This week, the Federal Office for Information Security has again published a warning of the trojan "Emotet"  (only in german)
Fraudsters are currently sending fake applications to prepare dynamite phishing.
In dynamite phishing, the attackers send e-mails to a target with the intention of forcing them to open the e-mail attachment.
On Tuesday, 09.07.2019 at 6pm, the certificates of the WLAN connections "Uni-Mainz" and "eduroam", as well as of the unversity VPN server of the unversity will be renewed. Depending on the operating system, the certificate will be automatically accepted or must be manually accepted due to a request. Either the name oder the fingerprint will be shown.
The correct certificate contains (again depending on the operating system and may be shown partially) the follow information:
CN = radius.zdv.uni-mainz.de
O = Johannes Gutenberg-Universitaet Mainz
L = Mainz
S = Rheinland-Pfalz
C = DE
Fingerprint: e7 78 56 db b8 2c 23 cf f1 26 94 48 42 f4 cd 54 b3 5b 6b 7d
PuTTY is a free implementation of SSH- and Telnet-services for Windows.
In a nutshell
- Official title: KRACK (Key Reinstallation AttaCKs)
- The cause of this security breach is the so called 4-way-handshake method.
How to access and register at the ssh-gateway.