[2396] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, August 8, 2011

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Aug 8 13:55:44 2011

From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Mon, 8 Aug 2011 13:54:28 -0400
Message-ID: <CA659B13.1A5A3%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============0437972925=="
Errors-To: ist-security-fyi-bounces@mit.edu

--===============0437972925==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_CA659B131A5A3myeatonexchangemitedu_"

--_000_CA659B131A5A3myeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


In this issue:


1. August 2011 Microsoft Security Updates

2. You CAN Prevent Data Leaks at MIT

3. Operation Shady RAT



------------------------------------------------------

1. August 2011 Microsoft Security Updates

------------------------------------------------------


Microsoft will release fixes for 22 vulnerabilities on Tuesday, August 9. T=
he patches will address security issues in all supported versions of:


 *   Internet Explorer
 *   Windows
 *   Windows Server
 *   Visio
 *   Visual Studio.


The patches are described in 13 security bulletins, two of which have been =
given maximum severity ratings of critical.


Read the full August bulletin:

<http://www.microsoft.com/technet/security/Bulletin/MS11-aug.mspx>



--------------------------------------------------

2. You CAN Prevent Data Leaks at MIT

--------------------------------------------------


The history of cyber-criminal activity over the past few decades has shown =
that the bad guys will always find ways into our systems if they really wan=
t to, either through viruses, malware, tricks or brute force. This is in sp=
ite of our attempts to block such occurrences from happening with secure te=
chnology. So is it a losing battle? Not if we cover all bases.


There are three basic steps to ensure that even if a system is breached, no=
 sensitive data is accessed.


 1.  FIND IT: Know where the data resides so that measures can be taken to =
protect it. Take an audit of computers and servers to determine if sensitiv=
e data is stored on them or if they are being used to access data remotely.
 2.  MINIMIZE IT: Remove all the sensitive data files from the places where=
 they are no longer needed. Either secure delete them altogether or move th=
em to a system that is less likely to be compromised. If you have multiple =
versions of the data, remove the unnecessary copies.
 3.  SECURE IT: Comply with recommended protection methods for securing dat=
a, such as limiting access through secure authentication and encrypting sys=
tems where sensitive data resides.


Identity Finder is a software tool provided by IS&T that helps take action =
with all three of these steps. Identity Finder searches for data elements, =
such as Social Security numbers, passwords and financial account numbers. I=
t reports when such data elements are found and gives the user the choice t=
o shred the files, just remove the sensitive parts, or put the files in an =
encrypted vault. Identity Finder is supported by a console that provides ce=
ntralized reporting and remote administration, remediation and scheduling.


Members of MIT who view, store or process MIT business data can obtain a fr=
ee copy. Learn more: <http://ist.mit.edu/services/software/available-softwa=
re?&title=3Didentity+finder>


For questions, please contact <idfinder-help@mit.edu>.



-------------------------------

3. Operation Shady RAT

-------------------------------


Security analysts from McAfee have discovered that since 2006, cyber-espion=
age has been carried out against at least 72 organizations in 14 countries =
in a series of professional hacking attacks. Named victims include the Unit=
ed Nations and the International Olympic Committee. McAfee was able to trac=
k down the command and control center of the organized crime, and were able=
 to access the server's log files, which contained detailed records of the =
attacks.


According to an article on www.h-online.com, "The criminals sent targeted e=
mails containing specially crafted attachments to select personnel within t=
he affected organizations. In spear-phishing attacks of this type, the emai=
ls are often well formulated and formatted, making it hard for potential vi=
ctims to distinguish them from legitimate emails. If the recipient opens th=
e attachment, the exploit downloads further malware."


Read the full story:

<http://www.h-online.com/security/news/item/Operation-Shady-RAT-reveals-wor=
ldwide-espionage-attacks-1317710.html>


=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D


Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_CA659B131A5A3myeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-si=
ze: 14px; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"ma=
rgin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-height: 17.0px">=
<br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">In thi=
s issue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. August =
2011 Microsoft Security Updates</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. You=
 CAN Prevent Data Leaks at MIT</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Ope=
ration Shady RAT</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
--------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. August =
2011 Microsoft Security Updates</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
--------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Microsoft =
will release fixes for 22 vulnerabilities on Tuesday, August 9. The patches=
 will address security issues in all supported versions of:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Internet =
Explorer</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Windows</=
li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Windows S=
erver</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Visio&nbs=
p;</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Visual St=
udio.&nbsp;</li>
</ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The patche=
s are described in 13 security bulletins, two of which have been given maxi=
mum severity ratings of critical.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the f=
ull August bulletin:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">&lt;http:/=
/www.microsoft.com/technet/security/Bulletin/MS11-aug.mspx&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. You=
 CAN Prevent Data Leaks at MIT</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The hi=
story of cyber-criminal activity over the past few decades has shown that t=
he bad guys will always find ways into our systems if they really want to, =
either through viruses, malware, tricks or brute force. This is in spite of=
 our attempts to block such occurrences from happening with secure technolo=
gy. So is it a losing battle? Not if we cover all bases.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">There =
are three basic steps to ensure that even if a system is breached, no sensi=
tive data is accessed.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<ol style=3D"list-style-type: decimal">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">FIND =
IT: Know where the data resides so that measures can be taken to protect it=
. Take an audit of computers and servers to determine if sensitive data is =
stored on them or if they are being used to access data remotely.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">MINIM=
IZE IT: Remove all the sensitive data files from the places where they are =
no longer needed. Either secure delete them altogether or move them to a sy=
stem that is less likely to be compromised. If you have multiple versions o=
f the data, remove the unnecessary copies.</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">SECUR=
E IT: Comply with recommended protection methods for securing data, such as=
 limiting access through secure authentication and encrypting systems where=
 sensitive data resides.</li>
</ol>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Identi=
ty Finder is a software tool provided by IS&amp;T that helps take action wi=
th all three of these steps. Identity Finder searches for data elements, su=
ch as Social Security numbers, passwords and financial account numbers. It =
reports when such data elements are found and gives the user the choice to =
shred the files, just remove the sensitive parts, or put the files in an en=
crypted vault. Identity Finder is supported by a console that provides cent=
ralized reporting and remote administration, remediation and scheduling.</p=
>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Member=
s of MIT who view, store or process MIT business data can obtain a free cop=
y. Learn more: &lt;http://ist.mit.edu/services/software/available-software?=
&amp;title=3Didentity+finder&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">For qu=
estions, please contact &lt;idfinder-help@mit.edu&gt;.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Ope=
ration Shady RAT</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Securi=
ty analysts from McAfee have discovered that since 2006, cyber-espionage ha=
s been carried out against at least 72 organizations in 14 countries in a s=
eries of professional hacking attacks. Named victims include the United Nat=
ions and the International Olympic Committee. McAfee was able to track down=
 the command and control center of the organized crime, and were able to ac=
cess the server's log files, which contained detailed records of the attack=
s.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Accord=
ing to an article on www.h-online.com, "The criminals sent targeted emails =
containing specially crafted attachments to select personnel within the aff=
ected organizations. In spear-phishing attacks of this type, the emails are=
 often well formulated and formatted, making it hard for potential victims =
to distinguish them from legitimate emails. If the recipient opens the atta=
chment, the exploit downloads further malware."</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Read t=
he full story:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">&lt;ht=
tp://www.h-online.com/security/news/item/Operation-Shady-RAT-reveals-worldw=
ide-espionage-attacks-1317710.html&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments&nbsp;online&nbsp;at htt=
p://securityfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px"><br></p></div><div><div style=3D"word-wrap: break-word; -webk=
it-nbsp-mode: space; -webkit-line-break: after-white-space; font-family: He=
lvetica; "><span class=3D"Apple-style-span" style=3D"border-collapse: separ=
ate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacin=
g: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-=
style: normal; font-variant: normal; font-weight: normal; letter-spacing: n=
ormal; line-height: normal; -webkit-text-decorations-in-effect: none; text-=
indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans:=
 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"App=
le-style-span" style=3D"border-collapse: separate; -webkit-border-horizonta=
l-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); =
font-family: Helvetica; font-size: 14px; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: normal; -=
webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-siz=
e-adjust: auto; text-transform: none; orphans: 2; white-space: normal; wido=
ws: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"borde=
r-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-borde=
r-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-=
size: 14px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; -webkit-text-decorations-in-ef=
fect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transfor=
m: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><=
span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit=
-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; colo=
r: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norma=
l; font-variant: normal; font-weight: normal; letter-spacing: normal; line-=
height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px;=
 -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-sp=
ace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-spa=
n" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0=
px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family:=
 Helvetica; font-size: 14px; font-style: normal; font-variant: normal; font=
-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text-=
decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: au=
to; text-transform: none; orphans: 2; white-space: normal; widows: 2; word-=
spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-s=
pacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; letter-spaci=
ng: normal; line-height: normal; -webkit-text-decorations-in-effect: none; =
text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orp=
hans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><div style=3D"font-size: 12px; "><br></d=
iv><div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span=
 class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Appl=
e-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" =
style=3D"font-size: 12px; ">Monique Yeaton</span></span></span></span></spa=
n></span></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-=
span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D=
"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12=
px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cl=
ass=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-s=
tyle-span" style=3D"font-size: 12px; ">IT Security Communications Consultan=
t</span></span></span></span></span></span></div><div style=3D"font-size: 1=
2px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span c=
lass=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-=
style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" st=
yle=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-si=
ze: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">MI=
T Information Services &amp; Technology (IS&amp;T)</span></span></span></sp=
an></span></span></div><div style=3D"font-size: 12px; "><span class=3D"Appl=
e-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" =
style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-=
size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">=
<span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D=
"Apple-style-span" style=3D"font-size: 12px; ">(617) 253-2715</span></span>=
</span></span></span></span></div><div style=3D"font-size: 12px; "><span cl=
ass=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-s=
tyle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" sty=
le=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-siz=
e: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><sp=
an class=3D"Apple-style-span" style=3D"font-size: 12px; ">http://ist.mit.ed=
u/security</span></span></span></span></span></span></div><div style=3D"fon=
t-size: 12px; "><br class=3D"khtml-block-placeholder"></div><br class=3D"Ap=
ple-interchange-newline"></span></span></span></span></span></span></span><=
/div></div></div></div></body></html>

--_000_CA659B131A5A3myeatonexchangemitedu_--

--===============0437972925==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0437972925==--

home help back first fref pref prev next nref lref last post