[2327] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, September 13, 2010

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Sep 13 12:18:28 2010

From: Monique Yeaton <myeaton@MIT.EDU>
Date: Mon, 13 Sep 2010 12:17:32 -0400
Message-Id: <67BF7D9D-3225-4C63-B718-DCE3301A9F61@mit.edu>
To: ist-security-fyi@MIT.EDU
Mime-Version: 1.0 (Apple Message framework v1081)
Cc: itss@MIT.EDU
Content-Type: multipart/mixed; boundary="===============0182884721=="
Errors-To: ist-security-fyi-bounces@MIT.EDU


--===============0182884721==
Content-Type: multipart/alternative; boundary=Apple-Mail-58--1002709030


--Apple-Mail-58--1002709030
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252


Welcome (back) to MIT!

In this issue:

1. Laptop Theft on Campus
2. Microsoft Security Updates for September 2010
3. Zero Day Exploit in Adobe Reader/Acrobat
4. New Mass-Mailing Worm Detected


-----------------------------------
1. Laptop Theft on Campus=20
-----------------------------------

Five instances of laptop theft have been reported to MIT Police since =
August 16. All of these incidents occurred in MIT campus residences, =
with the laptops removed from rooms that were left open or unlocked.

Laptop theft can lead to not just inconvenience for the owner but also =
access to his or her personal information by criminals. Additionally, a =
substantial data breach could occur, depending on the amount and type of =
information the computer contains. For example, earlier this month a =
laptop that contained 7,000 student Social Security numbers was stolen =
from a college campus in New York City.=20

Costs associated with computer theft range from that of replacing the =
hardware and software to potentially millions of dollars for forensics, =
remediation for identity theft, and reputation management. The average =
cost of a data breach incident in the U.S. is $6.75 million.

Suggestions:

Keep your doors locked. If you live in a campus residence, that includes =
locking the door to your room.=20

If someone who you don't recognize follows you into a residence or =
office building, ask the front desk worker to call MIT Police. The =
police would much rather respond and find that there is nothing wrong =
than not prevent a theft from occurring.

Register your laptop computer with the MIT Police by attending the next =
Security Tracking of Office Property (STOP) tagging sessions; they are =
held on Monday, September 20 and Wednesday, September 22 from 11:30 am =96=
 1:00 pm in Lobby 10. There is a $10 cash fee for this loss prevention =
measure. (Departments can use a cost object code.)

Safety starts with you! If you see something, say something =96 call the =
MIT Police at 617.253.1212.

STOP Tagging details: <http://ist.mit.edu/security/loss/deterrents>


---------------------------------------------------------------
2. Microsoft Security Updates for September 2010
---------------------------------------------------------------

On Tuesday, September 14, 2010, Microsoft will issue nine security =
bulletins to address 34 vulnerabilities in various software. Four of the =
bulletins are rated critical.

Systems affected:

Microsoft Windows (XP, Vista and 7)
Microsoft Windows Server (2003, 2008 and 2008 R2)
Microsoft Office (XP, 2003 and 2007)

Flaws could be exploited to allow remote code execution or privilege =
elevation. It is possible that some of the bulletins will address the =
DLL hijacking threat covered in the August 30 issue of this newsletter.

Read the full bulletin:
<http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx>


---------------------------------------------------------
3. Zero Day Exploit in Adobe Reader/Acrobat
---------------------------------------------------------

Another zero day flaw has been found in Adobe Reader and Acrobat =
products versions 9.3.4 and earlier. A previously reported zero day flaw =
was fixed in early August with the release of 9.3.4.=20

According to the advisory, this critical vulnerability could cause a =
crash and potentially allow an attacker to take control of the affected =
system. Adobe is aware of the public exploit code and the next scheduled =
patch date is October 13, however an emergency patch may be released =
earlier. In August the company pledged to provide a security sandbox to =
the next major upgrade of Reader.

In the meantime, the advice is to disable JavaScript, but this appears =
to only be a temporary measure.=20

Read the security advisory:=20
<http://www.adobe.com/support/security/advisories/apsa10-02.html>

Read the story in the news:
=
<http://www.digitaltrends.com/computing/adobe-acrobat-and-reader-under-att=
ack-with-a-zero-day-exploit/>


-----------------------------------------------
4. New Mass-Mailing Worm Detected
-----------------------------------------------

[Article source: SANS.org]
There are reports that a new mass-mailing worm is spreading.  The worm =
spreads through email messages with the subject line "Here you have;" =
the body of the message includes a link that appears to lead to a PDF =
file, but instead leads to a malicious executable file.  For users' =
machines to become infected, they must agree to install what claims to =
be a screensaver, but is actually the worm, which tries to disable =
security software and then sends itself to everyone in the infected =
computer's email contact list.  The worm is the first wide-spread =
infection of this type in nearly a decade.

TIP: Never click on attachments in emails coming from dubious sources.

Read the story in the news:
=
<http://www.computerworld.com/s/article/9184438/_Here_you_have_e_mail_worm=
_spreads_quickly>


=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=


Find current and older issues of Security FYI Newsletter in Hermes at =
<http://kb.mit.edu/confluence/x/ehBB> or by visiting the Security FYI =
Blog at <http://securityfyi.wordpress.com/>



Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security







--Apple-Mail-58--1002709030
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">Welcome (back) to MIT!</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">In this issue:</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">1. Laptop Theft on Campus</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">2. =
Microsoft Security Updates for September 2010</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">3. =
Zero Day Exploit in Adobe Reader/Acrobat</div><div style=3D"margin-top: =
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">4. New Mass-Mailing Worm =
Detected</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; min-height: 16px; =
"><br></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; ">-----------------------------------</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">1. =
Laptop Theft on Campus&nbsp;</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; =
">-----------------------------------</div><div style=3D"margin-top: =
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; min-height: 16px; =
"><br></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; ">Five instances of laptop theft have been reported =
to&nbsp;MIT Police since August 16. All of these incidents occurred in =
MIT campus residences, with the laptops removed from rooms that were =
left open or unlocked.</div><div style=3D"margin-top: 0px; margin-right: =
0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">Laptop theft can lead to not =
just inconvenience for the owner but also access to his or her personal =
information by criminals. Additionally, a substantial data breach could =
occur, depending on the amount and type of information the computer =
contains. For example, earlier this month a laptop&nbsp;that contained =
7,000 student Social Security numbers&nbsp;was stolen from a college =
campus in New York City.&nbsp;</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">Costs =
associated with computer theft range from that of replacing the hardware =
and software to potentially millions of dollars for forensics, =
remediation for identity theft, and reputation management. The average =
cost of a data breach incident in the U.S. is $6.75 million.</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">Suggestions:</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Keep =
your doors locked. If you live in a campus residence, that includes =
locking the door to your room.&nbsp;</li>
</ul><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">If =
someone who you don't recognize follows you into a residence or office =
building, ask the front desk worker to call MIT Police. The police would =
much rather respond and find that there is nothing wrong than not =
prevent a theft from occurring.</li>
</ul><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Register your laptop computer with the MIT Police by attending =
the next Security Tracking of Office Property (STOP) tagging sessions; =
they are held on Monday, September 20 and Wednesday, September 22 from =
11:30 am =96 1:00 pm in Lobby 10. There is a $10 cash fee for this loss =
prevention measure. (Departments can use a cost object code.)</li>
</ul><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">Safety starts with you! If you see =
something, say something =96 call the MIT Police at =
617.253.1212.</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; color: rgb(19, 79, 174); "><span =
style=3D"color: #000000">STOP Tagging details: &lt;<a =
href=3D"http://ist.mit.edu/security/loss/deterrents%5D"><span =
style=3D"text-decoration: =
underline">http://ist.mit.edu/security/loss/deterrents</span></a>&gt;</spa=
n></div><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
">---------------------------------------------------------------</div><di=
v style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">2. =
Microsoft Security Updates for September 2010</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
">---------------------------------------------------------------</div><di=
v style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">On Tuesday, September 14, 2010, =
Microsoft will issue nine security bulletins to address 34 =
vulnerabilities in various software. Four of the bulletins are rated =
critical.</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">Systems affected:</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Microsoft Windows&nbsp;(XP, Vista and 7)</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Microsoft Windows Server&nbsp;(2003, 2008 and 2008 R2)</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Microsoft Office (XP, 2003 and 2007)</li>
</ul><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">Flaws could be exploited to allow =
remote code execution or privilege elevation. It is possible that some =
of the bulletins will address the DLL hijacking threat covered in the =
August 30 issue of this newsletter.</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">Read =
the full bulletin:</div><div style=3D"margin-top: 0px; margin-right: =
0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; color: rgb(19, 79, 174); "><span style=3D"color: =
#000000">&lt;</span><span style=3D"text-decoration: underline"><a =
href=3D"http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx">=
http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx</a></span=
><span style=3D"color: #000000">&gt;</span></div><div style=3D"margin-top:=
 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; min-height: 16px; =
"><br></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; =
">---------------------------------------------------------</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">3. =
Zero Day Exploit in Adobe Reader/Acrobat</div><div style=3D"margin-top: =
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; =
">---------------------------------------------------------</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">Another zero day flaw has been found =
in Adobe Reader and Acrobat products versions 9.3.4 and earlier. A =
previously reported zero day flaw was fixed in early August with the =
release of 9.3.4.&nbsp;</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
">According to the advisory, this critical vulnerability could cause a =
crash and potentially allow an attacker to take control of the affected =
system. Adobe is aware of the public exploit code and the next scheduled =
patch date is October 13, however an emergency patch may be released =
earlier. In August the company pledged to provide a security sandbox to =
the next major upgrade of Reader.</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">In the =
meantime, the advice is to disable JavaScript, but this appears to only =
be a temporary measure.&nbsp;</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">Read =
the security advisory:&nbsp;</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">&lt;<a =
href=3D"http://www.adobe.com/support/security/advisories/apsa10-02.html">h=
ttp://www.adobe.com/support/security/advisories/apsa10-02.html</a>&gt;</di=
v><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">Read the story in the news:</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">&lt;<a =
href=3D"http://www.digitaltrends.com/computing/adobe-acrobat-and-reader-un=
der-attack-with-a-zero-day-exploit/">http://www.digitaltrends.com/computin=
g/adobe-acrobat-and-reader-under-attack-with-a-zero-day-exploit/</a>&gt;</=
div><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
">-----------------------------------------------</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">4. New =
Mass-Mailing Worm Detected</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; =
">-----------------------------------------------</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">[Article source: SANS.org]</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">There =
are reports that a new mass-mailing worm is spreading. &nbsp;The worm =
spreads through email messages with the subject line "Here you have;" =
the body of the message includes a link that appears to lead to a PDF =
file, but instead leads to a malicious executable file. &nbsp;For users' =
machines to become infected, they must agree to install what claims to =
be a screensaver, but is actually the worm, which tries to disable =
security software and then sends itself to everyone in the infected =
computer's email contact list. &nbsp;The worm is the first wide-spread =
infection of this type in nearly a decade.</div><div style=3D"margin-top: =
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">TIP: =
Never click on attachments in emails coming from dubious =
sources.</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">Read the story in the =
news:</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; ">&lt;<a =
href=3D"http://www.computerworld.com/s/article/9184438/_Here_you_have_e_ma=
il_worm_spreads_quickly">http://www.computerworld.com/s/article/9184438/_H=
ere_you_have_e_mail_worm_spreads_quickly</a>&gt;</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
"><br></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; =
">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">Find current and older issues =
of Security FYI Newsletter in Hermes at &lt;<a =
href=3D"http://kb.mit.edu/confluence/x/ehBB"><span =
style=3D"text-decoration: underline ; color: =
#2f69b5">http://kb.mit.edu/confluence/x/ehBB</span></a>&gt; or by =
visiting the Security FYI Blog at &lt;<a =
href=3D"http://securityfyi.wordpress.com/">http://securityfyi.wordpress.co=
m/</a>&gt;</div></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; min-height: 16px; =
"><br></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div><span =
class=3D"Apple-style-span" style=3D"font-family: Calibri; font-size: =
14px; "><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; "><div><div><div>Monique =
Yeaton</div><div>IT Security Awareness Consultant</div><div>MIT =
Information Services &amp; Technology (IS&amp;T)</div><div>(617) =
253-2715</div><div><a =
href=3D"http://ist.mit.edu/security">http://ist.mit.edu/security</a></div>=
<div><br></div><br></div></div><br></div></span><br =
class=3D"Apple-interchange-newline"><br =
class=3D"Apple-interchange-newline">
</div>
<br></body></html>=

--Apple-Mail-58--1002709030--

--===============0182884721==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0182884721==--

home help back first fref pref prev next nref lref last post