[10206] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, December 17, 2013

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue Dec 17 12:36:45 2013

Resent-From: ist-security-fyi@MIT.EDU
From: Monique Yeaton <myeaton@MIT.EDU>
To: ist-security-fyi <ist-security-fyi@MIT.EDU>
Date: Tue, 17 Dec 2013 17:35:30 +0000
Message-ID: <3ACED3B2A8CEFB4598A845F07FD4A05F3AAA0BD5@OC11EXPO24.exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============0264538172=="
Errors-To: ist-security-fyi-bounces@MIT.EDU

--===============0264538172==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AAA0BD5OC11EXPO24excha_"

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AAA0BD5OC11EXPO24excha_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

In this issue:


1. Popular Holiday-Themed Phishing

2. Reminder: Windows XP and Office 2003 Soon De-Supported

3. Job Opening: IT Network Security Technical Team Lead

4. Free from SANS: Holiday Hacking Challenge



-------------------------------------------------

1. Popular Holiday-Themed Phishing

-------------------------------------------------


Phishing attacks =97using email to trick a recipient to click on a link or =
an attachment that then infects the computer =97happen year round. However,=
 at this time of year there are more people shopping online than usual. Thi=
eves take advantage of these rushed and weary shoppers to get through their=
 defenses.


An article on Help Net Security lists the most common holiday-themed phishi=
ng attacks:


  *   Holiday e-card: Holiday greetings that come through email.
  *   Holiday sales, discounts or deals: Attackers will try to sneak throug=
h phishing emails masquerading as merchants offering blowout deals.
  *   Holiday party information or registration: Most companies throw a hol=
iday party this time of year. Spoofed invitations could catch the untrained=
 eye.
  *   Package delivery or update information: Fed Ex or UPS delivery notifi=
cations have often been spoofed to get a recipient caught unawares.
  *   Year-end deadlines or requirements: This is an open opportunity for a=
ttackers to get creative and exploit an employee before he/she heads out fo=
r the holidays.
  *   Travel notifications: Emails warning of itinerary changes will certai=
nly grab the attention of a person eager to get home for the holidays.


Read the full article online<http://www.net-security.org/secworld.php?id=3D=
16075>.


The best way to make sure an email is legitimate is to verify the sender. E=
ither view the email=92s full headers<http://kb.mit.edu/confluence/display/=
istcontrib/How+to+verify+if+an+email+originated+from+someone+at+MIT> or dou=
ble-check with the sender through some other means (calling them directly, =
for example) regarding the information in the email.


How to find full email headers<http://kb.mit.edu/confluence/display/mitcont=
rib/How+to+Find+Full+Email+Headers>.



---------------------------------------------------------------------------=
----------

2. Reminder: Windows XP and Office 2003 Soon De-Supported

---------------------------------------------------------------------------=
----------


In less than four months, Windows XP and Office 2003 will no longer be supp=
orted by Microsoft and the Windows Update services. MIT Information Service=
s & Technology (IS&T) has also announced its de-support plan of Windows XP<=
http://kb.mit.edu/confluence/display/istcontrib/Windows+XP+De-support+Plan>=
.


This means that if your computer is still running Windows XP and Office 200=
3 by April 8, 2014, it will no longer receive security updates. Security up=
dates prevent flaws in the software code from being exploited by attackers.=
 Software that is up to date with the latest patches is much less likely to=
 be vulnerable to an attack.


Office 2003 includes SharePoint 2003, Visio 2003 and Project 2003. Exchange=
 Server 2003 is also being de-supported.


Content Management Server 2002 will no longer be supported after April 8, 2=
014 and Microsoft XML Core Services 4.0 will no longer be supported after A=
pril 12, 2014.


It is recommended to upgrade as soon as possible. IS&T recommends users upg=
rade to Windows 7. Here are the guidelines for a Windows 7 migration<http:/=
/kb.mit.edu/confluence/display/istcontrib/Windows+7+Migration+Guidelines>.


NOTE: If you have a new machine, IS&T now offers full support for the busin=
ess-class versions of Windows 8<http://ist.mit.edu/windows/8/enterprise>. N=
ote that there are still some known issues with using Windows 8 in the MIT =
environment, such as PGP Desktop is not supported. These issues are reporte=
d on the Windows 8 Enterprise page<http://ist.mit.edu/windows/8/enterprise>=
.



---------------------------------------------------------------------------=
--

3. Job Opening: IT Network Security Technical Team Lead

---------------------------------------------------------------------------=
--


IS&T has a position open for an IT Network Security Technical Team Lead. Th=
e position involves managing and delivering security operations, monitoring=
 intrusion detection mechanisms, and other tasks to minimize security-relat=
ed risks to the Institute.


View the full job description at the Jobs Site<http://jobs.mit.edu/>.



----------------------------------------------------------------

4. Free from SANS: Holiday Hacking Challenge

----------------------------------------------------------------


The SANS tenth annual holiday hacking challenge, using themes from the clas=
sic It's a Wonderful Life holiday movie, is their most exciting and in-dept=
h challenge ever.  You'll match wits with nasty cyber attackers, analyzing =
their techniques in depth to help save the city and George Bailey's life!  =
Based on the technical infrastructure of SANS CyberCity project, this fun a=
nd informative challenge will help you pick up valuable real-world skills i=
n defending critical infrastructures.


You see, the city of Bedford Falls is under cyber attack, and on Christmas =
Eve no less! Dastardly villains have targeted its train switching system, w=
ater reservoir, traffic lights, and even its power

grid. George Bailey, head of infosec for the town, is all that stands betwe=
en Bedford Falls and disaster. Suddenly, all the lights in town go dark... =
And that's where you come in.


To read and participate in this FREE challenge, click here<http://pen-testi=
ng.sans.org/holiday-challenge>.



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Read all archived Security FYI Newsletter articles and submit comments onli=
ne at http://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AAA0BD5OC11EXPO24excha_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <E54899604C82384D9EE70CC060CAE75D@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif;">
<div>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;">In this=
 issue:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">1. Popular Holiday-Themed=
 Phishing&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica;">2. Reminder: Windows XP a=
nd Office 2003 Soon De-Supported</p>
<p style=3D"margin: 0px; font-family: Helvetica;">3. Job Opening: IT Networ=
k Security Technical Team Lead</p>
<p style=3D"margin: 0px; font-family: Helvetica;">4. Free from SANS: Holida=
y Hacking Challenge</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">-------------------------=
------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica;">1. Popular Holiday-Themed=
 Phishing&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica;">-------------------------=
------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">Phishing attacks =97using=
 email to trick a recipient to click on a link or an attachment that then i=
nfects the computer =97happen year round. However, at this time of year the=
re are more people shopping online than
 usual. Thieves take advantage of these rushed and weary shoppers to get th=
rough their defenses.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">An article on Help Net Se=
curity lists the most common holiday-themed phishing attacks:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<ul>
<li style=3D"margin: 0px; font-family: Helvetica;">Holiday e-card: Holiday =
greetings that come through email.
</li><li style=3D"margin: 0px; font-family: Helvetica;">Holiday sales, disc=
ounts or deals: Attackers will try to sneak through phishing emails masquer=
ading as merchants offering blowout deals.
</li><li style=3D"margin: 0px; font-family: Helvetica;">Holiday party infor=
mation or registration: Most companies throw a holiday party this time of y=
ear. Spoofed invitations could catch the untrained eye.
</li><li style=3D"margin: 0px; font-family: Helvetica;">Package delivery or=
 update information: Fed Ex or UPS delivery notifications have often been s=
poofed to get a recipient caught unawares.
</li><li style=3D"margin: 0px; font-family: Helvetica;">Year-end deadlines =
or requirements: This is an open opportunity for attackers to get creative =
and exploit an employee before he/she heads out for the holidays.
</li><li style=3D"margin: 0px; font-family: Helvetica;">Travel notification=
s: Emails warning of itinerary changes will certainly grab the attention of=
 a person eager to get home for the holidays.
</li></ul>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;"><a href=3D"http://www.net=
-security.org/secworld.php?id=3D16075">Read the full article online</a>.</p=
>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">The best way to make sure=
 an email is legitimate is to verify the sender. Either
<a href=3D"http://kb.mit.edu/confluence/display/istcontrib/How&#43;to&#43;v=
erify&#43;if&#43;an&#43;email&#43;originated&#43;from&#43;someone&#43;at&#4=
3;MIT">
view the email=92s full headers</a> or double-check with the sender through=
 some other means (calling them directly, for example) regarding the inform=
ation in the email.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;"><a href=3D"http://kb.mit.=
edu/confluence/display/mitcontrib/How&#43;to&#43;Find&#43;Full&#43;Email&#4=
3;Headers">How to find full email headers</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">-------------------------=
------------------------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica;">2. Reminder: Windows XP a=
nd Office 2003 Soon De-Supported</p>
<p style=3D"margin: 0px; font-family: Helvetica;">-------------------------=
------------------------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">In less than four months,=
 Windows XP and Office 2003 will no longer be supported by Microsoft and th=
e Windows Update services. MIT Information Services &amp; Technology (IS&am=
p;T) has also announced its
<a href=3D"http://kb.mit.edu/confluence/display/istcontrib/Windows&#43;XP&#=
43;De-support&#43;Plan">
de-support plan of Windows XP</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">This means that if your c=
omputer is still running Windows XP and Office 2003 by
<b>April 8, 2014</b>, it will no longer receive security updates. Security =
updates prevent flaws in the software code from being exploited by attacker=
s. Software that is up to date with the latest patches is much less likely =
to be vulnerable to an attack.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">Office 2003 includes Shar=
ePoint 2003, Visio 2003 and Project 2003. Exchange Server 2003 is also bein=
g de-supported.&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">Content Management Server=
 2002 will no longer be supported after April 8, 2014 and Microsoft XML Cor=
e Services 4.0 will no longer be supported after April 12, 2014.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">It is recommended to upgr=
ade as soon as possible. IS&amp;T recommends users upgrade to Windows 7.
<a href=3D"http://kb.mit.edu/confluence/display/istcontrib/Windows&#43;7&#4=
3;Migration&#43;Guidelines">
Here are the guidelines for a Windows 7 migration</a>.&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">NOTE: If you have a new m=
achine, IS&amp;T now offers full support for the business-class versions of
<a href=3D"http://ist.mit.edu/windows/8/enterprise">Windows 8</a>. Note tha=
t there are still some known issues with using Windows 8 in the MIT environ=
ment, such as PGP Desktop is not supported. These issues are reported on th=
e
<a href=3D"http://ist.mit.edu/windows/8/enterprise">Windows 8 Enterprise pa=
ge</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">-------------------------=
----------------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica;">3. Job Opening: IT Networ=
k Security Technical Team Lead</p>
<p style=3D"margin: 0px; font-family: Helvetica;">-------------------------=
----------------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">IS&amp;T has a position o=
pen for an IT Network Security Technical Team Lead. The position involves m=
anaging and delivering security operations, monitoring intrusion detection =
mechanisms, and other tasks to minimize
 security-related risks to the Institute.&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;"><a href=3D"http://jobs.mi=
t.edu/">View the full job description at the Jobs Site</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">-------------------------=
---------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica;">4. Free from SANS: Holida=
y Hacking Challenge</p>
<p style=3D"margin: 0px; font-family: Helvetica;">-------------------------=
---------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">The SANS tenth annual hol=
iday hacking challenge, using themes from the classic It's a Wonderful Life=
 holiday movie, is their most exciting and in-depth challenge ever.&nbsp;&n=
bsp;You'll match wits with nasty cyber attackers,
 analyzing their techniques in depth to help save the city and George Baile=
y's life!&nbsp;&nbsp;Based on the technical infrastructure of SANS CyberCit=
y project, this fun and informative challenge will help you pick up valuabl=
e real-world skills in defending critical
 infrastructures.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">You see, the city of Bedf=
ord Falls is under cyber attack, and on Christmas Eve no less! Dastardly vi=
llains have targeted its train switching system, water reservoir, traffic l=
ights, and even its power</p>
<p style=3D"margin: 0px; font-family: Helvetica;">grid. George Bailey, head=
 of infosec for the town, is all that stands between Bedford Falls and disa=
ster. Suddenly, all the lights in town go dark... And that's where you come=
 in.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">To read and participate i=
n this FREE challenge,
<a href=3D"http://pen-testing.sans.org/holiday-challenge">click here</a>.</=
p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica;">=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D</p>
<p style=3D"margin: 0px; font-family: Helvetica;">Read all archived Securit=
y FYI Newsletter articles and submit comments&nbsp;online&nbsp;at
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"color: rgb(4, =
46, 238);">http://securityfyi.wordpress.com/</span></a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica;">=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D</p>
</div>
<div><span class=3D"Apple-style-span" style=3D"border-collapse: separate; f=
ont-family: Calibri; font-size: medium; border-spacing: 0px;"><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacing: 0=
px; font-family: Helvetica; font-size: 14px; orphans: 2; widows: 2;">
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; border=
-spacing: 0px;"><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; border-spacing: 0px;"><span class=3D"Apple-style-span" style=3D"b=
order-collapse: separate; border-spacing: 0px;"><span class=3D"Apple-style-=
span" style=3D"border-collapse: separate; border-spacing: 0px;"><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacing: 0=
px;"><span class=3D"Apple-style-span" style=3D"border-collapse: separate; b=
order-spacing: 0px; font-size: 12px;">
<div><br>
</div>
<div>Monique Yeaton</div>
<div>IT Security Communications Consultant</div>
<div>MIT Information Services &amp; Technology (IS&amp;T)</div>
<div>(617) 253-2715</div>
<div>http://ist.mit.edu/security</div>
<div><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></div>
</span></span></div>
</body>
</html>

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AAA0BD5OC11EXPO24excha_--

--===============0264538172==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0264538172==--

home help back first fref pref prev next nref lref last post