[2577] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, May 15, 2012
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue May 15 12:02:51 2012
From: Monique Yeaton <myeaton@MIT.EDU>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@MIT.EDU>
Date: Tue, 15 May 2012 16:01:22 +0000
Message-ID: <CBD7F610.28732%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@MIT.EDU>
Content-Type: multipart/mixed; boundary="===============0801375032=="
Errors-To: ist-security-fyi-bounces@MIT.EDU
--===============0801375032==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_CBD7F61028732myeatonexchangemitedu_"
--_000_CBD7F61028732myeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. Microsoft Security Updates for May 2012
2. Apple Releases Various Updates This Month
3. Warning: Malware Installed Through Hotel Internet Connections
-------------------------------------------------------
1. Microsoft Security Updates for May 2012
-------------------------------------------------------
Last Tuesday, May 8, Microsoft issued seven security bulletins that address=
ed a total of 23 security flaws. Three bulletins were labeled as critical. =
Systems affected:
* Windows
* .NET Framework
* Microsoft Office
* Silverlight
All but two bulletins addressed remote code execution vulnerabilities. Whil=
e none of the bugs fixed in the update are currently being targeted, Micros=
oft said exploit code for eighteen of them was likely.
Among others, Microsoft patched flaws in Office for Mac 2011, a True Type F=
onts vulnerability, a Rich Text Format mismatch vulnerability, six bugs in =
Excel, and various file format memory corruption, record heaps overflow, an=
d remote code execution vulnerabilities.
Read the full Microsoft Security Bulletin summary here<http://technet.micro=
soft.com/en-us/security/bulletin/ms12-may>.
MIT WAUS<http://ist.mit.edu/waus> has released the patches to subscribers. =
They are also available through the operating system's Windows Update tool.
------------------------------------------------------------
2. Apple Releases Various Updates This Month
------------------------------------------------------------
In the past two weeks, Apple has released several updates, including:
* iOS 5.1.1 (for iPhone 4S, 4 and 3GS, iPod touch, and iPad)
* OS X Lion 10.7.4 and Security Update 2012-002
* OS X Leopard Security Update 2012-003 (for OS X 10.5 to 10.5.8)
* Flashback Removal Security Update (for OS X 10.5 to 10.5.8)
* Safari 5.1.7
OS X Lion 10.7.4 and Security Update 2012-002<http://support.apple.com/kb/H=
T5281> fixes 35 bugs including a FileVault password bug. It is possible tha=
t a debug log file could contain the password (stored in the clear) of ever=
y user who logged in. Anyone who used FileVault encryption on their Mac pri=
or to Lion, upgraded to Lion, but kept their folders encrypted using the le=
gacy version of FileVault is vulnerable. FileVault 2 users are unaffected. =
To be on the safe side, it is a good idea to change your FileVault password=
in addition to taking the update.
The Safari update contains stability improvements and fixes for four WebKit=
vulnerabilities. When installed, it also checks the version of Adobe Flash=
plugin that is installed in the browser and disables it if it is out of da=
te.
The iOS update fixes the same WebKit vulnerabilities. Exploitation of these=
vulnerabilities may allow an attacker to execute arbitrary code, obtain se=
nsitive information, operate with elevated privileges, cause a denial-of-se=
rvice condition, or perform a cross-site scripting attack.
A great outline of all the fixes from Apple this month are listed in this a=
rticle from Sophos<http://nakedsecurity.sophos.com/2012/05/10/important-app=
le-updates-for-snow-leopard-and-lion-get-em-today/>.
The updates are available through the operating system's Software Update to=
ol or from Apple's Downloads webpage<http://support.apple.com/downloads/>.
---------------------------------------------------------------------------=
---------
3. Warning: Malware Installed Through Hotel Internet Connections
---------------------------------------------------------------------------=
---------
Earlier this month, the IC3 (Internet Crime Complaint Center) released an i=
ntelligence note<http://www.ic3.gov/media/2012/120508.aspx> stating a recen=
t discovery by the FBI of malicious actors targeting travelers abroad throu=
gh pop-up windows when they attempt an Internet connection to their hotel r=
ooms. If a traveler attempts an Internet connection, he is presented with a=
pop-up window notifying him to update a widely-used and legitimate softwar=
e product. If installed, malware is installed on the laptop.
Recommendation: Take your software updates right before traveling and don't=
install any software while on the road, unless the vendor has been verifie=
d. To ensure protection while traveling, members of the MIT community can u=
se the Cisco AnyConnect VPN client<http://kb.mit.edu/confluence/x/zwBa> (vp=
n.mit.edu), which establishes an encrypted connection to the Internet.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_CBD7F61028732myeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-ID: <0331DE707B517442B43CF2C807249059@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif; ">
<div>
<div>
<div><span class=3D"Apple-style-span" style=3D"font-family: Helvetica; ">In=
this issue:</span></div>
<div><span class=3D"Apple-style-span" style=3D"font-family: Helvetica; ">
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webki=
t-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; col=
or: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: norm=
al; font-variant: normal; font-weight: normal; letter-spacing: normal; line=
-height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px=
; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-s=
pace: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-sp=
an" style=3D"border-collapse: separate; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family=
: Helvetica; font-size: 14px; font-style: normal; font-variant: normal; fon=
t-weight: normal; letter-spacing: normal; line-height: normal; -webkit-text=
-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: a=
uto; text-transform: none; orphans: 2; white-space: normal; widows: 2; word=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-=
spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px;=
font-style: normal; font-variant: normal; font-weight: normal; letter-spac=
ing: normal; line-height: normal; -webkit-text-decorations-in-effect: none;=
text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; or=
phans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-border-ho=
rizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; font-va=
riant: normal; font-weight: normal; letter-spacing: normal; line-height: no=
rmal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-t=
ext-size-adjust: auto; text-transform: none; orphans: 2; white-space: norma=
l; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=
=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -web=
kit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helveti=
ca; font-size: 14px; font-style: normal; font-variant: normal; font-weight:=
normal; letter-spacing: normal; line-height: normal; -webkit-text-decorati=
ons-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text=
-transform: none; orphans: 2; white-space: normal; widows: 2; word-spacing:=
0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separate=
; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-sty=
le: normal; font-variant: normal; font-weight: normal; letter-spacing: norm=
al; line-height: normal; -webkit-text-decorations-in-effect: none; text-ind=
ent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2;=
white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-=
style-span" style=3D"border-collapse: separate; -webkit-border-horizontal-s=
pacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); fon=
t-family: Helvetica; font-size: 12px; font-style: normal; font-variant: nor=
mal; font-weight: normal; letter-spacing: normal; line-height: normal; -web=
kit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-a=
djust: auto; text-transform: none; orphans: 2; white-space: normal; widows:=
2; word-spacing: 0px; ">
<div style=3D"font-size: 12px; ">
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Mic=
rosoft Security Updates for May 2012</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. App=
le Releases Various Updates This Month</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. War=
ning: Malware Installed Through Hotel Internet Connections</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">1. Mic=
rosoft Security Updates for May 2012</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
-------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Last T=
uesday, May 8, Microsoft issued seven security bulletins that addressed a t=
otal of 23 security flaws. Three bulletins were labeled as critical. System=
s affected:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Windo=
ws </li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetic=
a">.NET Framework
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">=
Microsoft Office
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">=
Silverlight </li></ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">All bu=
t two bulletins addressed remote code execution vulnerabilities. While none=
of the bugs fixed in the update are currently being targeted, Microsoft sa=
id exploit code for eighteen of them
was likely.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Among =
others, Microsoft patched flaws in Office for Mac 2011, a True Type Fonts v=
ulnerability, a Rich Text Format mismatch vulnerability, six bugs in Excel,=
and various file format memory corruption,
record heaps overflow, and remote code execution vulnerabilities. </p=
>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Read t=
he full Microsoft Security Bulletin summary
<a href=3D"http://technet.microsoft.com/en-us/security/bulletin/ms12-may">h=
ere</a>. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><a hre=
f=3D"http://ist.mit.edu/waus">MIT WAUS</a> has released the patches to subs=
cribers. They are also available through the operating system's Windows Upd=
ate tool.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">2. App=
le Releases Various Updates This Month</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">In the=
past two weeks, Apple has released several updates, including:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">iOS 5=
.1.1 (for iPhone 4S, 4 and 3GS, iPod touch, and iPad)
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">=
OS X Lion 10.7.4 and Security Update 2012-002
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">=
OS X Leopard Security Update 2012-003 (for OS X 10.5 to 10.5.8)
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">=
Flashback Removal Security Update (for OS X 10.5 to 10.5.8)
</li><li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">=
Safari 5.1.7 </li></ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica"><a hre=
f=3D"http://support.apple.com/kb/HT5281">OS X Lion 10.7.4 and Security Upda=
te 2012-002</a> fixes 35 bugs including a FileVault password bug. It is pos=
sible that a debug log file could contain
the password (stored in the clear) of every user who logged in. Anyone who=
used FileVault encryption on their Mac prior to Lion, upgraded to Lion, bu=
t kept their folders encrypted using the legacy version of FileVault is vul=
nerable. FileVault 2 users are unaffected.
To be on the safe side, it is a good idea to change your FileVault passwor=
d in addition to taking the update.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The Sa=
fari update contains stability improvements and fixes for four WebKit vulne=
rabilities. When installed, it also checks the version of Adobe Flash plugi=
n that is installed in the browser
and disables it if it is out of date.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The iO=
S update fixes the same WebKit vulnerabilities. Exploitation of these vulne=
rabilities may allow an attacker to execute arbitrary code, obtain sensitiv=
e information, operate with elevated
privileges, cause a denial-of-service condition, or perform a cross-site s=
cripting attack.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">A grea=
t outline of all the fixes from Apple this month are listed
<a href=3D"http://nakedsecurity.sophos.com/2012/05/10/important-apple-updat=
es-for-snow-leopard-and-lion-get-em-today/">
in this article from Sophos</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">The up=
dates are available through the operating system's Software Update tool or =
from Apple's
<a href=3D"http://support.apple.com/downloads/">Downloads webpage</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
---------------------------------------------------------------------------=
---</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">3. War=
ning: Malware Installed Through Hotel Internet Connections</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">------=
---------------------------------------------------------------------------=
---</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Earlie=
r this month, the IC3 (Internet Crime Complaint Center) released an
<a href=3D"http://www.ic3.gov/media/2012/120508.aspx">intelligence note</a>=
stating a recent discovery by the FBI of malicious actors targeting travel=
ers abroad through pop-up windows when they attempt an Internet connection =
to their hotel rooms. If a traveler
attempts an Internet connection, he is presented with a pop-up window noti=
fying him to update a widely-used and legitimate software product. If insta=
lled, malware is installed on the laptop. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica">Recomm=
endation: Take your software updates right before traveling and don't insta=
ll any software while on the road, unless the vendor has been verified. To =
ensure protection while traveling,
members of the MIT community can use the <a href=3D"http://kb.mit.edu/conf=
luence/x/zwBa">
Cisco AnyConnect VPN client</a> (vpn.mit.edu), which establishes an encrypt=
ed connection to the Internet.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments online at
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"text-decoratio=
n: underline ; color: #1e37ee">http://securityfyi.wordpress.com/</span></a>=
.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Helvetica; min-he=
ight: 17.0px">
<br>
</p>
</div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; ">Monique
Yeaton</span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">IT
Security Communications Consultant</span></span></span></span></span></spa=
n></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">MIT
Information Services & Technology (IS&T)</span></span></span></spa=
n></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">(617)
253-2715</span></span></span></span></span></span></div>
<div style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"=
font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12p=
x; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span cla=
ss=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-st=
yle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" styl=
e=3D"font-size: 12px; ">http://ist.mit.edu/security</span></span></span></s=
pan></span></span></div>
<div style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></span></div>
</span></div>
</div>
</div>
</body>
</html>
--_000_CBD7F61028732myeatonexchangemitedu_--
--===============0801375032==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0801375032==--