[2394] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, August 2, 2011
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue Aug 2 11:58:09 2011
From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Tue, 2 Aug 2011 11:57:19 -0400
Message-ID: <CA5D969F.1A0E3%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============0647951199=="
Errors-To: ist-security-fyi-bounces@mit.edu
--===============0647951199==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_CA5D969F1A0E3myeatonexchangemitedu_"
--_000_CA5D969F1A0E3myeatonexchangemitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. Mac iOS 4.3.5 Fixes Data Security Issue
2. New Tricks Used by Computer Crooks
3. Help! My Laptop Was Stolen!
------------------------------------------------------
1. Mac iOS 4.3.5 Fixes Data Security Issue
------------------------------------------------------
Last week Apple released iOS 4.3.5 for iPhone, iPad, and iPod Touch and iOS=
4.2.10 for iPhone with Verizon service. It addresses a flaw with the certi=
ficate chain validation process when handling X.509 certificates.
According to Apple, "An attacker with a privileged network position may cap=
ture or modify data in sessions protected by SSL/TLS. Other attacks involvi=
ng X.509 certificate validation may also be possible."
Users of the above devices can take the update via iTunes on their PC or Ma=
c.
See the notice by Apple:
<http://support.apple.com/kb/HT4824>
----------------------------------------------------
2. New Tricks Used by Computer Crooks
----------------------------------------------------
A new malware variant tries to trick people into voluntarily transferring m=
oney from their accounts to a cyber thief's account. The German police have=
warned consumers about a new Windows malware strain that waits until the v=
ictim logs into his bank account. The malware presents the customer with a =
message, stating that a credit has been made to his account by mistake, and=
that the account has been frozen until the errant payment is transferred b=
ack.
The victim is told to immediately make a transfer to return the funds and u=
nlock his account. The malicious software presents an already filled-in onl=
ine transfer form, with the account and routing numbers for a bank account =
the attacker controls.
To avoid falling victim to such scams, Kreb on Security, the blog featuring=
this story, recommends to "pick up the phone and call your bank=85 and mak=
e sure you are using the bank's real phone number" if you see something odd=
such as a "down for maintenance" page or an alert when logging in to your =
bank account.
Read the full story here:
<http://krebsonsecurity.com/2011/07/trojan-tricks-victims-into-transfering-=
funds/>
----------------------------------------
3. Help! My Laptop Was Stolen!
----------------------------------------
The unfortunate side-effect of having a mobile device such as an iPad, smar=
t phone or laptop is that, of course, they can be easily misplaced or stole=
n. They are small, lightweight and could bring in a few hundred bucks for t=
he thief who off-loads them.
If it's gone, what do you do now? The important data contained on the devic=
e is hopefully password protected or even encrypted, but what if the drive=
wasn't encrypted? Or you can't remotely wipe or disable the device?
Think about what it may contain: photos of your family and friends, emails =
you sent out and received for work or personal correspondence, a manuscript=
or school paper, financial documents, etc. Depending on your browser setti=
ngs, sites you have visited and passwords you entered may be easy to access=
. In other words, your own personal private information and intellectual pr=
operty is now out there in someone's hands and you have no idea what they'r=
e doing with it.
Thieves will usually wipe the drive before selling it, but it's always best=
to prepare for the worst:
1. Call MIT Police. Provide them with as much detail as you can, the seri=
al number of the device, where and when it was stolen, and what it containe=
d. Make sure you get a police report in case you need to prove fraud should=
that occur.
2. If the laptop had a STOP tag, there may be a chance of finding it agai=
n when the thief attempts to sell it. STOP tags can not be removed and if a=
ttempted, a tattoo is left in its place stating it is stolen material. Tell=
the MIT Police if there was a STOP tag affixed.
3. Email infoprotect@mit.edu. If the device did contain the sensitive inf=
ormation of other members of the community, it is important to determine if=
that information has been put at risk. Again, include as much detail as yo=
u can. The email will be received by the IT Security Team. If you include t=
he computer's MAC address, the last known IP address and the user name on t=
he account, they can attempt to see if the computer comes back "on line," w=
ith the possibility of tracking it down.
4. Change all your passwords, especially those to sites with your persona=
l information.
5. Contact your account providers to let them know your information may h=
ave been compromised. They may recommend you change the account numbers of =
your banks or credit cards. It's easier to close your accounts and open new=
ones than get the money back that the thieves have taken.
6. All a thief needs is your full name and another identifying piece of i=
nformation, such as your driver's license or Social Security number to stea=
l your identity. Put a fraud alert or credit freeze on your credit cards as=
soon as you can.
It's very tough protecting data after a theft. Be proactive. Use software t=
o protect your data. Use a lock to prevent theft. Other security tips for t=
hose traveling with a laptop can be found here:
<http://ist.mit.edu/security/traveling>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Read all Security FYI Newsletter articles online or submit a comment at htt=
p://securityfyi.wordpress.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_CA5D969F1A0E3myeatonexchangemitedu_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
<html><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252"></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space;=
-webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14p=
x; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"margin: 0=
.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-height: 17.0px"><br></p=
>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">In thi=
s issue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Mac=
iOS 4.3.5 Fixes Data Security Issue</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. New=
Tricks Used by Computer Crooks</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Hel=
p! My Laptop Was Stolen!</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Mac=
iOS 4.3.5 Fixes Data Security Issue</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Last w=
eek Apple released iOS 4.3.5 for iPhone, iPad, and iPod Touch and iOS 4.2.1=
0 for iPhone with Verizon service. It addresses a flaw with the certificate=
chain validation process when handling X.509 certificates. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Accord=
ing to Apple, "An attacker with a privileged network position may capt=
ure or modify data in sessions protected by SSL/TLS. Other attacks involvin=
g X.509 certificate validation may also be possible."</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Users =
of the above devices can take the update via iTunes on their PC or Mac.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">See th=
e notice by Apple:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><ht=
tp://support.apple.com/kb/HT4824></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. New=
Tricks Used by Computer Crooks</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">A new =
malware variant tries to trick people into voluntarily transferring money f=
rom their accounts to a cyber thief's account. The German police have warne=
d consumers about a new Windows malware strain that waits until the victim =
logs into his bank account. The malware presents the customer with a messag=
e, stating that a credit has been made to his account by mistake, and that =
the account has been frozen until the errant payment is transferred back.</=
p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The vi=
ctim is told to immediately make a transfer to return the funds and unlock =
his account. The malicious software presents an already filled-in online tr=
ansfer form, with the account and routing numbers for a bank account the at=
tacker controls.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">To avo=
id falling victim to such scams, Kreb on Security, the blog featuring this =
story, recommends to "pick up the phone and call your bank=85 and make=
sure you are using the bank's real phone number" if you see something=
odd such as a "down for maintenance" page or an alert when loggi=
ng in to your bank account.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Read t=
he full story here:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><ht=
tp://krebsonsecurity.com/2011/07/trojan-tricks-victims-into-transfering-fun=
ds/></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Hel=
p! My Laptop Was Stolen!</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The un=
fortunate side-effect of having a mobile device such as an iPad, smart phon=
e or laptop is that, of course, they can be easily misplaced or stolen. The=
y are small, lightweight and could bring in a few hundred bucks for the thi=
ef who off-loads them.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">If it'=
s gone, what do you do now? The important data contained on the device is h=
opefully password protected or even encrypted, but what if the drive =
wasn't encrypted? Or you can't remotely wipe or disable the device? </=
p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Think =
about what it may contain: photos of your family and friends, emails you se=
nt out and received for work or personal correspondence, a manuscript or sc=
hool paper, financial documents, etc. Depending on your browser settings, s=
ites you have visited and passwords you entered may be easy to access. In o=
ther words, your own personal private information and intellectual property=
is now out there in someone's hands and you have no idea what they're doin=
g with it. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Thieve=
s will usually wipe the drive before selling it, but it's always best to pr=
epare for the worst:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<ol style=3D"list-style-type: decimal">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Call =
MIT Police. Provide them with as much detail as you can, the serial number =
of the device, where and when it was stolen, and what it contained. Make su=
re you get a police report in case you need to prove fraud should that occu=
r.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">If th=
e laptop had a STOP tag, there may be a chance of finding it again when the=
thief attempts to sell it. STOP tags can not be removed and if attempted, =
a tattoo is left in its place stating it is stolen material. Tell the MIT P=
olice if there was a STOP tag affixed.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Email=
infoprotect@mit.edu. If the device did contain the sensitive information o=
f other members of the community, it is important to determine if that info=
rmation has been put at risk. Again, include as much detail as you can. The=
email will be received by the IT Security Team. If you include the compute=
r's MAC address, the last known IP address and the user name on the account=
, they can attempt to see if the computer comes back "on line," w=
ith the possibility of tracking it down.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Chang=
e all your passwords, especially those to sites with your personal informat=
ion.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Conta=
ct your account providers to let them know your information may have been c=
ompromised. They may recommend you change the account numbers of your banks=
or credit cards. It's easier to close your accounts and open new ones than=
get the money back that the thieves have taken.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">All a=
thief needs is your full name and another identifying piece of information=
, such as your driver's license or Social Security number to steal your ide=
ntity. Put a fraud alert or credit freeze on your credit cards as soon as y=
ou can.</li>
</ol>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">It's v=
ery tough protecting data after a theft. Be proactive. Use software to prot=
ect your data. Use a lock to prevent theft. Other security tips for those t=
raveling with a laptop can be found here:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><ht=
tp://ist.mit.edu/security/traveling></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p></div><div><div style=3D"word-wrap: break-word; -webk=
it-nbsp-mode: space; -webkit-line-break: after-white-space; font-family: He=
lvetica; "><span class=3D"Apple-style-span" style=3D"border-collapse: separ=
ate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacin=
g: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-=
style: normal; font-variant: normal; font-weight: normal; letter-spacing: n=
ormal; line-height: normal; -webkit-text-decorations-in-effect: none; text-=
indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans:=
2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"App=
le-style-span" style=3D"border-collapse: separate; -webkit-border-horizonta=
l-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); =
font-family: Helvetica; font-size: 14px; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: normal; -=
webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-siz=
e-adjust: auto; text-transform: none; orphans: 2; white-space: normal; wido=
ws: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"borde=
r-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-borde=
r-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-=
size: 14px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; -webkit-text-decorations-in-ef=
fect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transfor=
m: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><=
span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit=
-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; colo=
r: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norma=
l; font-variant: normal; font-weight: normal; letter-spacing: normal; line-=
height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px;=
-webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-sp=
ace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-spa=
n" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0=
px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family:=
Helvetica; font-size: 14px; font-style: normal; font-variant: normal; font=
-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text-=
decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: au=
to; text-transform: none; orphans: 2; white-space: normal; widows: 2; word-=
spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-s=
pacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; letter-spaci=
ng: normal; line-height: normal; -webkit-text-decorations-in-effect: none; =
text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orp=
hans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><div style=3D"font-size: 12px; "><p styl=
e=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles online or submit a comment at http://securi=
tyfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p><p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0p=
x Arial"><br></p><p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial"><br></p></div><div style=3D"font-size: 12px; "><span class=3D"Apple-=
style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" st=
yle=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-si=
ze: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">Mo=
nique Yeaton</span></span></span></span></div><div style=3D"font-size: 12px=
; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span clas=
s=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-sty=
le-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">IT Se=
curity Communications Consultant</span></span></span></span></span></span><=
/div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size=
: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><spa=
n class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"App=
le-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span"=
style=3D"font-size: 12px; ">MIT Information Services & Technology (IS&=
amp;T)</span></span></span></span></span></span></div><div style=3D"font-si=
ze: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><s=
pan class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"A=
pple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-spa=
n" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"fo=
nt-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px;=
">(617) 253-2715</span></span></span></span></span></span></div><div style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span=
class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Appl=
e-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" =
style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-=
size: 12px; ">http://ist.mit.edu/security</span></span></span></span></span=
></span></div><div style=3D"font-size: 12px; "><br class=3D"khtml-block-pla=
ceholder"></div><br class=3D"Apple-interchange-newline"></span></span></spa=
n></span></span></span></span></div></div></div></div></body></html>
--_000_CA5D969F1A0E3myeatonexchangemitedu_--
--===============0647951199==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0647951199==--