChart upgrade will occur. This will be the final planned upgrade for 2023.
This will impact all MiChart users and users of applications that send data to or receive data from MiChart.
See the update to this advisory. This message is intended for U-M IT staff who are responsible for any systems that utilize curl and libcurl.
Google has released an important update for Android to remediate a zero-day vulnerability (CVE-2023-4863 and CVE-2023-4211) that is being actively exploited in the wild. We expect additional software vendors will also be releasing updates to fix other applications affected by this vulnerability.
Update Android devices as soon as possible.
A vulnerability (CVE-2023-4911) in the GNU C Library (i.e., glibc) on many popular Linux distributions has been discovered. Successful exploit of this vulnerability can give a malicious actor full root privileges. Proof of concept (POC) exploit code is publicly available. Linux systems should be patched as soon as possible.
ALERT: Apply Urgent Update to Google Chrome and Mozilla Firefox Browsers, and other software (CVE-2023-5217)
NOTE: EDEM is in the process of getting the updated version packaged and will be deploying it to all CoreImage devices in the coming days - there is no action CoreImage users need to take. Note that EDEM does not manage Firefox, so if users have it installed they should follow ITS instructions and update manually.
A major incident impacting Level 2 authentication services has been resolved.
This message is intended for U-M IT staff who are responsible for university devices running the Mozilla Firefox web browser or Thunderbird email client. It will also be of interest to individuals who have these programs installed on their own devices.
Be aware of this and share/advise those in your community that this calling activity is a scam.
Google has released an important update to the Google Chrome web browser for a zero-day vulnerability that is being actively exploited in the wild. Update Chrome as soon as possible.
This week, the organization will officially retire its annual Valuation form.
Ray Khamo talks Microsoft, his team's impact on the university, golf, and his family's journey.
Help spread awareness of scam emails that target students