PGP is a product that encrypts your data to keep it safe from unauthorized access. The University is now supporting two components of PGP: Whole Disk Encryption and NetShare. Installation of the PGP Desktop application is required to use either component. For information about purchasing licenses, please see our PGP Information page.
NOTE: Do not install PGP Desktop on MacOS 10.7.3. There are unresolved issues with the software on this version of OSX.
|Installer||PGP Desktop for MacOSX Installer|
|How To||Install PGP Desktop for MacOSX (Video)*|
|Quick Start||PGP Desktop 10.2 for MacOSX Quick Start Guide*|
|User Guide||PGP Desktop 10.2 for MacOSX User's Guide*|
|Installer||PGP Desktop for Windows 32-bit Installer|
|PGP Desktop for Windows 64-bit Installer|
|How To||Installing the Client Software and User Enrollment|
|Installing the Client Software from AD Joined Systems|
|Install PGP Desktop for Windows (Video)*|
|Quick Start||PGP Desktop 10.2 for Windows Quick Start Guides*|
|User Guide||PGP Desktop 10.2 for Windows User's Guides*|
|Links to Many Other Installation/Upgrade/User's/Admin Guides*|
Using PGP Whole Disk Encryption (WDE), your entire disk is encrypted. After encryption, you will enter a passphrase when you start you computer. Not all computers need to be encrypted. If you have questions about your computer and the data stored on it, contact your departmental support technician, or contact the OIT Service Desk at 3-1222.
|How To||Setting Up Whole Disk Encryption (Windows)|
|User Guide||PGP Whole Disk User Guides*|
|PGP Whole Disk Command Line User Guide*|
|Product Information||PGP Whole Disk Encryption at Symantec*|
|Current Issues||Unable to boot after installing MacOSX 10.7.3 on encrypted disk*|
|PGP Whole Disk Encryption for MacOSX Recovery Disk Images*|
PGP NetShare is a Windows only feature that allows you to create a secure file store either on your local computer or a network share. All files saved into this folder are automatically encrypted. If you have questions about setting up or using this feature, contact your departmental support technician or the OIT Service Desk at 3-1222.
|How To||Setting up a NetShare Folder|
|Adding or Removing Users/Groups from a NetShare Folder|
|User Guide||PGP NetShare Command Line User Guide*|
|Product Information||PGP NetShare at Symantec*|
|How To||Creating a Self Decrypting Passphrase Protected File|
*These links navigate to outside sources.
The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.
Original release date: December 01, 2016 | Last revised: December 14, 2016
Avalanche refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI), is releasing this Technical Alert to provide further information about Avalanche.
Cyber criminals utilized Avalanche botnet infrastructure to host and distribute a variety of malware variants to victims, including the targeting of over 40 major financial institutions. Victims may have had their sensitive personal information stolen (e.g., user account credentials). Victims compromised systems may also have been used to conduct other malicious activity, such as launching denial-of-service (DoS) attacks or distributing malware variants to other victims computers.
In addition, Avalanche infrastructure was used to run money mule schemes where criminals recruited people to commit fraud involving transporting and laundering stolen money or merchandise.
Avalanche used fast-flux DNS, a technique to hide the criminal servers, behind a constantly changing network of compromised systems acting as proxies.
The following malware families were hosted on the infrastructure:
Avalanche was also used as a fast flux botnet which provides communication infrastructure for other botnets, including the following:
A system infected with Avalanche-associated malware may be subject to malicious activity including the theft of user credentials and other sensitive data, such as banking and credit card information. Some of the malware had the capability to encrypt user files and demand a ransom be paid by the victim to regain access to those files. In addition, the malware may have allowed criminals unauthorized remote access to the infected computer. Infected systems could have been used to conduct distributed denial-of-service (DDoS) attacks.
Users are advised to take the following actions to remediate malware infections associated with Avalanche:
ESET Online Scanner
Microsoft Safety Scanner
Norton Power Eraser
Trend Micro HouseCall