[2429] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, March 12, 2012

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Mar 12 14:02:09 2012

From: Monique Yeaton <myeaton@MIT.EDU>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@MIT.EDU>
Date: Mon, 12 Mar 2012 18:00:53 +0000
Message-ID: <CB83B213.251B6%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@MIT.EDU>
Content-Type: multipart/mixed; boundary="===============1593701579=="
Errors-To: ist-security-fyi-bounces@MIT.EDU

--===============1593701579==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_CB83B213251B6myeatonexchangemitedu_"

--_000_CB83B213251B6myeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


In this issue:


1. Microsoft Security Updates for March 2012

2. EVENT: Laptop Tagging on 3/14 in E17 @11:30 am - 1:00 pm

3. Two Interesting Scams Making the Rounds

4. OUCH! Newsletter, March 2012: Email Dos and Don'ts



----------------------------------------------------------

1. Microsoft Security Updates for March 2012

----------------------------------------------------------


On Tuesday, March 13, Microsoft plans to issue six security bulletins that =
address a total of seven flaws. Only one of the bulletins to be issued is l=
abeled as critical. Systems affected:


  *   Microsoft Windows (all supported versions)
  *   Visual Studio
  *   Expression Design


The critical bulletin will address a remote code execution flaw in Windows.=
 Such flaws can be exploited by hackers to install malware on a targeted sy=
stem without user warning or interaction.


Read the story in the news<http://www.scmagazine.com.au/News/293142,microso=
ft-to-patch-seven-security-issues-with-six-bulletins.aspx>.


Read the Microsoft Security Bulletin Advanced Notification<http://technet.m=
icrosoft.com/en-us/security/bulletin/ms12-mar>.



---------------------------------------------------------------------------=
-------

2. EVENT: Laptop Tagging on 3/14 in E17 @11:30 am - 1:00 pm

---------------------------------------------------------------------------=
-------


Every second Wednesday of the month, the MIT Campus Police teams up with IS=
&T to tag and register laptop computers and electronic devices. The STOP ta=
gs<http://www.stoptheft.com/site/index.php> take up to 800 pounds of pressu=
re to remove and if removed, leave a tattoo stating "Stolen Property."


With a rash of thefts happening in various open buildings on campus (some i=
tems are lifted from locked rooms), it is a good idea to use such visible d=
eterrents as protection, especially for items which can be quickly removed.=
 The registration of such items will also help to return found items to the=
 proper owner.


There is a $10 cost per tagged item, and cash or MIT Cost Object are accept=
ed. Learn more here<https://kb.mit.edu/confluence/display/istcontrib/Campus=
+Police+Laptop+Tagging+and+Registration>.


The next tagging event will be happening on April 11.



----------------------------------------------------------

3. Two Interesting Scams Making the Rounds

----------------------------------------------------------


Scams are nothing new, they probably have been around since the dawn of civ=
ilization. However, new technology brings new ways for criminals to scam pe=
ople and we should be on the look out for these possibilities. Here are two=
 that caught my attention recently:


Cramming:

Customers finding unauthorized charges on their phone bill (landline or wir=
eless). This type of illegal billing (called "cramming") has been around fo=
r at least a decade, but more recently is affecting cell and smart phone us=
ers. The bogus charges are for anything from yoga classes to psychic hotlin=
e memberships and diet programs. The FCC is proposing new rules designed to=
 reduce the scams. In the meantime, consumers should keep an eye on their p=
hone bills, even for such small amounts as $1.99. If billed each month, tho=
se small charges can add up. Read it in the news<http://www.msnbc.msn.com/i=
d/43728825/ns/business-consumer_news/t/fcc-proposes-crackdown-phone-bill-cr=
amming/#.T14SFitSRQ9>.


Gift Giving Scam Targeting Universities:

Several universities in the US, including MIT, are experiencing a scam in w=
hich a person donates a large amount of money to the university online with=
 a credit card, then calls to request a refund on a different credit card. =
They are claiming the intended gift was smaller and would like the differen=
ce refunded. When verifying the given names and contact information, the in=
formation turns out to be invalid. Example from the State of Mississippi<ht=
tp://www.bolivarcom.com/view/full_story/17744981/article-Delta-State-target=
ed-in-credit-card-scam>.



------------------------------------------------------------------------

4. OUCH! Newsletter, March 2012: Email Dos and Don'ts

------------------------------------------------------------------------


The month's issue of OUCH! from SANS.org explains the Dos and Don'ts of usi=
ng email. Specifically, how people can be their own worst enemy when it com=
es to copying the wrong recipient with auto-complete, sending an email when=
 emotionally charged or not understanding the privacy limitations of email.=
 The newsletter provides in simple terms how some of email's most common fe=
atures work and how to avoid shooting yourself in the foot.


Read or download the newsletter in PDF format here<http://www.securingthehu=
man.org/newsletters/ouch/issues/OUCH-201203_en.pdf>.


=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D


Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_CB83B213251B6myeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-ID: <28FDC4B53367B9449B1C24C036BF09D6@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif; ">
<div>
<div>
<div>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">In thi=
s issue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Mic=
rosoft Security Updates for March 2012&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. EVE=
NT: Laptop Tagging on 3/14 in E17 @11:30 am - 1:00 pm</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Two=
 Interesting Scams Making the Rounds</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">4. OUC=
H! Newsletter, March 2012: Email Dos and Don'ts</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Mic=
rosoft Security Updates for March 2012&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">On Tue=
sday, March 13, Microsoft plans to issue six security bulletins that addres=
s a total of seven flaws. Only one of the bulletins to be issued is labeled=
 as critical. Systems affected:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Micro=
soft Windows (all supported versions)
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">=
Visual Studio
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">=
Expression Design
</li></ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The cr=
itical bulletin will address a remote code execution flaw in Windows. Such =
flaws can be exploited by hackers to install malware on a targeted system w=
ithout user warning or interaction.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><a hre=
f=3D"http://www.scmagazine.com.au/News/293142,microsoft-to-patch-seven-secu=
rity-issues-with-six-bulletins.aspx">Read the story in the news</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><a hre=
f=3D"http://technet.microsoft.com/en-us/security/bulletin/ms12-mar">Read th=
e Microsoft Security Bulletin Advanced Notification</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
---------------------------------------------------------------------------=
-</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. EVE=
NT: Laptop Tagging on 3/14 in E17 @11:30 am - 1:00 pm</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
---------------------------------------------------------------------------=
-</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Every =
second Wednesday of the month, the MIT Campus Police teams up with IS&amp;T=
 to tag and register laptop computers and electronic devices. The
<a href=3D"http://www.stoptheft.com/site/index.php">STOP tags</a> take up t=
o 800 pounds of pressure to remove and if removed, leave a tattoo stating &=
quot;Stolen Property.&quot;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">With a=
 rash of thefts happening in various open buildings on campus (some items a=
re lifted from locked rooms), it is a good idea to use such visible deterre=
nts as protection, especially for
 items which can be quickly removed. The registration of such items will al=
so help to return found items to the proper owner.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">There =
is a $10 cost per tagged item, and cash or MIT Cost Object are accepted.
<a href=3D"https://kb.mit.edu/confluence/display/istcontrib/Campus&#43;Poli=
ce&#43;Laptop&#43;Tagging&#43;and&#43;Registration">
Learn more here</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The ne=
xt tagging event will be happening on April 11.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Two=
 Interesting Scams Making the Rounds</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Scams =
are nothing new, they probably have been around since the dawn of civilizat=
ion. However, new technology brings new ways for criminals to scam people a=
nd we should be on the look out for
 these possibilities. Here are two that caught my attention recently:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Crammi=
ng:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Custom=
ers finding unauthorized charges on their phone bill (landline or wireless)=
. This type of illegal billing (called &quot;cramming&quot;) has been aroun=
d for at least a decade, but more recently is
 affecting cell and smart phone users. The bogus charges are for anything f=
rom yoga classes to psychic hotline memberships and diet programs. The FCC =
is proposing new rules designed to reduce the scams. In the meantime, consu=
mers should keep an eye on their
 phone bills, even for such small amounts as $1.99. If billed each month, t=
hose small charges can add up.
<a href=3D"http://www.msnbc.msn.com/id/43728825/ns/business-consumer_news/t=
/fcc-proposes-crackdown-phone-bill-cramming/#.T14SFitSRQ9">
Read it in the news</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Gift G=
iving Scam Targeting Universities:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Severa=
l universities in the US, including MIT, are experiencing a scam in which a=
 person donates a large amount of money to the university online with a cre=
dit card, then calls to request a
 refund on a different credit card. They are claiming the intended gift was=
 smaller and would like the difference refunded. When verifying the given n=
ames and contact information, the information turns out to be invalid.
<a href=3D"http://www.bolivarcom.com/view/full_story/17744981/article-Delta=
-State-targeted-in-credit-card-scam">
Example from the State of Mississippi</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">4. OUC=
H! Newsletter, March 2012: Email Dos and Don'ts</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The month'=
s issue of OUCH! from SANS.org explains the Dos and Don'ts of using email. =
Specifically, how people can be their own worst enemy when it comes to copy=
ing the wrong recipient with auto-complete,
 sending an email when emotionally charged or not understanding the privacy=
 limitations of email. The newsletter provides in simple terms how some of =
email's most common features work and how to avoid shooting yourself in the=
 foot.&nbsp;&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read or do=
wnload the newsletter in PDF format
<a href=3D"http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201=
203_en.pdf">
here</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments&nbsp;online&nbsp;at htt=
p://securityfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
</div>
<div><br>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; font-family: Helvetica; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webki=
t-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; col=
or: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norm=
al; font-variant: normal; font-weight: normal; letter-spacing: normal; line=
-height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px=
; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-s=
pace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-sp=
an" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family=
: Helvetica; font-size: 14px; font-style: normal; font-variant: normal; fon=
t-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text=
-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: a=
uto; text-transform: none; orphans: 2; white-space: normal; widows: 2; word=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
 separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-=
spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px;=
 font-style: normal; font-variant: normal; font-weight: normal; letter-spac=
ing: normal; line-height: normal; -webkit-text-decorations-in-effect: none;=
 text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; or=
phans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=
=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -web=
kit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helveti=
ca; font-size: 14px; font-style: normal; font-variant: normal; font-weight:=
 normal; letter-spacing: normal; line-height: normal; -webkit-text-decorati=
ons-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text=
-transform: none; orphans: 2; white-space: normal; widows: 2; word-spacing:=
 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separate=
; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-sty=
le: normal; font-variant: normal; font-weight: normal; letter-spacing: norm=
al; line-height: normal; -webkit-text-decorations-in-effect: none; text-ind=
ent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2;=
 white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-=
style-span" style=3D"border-collapse: separate; -webkit-border-horizontal-s=
pacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); fon=
t-family: Helvetica; font-size: 12px; font-style: normal; font-variant: nor=
mal; font-weight: normal; letter-spacing: normal; line-height: normal; -web=
kit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-a=
djust: auto; text-transform: none; orphans: 2; white-space: normal; widows:=
 2; word-spacing: 0px; ">
<div style=3D"font-size: 12px; "><br>
</div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">Monique
 Yeaton</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">IT
 Security Communications Consultant</span></span></span></span></span></spa=
n></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">MIT
 Information Services &amp; Technology (IS&amp;T)</span></span></span></spa=
n></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">(617)
 253-2715</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">http://ist.mit.edu/security</span></span></span></s=
pan></span></span></div>
<div style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></span></div>
</div>
</div>
</div>
</body>
</html>

--_000_CB83B213251B6myeatonexchangemitedu_--

--===============1593701579==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============1593701579==--

home help back first fref pref prev next nref lref last post