January 17, 2014
SVSU student to lead national convention for 400,000-member service fraternity
Saginaw Valley State University junior Amber Swanson will serve as chairperson of the 2014 national convention for Alpha Phi Omega, a co-ed service fraternity with 400,000 members on 375 campuses.
Swanson said she expects 2,000 members to attend the convention from Dec. 27-30 at the Hyatt Regency O’Hare in Chicago. The group assembles every two years.
“I was literally jumping for joy,” the communication major said upon learning of her appointment via email last month.
“Words cannot describe how insanely excited and fortunate I feel as I embark on this new journey. I cannot wait to plan a spectacular convention, meet brothers from across the country and represent Alpha Delta Upsilon (SVSU’s chapter).”
Over the next 12 months, Swanson’s duties will include developing a theme and logo for the conference, recruiting membership involvement, developing the program lineup and serving as spokesperson for the event.
The convention goals include conducting business for the fraternity, educating members via workshops and celebrating the group’s successes, she said.
Swanson, a Grayling native, said pledging for SVSU’s chapter “is the best decision I’ve ever made.”
The local group in recent months has volunteered its help at the Saginaw Children’s Zoo at Celebration Square, helped organize several community BINGO games at local assembly halls and sent greeting cards that troops overseas could fill out and mail to family and friends. The fraternity plans to meet this month to determine this semester’s service project goals, Swanson said.
December 18, 2013
BRL Students attend SFN!
Long trip, but great week engaged in neuroscience
December 12, 2013
What do you know about internet safety?
Learn about how to keep yourself safe on the internet.
By Mike Holliday
is our new landing page for information about how you can be more aware about the various ways methods you can become vulnerable to a security breach, personal identity theft, virus/malware infections, and other attacks to compromise your way of life.
November 14, 2013
Adobe Software Breach
Adobe Software users may be affected by a security breach at the company.
By Mike Holliday
In October, Adobe suffered a serious data breach that exposed all of their registered user accounts. Anyone who has ever purchased or registered their Adobe software, or signed up for announcements, has been exposed and will potentially be targeted for attacks.
In this message, we want to communicate major action points for those who may have become vulnerable due to this breach:
- CHANGE PASSWORDS IMMEDIATELY
- Anyone who used the same password for Adobe and other accounts (especially SVSU) should immediately change their passwords at the other locations and monitor for unusual activity.
- RESET YOUR ADOBE PASSWORD and HINTS
- You should do this by manually visiting the Adobe website, and not by clicking on links arriving via email.
- BE AWARE!
- Be aware that additional phishing attempts will likely come to your account(s).
- Do not open attachments - scrutinize the message(s) for authenticity.
- Do not respond directly to messages seeking personal information. this includes username and password, or credit card information.
- Do not click on links provided in messages (go to the proper site manually).
- Be careful to not fall victim to phishing attempts that require you to provide credentials, for lack of service or to gain services.
- DO NOT USE YOUR INSTITUTIONAL PASSWORD for external web sites or Internet services.
- If you reuse a password at multiple locations, when the password is compromised at one site, the miscreants then can gain access to all sites where you've used that password.
- The best policy is to always use different passwords for different accounts.
November 8, 2013
Crytovirus, aka CrytoLocker, and How it May Affect You
By Mike Holliday
This message pertains to recent news stories on various cable networks, including our local WNEM TV 5 reporting about Cryptovirus (aka CryptoLocker). The reports are about a serious and nasty variation of other past ransomware viruses like FBI CyberCrime and Homeland Security. Watch this video for some insider technical information about how this virus works, from Sophos.
This latest variation informs you that your system files have been locked (encrypted) and you must pay $300 with X amount of time to get the key to unlock/decrypt your machine (or risk losing the key forever). And it actually does encrypt your files (see news articles below for a list of common files). Of course, there is no way you can trust them to provide you the key (after you give them your account information and money).
This infection is typically spread through emails sent to company email addresses that pretend to be customer support related issues from Fedex, UPS, DHS, etc. These emails would contain a zip attachment that when opened would infect the computer. These zip files contain executables that are disguised as PDF files as they have a PDF icon and are typically named something like FORM_101513.exe or FORM_101513.pdf.exe. Since Microsoft does not show extensions by default, they look like normal PDF files and people open them.
The only way to ensure you do not lose your files is to:
- Back your files up to a source that's not always connected to your computer or network. Variations of the virus may extend past your local hard drive and look for files on USB flash drives, external hard drives, and network shares.
- Cloud-based backup solutions (such as DropBox or SkyDrive) would be ideal.
- Practice safe computing!
- Make sure your computer anti-virus software is up to date.
- Make sure System Restore is enabled
- Most viruses are propagated through email links and attachments; phishing and scam emails attempting to be something they're not.
- Scrutinize the messages and think critically - an ounce of suspicion should cause you to exercise extreme caution.
- Do not blindly click on links; instead, visit the site manually (if you feel you must!)
- Do not open attachments just to check them out! Read the paragraph above about how these are typically spread!
Additional information below:
The recent Walmart Email is just one example of the Blackhole Exploit - read more here:
May 16, 2013
New Virus Attack: Walmart.com Emails
By Mike Holliday
The purpose of this message is to inform you of a new sophisticated Virus infected message, that does not require you to click on links - simply load the message into a "dated" web browser (like Firefox, IE, Chrome, Safari) and it searches for exploits on your computer.
If your system had AVG popup as you viewed it, and it blocked the message - great! That means AVG stopped its actions cold. If it did not, we should have your system inspected. Please contact the IT Support Center at x4225.
Below is a sample message. The circled areas are items you should scrutinize before acting on messages.
- If you hover over the From address - you'll see not only is Walmart misspelled (has two L's), and the actual address is poorly named and even sometimes has a different extension (.com, .net, .org).
- If you hover over the links (not clicking) it shows a completely different web address not related to the subject or material in the message.
- The fact they use an email address for salutation, versus your actual name on file when you order things online.
- The fact that the shipping details are not even close to being related to you.
Again, being aware of these kinds of nuances in messages will help further protect you. Be careful and assume that the message is not legitimate. Ask yourself basic questions.
- Do I have a Walmart/PayPal/eBay account?
- Did I order something online recently?
- Does something about this message seem suspicious or "phishy"?
If you are concerned, your next best course of action is to go directly to the website and log in normal and/or contact their Customer Service via phone (never click on links in these messages to get there).
And as always, please feel free to contact the IT Support Center (989-964-4225) for advice or to report something that is phishy. If you accidentally clicked and became a victim, you should change your passwords immediately and contact the IT Support Center to have your system inspected.
October 24, 2012
BRL travels to SFN
The members of the Brain Research Lab at Saginaw Valley State University traveled to New Orleans, La for the 42nd Annual Meeting of the Society for Neuroscience (http://www.sfn.org). While there the students were able to meet with and learn about neuroscience from experts from around the world. In addition, the students presented (5 posters) the research they worked on over the summer at the annual Faculty for Undergraduate Neuroscience (http://www.funfaculty.org).
Front Row (L-R): Justin Jacqmain (PSY), Jake Dunkerson (HS/OT), Jennica Young (HS), Maddy Searles (HS), Katalin Geeck (PSY), Tim Pionk (PSY)
Back Row (L-R): Evan Nudi (PSY), Dr. Charles Weaver (HS), David Mudd (PSY), Dr. Jeff Smith (HS), Kasey Moritz (PSY), Bob Underly (PSY)
September 3, 2012
BRL students attend SFN
The Society for Neuroscience (http://sfn.org) 41st Annual meeting was held in Washington DC in November of 2011. (from left to right) Bob Underly (Psychology), Jon Gallagher (Pre-med), David Mudd (Psychology), Jake Dunkerson (MS-OT), Sarah Fluharty (Psychology), and Kasey Moritz (Psychology) were able to attend symposia, poster session, vender row (SWAG!) during their four-day stay in DC. Jon, Jake, Dave, and Sarah also presented their poster at the FUN (http://funfaculty.org) poster session.
September 3, 2012
BRL student wins 2nd place at National Meeting
Jon Gallagher placed second in the Faculty for Undergraduate Neuroscience / German Graduate Schools of Neuroscience Poster Award annual competition. To be eligible for this award, the nominee must currently be an undergraduate student. Each nominee must be sponsored by a FUN Member whose dues are current. Each sponsor may nominate only one student. For a poster to be considered, it must have been accepted for presentation by the nominee at the FUN Social and Poster Session at the Society for Neuroscience Meeting. The posters are judged on methodological approach, degree of difficulty, solidity/verifiability of data, contribution to "new knowledge", design and layout of the poster, and the ability of the student to answer questions regarding the project.
We are also pleased to announce that Jon was also accepted into the MSU-COM medical program.
May 26, 2012
Sarah Fluharty wins SRCI
Sarah Fluharty, a psychology major from Sandusky, will receive $9,968 for her research on traumatic brain injury in rats. She will carry out her research at SVSU's Brain Research Lab, using rats as models to test the impact of an enriched environment for the recovery of head trauma. Fluharty writes that "rats are the preferred model for testing brain injuries because of their similar brain structure and organization" compared to humans. She hopes to present her findings at several conferences and ultimately submit a paper on the subject to scholarly journals.
Winning Student Research and Creativity Institute proposals were chosen through a competitive selection process.