[2415] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, November 28, 2011

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Nov 28 16:47:44 2011

From: Monique Yeaton <myeaton@MIT.EDU>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@MIT.EDU>
Date: Mon, 28 Nov 2011 21:46:26 +0000
Message-ID: <CAF96B61.20004%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@MIT.EDU>
Content-Type: multipart/mixed; boundary="===============0107247950=="
Errors-To: ist-security-fyi-bounces@MIT.EDU

--===============0107247950==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_CAF96B6120004myeatonexchangemitedu_"

--_000_CAF96B6120004myeatonexchangemitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable


In this issue:


1. The Latest on the DNS Changer Malware

2. Cyber Shopping Risks



--------------------------------------------------------

1. The Latest on the DNS Changer Malware

--------------------------------------------------------


The FBI arrested six people this month in connection with a click-fraud sch=
eme that infected more than 4 million computers around the world. The arres=
ts were the result of a two-year investigation known as Operation Ghost Cli=
ck. All were arrested in Estonia. A seventh person is still at large.


The malware used in the scheme is known as DNS Changer. DNS is short for Do=
main Name System (learn more about DNS here<http://www.howstuffworks.com/dn=
s.htm>). DNS Changer changes the DNS settings on the infected computers, po=
inting them to DNS servers under control of the criminals. They can then re=
direct victim's traffic from legitimate sites, such as iTunes, to other sit=
es. The criminals earned more than $14 million from commissions on referral=
s to the online advertising at these sites. The attack targeted both Window=
s and Mac computers.


Technical specifications of the malware can be found here<http://www.f-secu=
re.com/v-descs/trojan_w32_dnschanger.shtml>.


How does a computer get the malware?

By visiting sites that ask you to download a third-party plug-in or tool. T=
he malware is called a Trojan horse because it hides within another piece o=
f code to carry out its attack. For example, the criminals were using a vul=
nerability in Flash (now fixed by Adobe) so that if you played an infected =
Flash-based video, it would install the malware.


Protection tips:

  *   Be careful about the sites you visit.
  *   Don't click on links you receive in shady emails.
  *   Avoid installing software from sites.
  *   Make sure you are running the latest versions of your anti-virus soft=
ware, browsers and its plug-ins.


Anti-virus software should catch this malware, but can sometimes fail. The =
malware can prevent infected machines from downloading security updates to =
operating systems or updates to anti-virus software that might help detect =
the malware and stop it from operating. Often when the DNS Changer virus is=
 downloaded, other types of malware come along with it, making it difficult=
 to clean up a system. Several dozens of computers have already been infect=
ed with this virus at MIT.


If you=92re worried, check that your anti-virus software is up-to-date, and=
 verify that your DNS server settings match what you=92d expect for your PC=
. The IS&T Help Desk (helpdesk@mit.edu) will be able to help with what to l=
ook for.


The FBI provides this resource<https://forms.fbi.gov/check-to-see-if-your-c=
omputer-is-using-rogue-DNS> to help you find out if your computer is using =
a rogue DNS.


Read the full story in the news<http://www.eweek.com/c/a/Security/Researche=
rs-Discover-Link-Between-TDSS-Rootkit-and-DNSchanger-Trojan-753018/>.



--------------------------------

2. Cyber Shopping Risks

--------------------------------


The Monday after Thanksgiving (today) is known as Cyber Monday, one of the =
busiest online shopping days of the year.


The National Retail Federation<http://www.nrf.com/> reports that almost hal=
f of all Americans plan to shop online this season. Unfortunately, just as =
shoppers hit the Internet to search for deals, cyber criminals are trolling=
 the Web for their next victim. A significant increase in malicious shoppin=
g websites are launched between October and January, according to Webroot, =
an anti-virus and anti-spyware software company.


Tips for shoppers:


  *   Think before you click. Never click on links to unfamiliar websites, =
especially those provided within emails.
  *   Install security software. Protect your PC with up to date anti-virus=
 programs.
  *   Know the retailer. If unfamiliar to you, look for more information ab=
out the company by contacting the Better Business Bureau.
  *   Monitor your credit report. Once a year you can freely check your rep=
ort to look for suspicious activity on your bank or credit card accounts.
  *   Keep your passwords safe. Never reveal them to anyone and do not have=
 a password that contains commonly known information, such as your birth da=
te.
  *   Only make purchases from secure websites. Secured site web addresses =
start with "https:"


For more tips on how to stay safe while shopping online, visit the FTC site=
: "Fight Back Against Identity Theft<http://www.ftc.gov/bcp/edu/pubs/consum=
er/idtheft/idt04.shtm>."



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D


Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_CAF96B6120004myeatonexchangemitedu_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <FA5679AC3230BA449770A0958CDE1450@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif; ">
<div>
<div>
<div>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this is=
sue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. The Lat=
est on the DNS Changer Malware</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Cyber S=
hopping Risks</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. The Lat=
est on the DNS Changer Malware</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The FBI ar=
rested six people this month in connection with a click-fraud scheme that i=
nfected more than 4 million computers around the world. The arrests were th=
e result of a two-year investigation
 known as Operation Ghost Click. All were arrested in Estonia. A seventh pe=
rson is still at large.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The malwar=
e used in the scheme is known as DNS Changer. DNS is short for Domain Name =
System (<a href=3D"http://www.howstuffworks.com/dns.htm">learn more about D=
NS here</a>). DNS Changer changes the
 DNS settings on the infected computers, pointing them to DNS servers under=
 control of the criminals. They can then redirect victim's traffic from leg=
itimate sites, such as iTunes, to other sites. The criminals earned more th=
an $14 million from commissions
 on referrals to the online advertising at these sites. The attack targeted=
 both Windows and Mac computers.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Technical =
specifications of the malware can be found
<a href=3D"http://www.f-secure.com/v-descs/trojan_w32_dnschanger.shtml">her=
e</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">How does a=
 computer get the malware?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">By visitin=
g sites that ask you to download a third-party plug-in or tool. The malware=
 is called a Trojan horse because it hides within another piece of code to =
carry out its attack. For example,
 the criminals were using a vulnerability in Flash (now fixed by Adobe) so =
that if you played an infected Flash-based video, it would install the malw=
are.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Protection=
 tips:</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Be carefu=
l about the sites you visit.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Don'=
t click on links you receive in shady emails.&nbsp;
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Avoi=
d installing software from sites.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Make=
 sure you are running the latest versions of your anti-virus software, brow=
sers and its plug-ins.&nbsp;
</li></ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Anti-virus=
 software should catch this malware, but can sometimes fail. The malware ca=
n prevent infected machines from downloading security updates to operating =
systems or updates to anti-virus software
 that might help detect the malware and stop it from operating. Often when =
the DNS Changer virus is downloaded, other types of malware come along with=
 it, making it difficult to clean up a system. Several dozens of computers =
have already been infected with
 this virus at MIT.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">If you=92r=
e worried, check that your anti-virus software is up-to-date, and verify th=
at your DNS server settings match what you=92d expect for your PC. The IS&a=
mp;T Help Desk (helpdesk@mit.edu) will be
 able to help with what to look for.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><a href=3D=
"https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS">Th=
e FBI provides this resource</a> to help you find out if your computer is u=
sing a rogue DNS.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><a href=3D=
"http://www.eweek.com/c/a/Security/Researchers-Discover-Link-Between-TDSS-R=
ootkit-and-DNSchanger-Trojan-753018/">Read the full story in the news</a>.<=
/p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Cyber S=
hopping Risks</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The Monday=
 after Thanksgiving (today) is known as Cyber Monday, one of the busiest on=
line shopping days of the year.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The <a hre=
f=3D"http://www.nrf.com/">
National Retail Federation</a> reports that almost half of all Americans pl=
an to shop online this season. Unfortunately, just as shoppers hit the Inte=
rnet to search for deals, cyber criminals are trolling the Web for their ne=
xt victim. A significant increase
 in malicious shopping websites are launched between October and January, a=
ccording to Webroot, an anti-virus and anti-spyware software company.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Tips for s=
hoppers:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Think bef=
ore you click. Never click on links to unfamiliar websites, especially thos=
e provided within emails.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Inst=
all security software. Protect your PC with up to date anti-virus programs.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Know=
 the retailer. If unfamiliar to you, look for more information about the co=
mpany by contacting the Better Business Bureau.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Moni=
tor your credit report. Once a year you can freely check your report to loo=
k for suspicious activity on your bank or credit card accounts.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Keep=
 your passwords safe. Never reveal them to anyone and do not have a passwor=
d that contains commonly known information, such as your birth date.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Only=
 make purchases from secure websites. Secured site web addresses start with=
 &quot;https:&quot;
</li></ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">For more t=
ips on how to stay safe while shopping online, visit the FTC site: &quot;<a=
 href=3D"http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt04.shtm">Fight=
 Back Against Identity Theft</a>.&quot;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments&nbsp;online&nbsp;at htt=
p://securityfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
</div>
<div><br>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; font-family: Helvetica; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webki=
t-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; col=
or: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norm=
al; font-variant: normal; font-weight: normal; letter-spacing: normal; line=
-height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px=
; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-s=
pace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-sp=
an" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family=
: Helvetica; font-size: 14px; font-style: normal; font-variant: normal; fon=
t-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text=
-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: a=
uto; text-transform: none; orphans: 2; white-space: normal; widows: 2; word=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
 separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-=
spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px;=
 font-style: normal; font-variant: normal; font-weight: normal; letter-spac=
ing: normal; line-height: normal; -webkit-text-decorations-in-effect: none;=
 text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; or=
phans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=
=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -web=
kit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helveti=
ca; font-size: 14px; font-style: normal; font-variant: normal; font-weight:=
 normal; letter-spacing: normal; line-height: normal; -webkit-text-decorati=
ons-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text=
-transform: none; orphans: 2; white-space: normal; widows: 2; word-spacing:=
 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separate=
; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-sty=
le: normal; font-variant: normal; font-weight: normal; letter-spacing: norm=
al; line-height: normal; -webkit-text-decorations-in-effect: none; text-ind=
ent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2;=
 white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-=
style-span" style=3D"border-collapse: separate; -webkit-border-horizontal-s=
pacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); fon=
t-family: Helvetica; font-size: 12px; font-style: normal; font-variant: nor=
mal; font-weight: normal; letter-spacing: normal; line-height: normal; -web=
kit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-a=
djust: auto; text-transform: none; orphans: 2; white-space: normal; widows:=
 2; word-spacing: 0px; ">
<div style=3D"font-size: 12px; "><br>
</div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">Monique
 Yeaton</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">IT
 Security Communications Consultant</span></span></span></span></span></spa=
n></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">MIT
 Information Services &amp; Technology (IS&amp;T)</span></span></span></spa=
n></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">(617)
 253-2715</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">http://ist.mit.edu/security</span></span></span></s=
pan></span></span></div>
<div style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></span></div>
</div>
</div>
</div>
</body>
</html>

--_000_CAF96B6120004myeatonexchangemitedu_--

--===============0107247950==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0107247950==--

home help back first fref pref prev next nref lref last post