[2356] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, February 7, 2011
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Feb 7 12:14:15 2011
From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Mon, 7 Feb 2011 12:12:50 -0500
Message-ID: <C9759242.10981%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "'itss@mit.edu'" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============2091426240=="
Errors-To: ist-security-fyi-bounces@mit.edu
--===============2091426240==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_C975924210981myeatonexchangemitedu_"
--_000_C975924210981myeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. February 2011 Microsoft Security Updates
2. Microsoft Issues Temporary Fix for IE Flaw
3. What is Whole Disk Encryption?
4. VirusScan Enterprise 8.8 for Windows Released
---------------------------------------------------------
1. February 2011 Microsoft Security Updates
---------------------------------------------------------
This month's security updates from Microsoft, to be released on Tuesday, Fe=
bruary 8, contain 12 bulletins that will address 22 vulnerabilities in vari=
ous systems. Among the patches are three for zero-day vulnerabilities. Thre=
e of the 12 bulletins are rated critical.
Systems affected:
* Internet Explorer
* Windows
* Windows Server
* Visio
Read the full February security bulletin:
<http://www.microsoft.com/technet/security/bulletin/ms11-feb.mspx>
----------------------------------------------------------
2. Microsoft Issues Temporary Fix for IE Flaw
----------------------------------------------------------
On January 31, Microsoft issued an advisory warning of a critical flaw in W=
indows that affects all currently supported versions of Internet Explorer (=
IE). Microsoft has issued a temporary workaround for users (see the Microso=
ft advisory below) so they can protect their computers until a more permane=
nt fix is available. This flaw will NOT be fixed with this month's Patch Tu=
esday security updates. The flaw affects the way IE handles certain documen=
ts and web pages and could be exploited to take control of vulnerable compu=
ters or to steal information. All supported Windows systems are affected.
Read the Microsoft advisory:
<http://www.microsoft.com/technet/security/advisory/2501696.mspx>
Read the story in the news:
<http://www.computerweekly.com/Articles/2011/02/07/245286/Microsoft-Patch-T=
uesday-update-excludes-fix-for-MHTML.htm>
-------------------------------------------
3. What is Whole Disk Encryption?
-------------------------------------------
Many companies are switching from traditional desktop computers to laptops =
as the price of portability has plummeted. Meanwhile, adoption of full disk=
encryption has accelerated. Unfortunately, many users are overconfident in=
the magical and misunderstood security blanket of "being encrypted."
Users who are protected through encryption begin to engage in riskier activ=
ities. When end-users have encryption, they may understand that to mean tha=
t their hard disk is jumbled and can only be unlocked with their secure pas=
sword, but what they might not understand is that when their computer is on=
, this no longer applies.
This Hermes article begins to unravel some of the mysteries of encryption: =
<http://kb.mit.edu/confluence/x/g4Vh>
PGP is full disk encryption software that was chosen by IS&T to protect MIT=
's high-risk data. It is used by personnel who need to protect sensitive pe=
rsonal information on laptops and desktops.
To learn more, visit the PGP Frequently Asked Questions page:
<http://kb.mit.edu/confluence/x/Cwta>
----------------------------------------------------------------
4. VirusScan Enterprise 8.8 for Windows Released
----------------------------------------------------------------
IS&T announced the release of McAfee VirusScan 8.8 for Windows today. Accor=
ding to the announcement, VirusScan 8.8 offers many new features and improv=
ements including AntiSpyware, support for Office 2010 and Outlook on-demand=
email scanning.
For more information and/or to download VirusScan 8.8 for Windows visit:
<http://ist.mit.edu/services/software/virusscan/enterprise<http://ist.mit.e=
du/services/software/virusscan/enterprise/88?random=3D1296757645471>>.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
To read all current and archived articles online, visit the Security-FYI Bl=
og at <http://securityfyi.wordpress.com/>
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_C975924210981myeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-si=
ze: 14px; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"ma=
rgin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height: 16.0px"><br>=
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this is=
sue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. Februar=
y 2011 Microsoft Security Updates </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Microso=
ft Issues Temporary Fix for IE Flaw</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. What is=
Whole Disk Encryption?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">4. VirusSc=
an Enterprise 8.8 for Windows Released</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. Februar=
y 2011 Microsoft Security Updates </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">This month=
's security updates from Microsoft, to be released on Tuesday, February 8, =
contain 12 bulletins that will address 22 vulnerabilities in various system=
s. Among the patches are three for zero-day vulnerabilities. Three of the 1=
2 bulletins are rated critical.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Systems af=
fected:</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Internet =
Explorer</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Windows</=
li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Windows S=
erver</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Visio</li=
>
</ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the f=
ull February security bulletin:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><http:/=
/www.microsoft.com/technet/security/bulletin/ms11-feb.mspx></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Microso=
ft Issues Temporary Fix for IE Flaw</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">On January=
31, Microsoft issued an advisory warning of a critical flaw in Windows tha=
t affects all currently supported versions of Internet Explorer (IE). Micro=
soft has issued a temporary workaround for users (see the Microsoft advisor=
y below) so they can protect their computers until a more permanent fix is =
available. This flaw will NOT be fixed with this month's Patch Tuesday secu=
rity updates. The flaw affects the way IE handles certain documents and web=
pages and could be exploited to take control of vulnerable computers or to=
steal information. All supported Windows systems are affected.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the M=
icrosoft advisory: </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><http:/=
/www.microsoft.com/technet/security/advisory/2501696.mspx></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the s=
tory in the news: </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><http:/=
/www.computerweekly.com/Articles/2011/02/07/245286/Microsoft-Patch-Tuesday-=
update-excludes-fix-for-MHTML.htm></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. What is=
Whole Disk Encryption?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Many compa=
nies are switching from traditional desktop computers to laptops as the pri=
ce of portability has plummeted. Meanwhile, adoption of full disk encryptio=
n has accelerated. Unfortunately, many users are overconfident in the magic=
al and misunderstood security blanket of "being encrypted."</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Users who =
are protected through encryption begin to engage in riskier activities. Whe=
n end-users have encryption, they may understand that to mean that their ha=
rd disk is jumbled and can only be unlocked with their secure password, but=
what they might not understand is that when their computer is on, this no =
longer applies.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">This Herme=
s article begins to unravel some of the mysteries of encryption: <http:/=
/kb.mit.edu/confluence/x/g4Vh></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">PGP is ful=
l disk encryption software that was chosen by IS&T to protect MIT's hig=
h-risk data. It is used by personnel who need to protect sensitive personal=
information on laptops and desktops.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">To learn m=
ore, visit the PGP Frequently Asked Questions page:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><http:/=
/kb.mit.edu/confluence/x/Cwta></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">4. VirusSc=
an Enterprise 8.8 for Windows Released</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">IS&T a=
nnounced the release of McAfee VirusScan 8.8 for Windows today. According t=
o the announcement, VirusScan 8.8 offers many new features and improvements=
including AntiSpyware, support for Office 2010 and Outlook on-demand email=
scanning.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">For more i=
nformation and/or to download VirusScan 8.8 for Windows visit:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #20=
3af9"><span style=3D"color: #000000"><<a href=3D"http://ist.mit.edu/serv=
ices/software/virusscan/enterprise/88?random=3D1296757645471">http://ist.mi=
t.edu/services/software/virusscan/enterprise</a>>. </span></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">To read al=
l current and archived articles online, visit the Security-FYI Blog at <=
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"text-decoratio=
n: underline ; color: #3369b5">http://securityfyi.wordpress.com/</span></a>=
></p></div><div><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; -webkit-line-break: after-white-space; font-family: Helvetica; "><sp=
an class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-b=
order-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color:=
rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: normal;=
font-variant: normal; font-weight: normal; letter-spacing: normal; line-he=
ight: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -=
webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-spac=
e: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span"=
style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px=
; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: H=
elvetica; font-size: 14px; font-style: normal; font-variant: normal; font-w=
eight: normal; letter-spacing: normal; line-height: normal; -webkit-text-de=
corations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto=
; text-transform: none; orphans: 2; white-space: normal; widows: 2; word-sp=
acing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: se=
parate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spa=
cing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; fo=
nt-style: normal; font-variant: normal; font-weight: normal; letter-spacing=
: normal; line-height: normal; -webkit-text-decorations-in-effect: none; te=
xt-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orpha=
ns: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"=
Apple-style-span" style=3D"border-collapse: separate; -webkit-border-horizo=
ntal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0=
); font-family: Helvetica; font-size: 14px; font-style: normal; font-varian=
t: normal; font-weight: normal; letter-spacing: normal; line-height: normal=
; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-=
size-adjust: auto; text-transform: none; orphans: 2; white-space: normal; w=
idows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"bo=
rder-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-bo=
rder-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; fo=
nt-size: 14px; font-style: normal; font-variant: normal; font-weight: norma=
l; letter-spacing: normal; line-height: normal; -webkit-text-decorations-in=
-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-trans=
form: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; =
"><span class=3D"Apple-style-span" style=3D"border-collapse: separate; -web=
kit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; c=
olor: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: no=
rmal; font-variant: normal; font-weight: normal; letter-spacing: normal; li=
ne-height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0=
px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white=
-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-=
span" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing=
: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-fami=
ly: Helvetica; font-size: 12px; font-style: normal; font-variant: normal; f=
ont-weight: normal; letter-spacing: normal; line-height: normal; -webkit-te=
xt-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust:=
auto; text-transform: none; orphans: 2; white-space: normal; widows: 2; wo=
rd-spacing: 0px; "><div style=3D"font-size: 12px; "><br></div><div style=3D=
"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12=
px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cl=
ass=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-s=
tyle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" sty=
le=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-siz=
e: 12px; ">Monique Yeaton</span></span></span></span></span></span></div><d=
iv style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"fo=
nt-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px;=
"><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; ">IT Security Awareness Consultant</span></span></span=
></span></span></span></div><div style=3D"font-size: 12px; "><span class=3D=
"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-s=
pan" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; ">MIT Information Service=
s & Technology (IS&T)</span></span></span></span></span></span></di=
v><div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span=
class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Appl=
e-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" =
style=3D"font-size: 12px; ">(617) 253-2715</span></span></span></span></spa=
n></span></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-=
span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D=
"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12=
px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cl=
ass=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-s=
tyle-span" style=3D"font-size: 12px; ">http://ist.mit.edu/security</span></=
span></span></span></span></span></div><div style=3D"font-size: 12px; "><br=
class=3D"khtml-block-placeholder"></div><br class=3D"Apple-interchange-new=
line"></span></span></span></span></span></span></span></div></div></div></=
div></body></html>
--_000_C975924210981myeatonexchangemitedu_--
--===============2091426240==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============2091426240==--