[2415] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, November 28, 2011
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Nov 28 16:47:44 2011
From: Monique Yeaton <myeaton@MIT.EDU>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@MIT.EDU>
Date: Mon, 28 Nov 2011 21:46:26 +0000
Message-ID: <CAF96B61.20004%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@MIT.EDU>
Content-Type: multipart/mixed; boundary="===============0107247950=="
Errors-To: ist-security-fyi-bounces@MIT.EDU
--===============0107247950==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_CAF96B6120004myeatonexchangemitedu_"
--_000_CAF96B6120004myeatonexchangemitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. The Latest on the DNS Changer Malware
2. Cyber Shopping Risks
--------------------------------------------------------
1. The Latest on the DNS Changer Malware
--------------------------------------------------------
The FBI arrested six people this month in connection with a click-fraud sch=
eme that infected more than 4 million computers around the world. The arres=
ts were the result of a two-year investigation known as Operation Ghost Cli=
ck. All were arrested in Estonia. A seventh person is still at large.
The malware used in the scheme is known as DNS Changer. DNS is short for Do=
main Name System (learn more about DNS here<http://www.howstuffworks.com/dn=
s.htm>). DNS Changer changes the DNS settings on the infected computers, po=
inting them to DNS servers under control of the criminals. They can then re=
direct victim's traffic from legitimate sites, such as iTunes, to other sit=
es. The criminals earned more than $14 million from commissions on referral=
s to the online advertising at these sites. The attack targeted both Window=
s and Mac computers.
Technical specifications of the malware can be found here<http://www.f-secu=
re.com/v-descs/trojan_w32_dnschanger.shtml>.
How does a computer get the malware?
By visiting sites that ask you to download a third-party plug-in or tool. T=
he malware is called a Trojan horse because it hides within another piece o=
f code to carry out its attack. For example, the criminals were using a vul=
nerability in Flash (now fixed by Adobe) so that if you played an infected =
Flash-based video, it would install the malware.
Protection tips:
* Be careful about the sites you visit.
* Don't click on links you receive in shady emails.
* Avoid installing software from sites.
* Make sure you are running the latest versions of your anti-virus soft=
ware, browsers and its plug-ins.
Anti-virus software should catch this malware, but can sometimes fail. The =
malware can prevent infected machines from downloading security updates to =
operating systems or updates to anti-virus software that might help detect =
the malware and stop it from operating. Often when the DNS Changer virus is=
downloaded, other types of malware come along with it, making it difficult=
to clean up a system. Several dozens of computers have already been infect=
ed with this virus at MIT.
If you=92re worried, check that your anti-virus software is up-to-date, and=
verify that your DNS server settings match what you=92d expect for your PC=
. The IS&T Help Desk (helpdesk@mit.edu) will be able to help with what to l=
ook for.
The FBI provides this resource<https://forms.fbi.gov/check-to-see-if-your-c=
omputer-is-using-rogue-DNS> to help you find out if your computer is using =
a rogue DNS.
Read the full story in the news<http://www.eweek.com/c/a/Security/Researche=
rs-Discover-Link-Between-TDSS-Rootkit-and-DNSchanger-Trojan-753018/>.
--------------------------------
2. Cyber Shopping Risks
--------------------------------
The Monday after Thanksgiving (today) is known as Cyber Monday, one of the =
busiest online shopping days of the year.
The National Retail Federation<http://www.nrf.com/> reports that almost hal=
f of all Americans plan to shop online this season. Unfortunately, just as =
shoppers hit the Internet to search for deals, cyber criminals are trolling=
the Web for their next victim. A significant increase in malicious shoppin=
g websites are launched between October and January, according to Webroot, =
an anti-virus and anti-spyware software company.
Tips for shoppers:
* Think before you click. Never click on links to unfamiliar websites, =
especially those provided within emails.
* Install security software. Protect your PC with up to date anti-virus=
programs.
* Know the retailer. If unfamiliar to you, look for more information ab=
out the company by contacting the Better Business Bureau.
* Monitor your credit report. Once a year you can freely check your rep=
ort to look for suspicious activity on your bank or credit card accounts.
* Keep your passwords safe. Never reveal them to anyone and do not have=
a password that contains commonly known information, such as your birth da=
te.
* Only make purchases from secure websites. Secured site web addresses =
start with "https:"
For more tips on how to stay safe while shopping online, visit the FTC site=
: "Fight Back Against Identity Theft<http://www.ftc.gov/bcp/edu/pubs/consum=
er/idtheft/idt04.shtm>."
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_CAF96B6120004myeatonexchangemitedu_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <FA5679AC3230BA449770A0958CDE1450@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif; ">
<div>
<div>
<div>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this is=
sue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. The Lat=
est on the DNS Changer Malware</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Cyber S=
hopping Risks</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. The Lat=
est on the DNS Changer Malware</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The FBI ar=
rested six people this month in connection with a click-fraud scheme that i=
nfected more than 4 million computers around the world. The arrests were th=
e result of a two-year investigation
known as Operation Ghost Click. All were arrested in Estonia. A seventh pe=
rson is still at large.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The malwar=
e used in the scheme is known as DNS Changer. DNS is short for Domain Name =
System (<a href=3D"http://www.howstuffworks.com/dns.htm">learn more about D=
NS here</a>). DNS Changer changes the
DNS settings on the infected computers, pointing them to DNS servers under=
control of the criminals. They can then redirect victim's traffic from leg=
itimate sites, such as iTunes, to other sites. The criminals earned more th=
an $14 million from commissions
on referrals to the online advertising at these sites. The attack targeted=
both Windows and Mac computers. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Technical =
specifications of the malware can be found
<a href=3D"http://www.f-secure.com/v-descs/trojan_w32_dnschanger.shtml">her=
e</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">How does a=
computer get the malware?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">By visitin=
g sites that ask you to download a third-party plug-in or tool. The malware=
is called a Trojan horse because it hides within another piece of code to =
carry out its attack. For example,
the criminals were using a vulnerability in Flash (now fixed by Adobe) so =
that if you played an infected Flash-based video, it would install the malw=
are.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Protection=
tips:</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Be carefu=
l about the sites you visit.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Don'=
t click on links you receive in shady emails.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Avoi=
d installing software from sites.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Make=
sure you are running the latest versions of your anti-virus software, brow=
sers and its plug-ins.
</li></ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Anti-virus=
software should catch this malware, but can sometimes fail. The malware ca=
n prevent infected machines from downloading security updates to operating =
systems or updates to anti-virus software
that might help detect the malware and stop it from operating. Often when =
the DNS Changer virus is downloaded, other types of malware come along with=
it, making it difficult to clean up a system. Several dozens of computers =
have already been infected with
this virus at MIT.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">If you=92r=
e worried, check that your anti-virus software is up-to-date, and verify th=
at your DNS server settings match what you=92d expect for your PC. The IS&a=
mp;T Help Desk (helpdesk@mit.edu) will be
able to help with what to look for.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><a href=3D=
"https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS">Th=
e FBI provides this resource</a> to help you find out if your computer is u=
sing a rogue DNS.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><a href=3D=
"http://www.eweek.com/c/a/Security/Researchers-Discover-Link-Between-TDSS-R=
ootkit-and-DNSchanger-Trojan-753018/">Read the full story in the news</a>.<=
/p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Cyber S=
hopping Risks</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The Monday=
after Thanksgiving (today) is known as Cyber Monday, one of the busiest on=
line shopping days of the year.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The <a hre=
f=3D"http://www.nrf.com/">
National Retail Federation</a> reports that almost half of all Americans pl=
an to shop online this season. Unfortunately, just as shoppers hit the Inte=
rnet to search for deals, cyber criminals are trolling the Web for their ne=
xt victim. A significant increase
in malicious shopping websites are launched between October and January, a=
ccording to Webroot, an anti-virus and anti-spyware software company.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Tips for s=
hoppers:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Think bef=
ore you click. Never click on links to unfamiliar websites, especially thos=
e provided within emails.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Inst=
all security software. Protect your PC with up to date anti-virus programs.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Know=
the retailer. If unfamiliar to you, look for more information about the co=
mpany by contacting the Better Business Bureau.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Moni=
tor your credit report. Once a year you can freely check your report to loo=
k for suspicious activity on your bank or credit card accounts.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Keep=
your passwords safe. Never reveal them to anyone and do not have a passwor=
d that contains commonly known information, such as your birth date.
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Only=
make purchases from secure websites. Secured site web addresses start with=
"https:"
</li></ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">For more t=
ips on how to stay safe while shopping online, visit the FTC site: "<a=
href=3D"http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt04.shtm">Fight=
Back Against Identity Theft</a>."</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
</div>
<div><br>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; font-family: Helvetica; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webki=
t-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; col=
or: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norm=
al; font-variant: normal; font-weight: normal; letter-spacing: normal; line=
-height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px=
; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-s=
pace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-sp=
an" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family=
: Helvetica; font-size: 14px; font-style: normal; font-variant: normal; fon=
t-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text=
-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: a=
uto; text-transform: none; orphans: 2; white-space: normal; widows: 2; word=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-=
spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px;=
font-style: normal; font-variant: normal; font-weight: normal; letter-spac=
ing: normal; line-height: normal; -webkit-text-decorations-in-effect: none;=
text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; or=
phans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=
=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -web=
kit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helveti=
ca; font-size: 14px; font-style: normal; font-variant: normal; font-weight:=
normal; letter-spacing: normal; line-height: normal; -webkit-text-decorati=
ons-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text=
-transform: none; orphans: 2; white-space: normal; widows: 2; word-spacing:=
0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separate=
; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-sty=
le: normal; font-variant: normal; font-weight: normal; letter-spacing: norm=
al; line-height: normal; -webkit-text-decorations-in-effect: none; text-ind=
ent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2;=
white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-=
style-span" style=3D"border-collapse: separate; -webkit-border-horizontal-s=
pacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); fon=
t-family: Helvetica; font-size: 12px; font-style: normal; font-variant: nor=
mal; font-weight: normal; letter-spacing: normal; line-height: normal; -web=
kit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-a=
djust: auto; text-transform: none; orphans: 2; white-space: normal; widows:=
2; word-spacing: 0px; ">
<div style=3D"font-size: 12px; "><br>
</div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">Monique
Yeaton</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">IT
Security Communications Consultant</span></span></span></span></span></spa=
n></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">MIT
Information Services & Technology (IS&T)</span></span></span></spa=
n></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">(617)
253-2715</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">http://ist.mit.edu/security</span></span></span></s=
pan></span></span></div>
<div style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></span></div>
</div>
</div>
</div>
</body>
</html>
--_000_CAF96B6120004myeatonexchangemitedu_--
--===============0107247950==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0107247950==--