[10210] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, January 27, 2014
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Jan 27 13:06:26 2014
Resent-From: ist-security-fyi@MIT.EDU
From: Monique Yeaton <myeaton@MIT.EDU>
To: ist-security-fyi <ist-security-fyi@MIT.EDU>
Date: Mon, 27 Jan 2014 18:05:07 +0000
Message-ID: <8B2D58E3-E587-47AF-9957-D94D19A3467E@mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============2035106095=="
Errors-To: ist-security-fyi-bounces@MIT.EDU
--===============2035106095==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_8B2D58E3E58747AF9957D94D19A3467Emitedu_"
--_000_8B2D58E3E58747AF9957D94D19A3467Emitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. Data Privacy Day and Month
2. EVENT: Big Data Talk @ CSAIL
3. Website Safety and Reputation
------------------------------------------
1. Data Privacy Day and Month
------------------------------------------
January 28th is Data Privacy Day, which celebrates the effort to protect th=
e privacy of citizens. It also kicks off Data Privacy Month, sponsored by E=
DUCAUSE<http://www.educause.edu/focus-areas-and-initiatives/policy-and-secu=
rity/educause-policy/community-engagement/data-privacy-month>. To get invol=
ved and learn how you or your business area can take steps to safeguard pri=
vacy online, check out some of the free available resources.
Learn more about Data Privacy Day<http://kb.mit.edu/confluence/x/xpgBCQ>.
---------------------------------------------
2. EVENT: Big Data Talk @ CSAIL
---------------------------------------------
MIT CSAIL in the Stata Building (Building 32) hosts regular talks on the to=
pic of big data. Talks feature distinguished individuals from academia, ind=
ustry and government, including pre-eminent people from all the subfields o=
f computer science that have something to say about data, data processing a=
nd analytics, as well as people from organizations that are consumers of bi=
g data from both industry and government.
The next talk is =93NSA Surveillance and What to Do About It.=94 The speake=
r is Bruce Schneier, an internationally known security technologist, author=
of 12 books and blogger (Schneier on Security<https://www.schneier.com/>).
Date & Time: Thursday, February 6, 2014, 5:00pm to 6:00pm
Location: 32-123
Learn more<http://bigdata.csail.mit.edu/node/145>.
---------------------------------------------
3. Website Safety and Reputation
---------------------------------------------
If you have children, you may have concerns about the places they visit on =
the Internet. While it is one thing to keep track of your child in the phys=
ical world, it=92s much more difficult to know where he/she is going online=
. Setting up your home computer with limited access to sites may be one way=
to limit risks.
Another is to educate your child on the risks of the Internet and help the =
child know which sites he or she will want to stay away from. Know whether =
a site is risky, not just in terms of content such as scams, but also when =
it comes to the possibility of contracting malware such as spyware or spam.
If you use Chrome or Firefox, you can install an extension called Webutatio=
n that scores websites, based on a safety rating. The plug-in shows the sco=
re when you visit sites and it can block fraudulent e-commerce shops or adu=
lt sites. For other browsers (IE, Safari, e.g.), there is a bookmarklet. We=
butation collects feedback from consumers to determine a site=92s score, an=
d collected information is updated regularly.
If you don=92t want to install the software, but still want to know the saf=
ety reputation of a particular website, visit the Webutation page to look t=
hem up. Learn more about Webutation here<http://www.webutations.net/>. This=
software is not distributed, vetted or supported by Information Systems & =
Technology.
Other resources for parents and young students regarding online safety:
Connectsafely.org<http://www.connectsafely.org/>
Wiredsafety.org<https://www.wiredsafety.org/>
OnGuardOnline.gov<http://www.onguardonline.gov/>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Read all archived Security FYI Newsletter articles and submit comments onli=
ne at http://securityfyi.wordpress.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
"Distrust and caution are the parents of security" - Benjamin Franklin
Monique Buchanan
IT Security Communications Consultant
Information Systems & Technology (IS&T)
Massachusetts Institute of Technology
http://ist.mit.edu/secure
tel: 617.253.2715
--_000_8B2D58E3E58747AF9957D94D19A3467Emitedu_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <CD839416FABDA64DB30458249B72924F@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space;">
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
In this issue:</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">1. Dat=
a Privacy Day and Month</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">2. EVE=
NT: Big Data Talk @ CSAIL</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">3. Web=
site Safety and Reputation</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">------=
------------------------------------</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">1. Dat=
a Privacy Day and Month</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">------=
------------------------------------</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">Januar=
y 28th is Data Privacy Day, which celebrates the effort to protect the priv=
acy of citizens. It also kicks off Data Privacy Month, sponsored by
<a href=3D"http://www.educause.edu/focus-areas-and-initiatives/policy-and-s=
ecurity/educause-policy/community-engagement/data-privacy-month">
EDUCAUSE</a>. To get involved and learn how you or your business area can t=
ake steps to safeguard privacy online, check out some of the free available=
resources.</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;"><a hre=
f=3D"http://kb.mit.edu/confluence/x/xpgBCQ">Learn more about Data Privacy D=
ay</a>.</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">------=
---------------------------------------</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">2. EVE=
NT: Big Data Talk @ CSAIL</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">------=
---------------------------------------</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">MIT CS=
AIL in the Stata Building (Building 32) hosts regular talks on the topic of=
big data. Talks feature distinguished individuals from academia, industry =
and government, including pre-eminent
people from all the subfields of computer science that have something to s=
ay about data, data processing and analytics, as well as people from organi=
zations that are consumers of big data from both industry and government.</=
div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">The ne=
xt talk is =93NSA Surveillance and What to Do About It.=94 The speaker is B=
ruce Schneier, an internationally known security technologist, author of 12=
books and blogger (<a href=3D"https://www.schneier.com/">Schneier
on Security</a>).</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Arial;"><span styl=
e=3D"font-family: Helvetica;">Date & Time:
</span>Thursday, February 6, 2014, 5:00pm to 6:00pm</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">Locati=
on: 32-123</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;"><a hre=
f=3D"http://bigdata.csail.mit.edu/node/145">Learn more</a>. </div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">------=
---------------------------------------</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">3. Web=
site Safety and Reputation</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">------=
---------------------------------------</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">If you=
have children, you may have concerns about the places they visit on the In=
ternet. While it is one thing to keep track of your child in the physical w=
orld, it=92s much more difficult to
know where he/she is going online. Setting up your home computer with limi=
ted access to sites may be one way to limit risks.</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">Anothe=
r is to educate your child on the risks of the Internet and help the child =
know which sites he or she will want to stay away from. Know whether a site=
is risky, not just in terms of content
such as scams, but also when it comes to the possibility of contracting ma=
lware such as spyware or spam.</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">If you=
use Chrome or Firefox, you can install an extension called Webutation that=
scores websites, based on a safety rating. The plug-in shows the score whe=
n you visit sites and it can block
fraudulent e-commerce shops or adult sites. For other browsers (IE, Safari=
, e.g.), there is a bookmarklet. Webutation collects feedback from consumer=
s to determine a site=92s score, and collected information is updated regul=
arly. </div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">If you=
don=92t want to install the software, but still want to know the safety re=
putation of a particular website, visit the Webutation page to look them up=
.
<a href=3D"http://www.webutations.net/">Learn more about Webutation here</a=
>. This software is not distributed, vetted or supported by Information Sys=
tems & Technology.</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">Other =
resources for parents and young students regarding online safety:</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;"><a hre=
f=3D"http://www.connectsafely.org/">Connectsafely.org</a></div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;"><a hre=
f=3D"https://www.wiredsafety.org/">Wiredsafety.org</a></div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;"><a hre=
f=3D"http://www.onguardonline.gov/">OnGuardOnline.gov</a></div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">Read a=
ll archived Security FYI Newsletter articles and submit comments onlin=
e at
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"color: rgb(4, =
46, 238);">http://securityfyi.wordpress.com/</span></a>.</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica;">"=
Distrust and caution are the parents of security" - Benjamin Franklin<=
/div>
<div style=3D"margin: 0px; font-size: 14px; font-family: Helvetica; min-hei=
ght: 17px;">
<br>
</div>
<div apple-content-edited=3D"true">
<div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; t=
ext-align: start; text-indent: 0px; text-transform: none; white-space: norm=
al; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-w=
rap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-=
space;">
<br>
<br>
Monique Buchanan<br>
IT Security Communications Consultant<br>
Information Systems & Technology (IS&T)<br>
Massachusetts Institute of Technology<br>
<a href=3D"http://ist.mit.edu/secure">http://ist.mit.edu/secure</a><br>
tel: 617.253.2715<br>
<br>
<br>
</div>
</div>
<br>
</body>
</html>
--_000_8B2D58E3E58747AF9957D94D19A3467Emitedu_--
--===============2035106095==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============2035106095==--