[2345] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, November 29, 2010

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Nov 29 13:42:25 2010

Resent-From: ist-security-fyi@MIT.EDU
From: Monique Yeaton <myeaton@MIT.EDU>
To: ist-security-fyi <ist-security-fyi@MIT.EDU>
Date: Mon, 29 Nov 2010 13:41:31 -0500
Message-ID: <C9195E0A.8A1D%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@MIT.EDU>
Content-Type: multipart/mixed; boundary="===============0280041189=="
Errors-To: ist-security-fyi-bounces@MIT.EDU

--===============0280041189==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_C9195E0A8A1Dmyeatonexchangemitedu_"

--_000_C9195E0A8A1Dmyeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


In this issue: Cyber Monday Protection Tips


1. The Latest Electronic Scams

2. Password Protection Software: No More Remembering



----------------------------------------

1. The Latest Electronic Scams

----------------------------------------


It's Cyber Monday! Happy shopping!


So maybe you don't fall for those emails from Nigerian royalty asking you t=
o wire money, but digital criminals are getting sneakier each year. "These =
guys are constantly thinking of new ways to swindle you, some of which are =
quite sophisticated," says Brian Krebs, a computer security expert and auth=
or of "Krebs on Security."


Here's a list of some of the latest, sneakiest scams and some tips to prote=
ct yourself during this shopping and holiday season:


 *   Smishing: "Phishing" is when you get an email from a supposedly trustw=
orthy source, asking for your personal information, a user name or a passwo=
rd. Smishing is the latest twist on this scam, and is a combination of "SMS=
" (short message service, aka text messaging) and "phishing." In these text=
 messages the receiver is asked to call a toll-free number, which is answer=
ed by a bogus interactive voice-response system and tries to fool you into =
providing your account number and password. If you get a text alert about a=
n account, don't respond until you've verified it's legitimate. You can Goo=
gle search on the phone number to see if it matches your financial institut=
ion. Or you can call the customer service number listed on the paper statem=
ents you have on file.
 *   Skimmers: These are devices attached to ATMs or gas pumps to steal you=
r debit account number and password. They are placed at the mouth of the sl=
ot and record the data off of the magnetic strip on the back of your ATM ca=
rd. The new version of these skimming devices allows the criminal to send a=
ccount information via wireless technology to his cell phone or laptop. To =
protect yourself, use credit cards or cash for purchases and avoid using no=
n-bank ATMs. Check the card slot in the machine. If there's a plastic strip=
 or plastic film sticking out, or anything glued to the card reader, go els=
ewhere.
 *   Membership Programs: You purchase a product from a reputable website a=
nd before you click "confirm" a window pops up offering to enroll you into =
a merchandise discount program for a 30-day trial period. The program is no=
t run by the site you are on, but by a separate company. If you agree, a me=
mbership fee will appear on your monthly credit card bill, even though you =
never gave that company your credit card number. The catch is, you may real=
ize you even signed up because of the confusing 'yes' and 'continue' button=
s placed at the end of your purchase transaction. Prevent this by being war=
y of pop-up windows. If you can, disable them in your browser preferences. =
Scrutinize your credit card statement and question any unfamiliar charges. =
Check your email inbox because the programs often send a notification email=
 before they start charging your card and you might still have time to canc=
el.


For more information on scams and how to protect yourself while shopping th=
is holiday season, check out these resources:


 *   FTC.org - Federal Trade Commission has lots of consumer information
 *   Safeshopping.org - sponsored by the American Bar Association
 *   Onguardonline.gov - this site has tips on Internet shopping and is spo=
nsored by government agencies
 *   Antiphishing.org - industry sponsored association called the Anti-Phis=
hing Working Group
 *   web.mit.edu/infoprotect - this MIT site lists a few tips and resources=
 for consumers


This information came in part from the following article:

<http://shopping.yahoo.com/articles/yshoppingarticles/448/the-sneakiest-new=
-shopping-scams/>



-----------------------------------------

2. Password Protection Software

-----------------------------------------


As you navigate the Internet to find gifts for your loved ones this holiday=
 season, you are logging in to sites such as Amazon.com or eBay either with=
 an existing account or perhaps a new account. For each of these sites you =
sign into, you now have a user name and password.


Over time, you may have created so many user names and passwords for variou=
s sites that now you can't remember them all. Maybe you have selected to ha=
ve the sites save your information so that the next time you visit, it's al=
ready entered in the fields. Or maybe you have one user name and password t=
hat you use for all your shopping sites. But are those solutions really saf=
e?


Not really. If you get hit with a computer virus, those passwords could be =
collected by a cyber criminal. Or if you use a public computer, a dishonest=
 person would be able to go to those same sites and log in using your crede=
ntials. If you have just one user name and passwords for all your sites, an=
d it's been discovered, that thief now has access to ALL your online accoun=
ts.


Enter a better solution: password managers. The top of the line product I h=
ave seen is called LastPass. (This is not an IS&T recommendation! But I can=
 personally recommend it, because I use it.) LastPass is a plug-in for your=
 browser and stores all your internet login information inside an encrypted=
 vault, accessible only with a master password. There are various benefits =
to using LastPass, but the best one is that you no longer have to remember =
all your passwords or write them down and keep them near your computer, or =
put them in a document on your computer. Instead those passwords are encryp=
ted within your PC, which only you can access with a master password.


Another great selling point is that there is a very robust free version. Le=
arn more about the LastPass features here:

<http://lastpass.com/features_free.php>


Try it out and let me know what you think!


=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D


To read all current and archived articles online, visit the Security-FYI Bl=
og at <http://securityfyi.wordpress.com/>



Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_C9195E0A8A1Dmyeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-si=
ze: 14px; font-family: Calibri, sans-serif; "><div><div><div><br></div><div=
><span class=3D"Apple-style-span" style=3D"font-family: Helvetica; "><div s=
tyle=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break=
: after-white-space; "><span class=3D"Apple-style-span" style=3D"border-col=
lapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-ver=
tical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size:=
 14px; font-style: normal; font-variant: normal; font-weight: normal; lette=
r-spacing: normal; line-height: normal; -webkit-text-decorations-in-effect:=
 none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: no=
ne; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-bord=
er-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rg=
b(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; fo=
nt-variant: normal; font-weight: normal; letter-spacing: normal; line-heigh=
t: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -web=
kit-text-size-adjust: auto; text-transform: none; orphans: 2; white-space: =
normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" st=
yle=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -=
webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helv=
etica; font-size: 14px; font-style: normal; font-variant: normal; font-weig=
ht: normal; letter-spacing: normal; line-height: normal; -webkit-text-decor=
ations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; t=
ext-transform: none; orphans: 2; white-space: normal; widows: 2; word-spaci=
ng: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separ=
ate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacin=
g: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-=
style: normal; font-variant: normal; font-weight: normal; letter-spacing: n=
ormal; line-height: normal; -webkit-text-decorations-in-effect: none; text-=
indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans:=
 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"App=
le-style-span" style=3D"border-collapse: separate; -webkit-border-horizonta=
l-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); =
font-family: Helvetica; font-size: 14px; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: normal; -=
webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-siz=
e-adjust: auto; text-transform: none; orphans: 2; white-space: normal; wido=
ws: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"borde=
r-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-borde=
r-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-=
size: 12px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; -webkit-text-decorations-in-ef=
fect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transfor=
m: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><=
span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit=
-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; colo=
r: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: norma=
l; font-variant: normal; font-weight: normal; letter-spacing: normal; line-=
height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px;=
 -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-sp=
ace: normal; widows: 2; word-spacing: 0px; "><div style=3D"font-size: 12px;=
 "><p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min=
-height: 17.0px">In this issue: Cyber Monday Protection Tips</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. The=
 Latest Electronic Scams</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. Pas=
sword Protection Software: No More Remembering</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. The=
 Latest Electronic Scams</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">It's C=
yber Monday! Happy shopping!</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">So may=
be you don't fall for those emails from Nigerian royalty asking you to wire=
 money, but digital criminals are getting sneakier each year. "These guys a=
re constantly thinking of new ways to swindle you, some of which are quite =
sophisticated," says Brian Krebs, a computer security expert and author of =
"Krebs on Security."</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Here's=
 a list of some of the latest, sneakiest scams and some tips to protect you=
rself during this shopping and holiday season:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><b>Sm=
ishing</b>: "Phishing" is when you get an email from a supposedly trustwort=
hy source, asking for your personal information, a user name or a password.=
 Smishing is the latest twist on this scam, and is a combination of "SMS" (=
short message service, aka text messaging) and "phishing." In these text me=
ssages the receiver is asked to call a toll-free number, which is answered =
by a bogus interactive voice-response system and tries to fool you into pro=
viding your account number and password. If you get a text alert about an a=
ccount, don't respond until you've verified it's legitimate. You can Google=
 search on the phone number to see if it matches your financial institution=
. Or you can call the customer service number listed on the paper statement=
s you have on file.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><b>Sk=
immers</b>: These are devices attached to ATMs or gas pumps to steal your d=
ebit account number and password. They are placed at the mouth of the slot =
and record the data off of the magnetic strip on the back of your ATM card.=
 The new version of these skimming devices allows the criminal to send acco=
unt information via wireless technology to his cell phone or laptop. To pro=
tect yourself, use credit cards or cash for purchases and avoid using non-b=
ank ATMs. Check the card slot in the machine. If there's a plastic strip or=
 plastic film sticking out, or anything glued to the card reader, go elsewh=
ere.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><b>Me=
mbership Programs</b>: You purchase a product from a reputable website and =
before you click "confirm" a window pops up offering to enroll you into a m=
erchandise discount program for a 30-day trial period. The program is not r=
un by the site you are on, but by a separate company. If you agree, a membe=
rship fee will appear on your monthly credit card bill, even though you nev=
er gave that company your credit card number. The catch is, you may realize=
 you even signed up because of the confusing 'yes' and 'continue' buttons p=
laced at the end of your purchase transaction. Prevent this by being wary o=
f pop-up windows. If you can, disable them in your browser preferences. Scr=
utinize your credit card statement and question any unfamiliar charges. Che=
ck your email inbox because the programs often send a notification email be=
fore they start charging your card and you might still have time to cancel.=
</li>
</ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">For mo=
re information on scams and how to protect yourself while shopping this hol=
iday season, check out these resources:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">FTC.o=
rg - Federal Trade Commission has lots of consumer information</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Safes=
hopping.org - sponsored by the American Bar Association</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Ongua=
rdonline.gov - this site has tips on Internet shopping and is sponsored by =
government agencies</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Antip=
hishing.org - industry sponsored association called the Anti-Phishing Worki=
ng Group</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">web.m=
it.edu/infoprotect - this MIT site lists a few tips and resources for consu=
mers</li>
</ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">This i=
nformation came in part from the following article:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">&lt;ht=
tp://shopping.yahoo.com/articles/yshoppingarticles/448/the-sneakiest-new-sh=
opping-scams/&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. Pas=
sword Protection Software</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">As you=
 navigate the Internet to find gifts for your loved ones this holiday seaso=
n, you are logging in to sites such as Amazon.com or eBay either with an ex=
isting account or perhaps a new account. For each of these sites you sign i=
nto, you now have a user name and password.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Over t=
ime, you may have created so many user names and passwords for various site=
s that now you can't remember them all. Maybe you have selected to have the=
 sites save your information so that the next time you visit, it's already =
entered in the fields. Or maybe you have one user name and password that yo=
u use for all your shopping sites. But are those solutions really safe?&nbs=
p;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Not re=
ally. If you get hit with a computer virus, those passwords could be collec=
ted by a cyber criminal. Or if you use a public computer, a dishonest perso=
n would be able to go to those same sites and log in using your credentials=
. If you have just one user name and passwords for all your sites, and it's=
 been discovered, that thief now has access to ALL your online accounts.</p=
>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Enter =
a better solution: password managers. The top of the line product I have se=
en is called LastPass. (This is not an IS&amp;T recommendation! But I can p=
ersonally recommend it, because I use it.) LastPass is a plug-in for your b=
rowser and stores all your internet login information inside an encrypted v=
ault, accessible only with a master password. There are various benefits to=
 using LastPass, but the best one is that you no longer have to remember al=
l your passwords or write them down and keep them near your computer, or pu=
t them in a document on your computer. Instead those passwords are encrypte=
d within your PC, which only you can access with a master password.&nbsp;</=
p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Anothe=
r great selling point is that there is a very robust free version. Learn mo=
re about the LastPass features here:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">&lt;ht=
tp://lastpass.com/features_free.php&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Try it=
 out and let me know what you think!&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">To read al=
l current and archived articles online, visit the Security-FYI Blog at &lt;=
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"text-decoratio=
n: underline ; color: #3369b5">http://securityfyi.wordpress.com/</span></a>=
&gt;</p><div><br></div><div><br></div><div><br></div></div><div style=3D"fo=
nt-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px;=
 "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; ">Monique Yeaton</span></span></span></sp=
an></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" =
style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-=
size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">=
<span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D=
"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-s=
pan" style=3D"font-size: 12px; ">IT Security Awareness Consultant</span></s=
pan></span></span></span></span></div><div style=3D"font-size: 12px; "><spa=
n class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"App=
le-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span"=
 style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font=
-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "=
><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">MIT Informati=
on Services &amp; Technology (IS&amp;T)</span></span></span></span></span><=
/span></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-spa=
n" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"fo=
nt-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px;=
 "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; ">(617) 253-2715</span></span></span></sp=
an></span></span></div><div style=3D"font-size: 12px; "><span class=3D"Appl=
e-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" =
style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-=
size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">=
<span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D=
"Apple-style-span" style=3D"font-size: 12px; ">http://ist.mit.edu/security<=
/span></span></span></span></span></span></div><div style=3D"font-size: 12p=
x; "><br class=3D"khtml-block-placeholder"></div><br class=3D"Apple-interch=
ange-newline"></span></span></span></span></span></span></span></div></span=
></div></div></div></body></html>

--_000_C9195E0A8A1Dmyeatonexchangemitedu_--

--===============0280041189==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0280041189==--

home help back first fref pref prev next nref lref last post