[2384] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, May 23, 2011
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon May 23 12:49:08 2011
From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Mon, 23 May 2011 12:48:07 -0400
Message-ID: <CA000807.16AC3%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============0581602520=="
Errors-To: ist-security-fyi-bounces@mit.edu
--===============0581602520==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_CA00080716AC3myeatonexchangemitedu_"
--_000_CA00080716AC3myeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. I've Been Hacked! Now What?
2. Google Has Fix for Android Vulnerability
------------------------------------------
1. I've Been Hacked! Now What?
------------------------------------------
In spite of all your precautions to protect your computer from a virus, som=
ehow one got through. Pop up windows are appearing all over the place, you =
can't launch some applications, your computer is sluggish and it's just gen=
erally not working as it should. What do you do now??
This article from About.com shares a set of steps to take to bring your mac=
hine back to its normal state without your files being destroyed: <http://n=
etsecurity.about.com/od/disasterrecovery/a/I-Ve-Been-Hacked-Now-What.htm>
Below is a summary of the recovery steps mentioned:
1. Isolate your computer: Isolation prevents the hacker from continuing to =
wreak havoc by pulling files or personal information. Network access should=
be cut off by removing the cable or turning off the wifi.
Important Note!!: This step isn't mentioned in the article, but if your inf=
ected MIT work computer contains the personal information or financial info=
rmation of anyone other than yourself, you will want to notify your supervi=
sor and send an email to infoprotect@mit.edu before taking any of the follo=
wing steps. The IT Security team will run forensics on the drive to find ou=
t if the malware was data-seeking and will attempt to determine if the data=
was accessed by a third party. They will re-image the drive and return the=
original drive back to you as soon as possible.
2. Shut down and remove the hard drive: If you don't feel comfortable remov=
ing the drive, take the computer to a PC repair shop or the IS&T Help Desk.=
(An alternative to removing the drive would be to boot the machine off a L=
inux Live CD <http://en.wikipedia.org/wiki/Live_CD> with virus detecting to=
ols and the latest virus definitions on it.)
3. Scan the drive for infection and malware: Using a separate bootable driv=
e, scan the drive using rootkit, virus and spyware detectors. They should b=
e able to remove the malware from the file system.
4. Backup important files if you haven't already: You'll want to get all pe=
rsonal data off the drive. Copy photos, documents, media and other personal=
files to a DVD, CD or other clean hard drive.
5. Reinstall the hard drive: After verifying a successful backup of your fi=
les, you can put the drive back into the computer.
6. Completely wipe the old drive (repartition and reformat): You shouldn't =
trust that the malware has been cleaned off entirely. Some damage to the fi=
le system might still exist. The only way to be sure is to clean the drive =
with a hard drive wipe utility to blank the drive. This may take a few hour=
s to complete. The wiping process will overwrite every sector of the hard d=
rive.
7. Reload the OS and trusted media: Use your original OS disks that came wi=
th your computer, do not use ones from unknown origin. When attaching the c=
omputer back to the network, the first thing you want to do is accept the u=
pdates and patches. Don't install any software yet.
8. Reinstall virus protection software, and any other security software bef=
ore loading any applications on the machine. Make sure your AV software is =
up to date and is accepting new virus definitions on a daily basis.
9. Scan the backup disks for viruses before copying the files back onto the=
computer. You can never be too careful, as your backup files might have be=
come infected during a previous backup process.
10. Going forward, back up your files on a regular basis so that if this ha=
ppens again, you won't spend as much time reloading your system.
------------------------------------------------------
2. Google Has Fix for Android Vulnerability
------------------------------------------------------
Google is rolling out a fix for a vulnerability in the majority of Android =
phones that allows attackers to access and modify users' Google contacts an=
d calendar when they are being accessed over unsecured Wi-Fi networks. The =
flaw affects versions 2.3.3 and earlier of the Android platform, which is r=
unning on 99.7 percent of Android devices. The fix does not require action =
from users; it will be pushed out automatically.
Read the full story:
<http://www.pcworld.com/article/228146/google_issues_patch_to_plug_android_=
data_leaks.html>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Read all Security FYI Newsletter articles online at http://securityfyi.word=
press.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_CA00080716AC3myeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-si=
ze: 14px; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"ma=
rgin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height: 16.0px"><br>=
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this is=
sue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. I've Be=
en Hacked! Now What?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Google =
Has Fix for Android Vulnerability</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
--------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. I've Be=
en Hacked! Now What?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
--------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In spite o=
f all your precautions to protect your computer from a virus, somehow one g=
ot through. Pop up windows are appearing all over the place, you can't laun=
ch some applications, your computer is sluggish and it's just generally not=
working as it should. What do you do now??</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">This artic=
le from About.com shares a set of steps to take to bring your machine back =
to its normal state without your files being destroyed: <http://netsecur=
ity.about.com/od/disasterrecovery/a/I-Ve-Been-Hacked-Now-What.htm></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Below is a=
summary of the recovery steps mentioned:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. Isolate=
your computer: Isolation prevents the hacker from continuing to wreak havo=
c by pulling files or personal information. Network access should be cut of=
f by removing the cable or turning off the wifi.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Important =
Note!!: This step isn't mentioned in the article, but if your infected MIT =
work computer contains the personal information or financial information of=
anyone other than yourself, you will want to notify your supervisor and se=
nd an email to infoprotect@mit.edu before taking any of the following steps=
. The IT Security team will run forensics on the drive to find out if the m=
alware was data-seeking and will attempt to determine if the data was acces=
sed by a third party. They will re-image the drive and return the original =
drive back to you as soon as possible.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Shut do=
wn and remove the hard drive: If you don't feel comfortable removing the dr=
ive, take the computer to a PC repair shop or the IS&T Help Desk. (An a=
lternative to removing the drive would be to boot the machine off a Linux L=
ive CD <http://en.wikipedia.org/wiki/Live_CD> with virus detecting to=
ols and the latest virus definitions on it.)</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Scan th=
e drive for infection and malware: Using a separate bootable drive, scan th=
e drive using rootkit, virus and spyware detectors. They should be able to =
remove the malware from the file system.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">4. Backup =
important files if you haven't already: You'll want to get all personal dat=
a off the drive. Copy photos, documents, media and other personal files to =
a DVD, CD or other clean hard drive.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">5. Reinsta=
ll the hard drive: After verifying a successful backup of your files, you c=
an put the drive back into the computer.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">6. Complet=
ely wipe the old drive (repartition and reformat): You shouldn't trust that=
the malware has been cleaned off entirely. Some damage to the file system =
might still exist. The only way to be sure is to clean the drive with a har=
d drive wipe utility to blank the drive. This may take a few hours to compl=
ete. The wiping process will overwrite every sector of the hard drive.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">7. Reload =
the OS and trusted media: Use your original OS disks that came with your co=
mputer, do not use ones from unknown origin. When attaching the computer ba=
ck to the network, the first thing you want to do is accept the updates and=
patches. Don't install any software yet.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">8. Reinsta=
ll virus protection software, and any other security software before loadin=
g any applications on the machine. Make sure your AV software is up to date=
and is accepting new virus definitions on a daily basis.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">9. Scan th=
e backup disks for viruses before copying the files back onto the computer.=
You can never be too careful, as your backup files might have become infec=
ted during a previous backup process.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">10. Going =
forward, back up your files on a regular basis so that if this happens agai=
n, you won't spend as much time reloading your system.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
--------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Google =
Has Fix for Android Vulnerability</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
--------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Google is =
rolling out a fix for a vulnerability in the majority of Android phones tha=
t allows attackers to access and modify users' Google contacts and calendar=
when they are being accessed over unsecured Wi-Fi networks. The flaw affec=
ts versions 2.3.3 and earlier of the Android platform, which is running on =
99.7 percent of Android devices. The fix does not require action from users=
; it will be pushed out automatically.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the f=
ull story:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><http:/=
/www.pcworld.com/article/228146/google_issues_patch_to_plug_android_data_le=
aks.html></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles online at http://securityfyi.wordpress.com/=
.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p></div><div><br></div><div>=
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; font-family: Helvetica; "><span class=3D"Apple-s=
tyle-span" style=3D"border-collapse: separate; -webkit-border-horizontal-sp=
acing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font=
-family: Helvetica; font-size: 14px; font-style: normal; font-variant: norm=
al; font-weight: normal; letter-spacing: normal; line-height: normal; -webk=
it-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-ad=
just: auto; text-transform: none; orphans: 2; white-space: normal; widows: =
2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-co=
llapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-ve=
rtical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size=
: 14px; font-style: normal; font-variant: normal; font-weight: normal; lett=
er-spacing: normal; line-height: normal; -webkit-text-decorations-in-effect=
: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: n=
one; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span=
class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-bor=
der-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: r=
gb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; f=
ont-variant: normal; font-weight: normal; letter-spacing: normal; line-heig=
ht: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -we=
bkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-space:=
normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" s=
tyle=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Hel=
vetica; font-size: 14px; font-style: normal; font-variant: normal; font-wei=
ght: normal; letter-spacing: normal; line-height: normal; -webkit-text-deco=
rations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; =
text-transform: none; orphans: 2; white-space: normal; widows: 2; word-spac=
ing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: sepa=
rate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spaci=
ng: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font=
-style: normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; -webkit-text-decorations-in-effect: none; text=
-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans=
: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Ap=
ple-style-span" style=3D"border-collapse: separate; -webkit-border-horizont=
al-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0);=
font-family: Helvetica; font-size: 12px; font-style: normal; font-variant:=
normal; font-weight: normal; letter-spacing: normal; line-height: normal; =
-webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-si=
ze-adjust: auto; text-transform: none; orphans: 2; white-space: normal; wid=
ows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"bord=
er-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-bord=
er-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font=
-size: 12px; font-style: normal; font-variant: normal; font-weight: normal;=
letter-spacing: normal; line-height: normal; -webkit-text-decorations-in-e=
ffect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transfo=
rm: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; ">=
<div style=3D"font-size: 12px; "><br></div><div style=3D"font-size: 12px; "=
><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">Moniq=
ue Yeaton</span></span></span></span></span></span></div><div style=3D"font=
-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "=
><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; ">IT Security Communications Consultant</span></span></span></span><=
/span></span></div><div style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size=
: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><spa=
n class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"App=
le-style-span" style=3D"font-size: 12px; ">MIT Information Services & T=
echnology (IS&T)</span></span></span></span></span></span></div><div st=
yle=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-si=
ze: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><s=
pan class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"A=
pple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-spa=
n" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"fo=
nt-size: 12px; ">(617) 253-2715</span></span></span></span></span></span></=
div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span=
class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Appl=
e-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" =
style=3D"font-size: 12px; ">http://ist.mit.edu/security</span></span></span=
></span></span></span></div><div style=3D"font-size: 12px; "><br class=3D"k=
html-block-placeholder"></div><br class=3D"Apple-interchange-newline"></spa=
n></span></span></span></span></span></span></div></div></div></div></body>=
</html>
--_000_CA00080716AC3myeatonexchangemitedu_--
--===============0581602520==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0581602520==--