[2429] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, March 12, 2012
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Mar 12 14:02:09 2012
From: Monique Yeaton <myeaton@MIT.EDU>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@MIT.EDU>
Date: Mon, 12 Mar 2012 18:00:53 +0000
Message-ID: <CB83B213.251B6%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@MIT.EDU>
Content-Type: multipart/mixed; boundary="===============1593701579=="
Errors-To: ist-security-fyi-bounces@MIT.EDU
--===============1593701579==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_CB83B213251B6myeatonexchangemitedu_"
--_000_CB83B213251B6myeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. Microsoft Security Updates for March 2012
2. EVENT: Laptop Tagging on 3/14 in E17 @11:30 am - 1:00 pm
3. Two Interesting Scams Making the Rounds
4. OUCH! Newsletter, March 2012: Email Dos and Don'ts
----------------------------------------------------------
1. Microsoft Security Updates for March 2012
----------------------------------------------------------
On Tuesday, March 13, Microsoft plans to issue six security bulletins that =
address a total of seven flaws. Only one of the bulletins to be issued is l=
abeled as critical. Systems affected:
* Microsoft Windows (all supported versions)
* Visual Studio
* Expression Design
The critical bulletin will address a remote code execution flaw in Windows.=
Such flaws can be exploited by hackers to install malware on a targeted sy=
stem without user warning or interaction.
Read the story in the news<http://www.scmagazine.com.au/News/293142,microso=
ft-to-patch-seven-security-issues-with-six-bulletins.aspx>.
Read the Microsoft Security Bulletin Advanced Notification<http://technet.m=
icrosoft.com/en-us/security/bulletin/ms12-mar>.
---------------------------------------------------------------------------=
-------
2. EVENT: Laptop Tagging on 3/14 in E17 @11:30 am - 1:00 pm
---------------------------------------------------------------------------=
-------
Every second Wednesday of the month, the MIT Campus Police teams up with IS=
&T to tag and register laptop computers and electronic devices. The STOP ta=
gs<http://www.stoptheft.com/site/index.php> take up to 800 pounds of pressu=
re to remove and if removed, leave a tattoo stating "Stolen Property."
With a rash of thefts happening in various open buildings on campus (some i=
tems are lifted from locked rooms), it is a good idea to use such visible d=
eterrents as protection, especially for items which can be quickly removed.=
The registration of such items will also help to return found items to the=
proper owner.
There is a $10 cost per tagged item, and cash or MIT Cost Object are accept=
ed. Learn more here<https://kb.mit.edu/confluence/display/istcontrib/Campus=
+Police+Laptop+Tagging+and+Registration>.
The next tagging event will be happening on April 11.
----------------------------------------------------------
3. Two Interesting Scams Making the Rounds
----------------------------------------------------------
Scams are nothing new, they probably have been around since the dawn of civ=
ilization. However, new technology brings new ways for criminals to scam pe=
ople and we should be on the look out for these possibilities. Here are two=
that caught my attention recently:
Cramming:
Customers finding unauthorized charges on their phone bill (landline or wir=
eless). This type of illegal billing (called "cramming") has been around fo=
r at least a decade, but more recently is affecting cell and smart phone us=
ers. The bogus charges are for anything from yoga classes to psychic hotlin=
e memberships and diet programs. The FCC is proposing new rules designed to=
reduce the scams. In the meantime, consumers should keep an eye on their p=
hone bills, even for such small amounts as $1.99. If billed each month, tho=
se small charges can add up. Read it in the news<http://www.msnbc.msn.com/i=
d/43728825/ns/business-consumer_news/t/fcc-proposes-crackdown-phone-bill-cr=
amming/#.T14SFitSRQ9>.
Gift Giving Scam Targeting Universities:
Several universities in the US, including MIT, are experiencing a scam in w=
hich a person donates a large amount of money to the university online with=
a credit card, then calls to request a refund on a different credit card. =
They are claiming the intended gift was smaller and would like the differen=
ce refunded. When verifying the given names and contact information, the in=
formation turns out to be invalid. Example from the State of Mississippi<ht=
tp://www.bolivarcom.com/view/full_story/17744981/article-Delta-State-target=
ed-in-credit-card-scam>.
------------------------------------------------------------------------
4. OUCH! Newsletter, March 2012: Email Dos and Don'ts
------------------------------------------------------------------------
The month's issue of OUCH! from SANS.org explains the Dos and Don'ts of usi=
ng email. Specifically, how people can be their own worst enemy when it com=
es to copying the wrong recipient with auto-complete, sending an email when=
emotionally charged or not understanding the privacy limitations of email.=
The newsletter provides in simple terms how some of email's most common fe=
atures work and how to avoid shooting yourself in the foot.
Read or download the newsletter in PDF format here<http://www.securingthehu=
man.org/newsletters/ouch/issues/OUCH-201203_en.pdf>.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_CB83B213251B6myeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-ID: <28FDC4B53367B9449B1C24C036BF09D6@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif; ">
<div>
<div>
<div>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">In thi=
s issue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Mic=
rosoft Security Updates for March 2012 </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. EVE=
NT: Laptop Tagging on 3/14 in E17 @11:30 am - 1:00 pm</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Two=
Interesting Scams Making the Rounds</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">4. OUC=
H! Newsletter, March 2012: Email Dos and Don'ts</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Mic=
rosoft Security Updates for March 2012 </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">On Tue=
sday, March 13, Microsoft plans to issue six security bulletins that addres=
s a total of seven flaws. Only one of the bulletins to be issued is labeled=
as critical. Systems affected:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Micro=
soft Windows (all supported versions)
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">=
Visual Studio
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">=
Expression Design
</li></ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The cr=
itical bulletin will address a remote code execution flaw in Windows. Such =
flaws can be exploited by hackers to install malware on a targeted system w=
ithout user warning or interaction.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><a hre=
f=3D"http://www.scmagazine.com.au/News/293142,microsoft-to-patch-seven-secu=
rity-issues-with-six-bulletins.aspx">Read the story in the news</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><a hre=
f=3D"http://technet.microsoft.com/en-us/security/bulletin/ms12-mar">Read th=
e Microsoft Security Bulletin Advanced Notification</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
---------------------------------------------------------------------------=
-</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. EVE=
NT: Laptop Tagging on 3/14 in E17 @11:30 am - 1:00 pm</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
---------------------------------------------------------------------------=
-</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Every =
second Wednesday of the month, the MIT Campus Police teams up with IS&T=
to tag and register laptop computers and electronic devices. The
<a href=3D"http://www.stoptheft.com/site/index.php">STOP tags</a> take up t=
o 800 pounds of pressure to remove and if removed, leave a tattoo stating &=
quot;Stolen Property."</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">With a=
rash of thefts happening in various open buildings on campus (some items a=
re lifted from locked rooms), it is a good idea to use such visible deterre=
nts as protection, especially for
items which can be quickly removed. The registration of such items will al=
so help to return found items to the proper owner.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">There =
is a $10 cost per tagged item, and cash or MIT Cost Object are accepted.
<a href=3D"https://kb.mit.edu/confluence/display/istcontrib/Campus+Poli=
ce+Laptop+Tagging+and+Registration">
Learn more here</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The ne=
xt tagging event will be happening on April 11.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Two=
Interesting Scams Making the Rounds</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Scams =
are nothing new, they probably have been around since the dawn of civilizat=
ion. However, new technology brings new ways for criminals to scam people a=
nd we should be on the look out for
these possibilities. Here are two that caught my attention recently:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Crammi=
ng:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Custom=
ers finding unauthorized charges on their phone bill (landline or wireless)=
. This type of illegal billing (called "cramming") has been aroun=
d for at least a decade, but more recently is
affecting cell and smart phone users. The bogus charges are for anything f=
rom yoga classes to psychic hotline memberships and diet programs. The FCC =
is proposing new rules designed to reduce the scams. In the meantime, consu=
mers should keep an eye on their
phone bills, even for such small amounts as $1.99. If billed each month, t=
hose small charges can add up.
<a href=3D"http://www.msnbc.msn.com/id/43728825/ns/business-consumer_news/t=
/fcc-proposes-crackdown-phone-bill-cramming/#.T14SFitSRQ9">
Read it in the news</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Gift G=
iving Scam Targeting Universities:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Severa=
l universities in the US, including MIT, are experiencing a scam in which a=
person donates a large amount of money to the university online with a cre=
dit card, then calls to request a
refund on a different credit card. They are claiming the intended gift was=
smaller and would like the difference refunded. When verifying the given n=
ames and contact information, the information turns out to be invalid.
<a href=3D"http://www.bolivarcom.com/view/full_story/17744981/article-Delta=
-State-targeted-in-credit-card-scam">
Example from the State of Mississippi</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">4. OUC=
H! Newsletter, March 2012: Email Dos and Don'ts</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The month'=
s issue of OUCH! from SANS.org explains the Dos and Don'ts of using email. =
Specifically, how people can be their own worst enemy when it comes to copy=
ing the wrong recipient with auto-complete,
sending an email when emotionally charged or not understanding the privacy=
limitations of email. The newsletter provides in simple terms how some of =
email's most common features work and how to avoid shooting yourself in the=
foot. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read or do=
wnload the newsletter in PDF format
<a href=3D"http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201=
203_en.pdf">
here</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
</div>
<div><br>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; font-family: Helvetica; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webki=
t-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; col=
or: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norm=
al; font-variant: normal; font-weight: normal; letter-spacing: normal; line=
-height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px=
; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-s=
pace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-sp=
an" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family=
: Helvetica; font-size: 14px; font-style: normal; font-variant: normal; fon=
t-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text=
-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: a=
uto; text-transform: none; orphans: 2; white-space: normal; widows: 2; word=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-=
spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px;=
font-style: normal; font-variant: normal; font-weight: normal; letter-spac=
ing: normal; line-height: normal; -webkit-text-decorations-in-effect: none;=
text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; or=
phans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=
=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -web=
kit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helveti=
ca; font-size: 14px; font-style: normal; font-variant: normal; font-weight:=
normal; letter-spacing: normal; line-height: normal; -webkit-text-decorati=
ons-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text=
-transform: none; orphans: 2; white-space: normal; widows: 2; word-spacing:=
0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separate=
; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-sty=
le: normal; font-variant: normal; font-weight: normal; letter-spacing: norm=
al; line-height: normal; -webkit-text-decorations-in-effect: none; text-ind=
ent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2;=
white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-=
style-span" style=3D"border-collapse: separate; -webkit-border-horizontal-s=
pacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); fon=
t-family: Helvetica; font-size: 12px; font-style: normal; font-variant: nor=
mal; font-weight: normal; letter-spacing: normal; line-height: normal; -web=
kit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-a=
djust: auto; text-transform: none; orphans: 2; white-space: normal; widows:=
2; word-spacing: 0px; ">
<div style=3D"font-size: 12px; "><br>
</div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">Monique
Yeaton</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">IT
Security Communications Consultant</span></span></span></span></span></spa=
n></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">MIT
Information Services & Technology (IS&T)</span></span></span></spa=
n></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">(617)
253-2715</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">http://ist.mit.edu/security</span></span></span></s=
pan></span></span></div>
<div style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></span></div>
</div>
</div>
</div>
</body>
</html>
--_000_CB83B213251B6myeatonexchangemitedu_--
--===============1593701579==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============1593701579==--