[2424] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, February 27, 2012

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Feb 27 15:32:32 2012

From: Monique Yeaton <myeaton@MIT.EDU>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@MIT.EDU>
Date: Mon, 27 Feb 2012 20:31:36 +0000
Message-ID: <CB715257.247A6%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@MIT.EDU>
Content-Type: multipart/mixed; boundary="===============0471624984=="
Errors-To: ist-security-fyi-bounces@MIT.EDU

--===============0471624984==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_CB715257247A6myeatonexchangemitedu_"

--_000_CB715257247A6myeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


In this issue:


1. NERCOMP Conference & New Security Paradigms

2. QR Codes: A Tool for Criminals

3. The White House's Consumer Privacy Bill of Rights



--------------------------------------------------------------------

1. NERCOMP Conference & New Security Paradigms

--------------------------------------------------------------------


This year the NERCOMP annual conference in Providence, Rhode Island is occu=
rring on March 12-14. One of the pre-conference seminars is "New Paradigms =
for IT Security." Security officers from 4 different schools: Harvard, Brow=
n, UMass and Boston College, will be discussing how computer security has b=
ecome a business problem, with a growing need to "secure the human" over th=
e computer or technology. They will explore risk management, HR security, a=
pplications security, compliance, user awareness, and other elements of the=
 new security paradigm as they affect IT and the entire campus.


Time: Monday, March 12, 8:30 am - 12:00 pm

Location: Rhode Island Convention Center, Room 551

Cost: $165 (a separate registration and fee are required for this seminar)


Learn more<http://www.educause.edu/NC12/Program/SEM01A> or sign up online<h=
ttp://net.educause.edu/content.asp?page_id=3D1029579&bhcp=3D1>.


Note: The rest of the conference (the Tuesday 3/13 and Wednesday 3/14 semin=
ars) are available online, if interested. IS&T is hosting the online track =
of the conference<http://www.educause.edu/NC12/Program/Online> in the E17 L=
earning Center on both days.



-------------------------------------------

2. QR Codes: A Tool for Criminals

-------------------------------------------


You know those little black and white boxes you see on ads and billboards l=
ately, used by advertisers and marketers. In many cases, these QR codes<htt=
p://en.wikipedia.org/wiki/QR_code> are encoded web links. They are intended=
 to save users the hassle of writing down a web address or other informatio=
n while they're out and about. A quick scan with a smartphone is all you ne=
ed to use the decoded message.


Most scanning applications will recognize that the code is a link and insta=
ntly open a web browser. Here's where the bad guys can enter the picture. C=
riminals have discovered that they can use QR codes to infect your smartpho=
ne with malware, trick you to visiting a phishing web site, or steal inform=
ation from your mobile device.


All a criminal has to do is use one of the QR code-generating tools availab=
le for free on the Internet, print out the code and affix it to an existing=
 ad or poster, replacing the safe QR code with his risky one. You won't kno=
w you're scanning a malicious link until it's too late.


Learn what you can do to protect yourself from malicious QR codes<http://ne=
tsecurity.about.com/od/securityadvisorie1/a/How-To-Protect-Yourself-From-Ma=
licious-QR-Codes.htm>.



--------------------------------------------------------------------

3. The White House's Consumer Privacy Bill of Rights

--------------------------------------------------------------------


President Obama's administration has released a Consumer Privacy Bill of Ri=
ghts and plans to work with Congress to enact the legislation. The bill pro=
vides voluntary guidelines for online companies that aims to give people mo=
re control over how their personal data are collected and used.


Here's an excerpt of an article discussing the topic at CNET.com:


"Consumer online privacy is a hot topic these days, with complaints that Go=
ogle and Facebook, among others, compromise the privacy of consumers in ord=
er to boost advertising opportunities and revenues.


Recently, several lawmakers and consumer advocates filed complaints with th=
e FTC over Google's plan to consolidate its privacy policies and combine da=
ta on users from across all of it services and products. On Wednesday, 36 s=
tate Attorneys General offices signed a letter asking for a meeting with Go=
ogle CEO Larry Page to discuss concerns they have that consumers can't opt =
out of having their information shared between different Google services un=
der the modified privacy plan.


Google was also criticized this month for bypassing default privacy setting=
s on Safari and Internet Explorer. Meanwhile, Facebook has taken heat for i=
ts frictionless sharing and Timeline features."

Read more<http://news.cnet.com/8301-27080_3-57383300-245/obama-unveils-cons=
umer-privacy-bill-of-rights/#ixzz1nc88AY6A>.



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D


Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_CB715257247A6myeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-ID: <43C1C9B63B56F44782A0F9741EE1E0AD@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif; ">
<div>
<div>
<div>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">In thi=
s issue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. NER=
COMP Conference &amp; New Security Paradigms</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. QR =
Codes: A Tool for Criminals</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. The=
 White House's Consumer Privacy Bill of Rights</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
--------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. NER=
COMP Conference &amp; New Security Paradigms</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
--------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">This y=
ear the NERCOMP annual conference in Providence, Rhode Island is occurring =
on March 12-14. One of the pre-conference seminars is &quot;New Paradigms f=
or IT Security.&quot; Security officers from
 4 different schools: Harvard, Brown, UMass and Boston College, will be dis=
cussing how computer security has become a business problem, with a growing=
 need to &quot;secure the human&quot; over the computer or technology. They=
 will explore risk management, HR security,
 applications security, compliance, user awareness, and other elements of t=
he new security paradigm as they affect IT and the entire campus.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Time: =
Monday, March 12, 8:30 am - 12:00 pm</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Locati=
on: Rhode Island Convention Center, Room 551</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Cost: =
$165 (a separate registration and fee are required for this seminar)</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><a hre=
f=3D"http://www.educause.edu/NC12/Program/SEM01A">Learn more</a> or
<a href=3D"http://net.educause.edu/content.asp?page_id=3D1029579&amp;bhcp=
=3D1">sign up online</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><b>Not=
e</b>: The rest of the conference (the Tuesday 3/13 and Wednesday 3/14 semi=
nars) are available online, if interested. IS&amp;T is hosting
<a href=3D"http://www.educause.edu/NC12/Program/Online">the online track of=
 the conference</a> in the E17 Learning Center on both days. &nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. QR =
Codes: A Tool for Criminals</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">You kn=
ow those little black and white boxes you see on ads and billboards lately,=
 used by advertisers and marketers. In many cases, these
<a href=3D"http://en.wikipedia.org/wiki/QR_code">QR codes</a> are encoded w=
eb links. They are intended to save users the hassle of writing down a web =
address or other information while they're out and about. A quick scan with=
 a smartphone is all you need to use
 the decoded message.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Most s=
canning applications will recognize that the code is a link and instantly o=
pen a web browser. Here's where the bad guys can enter the picture. Crimina=
ls have discovered that they can use
 QR codes to infect your smartphone with malware, trick you to visiting a p=
hishing web site, or steal information from your mobile device.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">All a =
criminal has to do is use one of the QR code-generating tools available for=
 free on the Internet, print out the code and affix it to an existing ad or=
 poster, replacing the safe QR code
 with his risky one. You won't know you're scanning a malicious link until =
it's too late.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><a hre=
f=3D"http://netsecurity.about.com/od/securityadvisorie1/a/How-To-Protect-Yo=
urself-From-Malicious-QR-Codes.htm">Learn what you can do to protect yourse=
lf from malicious QR codes</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
--------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. The=
 White House's Consumer Privacy Bill of Rights</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
--------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Presid=
ent Obama's administration has released a Consumer Privacy Bill of Rights a=
nd plans to work with Congress to enact the legislation. The bill provides =
voluntary guidelines for online companies
 that aims to give people more control over how their personal data are col=
lected and used.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Here's=
 an excerpt of an article discussing the topic at CNET.com:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">&quot;=
Consumer online privacy is a hot topic these days, with complaints that Goo=
gle and Facebook, among others, compromise the privacy of consumers in orde=
r to boost advertising opportunities and
 revenues.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Recent=
ly, several lawmakers and consumer advocates filed complaints with the FTC =
over Google's plan to consolidate its privacy policies and combine data on =
users from across all of it services
 and products. On Wednesday, 36 state Attorneys General offices signed a le=
tter asking for a meeting with Google CEO Larry Page to discuss concerns th=
ey have that consumers can't opt out of having their information shared bet=
ween different Google services under
 the modified privacy plan.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Google=
 was also criticized this month for bypassing default privacy settings on S=
afari and Internet Explorer. Meanwhile, Facebook has taken heat for its fri=
ctionless sharing and Timeline features.&quot;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 15.0px Helvetica"><a hre=
f=3D"http://news.cnet.com/8301-27080_3-57383300-245/obama-unveils-consumer-=
privacy-bill-of-rights/#ixzz1nc88AY6A">Read more</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 15.0px Helvetica; min-he=
ight: 18.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 15.0px Helvetica; min-he=
ight: 18.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments&nbsp;online&nbsp;at htt=
p://securityfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
</div>
<div><br>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; font-family: Helvetica; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webki=
t-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; col=
or: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norm=
al; font-variant: normal; font-weight: normal; letter-spacing: normal; line=
-height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px=
; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-s=
pace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-sp=
an" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family=
: Helvetica; font-size: 14px; font-style: normal; font-variant: normal; fon=
t-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text=
-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: a=
uto; text-transform: none; orphans: 2; white-space: normal; widows: 2; word=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
 separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-=
spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px;=
 font-style: normal; font-variant: normal; font-weight: normal; letter-spac=
ing: normal; line-height: normal; -webkit-text-decorations-in-effect: none;=
 text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; or=
phans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=
=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -web=
kit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helveti=
ca; font-size: 14px; font-style: normal; font-variant: normal; font-weight:=
 normal; letter-spacing: normal; line-height: normal; -webkit-text-decorati=
ons-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text=
-transform: none; orphans: 2; white-space: normal; widows: 2; word-spacing:=
 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separate=
; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-sty=
le: normal; font-variant: normal; font-weight: normal; letter-spacing: norm=
al; line-height: normal; -webkit-text-decorations-in-effect: none; text-ind=
ent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2;=
 white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-=
style-span" style=3D"border-collapse: separate; -webkit-border-horizontal-s=
pacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); fon=
t-family: Helvetica; font-size: 12px; font-style: normal; font-variant: nor=
mal; font-weight: normal; letter-spacing: normal; line-height: normal; -web=
kit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-a=
djust: auto; text-transform: none; orphans: 2; white-space: normal; widows:=
 2; word-spacing: 0px; ">
<div style=3D"font-size: 12px; "><br>
</div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">Monique
 Yeaton</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">IT
 Security Communications Consultant</span></span></span></span></span></spa=
n></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">MIT
 Information Services &amp; Technology (IS&amp;T)</span></span></span></spa=
n></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">(617)
 253-2715</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">http://ist.mit.edu/security</span></span></span></s=
pan></span></span></div>
<div style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></span></div>
</div>
</div>
</div>
</body>
</html>

--_000_CB715257247A6myeatonexchangemitedu_--

--===============0471624984==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0471624984==--

home help back first fref pref prev next nref lref last post