As part of the Enabling Technology work, the provision of IT support across the University is being merged to create a new central IT function providing support across a range of systems and services to all parts of the University. Continue reading
IT Supporters
Latest scam email
We have had a mail sent to University staff this morning which is another scam. Continue reading
Wi-Fi access extension project update
In early 2013, the Technology Enhanced Learning Strategy Group (TELSG) proposed the expansion of centrally managed Wi-Fi services across the University. Continue reading
CryptoLocker warning
We are advising that you beware fake e-mails such as ones pretending to be either from Voicemail, HMRC, image scanners, courier deliveries, company complaints etc, containing small “Zip” attachments.
Continue reading
Wi-Fi developments
On 2 December 2013, there will be changes to how you connect to the Wi-Fi at the University of Reading. In order to keep in line with the recommendations of the Eduroam Federation, we will be changing the eduroam network to no longer support WPA-Enterprise encryption. Continue reading
6 months until end of Windows XP support.
The end of Windows XP and Office 2003 support from Microsoft is now only 6 months away. As in our previous news item, from April 2014, there will no longer be any operating system or security updates made available from Microsoft. Continue reading
AppGrad product
AppGrad is not approved for use with University of Reading IT Systems and should not be used. It is not associated with the University of Reading. Continue reading
Sophos update to v10.3
Version 10.3 of Sophos Endpoint Security client for Windows is coming early in October. This version adds support for the Sophos Client Firewall on Windows 8 workstations as well as an updated threat engine. Continue reading
Windows 8 RT
Following Microsoft’s currently aggressive pricing on the Surface Tablet, particularly the Windows 8RT version, here are some pros and cons for this Operating system Continue reading
New Java Exploits
A few days ago somebody “responsibly” published proof-of-concept code for vulnerabilities in Java and as a result there are now exploits starting to appear in drive-by-download exploit kits. Continue reading