[2394] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, August 2, 2011

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue Aug 2 11:58:09 2011

From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Tue, 2 Aug 2011 11:57:19 -0400
Message-ID: <CA5D969F.1A0E3%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============0647951199=="
Errors-To: ist-security-fyi-bounces@mit.edu

--===============0647951199==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_CA5D969F1A0E3myeatonexchangemitedu_"

--_000_CA5D969F1A0E3myeatonexchangemitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable


In this issue:


1. Mac iOS 4.3.5 Fixes Data Security Issue

2. New Tricks Used by Computer Crooks

3. Help! My Laptop Was Stolen!



------------------------------------------------------

1. Mac iOS 4.3.5 Fixes Data Security Issue

------------------------------------------------------


Last week Apple released iOS 4.3.5 for iPhone, iPad, and iPod Touch and iOS=
 4.2.10 for iPhone with Verizon service. It addresses a flaw with the certi=
ficate chain validation process when handling X.509 certificates.


According to Apple, "An attacker with a privileged network position may cap=
ture or modify data in sessions protected by SSL/TLS. Other attacks involvi=
ng X.509 certificate validation may also be possible."


Users of the above devices can take the update via iTunes on their PC or Ma=
c.


See the notice by Apple:

<http://support.apple.com/kb/HT4824>



----------------------------------------------------

2. New Tricks Used by Computer Crooks

----------------------------------------------------


A new malware variant tries to trick people into voluntarily transferring m=
oney from their accounts to a cyber thief's account. The German police have=
 warned consumers about a new Windows malware strain that waits until the v=
ictim logs into his bank account. The malware presents the customer with a =
message, stating that a credit has been made to his account by mistake, and=
 that the account has been frozen until the errant payment is transferred b=
ack.


The victim is told to immediately make a transfer to return the funds and u=
nlock his account. The malicious software presents an already filled-in onl=
ine transfer form, with the account and routing numbers for a bank account =
the attacker controls.


To avoid falling victim to such scams, Kreb on Security, the blog featuring=
 this story, recommends to "pick up the phone and call your bank=85 and mak=
e sure you are using the bank's real phone number" if you see something odd=
 such as a "down for maintenance" page or an alert when logging in to your =
bank account.


Read the full story here:

<http://krebsonsecurity.com/2011/07/trojan-tricks-victims-into-transfering-=
funds/>



----------------------------------------

3. Help! My Laptop Was Stolen!

----------------------------------------


The unfortunate side-effect of having a mobile device such as an iPad, smar=
t phone or laptop is that, of course, they can be easily misplaced or stole=
n. They are small, lightweight and could bring in a few hundred bucks for t=
he thief who off-loads them.


If it's gone, what do you do now? The important data contained on the devic=
e is hopefully password protected or even encrypted, but what  if the drive=
 wasn't encrypted? Or you can't remotely wipe or disable the device?


Think about what it may contain: photos of your family and friends, emails =
you sent out and received for work or personal correspondence, a manuscript=
 or school paper, financial documents, etc. Depending on your browser setti=
ngs, sites you have visited and passwords you entered may be easy to access=
. In other words, your own personal private information and intellectual pr=
operty is now out there in someone's hands and you have no idea what they'r=
e doing with it.


Thieves will usually wipe the drive before selling it, but it's always best=
 to prepare for the worst:


 1.  Call MIT Police. Provide them with as much detail as you can, the seri=
al number of the device, where and when it was stolen, and what it containe=
d. Make sure you get a police report in case you need to prove fraud should=
 that occur.
 2.  If the laptop had a STOP tag, there may be a chance of finding it agai=
n when the thief attempts to sell it. STOP tags can not be removed and if a=
ttempted, a tattoo is left in its place stating it is stolen material. Tell=
 the MIT Police if there was a STOP tag affixed.
 3.  Email infoprotect@mit.edu. If the device did contain the sensitive inf=
ormation of other members of the community, it is important to determine if=
 that information has been put at risk. Again, include as much detail as yo=
u can. The email will be received by the IT Security Team. If you include t=
he computer's MAC address, the last known IP address and the user name on t=
he account, they can attempt to see if the computer comes back "on line," w=
ith the possibility of tracking it down.
 4.  Change all your passwords, especially those to sites with your persona=
l information.
 5.  Contact your account providers to let them know your information may h=
ave been compromised. They may recommend you change the account numbers of =
your banks or credit cards. It's easier to close your accounts and open new=
 ones than get the money back that the thieves have taken.
 6.  All a thief needs is your full name and another identifying piece of i=
nformation, such as your driver's license or Social Security number to stea=
l your identity. Put a fraud alert or credit freeze on your credit cards as=
 soon as you can.


It's very tough protecting data after a theft. Be proactive. Use software t=
o protect your data. Use a lock to prevent theft. Other security tips for t=
hose traveling with a laptop can be found here:

<http://ist.mit.edu/security/traveling>


=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles online or submit a comment at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D



Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_CA5D969F1A0E3myeatonexchangemitedu_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252"></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space;=
 -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14p=
x; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"margin: 0=
.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-height: 17.0px"><br></p=
>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">In thi=
s issue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Mac=
 iOS 4.3.5 Fixes Data Security Issue</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. New=
 Tricks Used by Computer Crooks</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Hel=
p! My Laptop Was Stolen!</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Mac=
 iOS 4.3.5 Fixes Data Security Issue</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Last w=
eek Apple released iOS 4.3.5 for iPhone, iPad, and iPod Touch and iOS 4.2.1=
0 for iPhone with Verizon service. It addresses a flaw with the certificate=
 chain validation process when handling X.509 certificates.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Accord=
ing to Apple, &quot;An attacker with a privileged network position may capt=
ure or modify data in sessions protected by SSL/TLS. Other attacks involvin=
g X.509 certificate validation may also be possible.&quot;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Users =
of the above devices can take the update via iTunes on their PC or Mac.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">See th=
e notice by Apple:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">&lt;ht=
tp://support.apple.com/kb/HT4824&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. New=
 Tricks Used by Computer Crooks</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">A new =
malware variant tries to trick people into voluntarily transferring money f=
rom their accounts to a cyber thief's account. The German police have warne=
d consumers about a new Windows malware strain that waits until the victim =
logs into his bank account. The malware presents the customer with a messag=
e, stating that a credit has been made to his account by mistake, and that =
the account has been frozen until the errant payment is transferred back.</=
p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The vi=
ctim is told to immediately make a transfer to return the funds and unlock =
his account. The malicious software presents an already filled-in online tr=
ansfer form, with the account and routing numbers for a bank account the at=
tacker controls.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">To avo=
id falling victim to such scams, Kreb on Security, the blog featuring this =
story, recommends to &quot;pick up the phone and call your bank=85 and make=
 sure you are using the bank's real phone number&quot; if you see something=
 odd such as a &quot;down for maintenance&quot; page or an alert when loggi=
ng in to your bank account.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Read t=
he full story here:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">&lt;ht=
tp://krebsonsecurity.com/2011/07/trojan-tricks-victims-into-transfering-fun=
ds/&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Hel=
p! My Laptop Was Stolen!</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The un=
fortunate side-effect of having a mobile device such as an iPad, smart phon=
e or laptop is that, of course, they can be easily misplaced or stolen. The=
y are small, lightweight and could bring in a few hundred bucks for the thi=
ef who off-loads them.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">If it'=
s gone, what do you do now? The important data contained on the device is h=
opefully password protected or even encrypted, but what&nbsp; if the drive =
wasn't encrypted? Or you can't remotely wipe or disable the device?&nbsp;</=
p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Think =
about what it may contain: photos of your family and friends, emails you se=
nt out and received for work or personal correspondence, a manuscript or sc=
hool paper, financial documents, etc. Depending on your browser settings, s=
ites you have visited and passwords you entered may be easy to access. In o=
ther words, your own personal private information and intellectual property=
 is now out there in someone's hands and you have no idea what they're doin=
g with it.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Thieve=
s will usually wipe the drive before selling it, but it's always best to pr=
epare for the worst:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<ol style=3D"list-style-type: decimal">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Call =
MIT Police. Provide them with as much detail as you can, the serial number =
of the device, where and when it was stolen, and what it contained. Make su=
re you get a police report in case you need to prove fraud should that occu=
r.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">If th=
e laptop had a STOP tag, there may be a chance of finding it again when the=
 thief attempts to sell it. STOP tags can not be removed and if attempted, =
a tattoo is left in its place stating it is stolen material. Tell the MIT P=
olice if there was a STOP tag affixed.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Email=
 infoprotect@mit.edu. If the device did contain the sensitive information o=
f other members of the community, it is important to determine if that info=
rmation has been put at risk. Again, include as much detail as you can. The=
 email will be received by the IT Security Team. If you include the compute=
r's MAC address, the last known IP address and the user name on the account=
, they can attempt to see if the computer comes back &quot;on line,&quot; w=
ith the possibility of tracking it down.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Chang=
e all your passwords, especially those to sites with your personal informat=
ion.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Conta=
ct your account providers to let them know your information may have been c=
ompromised. They may recommend you change the account numbers of your banks=
 or credit cards. It's easier to close your accounts and open new ones than=
 get the money back that the thieves have taken.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">All a=
 thief needs is your full name and another identifying piece of information=
, such as your driver's license or Social Security number to steal your ide=
ntity. Put a fraud alert or credit freeze on your credit cards as soon as y=
ou can.</li>
</ol>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">It's v=
ery tough protecting data after a theft. Be proactive. Use software to prot=
ect your data. Use a lock to prevent theft. Other security tips for those t=
raveling with a laptop can be found here:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">&lt;ht=
tp://ist.mit.edu/security/traveling&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p></div><div><div style=3D"word-wrap: break-word; -webk=
it-nbsp-mode: space; -webkit-line-break: after-white-space; font-family: He=
lvetica; "><span class=3D"Apple-style-span" style=3D"border-collapse: separ=
ate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacin=
g: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-=
style: normal; font-variant: normal; font-weight: normal; letter-spacing: n=
ormal; line-height: normal; -webkit-text-decorations-in-effect: none; text-=
indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans:=
 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"App=
le-style-span" style=3D"border-collapse: separate; -webkit-border-horizonta=
l-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); =
font-family: Helvetica; font-size: 14px; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: normal; -=
webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-siz=
e-adjust: auto; text-transform: none; orphans: 2; white-space: normal; wido=
ws: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"borde=
r-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-borde=
r-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-=
size: 14px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; -webkit-text-decorations-in-ef=
fect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transfor=
m: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><=
span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit=
-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; colo=
r: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norma=
l; font-variant: normal; font-weight: normal; letter-spacing: normal; line-=
height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px;=
 -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-sp=
ace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-spa=
n" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0=
px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family:=
 Helvetica; font-size: 14px; font-style: normal; font-variant: normal; font=
-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text-=
decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: au=
to; text-transform: none; orphans: 2; white-space: normal; widows: 2; word-=
spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-s=
pacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; letter-spaci=
ng: normal; line-height: normal; -webkit-text-decorations-in-effect: none; =
text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orp=
hans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><div style=3D"font-size: 12px; "><p styl=
e=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles online or submit a comment at http://securi=
tyfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p><p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0p=
x Arial"><br></p><p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial"><br></p></div><div style=3D"font-size: 12px; "><span class=3D"Apple-=
style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" st=
yle=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-si=
ze: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">Mo=
nique Yeaton</span></span></span></span></div><div style=3D"font-size: 12px=
; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span clas=
s=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-sty=
le-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">IT Se=
curity Communications Consultant</span></span></span></span></span></span><=
/div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size=
: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><spa=
n class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"App=
le-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span"=
 style=3D"font-size: 12px; ">MIT Information Services &amp; Technology (IS&=
amp;T)</span></span></span></span></span></span></div><div style=3D"font-si=
ze: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><s=
pan class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"A=
pple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-spa=
n" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"fo=
nt-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px;=
 ">(617) 253-2715</span></span></span></span></span></span></div><div style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span=
 class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Appl=
e-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" =
style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-=
size: 12px; ">http://ist.mit.edu/security</span></span></span></span></span=
></span></div><div style=3D"font-size: 12px; "><br class=3D"khtml-block-pla=
ceholder"></div><br class=3D"Apple-interchange-newline"></span></span></spa=
n></span></span></span></span></div></div></div></div></body></html>

--_000_CA5D969F1A0E3myeatonexchangemitedu_--

--===============0647951199==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0647951199==--

home help back first fref pref prev next nref lref last post