[2493] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, April 17, 2012

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue Apr 17 15:42:22 2012

From: Monique Yeaton <myeaton@MIT.EDU>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@MIT.EDU>
Date: Tue, 17 Apr 2012 19:41:11 +0000
Message-ID: <CBB33F95.26C77%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@MIT.EDU>
Content-Type: multipart/mixed; boundary="===============0356391484=="
Errors-To: ist-security-fyi-bounces@MIT.EDU

--===============0356391484==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_CBB33F9526C77myeatonexchangemitedu_"

--_000_CBB33F9526C77myeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


In this issue:


1. Spam Getting Through? Report It.

2. Mobile Security, Not So Much

3. Event: 2012 National Collegiate Cyber Competition

4. April Issue of OUCH! Newsletter Covers Metadata



----------------------------------------------

1. Spam Getting Through? Report It.

----------------------------------------------


The email coming through MIT's email servers also runs through the Symantec=
 Brightmail Gateway. This service ensures that most spam is caught before i=
t reaches our in-boxes. End users at MIT can log into the Gateway to set up=
 good and bad senders lists. It also allows users to release spam that is i=
nadvertently caught by the Spam Quarantine. Learn more<http://ist.mit.edu/s=
pam>.


Unfortunately, no spam filters are 100% fail-safe. Unwanted email may still=
 get through and land in our in boxes. I'm referring to unsolicited email t=
hat should not have made it through the filters in the first place. IS&T do=
es not have fine-tuning control over the spam measuring features built into=
 the Gateway itself; that is controlled by the vendor, Symantec. However, t=
he vendor does provide users with a way to submit feedback so that the metr=
ics used to tag emails as spam can be tweaked. If you are computer savvy, t=
his knowledge base article posted by Symantec<http://www.symantec.com/busin=
ess/support/index?page=3Dcontent&id=3DTECH83081> explains how you can manua=
lly submit spam and false positives to the Symantec Security Response Cente=
r.


NOTE: The spam feedback service is provided by Symantec to its customers, i=
t is not a service that IS&T offers to MIT. Users must contact Symantec dir=
ectly for support.



-----------------------------------------

2. Mobile Security, Not So Much

-----------------------------------------


Last week I attended an IT security conference and one of the presenters th=
rew out the following statistics: Five billion people in the world have acc=
ess to a mobile device, and in comparison, only half a billion have access =
to a computer. Yet when it comes to technologies for mobile security, they'=
re almost non-existent. In addition, the biggest obstacle to securing sensi=
tive data on cell phones or smart phones is the lack of knowledge of the cu=
stomer.


As stated in a recent New York Times article<http://www.nytimes.com/2012/01=
/26/technology/personaltech/protecting-a-cellphone-against-hackers.html>, t=
echnology experts predict that in 2012, breached, infiltrated or otherwise =
compromised mobile devices will be the biggest security issue. Some experts=
 also estimate that more than a million phones worldwide have already been =
affected. The article goes on to describe what can happen if your device is=
 breached and lists several ways you can help protect it against hackers.


Additional tips for mobile devices can be found in the IS&T Knowledge Base<=
http://kb.mit.edu/confluence/x/XQdS>.


Also, if you're interested, the next IT Partners lunch on April 24 is on Mo=
bile Device Management and one of the topics covers sensitive data concerns=
. Don't forget to RSVP with the IT Partners Planning team if you plan to at=
tend (rsvp-itpartners@mit.edu<mailto:rsvp-itpartners@mit.edu>). Details: Ap=
ril 24 (Tuesday), 12:00 to 1:30 pm, Marlar Lounge, 37-252.



-------------------------------------------------------------------

3. Event: 2012 National Collegiate Cyber Competition

-------------------------------------------------------------------


More than 400 college students in the US have registered for CyberQuest, th=
e online US Cyber Challenge competition that is the only way to win invitat=
ions and scholarships for the summer regional Fantasy Cyber Camps (featurin=
g America's top cyber experts teaching advanced technique) in California, V=
irginia and Delaware.


CyberQuests are a series of fun but challenging on-line competitions allowi=
ng participants to demonstrate their knowledge in a variety of information =
security realms. Each quest features an artifact for analysis, along with a=
 series of quiz questions. Some quests focus on a potentially vulnerable sa=
mple web server as the artifact, challenging participants to identify its f=
laws using vulnerability analysis skills. Other quests are focused around f=
orensic analysis, packet capture analysis, and more. The quests have varyin=
g levels of difficulty and complexity, with some quests geared toward begin=
ners, while others include more intermediate and ultimately advanced materi=
al.


Register for the April 2012 quest before it closes on April 29. More inform=
ation here<http://uscc.cyberquests.org/>.



------------------------------------------------------------------

4. April Issue of OUCH! Newsletter Covers Metadata

------------------------------------------------------------------


This month's issue explains what metadata is, the types of information meta=
data can unknowingly expose, and how to identify and delete it. Metadata is=
 far more pervasive than you may think. Download the PDF of the newsletter,=
 published by SANS.org here<http://www.securingthehuman.org/newsletters/ouc=
h/issues/OUCH-201204_en.pdf>.



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Thanks,

Monique

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_CBB33F9526C77myeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-ID: <8AAD0078D6CE0641AC57060F1D280A17@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif; ">
<div>
<div>
<div>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">In thi=
s issue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Spa=
m Getting Through? Report It.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. Mob=
ile Security, Not So Much</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Eve=
nt: 2012 National Collegiate Cyber Competition</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">4. Apr=
il Issue of OUCH! Newsletter Covers Metadata</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Spa=
m Getting Through? Report It.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
----------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The em=
ail coming through MIT's email servers also runs through the Symantec Brigh=
tmail Gateway. This service ensures that most spam is caught before it reac=
hes our in-boxes. End users at MIT
 can log into the Gateway to set up good and bad senders lists. It also all=
ows users to release spam that is inadvertently caught by the Spam Quaranti=
ne.
<a href=3D"http://ist.mit.edu/spam">Learn more</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Unfort=
unately, no spam filters are 100% fail-safe. Unwanted email may still get t=
hrough and land in our in boxes. I'm referring to unsolicited email that sh=
ould not have made it through the
 filters in the first place. IS&amp;T does not have fine-tuning control ove=
r the spam measuring features built into the Gateway itself; that is contro=
lled by the vendor, Symantec. However, the vendor does provide users with a=
 way to submit feedback so that the
 metrics used to tag emails as spam can be tweaked. If you are computer sav=
vy, <a href=3D"http://www.symantec.com/business/support/index?page=3Dconten=
t&amp;id=3DTECH83081">
this knowledge base article posted by Symantec</a> explains how you can man=
ually submit spam and false positives to the Symantec Security Response Cen=
ter.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">NOTE: =
The spam feedback service is provided by Symantec to its customers, it is n=
ot a service that IS&amp;T offers to MIT. Users must contact Symantec direc=
tly for support.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. Mob=
ile Security, Not So Much</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Last w=
eek I attended an IT security conference and one of the presenters threw ou=
t the following statistics: Five billion people in the world have access to=
 a mobile device, and in comparison,
 only half a billion have access to a computer. Yet when it comes to techno=
logies for mobile security, they're almost non-existent. In addition, the b=
iggest obstacle to securing sensitive data on cell phones or smart phones i=
s the lack of knowledge of the customer.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">As sta=
ted in a recent
<a href=3D"http://www.nytimes.com/2012/01/26/technology/personaltech/protec=
ting-a-cellphone-against-hackers.html">
New York Times article</a>, technology experts predict that in 2012, breach=
ed, infiltrated or otherwise compromised mobile devices will be the biggest=
 security issue. Some experts also estimate that more than a million phones=
 worldwide have already been affected.
 The article goes on to describe what can happen if your device is breached=
 and lists several ways you can help protect it against hackers.&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Additi=
onal tips for mobile devices can be found in the
<a href=3D"http://kb.mit.edu/confluence/x/XQdS">IS&amp;T Knowledge Base</a>=
.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Also, =
if you're interested, the next IT Partners lunch on April 24 is on Mobile D=
evice Management and one of the topics covers sensitive data concerns. Don'=
t forget to RSVP with the IT Partners
 Planning team if you plan to atte<span style=3D"font: 14.0px Arial">nd (<a=
 href=3D"mailto:rsvp-itpartners@mit.edu">rsvp-itpartners@mit.edu</a>). Deta=
ils: April 24 (Tuesday), 12:00 to 1:30 pm, Marlar Lounge, 37-252.</span></p=
>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. Eve=
nt: 2012 National Collegiate Cyber Competition</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">More t=
han 400 college students in the US have registered for CyberQuest, the onli=
ne US Cyber Challenge competition that is the only way to win invitations a=
nd scholarships for the summer regional
 Fantasy Cyber Camps (featuring America's top cyber experts teaching advanc=
ed technique) in California, Virginia and Delaware.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">CyberQuest=
s are a series of fun but challenging on-line competitions allowing partici=
pants to demonstrate their knowledge in a variety of information security r=
ealms. Each quest features an artifact
 for analysis, along with a series of quiz questions. Some quests focus on =
a potentially vulnerable sample web server as the artifact, challenging par=
ticipants to identify its flaws using vulnerability analysis skills. Other =
quests are focused around forensic
 analysis, packet capture analysis, and more. The quests have varying level=
s of difficulty and complexity, with some quests geared toward beginners, w=
hile others include more intermediate and ultimately advanced material.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Regist=
er for the April 2012 quest before it closes on April 29.
<a href=3D"http://uscc.cyberquests.org/">More information here</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">4. Apr=
il Issue of OUCH! Newsletter Covers Metadata</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">This month=
's issue explains what metadata is, the types of information metadata can u=
nknowingly expose, and how to identify and delete it.&nbsp;Metadata is far =
more pervasive than you may think. Download
 the PDF of the newsletter, published by SANS.org <a href=3D"http://www.sec=
uringthehuman.org/newsletters/ouch/issues/OUCH-201204_en.pdf">
here</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments&nbsp;online&nbsp;at
<a href=3D"http://securityfyi.wordpress.com/">http://securityfyi.wordpress.=
com/</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; font-family: Helvetica; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webki=
t-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; col=
or: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norm=
al; font-variant: normal; font-weight: normal; letter-spacing: normal; line=
-height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px=
; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-s=
pace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-sp=
an" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family=
: Helvetica; font-size: 14px; font-style: normal; font-variant: normal; fon=
t-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text=
-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: a=
uto; text-transform: none; orphans: 2; white-space: normal; widows: 2; word=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
 separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-=
spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px;=
 font-style: normal; font-variant: normal; font-weight: normal; letter-spac=
ing: normal; line-height: normal; -webkit-text-decorations-in-effect: none;=
 text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; or=
phans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=
=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -web=
kit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helveti=
ca; font-size: 14px; font-style: normal; font-variant: normal; font-weight:=
 normal; letter-spacing: normal; line-height: normal; -webkit-text-decorati=
ons-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text=
-transform: none; orphans: 2; white-space: normal; widows: 2; word-spacing:=
 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separate=
; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-sty=
le: normal; font-variant: normal; font-weight: normal; letter-spacing: norm=
al; line-height: normal; -webkit-text-decorations-in-effect: none; text-ind=
ent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2;=
 white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-=
style-span" style=3D"border-collapse: separate; -webkit-border-horizontal-s=
pacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); fon=
t-family: Helvetica; font-size: 12px; font-style: normal; font-variant: nor=
mal; font-weight: normal; letter-spacing: normal; line-height: normal; -web=
kit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-a=
djust: auto; text-transform: none; orphans: 2; white-space: normal; widows:=
 2; word-spacing: 0px; ">
<div style=3D"font-size: 12px; "><font class=3D"Apple-style-span" size=3D"4=
"><span class=3D"Apple-style-span" style=3D"font-size: 14px;"><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; ">Thanks,</span></span></fo=
nt></div>
<div style=3D"font-size: 12px; "><font class=3D"Apple-style-span" size=3D"4=
"><span class=3D"Apple-style-span" style=3D"font-size: 14px;"><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><br>
</span></span></font></div>
<div style=3D"font-size: 12px; "><font class=3D"Apple-style-span" size=3D"4=
"><span class=3D"Apple-style-span" style=3D"font-size: 14px;"><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; ">Monique</span></span></fo=
nt></div>
<div style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder">
</div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">Monique
 Yeaton</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">IT
 Security Communications Consultant</span></span></span></span></span></spa=
n></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">MIT
 Information Services &amp; Technology (IS&amp;T)</span></span></span></spa=
n></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">(617)
 253-2715</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">http://ist.mit.edu/security</span></span></span></s=
pan></span></span></div>
<div style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></span></div>
</div>
</div>
</div>
</body>
</html>

--_000_CBB33F9526C77myeatonexchangemitedu_--

--===============0356391484==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0356391484==--

home help back first fref pref prev next nref lref last post