[2349] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, January 3, 2011
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Jan 3 15:09:19 2011
From: Monique Yeaton <myeaton@MIT.EDU>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@MIT.EDU>
Date: Mon, 3 Jan 2011 15:08:25 -0500
Message-ID: <C94796E8.EFDE%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@MIT.EDU" <itss@MIT.EDU>
Content-Type: multipart/mixed; boundary="===============2056398055=="
Errors-To: ist-security-fyi-bounces@MIT.EDU
--===============2056398055==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_C94796E8EFDEmyeatonexchangemitedu_"
--_000_C94796E8EFDEmyeatonexchangemitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
The newsletter author took last month off from writing Security-FYI issues,=
but she's back, so keep an eye out for these weekly security updates in 20=
11.
In this issue:
1. IAP Session on Protecting Personal Information
2. McAfee Vulnerable to Metasploit Attack
3. Word 2004 for Windows Still Vulnerable
4. Security (or Lack Thereof) of New Gadgets
---------------------------------------------------------------
1. IAP Session on Protecting Personal Information
---------------------------------------------------------------
Tim McGovern and Monique Yeaton of the IT Security team will be hosting an =
IAP session on Protecting Personal Information at MIT. This is an update to=
the 2010 IAP session on Handling Sensitive Data.
We will discuss:
* What MIT has been doing over the last year to help reduce MIT's risk o=
f a serious data breach involving personal information.
* What each of us need to do in our own offices, and on our computers, t=
o minimize the collection of, and to protect sensitive data needed for our =
business activities.
*
There will be an opportunity to ask questions and participate in the discus=
sion. This is a mostly non-technical session, although we will talk about t=
echnology tools that can help in this effort. We hope to see you there!
For full information: <http://student.mit.edu/searchiap/iap-a709.html>
-----------------------------------------------------
2. McAfee Vulnerable to Metasploit Attack
-----------------------------------------------------
McAfee is aware of a publicly disclosed attack that could disable VirusScan=
Enterprise (VSE) running on a customer=92s machine. This attack is not a =
stand-alone attack, but acts as a payload to be chained via another attack.
Affected software:
* VirusScan Enterprise 8.7 and earlier (Windows only)
If the attack is successful, it disables both VSE and the connection to ePO=
. It would leave the McAfee Shield visible, so it may not be immediately a=
pparent that antivirus protection has been disabled. In addition to the im=
mediate disabling of VSE, the attack changes settings for VSE, resulting in=
diminished capacity for scanning going forward.
McAfee has already developed a strategy that would prevent this from happen=
ing in the upcoming VSE 8.8 release. They have released a DAT file (6209) t=
hat detects the metasploit plugin used to run this attack. It is recommende=
d that users update their McAfee software to receive the latest DAT file.
Read the full bulletin: <https://kc.mcafee.com/corporate/index?page=3Dconte=
nt&id=3DSB10014&actp=3DLIST_RECENT>
-----------------------------------------------------
3. Word 2004 for Windows Still Vulnerable
-----------------------------------------------------
Microsoft communicated a warning about active attacks on Windows machines, =
exploiting a vulnerability in Microsoft Word. The exploit involves using a=
RTF (rich text format) file to create a stack overflow in Word running on =
Windows. The vulnerability was patched in Microsoft Word 2002, 2003, 2007 =
and 2010 in last November's batch of updates (Security Bulletin MS10-087); =
the flaw has also been fixed in Word 2008 and 2011, but Word 2004 is still =
vulnerable. Users who have not downloaded the November patch are urged to =
do so as soon as possible at http://update.microsoft.com or by using Micros=
oft Update or Windows Server Update Services (WSUS).
Read the full story here: <http://www.computerworld.com/s/article/9202819/M=
icrosoft_warns_of_Word_attacks>
----------------------------------------------------------
4. Security (or Lack Thereof) of New Gadgets
----------------------------------------------------------
New gadgets designed to connect to the Internet, such as smartphones and ce=
rtain HDTV's, are not always being designed with security in mind. Hackers =
are shifting their focus to these devices as they become more ubiquitous. A=
s mobile device applications are intended for a single user, there is littl=
e to no authentication and authorization built in. Critical security functi=
ons such as data encryption and auditing are almost always missing. Protect=
ing the devices from attacks will also require new approaches. A few import=
ant steps you can take are:
1. turn off Bluetooth and other services that are not needed,
2. always run some form of security, such as encryption, on your wireless=
network,
3. put any web enabled devices behind a firewall.
Read the full story here: <http://www.nytimes.com/2010/12/27/technology/27h=
ack.html>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
To read all current and archived articles online, visit the Security-FYI Bl=
og at <http://securityfyi.wordpress.com/>
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_C94796E8EFDEmyeatonexchangemitedu_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
<html><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252"></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space;=
-webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14p=
x; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"margin: 0=
.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height: 16.0px">The newslet=
ter author took last month off from writing Security-FYI issues, but she's =
back, so keep an eye out for these weekly security updates in 2011.</p><p s=
tyle=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height: 16=
.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this is=
sue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. IAP Ses=
sion on Protecting Personal Information</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. McAfee =
Vulnerable to Metasploit Attack</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Word 20=
04 for Windows Still Vulnerable</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">4. Securit=
y (or Lack Thereof) of New Gadgets</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. IAP Ses=
sion on Protecting Personal Information</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Tim McGove=
rn and Monique Yeaton of the IT Security team will be hosting an IAP sessio=
n on Protecting Personal Information at MIT. This is an update to the 2010 =
IAP session on Handling Sensitive Data. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">We will di=
scuss:</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">What MIT =
has been doing over the last year to help reduce MIT's risk of a serious da=
ta breach involving personal information.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">What each=
of us need to do in our own offices, and on our computers, to minimize the=
collection of, and to protect sensitive data needed for our business activ=
ities.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-heigh=
t: 16.0px"><br></li>
</ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">There will=
be an opportunity to ask questions and participate in the discussion. This=
is a mostly non-technical session, although we will talk about technology =
tools that can help in this effort. We hope to see you there!</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">For full i=
nformation: <http://student.mit.edu/searchiap/iap-a709.html></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. McAfee =
Vulnerable to Metasploit Attack</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 12.0px 0.0px; font: 14.0px Arial">McAfee is=
aware of a publicly disclosed attack that could disable VirusScan Enterpri=
se (VSE) running on a customer=92s machine. This attack is not a stan=
d-alone attack, but acts as a payload to be chained via another attack.</p>
<p style=3D"margin: 0.0px 0.0px 12.0px 0.0px; font: 14.0px Arial">Affected =
software:</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 12.0px 0.0px; font: 14.0px Arial">VirusSca=
n Enterprise 8.7 and earlier (Windows only)</li>
</ul>
<p style=3D"margin: 0.0px 0.0px 12.0px 0.0px; font: 14.0px Arial">If the at=
tack is successful, it disables both VSE and the connection to ePO. I=
t would leave the McAfee Shield visible, so it may not be immediately appar=
ent that antivirus protection has been disabled. In addition to the i=
mmediate disabling of VSE, the attack changes settings for VSE, resulting i=
n diminished capacity for scanning going forward.</p>
<p style=3D"margin: 0.0px 0.0px 12.0px 0.0px; font: 14.0px Arial">McAfee ha=
s already developed a strategy that would prevent this from happening in th=
e upcoming VSE 8.8 release. They have released a DAT file (6209) that detec=
ts the metasploit plugin used to run this attack. It is recommended that us=
ers update their McAfee software to receive the latest DAT file.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the f=
ull bulletin: <https://kc.mcafee.com/corporate/index?page=3Dcontent&=
id=3DSB10014&actp=3DLIST_RECENT></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Word 20=
04 for Windows Still Vulnerable</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Microsoft =
communicated a warning about active attacks on Windows machines, exploiting=
a vulnerability in Microsoft Word. The exploit involves using a=
RTF (rich text format) file to create a stack overflow in Word running on =
Windows. The vulnerability was patched in Microsoft Word 2002, 2=
003, 2007 and 2010 in last November's batch of updates (Security Bulletin M=
S10-087); the flaw has also been fixed in Word 2008 and 2011, but Word 2004=
is still vulnerable. Users who have not downloaded the November=
patch are urged to do so as soon as possible at http://update.microsoft.co=
m or by using Microsoft Update or Windows Server Update Services (WSUS).</p=
>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the f=
ull story here: <http://www.computerworld.com/s/article/9202819/Microsof=
t_warns_of_Word_attacks></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">4. Securit=
y (or Lack Thereof) of New Gadgets</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">New gadget=
s designed to connect to the Internet, such as smartphones and certain HDTV=
's, are not always being designed with security in mind. Hackers are shifti=
ng their focus to these devices as they become more ubiquitous. As mobile d=
evice applications are intended for a single user, there is little to no au=
thentication and authorization built in. Critical security functions such a=
s data encryption and auditing are almost always missing. Protecting the de=
vices from attacks will also require new approaches. A few important steps =
you can take are: </p>
<ol style=3D"list-style-type: decimal">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">turn off =
Bluetooth and other services that are not needed,</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">always ru=
n some form of security, such as encryption, on your wireless network,</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">put any w=
eb enabled devices behind a firewall.</li>
</ol>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the f=
ull story here: <http://www.nytimes.com/2010/12/27/technology/27hack.htm=
l></p></div><div><br></div><div><p style=3D"margin: 0.0px 0.0px 0.0px 0.=
0px; font: 14.0px Arial">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">To read al=
l current and archived articles online, visit the Security-FYI Blog at <=
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"text-decoratio=
n: underline ; color: #3369b5">http://securityfyi.wordpress.com/</span></a>=
></p><p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><b=
r></p><p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><br>=
</p><p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><br></=
p></div><div><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space;=
-webkit-line-break: after-white-space; font-family: Helvetica; "><span cla=
ss=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-=
horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0=
, 0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; font-=
variant: normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit=
-text-size-adjust: auto; text-transform: none; orphans: 2; white-space: nor=
mal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=
=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -web=
kit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helveti=
ca; font-size: 14px; font-style: normal; font-variant: normal; font-weight:=
normal; letter-spacing: normal; line-height: normal; -webkit-text-decorati=
ons-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text=
-transform: none; orphans: 2; white-space: normal; widows: 2; word-spacing:=
0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separate=
; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-sty=
le: normal; font-variant: normal; font-weight: normal; letter-spacing: norm=
al; line-height: normal; -webkit-text-decorations-in-effect: none; text-ind=
ent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2;=
white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-=
style-span" style=3D"border-collapse: separate; -webkit-border-horizontal-s=
pacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); fon=
t-family: Helvetica; font-size: 12px; font-style: normal; font-variant: nor=
mal; font-weight: normal; letter-spacing: normal; line-height: normal; -web=
kit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-a=
djust: auto; text-transform: none; orphans: 2; white-space: normal; widows:=
2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-c=
ollapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-v=
ertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-siz=
e: 12px; font-style: normal; font-variant: normal; font-weight: normal; let=
ter-spacing: normal; line-height: normal; -webkit-text-decorations-in-effec=
t: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: =
none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><div=
style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font=
-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "=
><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; ">Monique Yeaton</span></span></span></span></span></s=
pan></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-span"=
style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font=
-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "=
><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; ">IT Security Awareness Consultant</span>=
</span></span></span></span></span></div><div style=3D"font-size: 12px; "><=
span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"=
Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-sp=
an" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"f=
ont-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px=
; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">MIT Inform=
ation Services & Technology (IS&T)</span></span></span></span></spa=
n></span></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-=
span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D=
"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12=
px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cl=
ass=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-s=
tyle-span" style=3D"font-size: 12px; ">(617) 253-2715</span></span></span><=
/span></span></span></div><div style=3D"font-size: 12px; "><span class=3D"A=
pple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-spa=
n" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"fo=
nt-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px;=
"><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; ">http://ist.mit.edu/securi=
ty</span></span></span></span></span></span></div><div style=3D"font-size: =
12px; "><br class=3D"khtml-block-placeholder"></div><br class=3D"Apple-inte=
rchange-newline"></span></span></span></span></span></div></div></div></div=
></body></html>
--_000_C94796E8EFDEmyeatonexchangemitedu_--
--===============2056398055==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============2056398055==--