[2383] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, May 16, 2011
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon May 16 14:39:32 2011
From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Mon, 16 May 2011 14:38:15 -0400
Message-ID: <C9F6E757.16722%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============0394230775=="
Errors-To: ist-security-fyi-bounces@mit.edu
--===============0394230775==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_C9F6E75716722myeatonexchangemitedu_"
--_000_C9F6E75716722myeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. The Sony PlayStation Network Attack
2. White House Reveals Cyber Security Plan
3. Combatting Phishing Attacks
---------------------------------------------------
1. The Sony PlayStation Network Attack
---------------------------------------------------
As you may have heard, last month the Sony PlayStation Network -- the netwo=
rk that gives PS3 and PSP system owners access to games, movies, music and =
TV programs -- experienced an unauthorized intrusion of its system, possibl=
y exposing personal data and credit card information.
A criminal investigation is currently underway to find the perpetrators and=
determine if sensitive information was accessed or is being sold on the bl=
ack market. The network currently has 77 million registered accounts.
Sony says that the credit card data was encrypted and did not include the 3=
-digit security codes, so it is unlikely the attackers can use the informat=
ion in the database to their advantage. But discussions on hackers forums i=
ndicate that the attackers are selling the credit card data for $100,000, a=
nd are even offering to sell it back to Sony.
For those affected, Sony encourages you to be especially aware of email, te=
lephone and postal mail scams that ask for personal or sensitive informatio=
n. Sony will not contact you for this information. They recommend that you =
change your PlayStation Network and Qriocity password as soon as possible (=
network access has finally been restored for some users). If you used the o=
ld password in other places, you should change it there as well. As a good =
habit, it is always recommended to monitor your card's account statements a=
nd your credit reports for any suspicious activity.
Sony provides a Q&A for their users here:
<http://blog.us.playstation.com/2011/04/27/qa-1-for-playstation-network-and=
-qriocity-services/>
A run down of the story has been posted by NPR here:
<http://www.npr.org/blogs/thetwo-way/2011/04/29/135844004/playstation-after=
math-hackers-claim-to-have-credit-card-data>
--------------------------------------------------------
2. White House Reveals Cyber Security Plan
--------------------------------------------------------
A cyber security plan proposed by the Obama administration aims to protect =
individual privacy, federal computer networks and elements of national crit=
ical infrastructure. The proposal includes more stringent penalties for cy=
ber criminals; mandatory data breach reporting for organizations; placing t=
he responsibility for defending federal agency networks from attack in the =
hands of the Department of Homeland Security (DHS); and improving protectio=
n for elements of the country's critical infrastructure. It also would est=
ablish guidelines for the government to help companies that suffer cyber in=
cidents, and for information sharing about threats among businesses and sta=
te and local governments.
[Article source: SANS.org]
Read the full story in the news:
<http://www.informationweek.com/news/government/security/229500148>
----------------------------------------
3. Combatting Phishing Attacks
----------------------------------------
An article recently posted on TechRepublic.com states, "Plain and simple, p=
hishing attacks work." They depend on people not knowing how and when to do=
the right thing. So how does an organization, company or university make s=
ure its employees understand what is required?
According to the same article, the answer is training. Employees should be =
consistently briefed on what would qualify as "suspicious" email and what t=
o do with it. This keeps them informed and prevents them from getting comfo=
rtable with sloppy security practices, because with these social engineerin=
g attacks, the goal is to lure you into a false sense of comfort.
IS&T has always been consistent with its message about dubious emails: no o=
ne at MIT will EVER ask you through email to reply with your personal infor=
mation, much less ask for your user name and passwords, or to click on a li=
nk to update your user name and password for, for instance, your email acco=
unt.
If you have not done so already, learn more about phishing attacks, example=
s of phishy emails that appear to be coming from MIT, and how to hone your =
skills for recognizing phishing emails with this Hermes article: <http://kb=
.mit.edu/confluence/x/SBhB>.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Read all Security FYI Newsletter articles online at http://securityfyi.word=
press.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_C9F6E75716722myeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-si=
ze: 14px; font-family: Calibri, sans-serif; "><div><div><div><font class=3D=
"Apple-style-span" face=3D"Arial"><font class=3D"Apple-style-span" face=3D"=
Calibri,sans-serif"><br></font></font></div><div><span class=3D"Apple-style=
-span" style=3D"font-family: Helvetica; "><div style=3D"word-wrap: break-wo=
rd; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><spa=
n class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-bo=
rder-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: =
rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; line-hei=
ght: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -w=
ebkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-space=
: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px;=
-webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: He=
lvetica; font-size: 14px; font-style: normal; font-variant: normal; font-we=
ight: normal; letter-spacing: normal; line-height: normal; -webkit-text-dec=
orations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto;=
text-transform: none; orphans: 2; white-space: normal; widows: 2; word-spa=
cing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: sep=
arate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spac=
ing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; fon=
t-style: normal; font-variant: normal; font-weight: normal; letter-spacing:=
normal; line-height: normal; -webkit-text-decorations-in-effect: none; tex=
t-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphan=
s: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"A=
pple-style-span" style=3D"border-collapse: separate; -webkit-border-horizon=
tal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0)=
; font-family: Helvetica; font-size: 14px; font-style: normal; font-variant=
: normal; font-weight: normal; letter-spacing: normal; line-height: normal;=
-webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-s=
ize-adjust: auto; text-transform: none; orphans: 2; white-space: normal; wi=
dows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"bor=
der-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-bor=
der-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; fon=
t-size: 14px; font-style: normal; font-variant: normal; font-weight: normal=
; letter-spacing: normal; line-height: normal; -webkit-text-decorations-in-=
effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transf=
orm: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "=
><span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webk=
it-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; co=
lor: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: nor=
mal; font-variant: normal; font-weight: normal; letter-spacing: normal; lin=
e-height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0p=
x; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-=
space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-s=
pan" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing:=
0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-famil=
y: Helvetica; font-size: 12px; font-style: normal; font-variant: normal; fo=
nt-weight: normal; letter-spacing: normal; line-height: normal; -webkit-tex=
t-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: =
auto; text-transform: none; orphans: 2; white-space: normal; widows: 2; wor=
d-spacing: 0px; "><div style=3D"font-size: 12px; ">
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this is=
sue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. The Son=
y PlayStation Network Attack</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. White H=
ouse Reveals Cyber Security Plan</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Combatt=
ing Phishing Attacks</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. The Son=
y PlayStation Network Attack</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">As you may=
have heard, last month the Sony PlayStation Network -- the network that gi=
ves PS3 and PSP system owners access to games, movies, music and TV program=
s -- experienced an unauthorized intrusion of its system, possibly exposing=
personal data and credit card information. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">A criminal=
investigation is currently underway to find the perpetrators and determine=
if sensitive information was accessed or is being sold on the black market=
. The network currently has 77 million registered accounts.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Sony says =
that the credit card data was encrypted and did not include the 3-digit sec=
urity codes, so it is unlikely the attackers can use the information in the=
database to their advantage. But discussions on hackers forums indicate th=
at the attackers are selling the credit card data for $100,000, and are eve=
n offering to sell it back to Sony.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">For those =
affected, Sony encourages you to be especially aware of email, telephone an=
d postal mail scams that ask for personal or sensitive information. Sony wi=
ll not contact you for this information. They recommend that you change you=
r PlayStation Network and Qriocity password as soon as possible (network ac=
cess has finally been restored for some users). If you used the old passwor=
d in other places, you should change it there as well. As a good habit, it =
is always recommended to monitor your card's account statements and your cr=
edit reports for any suspicious activity.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Sony provi=
des a Q&A for their users here:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><http:/=
/blog.us.playstation.com/2011/04/27/qa-1-for-playstation-network-and-qrioci=
ty-services/></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">A run down=
of the story has been posted by NPR here:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><http:/=
/www.npr.org/blogs/thetwo-way/2011/04/29/135844004/playstation-aftermath-ha=
ckers-claim-to-have-credit-card-data></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. White H=
ouse Reveals Cyber Security Plan</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">A cyber se=
curity plan proposed by the Obama administration aims to protect individual=
privacy, federal computer networks and elements of national critical infra=
structure. The proposal includes more stringent penalties for cy=
ber criminals; mandatory data breach reporting for organizations; placing t=
he responsibility for defending federal agency networks from attack in the =
hands of the Department of Homeland Security (DHS); and improving protectio=
n for elements of the country's critical infrastructure. It also=
would establish guidelines for the government to help companies that suffe=
r cyber incidents, and for information sharing about threats among business=
es and state and local governments.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">[Article s=
ource: SANS.org]</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the f=
ull story in the news:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><http:/=
/www.informationweek.com/news/government/security/229500148></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Combatt=
ing Phishing Attacks</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">An article=
recently posted on TechRepublic.com states, "Plain and simple, phishing at=
tacks work." They depend on people not knowing how and when to do the right=
thing. So how does an organization, company or university make sure its em=
ployees understand what is required?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">According =
to the same article, the answer is training. Employees should be consistent=
ly briefed on what would qualify as "suspicious" email and what to do with =
it. This keeps them informed and prevents them from getting comfortable wit=
h sloppy security practices, because with these social engineering attacks,=
the goal is to lure you into a false sense of comfort.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">IS&T h=
as always been consistent with its message about dubious emails: no one at =
MIT will EVER ask you through email to reply with your personal information=
, much less ask for your user name and passwords, or to click on a link to =
update your user name and password for, for instance, your email account.</=
p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">If you hav=
e not done so already, learn more about phishing attacks, examples of phish=
y emails that appear to be coming from MIT, and how to hone your skills for=
recognizing phishing emails with this Hermes article: <http://kb.mit.ed=
u/confluence/x/SBhB>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles online at http://securityfyi.wordpress.com/=
.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p><p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px=
Arial; min-height: 16.0px"><br></p></div><div style=3D"font-size: 12px; ">=
<span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D=
"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-s=
pan" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; ">Monique Yeaton</span></span></span></span></div><div sty=
le=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-siz=
e: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><sp=
an class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Ap=
ple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span=
" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"fon=
t-size: 12px; ">IT Security Communications Consultant</span></span></span><=
/span></span></span></div><div style=3D"font-size: 12px; "><span class=3D"A=
pple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-spa=
n" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"fo=
nt-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px;=
"><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; ">MIT Information Services =
& Technology (IS&T)</span></span></span></span></span></span></div>=
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">(617) 253-2715</span></span></span></span></span></=
span></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-span=
" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"fon=
t-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; =
"><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; ">http://ist.mit.edu/security</span></spa=
n></span></span></span></span></div><div style=3D"font-size: 12px; "><br cl=
ass=3D"khtml-block-placeholder"></div><br class=3D"Apple-interchange-newlin=
e"></span></span></span></span></span></span></span></div></span></div></di=
v></div></body></html>
--_000_C9F6E75716722myeatonexchangemitedu_--
--===============0394230775==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0394230775==--