[2379] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, April 19, 2011
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue Apr 19 15:05:52 2011
From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Tue, 19 Apr 2011 15:04:01 -0400
Message-ID: <C9D354E1.14D5B%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============0406321307=="
Errors-To: ist-security-fyi-bounces@mit.edu
--===============0406321307==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_C9D354E114D5Bmyeatonexchangemitedu_"
--_000_C9D354E114D5Bmyeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. Adobe Flash Player, Reader and Acrobat Vulnerabilities
2. Facebook, AOL, Email Communications Intercepted by Law Enforcement
3. Qualys BrowserCheck
--------------------------------------------------------------------------
1. Adobe Flash Player, Reader and Acrobat Vulnerabilities
--------------------------------------------------------------------------
Flash Player 10.2
A critical vulnerability exists in Flash Player 10.2.153.1 and earlier vers=
ions for Windows, Macintosh, Linux and Solaris; Flash Player 10.2.156.12 an=
d earlier for Android; and Adobe Flash Player 10.2.154.25 and earlier for C=
hrome users.
Adobe recommends users of Flash Player to update to version 10.2.159.1 (or =
Flash Player 10.2.154.27 for Chrome users), now available. Android users wi=
ll have to wait until the week of April 25th for the update to version 10.2=
.156.12. Users of Adobe AIR should update to Adobe AIR 2.6.19140.
Read the security bulletin on Flash Player: <http://www.adobe.com/support/s=
ecurity/bulletins/apsb11-07.html>
Download the latest Flash Player: <http://get.adobe.com/flashplayer/>
Reader 9 and 10
A critical vulnerability exists in the Authplay.dll component of Adobe Read=
er for Windows and Macintosh operating systems.
An update will be made available to Reader 9.4.3 and earlier for Windows an=
d Macintosh and Reader X (10.0.1) for Macintosh the week of April 25th. Bec=
ause Protected Mode would prevent an exploit in Adobe Reader X for Windows,=
Adobe will address this issue in the next quarterly security update schedu=
led for June 14, 2011.
Acrobat X
A critical vulnerability exists in the Authplay.dll component of Acrobat X =
(10.0.2) and earlier for Windows and Macintosh operating systems.
An update will be made available to Adobe Acrobat X (10.0.2) and earlier 10=
.x and 9.x versions for Windows and Macintosh the week of April 25th.
Read the full bulletin on all vulnerabilities: <http://www.adobe.com/suppor=
t/security/advisories/apsa11-02.html>
---------------------------------------------------------------------------=
---------------------
2. Facebook, AOL, Email Communications Intercepted by Law Enforcement
---------------------------------------------------------------------------=
---------------------
Christopher Soghoian, a doctoral candidate at the School of Informatics and=
Computing at Indiana University, recently published a paper on the reporti=
ng gap of electronic surveillance by law enforcement agencies.
While US law requires reporting of requests to intercept communications dat=
a in real-time, no such requirement exists for requests for stored communic=
ation data. As a result, most modern surveillance now takes place entirely =
off the books and the true scale of such activities, which vastly outnumber=
traditional wiretaps and pen registers, remains unknown. Law enforcement a=
gencies have already made tens of thousands of requests for stored data fro=
m companies like Facebook and AOL, and you may never know about it.
This is another good reason to keep your communications via the Internet le=
gal and "clean," as you never know who might be watching or reading!
Read the story in the news: <http://www.techworld.com.au/article/382991/us_=
police_increasingly_peeping_e-mail_instant_messages/>
-------------------------------
3. Qualys BrowserCheck
-------------------------------
Wondering if the browser you use, Firefox, Safari, Internet Explorer etc, i=
s safe to use? Now you can use a free online browser checking tool by Qualy=
s, a security software company, by going to <https://browsercheck.qualys.co=
m/>.
The Qualys BrowserCheck tool checks your browser as well as your browser pl=
ugins and add-ons (such as Adobe Flash Player, Apple Quicktime, Real Player=
, and Java Runtime) to identify insecure and out-of-date versions that put =
you at risk. It also checks if your Windows operating system is supported b=
y Microsoft (which is important if you are to continue to receive security =
updates).
Learn more about the scanner here, including supported browsers:
<https://community.qualys.com/docs/DOC-1542#s1>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
To read all current and archived articles online, visit the Security-FYI Bl=
og at <http://securityfyi.wordpress.com/>
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_C9D354E114D5Bmyeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-si=
ze: 14px; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"ma=
rgin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-height: 17.0px">=
<br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">In thi=
s issue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Ado=
be Flash Player, Reader and Acrobat Vulnerabilities</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Faceboo=
k, AOL, Email Communications Intercepted by Law Enforcement</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Qualys =
BrowserCheck</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
--------------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Ado=
be Flash Player, Reader and Acrobat Vulnerabilities</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
--------------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><b>Flash P=
layer 10.2</b></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">A critical=
vulnerability exists in Flash Player 10.2.153.1 and earlier versions for W=
indows, Macintosh, Linux and Solaris; Flash Player 10.2.156.12 and earlier =
for Android; and Adobe Flash Player 10.2.154.25 and earlier for Chrome user=
s.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Adobe =
recommends users of Flash Player to update to version 10.2.159.1 (or Flash =
Player 10.2.154.27 for Chrome users), now available. Android users will hav=
e to wait until the week of April 25th for the update to version 10.2.156.1=
2. Users of Adobe AIR should update to Adobe AIR 2.6.19140.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Read t=
he security bulletin on Flash Player: <http://www.adobe.com/support/secu=
rity/bulletins/apsb11-07.html></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Downlo=
ad the latest Flash Player: <http://get.adobe.com/flashplayer/></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><b>Rea=
der 9 and 10</b></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">A crit=
ical vulnerability exists in the Authplay.dll component of Adobe Reader for=
Windows and Macintosh operating systems.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">An upd=
ate will be made available to Reader 9.4.3 and earlier for Windows and Maci=
ntosh and Reader X (10.0.1) for Macintosh the week of April 25th. Because P=
rotected Mode would prevent an exploit in Adobe Reader X for Windows, Adobe=
will address this issue in the next quarterly security update scheduled fo=
r June 14, 2011.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><b>Acr=
obat X</b></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">A crit=
ical vulnerability exists in the Authplay.dll component of Acrobat X (10.0.=
2) and earlier for Windows and Macintosh operating systems.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">An update =
will be made available to Adobe Acrobat X (10.0.2) and earlier 10.x and 9.x=
versions for Windows and Macintosh the week of April 25th. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the f=
ull bulletin on all vulnerabilities: <http://www.adobe.com/support/secur=
ity/advisories/apsa11-02.html></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
---------------------------------------------------------------------------=
---------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Faceboo=
k, AOL, Email Communications Intercepted by Law Enforcement</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
---------------------------------------------------------------------------=
---------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Christophe=
r Soghoian, a doctoral candidate at the School of Informatics and Computing=
at Indiana University, recently published a paper on the reporting gap of =
electronic surveillance by law enforcement agencies.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">While US l=
aw requires reporting of requests to intercept communications data in real-=
time, no such requirement exists for requests for stored communication data=
. As a result, most modern surveillance now takes place entirely off the bo=
oks and the true scale of such activities, which vastly outnumber tradition=
al wiretaps and pen registers, remains unknown. Law enforcement agencies ha=
ve already made tens of thousands of requests for stored data from companie=
s like Facebook and AOL, and you may never know about it.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">This is an=
other good reason to keep your communications via the Internet legal and "c=
lean," as you never know who might be watching or reading!</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the s=
tory in the news: <http://www.techworld.com.au/article/382991/us_police_=
increasingly_peeping_e-mail_instant_messages/></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Qualys =
BrowserCheck</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Wondering =
if the browser you use, Firefox, Safari, Internet Explorer etc, is safe to =
use? Now you can use a free online browser checking tool by Qualys, a secur=
ity software company, by going to <https://browsercheck.qualys.com/>.=
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The Qualys=
BrowserCheck tool checks your browser as well as your browser plugins and =
add-ons (such as Adobe Flash Player, Apple Quicktime, Real Player, and Java=
Runtime) to identify insecure and out-of-date versions that put you at ris=
k. It also checks if your Windows operating system is supported by Microsof=
t (which is important if you are to continue to receive security updates).<=
/p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Learn more=
about the scanner here, including supported browsers:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><https:=
//community.qualys.com/docs/DOC-1542#s1></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">To read al=
l current and archived articles online, visit the Security-FYI Blog at <=
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"text-decoratio=
n: underline ; color: #3369b5">http://securityfyi.wordpress.com/</span></a>=
></p></div><div><br></div><div><br></div><div><div style=3D"word-wrap: b=
reak-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;=
font-family: Helvetica; "><span class=3D"Apple-style-span" style=3D"border=
-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-border=
-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-s=
ize: 14px; font-style: normal; font-variant: normal; font-weight: normal; l=
etter-spacing: normal; line-height: normal; -webkit-text-decorations-in-eff=
ect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transform=
: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><s=
pan class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-=
border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color=
: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: normal=
; font-variant: normal; font-weight: normal; letter-spacing: normal; line-h=
eight: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px; =
-webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-spa=
ce: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span=
" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0p=
x; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 14px; font-style: normal; font-variant: normal; font-=
weight: normal; letter-spacing: normal; line-height: normal; -webkit-text-d=
ecorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: aut=
o; text-transform: none; orphans: 2; white-space: normal; widows: 2; word-s=
pacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: s=
eparate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-sp=
acing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; f=
ont-style: normal; font-variant: normal; font-weight: normal; letter-spacin=
g: normal; line-height: normal; -webkit-text-decorations-in-effect: none; t=
ext-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orph=
ans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D=
"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-horiz=
ontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, =
0); font-family: Helvetica; font-size: 14px; font-style: normal; font-varia=
nt: normal; font-weight: normal; letter-spacing: normal; line-height: norma=
l; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text=
-size-adjust: auto; text-transform: none; orphans: 2; white-space: normal; =
widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"b=
order-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-b=
order-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; f=
ont-size: 12px; font-style: normal; font-variant: normal; font-weight: norm=
al; letter-spacing: normal; line-height: normal; -webkit-text-decorations-i=
n-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-tran=
sform: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px;=
"><span class=3D"Apple-style-span" style=3D"border-collapse: separate; -we=
bkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: n=
ormal; font-variant: normal; font-weight: normal; letter-spacing: normal; l=
ine-height: normal; -webkit-text-decorations-in-effect: none; text-indent: =
0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; whit=
e-space: normal; widows: 2; word-spacing: 0px; "><div style=3D"font-size: 1=
2px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span c=
lass=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-=
style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" st=
yle=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-si=
ze: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">Mo=
nique Yeaton</span></span></span></span></span></span></div><div style=3D"f=
ont-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px=
; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span clas=
s=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-sty=
le-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; ">IT Security Awareness Consultant</span></span></span></span></span=
></span></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-s=
pan" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; ">MIT Information Services & Techno=
logy (IS&T)</span></span></span></span></span></span></div><div style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span=
class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Appl=
e-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" =
style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-=
size: 12px; ">(617) 253-2715</span></span></span></span></span></span></div=
><div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D=
"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12=
px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cl=
ass=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-s=
tyle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" sty=
le=3D"font-size: 12px; ">http://ist.mit.edu/security</span></span></span></=
span></span></span></div><div style=3D"font-size: 12px; "><br class=3D"khtm=
l-block-placeholder"></div><br class=3D"Apple-interchange-newline"></span><=
/span></span></span></span></span></span></div></div></div></div></body></h=
tml>
--_000_C9D354E114D5Bmyeatonexchangemitedu_--
--===============0406321307==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0406321307==--