[3552] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, March 5, 2013

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue Mar 5 11:21:56 2013

Resent-From: ist-security-fyi@MIT.EDU
From: Monique Yeaton <myeaton@MIT.EDU>
To: ist-security-fyi <ist-security-fyi@MIT.EDU>
Date: Tue, 5 Mar 2013 16:19:54 +0000
Message-ID: <3ACED3B2A8CEFB4598A845F07FD4A05F252BBE35@OC11EXPO24.exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============1324819906=="
Errors-To: ist-security-fyi-bounces@MIT.EDU

--===============1324819906==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_3ACED3B2A8CEFB4598A845F07FD4A05F252BBE35OC11EXPO24excha_"

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F252BBE35OC11EXPO24excha_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

In this issue:


1. Next laptop tagging event is Wednesday, March 6

2. New Copyright Alert System Plan in Place

3. Java 7 Still Vulnerable

4. Future of Security Doomed for Failure?



---------------------------------------------------------------------

1. Next laptop tagging event is Wednesday, March 6

---------------------------------------------------------------------


On March 6, 11:00am - 1:30pm, laptop registration will be in E17-121


This Wednesday, MIT Police is providing an opportunity to tag and register =
laptop computers and electronic devices.


When registering your device, it receives a STOP tag. This loss prevention =
measure is a visible deterrent to theft. Take a look at this video<http://w=
eb.mit.edu/cp/www/_docs/theft_deterrent.wmv> to see the results. Each tag c=
osts $10. Cash or a G/L account is accepted (no TechCash).


Details of this service and all upcoming dates and locations are listed her=
e<http://kb.mit.edu/confluence/x/e4CSAw>.



-----------------------------------------------------------

2. New Copyright Alert System Plan in Place

-----------------------------------------------------------


The Copyright Alert System is a plan, more than four years in the making, t=
hat was pushed by the recording and movie industries, and backed by the pre=
sident. It includes participation by AT&T, Cablevision, Comcast, Time Warne=
r Cable and Verizon. Comcast and other internet service providers can now b=
egin hijacking browsers of their internet subscribers who are detected of r=
epeatedly infringing on public file-sharing networks.


Read the full article online<http://www.wired.com/threatlevel/2013/02/comca=
st-browser-hijack/>.



---------------------------------

3. Java 7 Still Vulnerable

---------------------------------


Researchers have found two new Java zero-day vulnerabilities. Browsers runn=
ing Java 1.6 update 41 and Java 1.7 update 15 are now vulnerable to malware=
 attack that installs a remote access tool called McRAT.


Apple released an update to Java following an earlier attack. The vulnerabi=
lity exists only in the browser plug-in for Java, not in applications that =
use Java Runtime.


The recommendation is for users to disable Java in the browser until Oracle=
 addresses the issue. If you have a Java plug-in in your browser, you can l=
earn how to disable it here<http://www.zdnet.com/how-to-disable-java-in-you=
r-browser-on-windows-mac-7000009732/>.


Read the full story online<http://www.zdnet.com/oracle-investigating-after-=
two-more-java-7-zero-day-flaws-found-7000011965>.



-------------------------------------------------------

4. Future of Security Doomed for Failure?

-------------------------------------------------------


Speaking at the 2013 RSA Conference last week, Mike Fey, CTO of McAfee said=
 that many companies just aren't ready for the sophisticated attacks headed=
 their way these days.


Basically, Fey suggested that based on the way the enterprise landscape loo=
ks now, we're on our way to complete breakdown if companies don't change th=
eir security strategies immediately.


Read the full article online<http://www.zdnet.com/mcafee-cto-current-securi=
ty-landscape-is-on-its-way-to-failure-7000011914>.



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D



Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_3ACED3B2A8CEFB4598A845F07FD4A05F252BBE35OC11EXPO24excha_
Content-Type: text/html; charset="us-ascii"
Content-ID: <263A91C2219E5C4F9803C4C0DFCF7D2C@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif; ">
<div><span style=3D"font-family: Helvetica; ">In this issue:</span></div>
<div><span class=3D"Apple-style-span" style=3D"border-collapse: separate; f=
ont-family: Calibri; font-size: medium; border-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacing: 0=
px; font-family: Helvetica; font-size: 14px; ">
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; border=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
 separate; border-spacing: 0px; "><span class=3D"Apple-style-span" style=3D=
"border-collapse: separate; border-spacing: 0px; "><span class=3D"Apple-sty=
le-span" style=3D"border-collapse: separate; border-spacing: 0px; "><span c=
lass=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacin=
g: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separa=
te; border-spacing: 0px; font-size: 12px; ">
<div>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">1. Next laptop tagging event is=
 Wednesday, March 6</p>
<p style=3D"margin: 0px; font-size: 14px; ">2. New Copyright Alert System P=
lan in Place</p>
<p style=3D"margin: 0px; font-size: 14px; ">3. Java 7 Still Vulnerable</p>
<p style=3D"margin: 0px; font-size: 14px; ">4. Future of Security Doomed fo=
r Failure?</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">-------------------------------=
--------------------------------------</p>
<p style=3D"margin: 0px; font-size: 14px; ">1. Next laptop tagging event is=
 Wednesday, March 6</p>
<p style=3D"margin: 0px; font-size: 14px; ">-------------------------------=
--------------------------------------</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; "><b>On March 6, 11:00am - 1:30pm=
, laptop registration will be in E17-121</b></p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">This Wednesday,&nbsp;MIT Police=
 is providing an opportunity to tag and register laptop computers and elect=
ronic devices.&nbsp;</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">When registering your device, i=
t receives a STOP tag. This loss prevention measure is a visible deterrent =
to theft. Take a look at&nbsp;<a href=3D"http://web.mit.edu/cp/www/_docs/th=
eft_deterrent.wmv"><span style=3D"color: rgb(4, 46, 238); ">this
 video</span></a>&nbsp;to see the results. Each tag costs $10. Cash or a G/=
L account is accepted (no TechCash).&nbsp;</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; color: rgb(4, 46, 238); "><span s=
tyle=3D"text-decoration: underline"><a href=3D"http://kb.mit.edu/confluence=
/x/e4CSAw">Details of this service and all upcoming dates and locations are=
 listed here</a></span><span style=3D"color: #000000">.</span></p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">-------------------------------=
----------------------------</p>
<p style=3D"margin: 0px; font-size: 14px; ">2. New Copyright Alert System P=
lan in Place</p>
<p style=3D"margin: 0px; font-size: 14px; ">-------------------------------=
----------------------------</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">The Copyright Alert System is a=
 plan, more than four years in the making, that was pushed by the recording=
 and movie industries, and backed by the president. It includes participati=
on by AT&amp;T, Cablevision, Comcast,
 Time Warner Cable and Verizon. Comcast and other internet service provider=
s can now begin hijacking browsers of their internet subscribers who are de=
tected of repeatedly infringing on public file-sharing networks.&nbsp;</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; "><a href=3D"http://www.wired.com=
/threatlevel/2013/02/comcast-browser-hijack/">Read the full article online<=
/a>.</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">-------------------------------=
--</p>
<p style=3D"margin: 0px; font-size: 14px; ">3. Java 7 Still Vulnerable</p>
<p style=3D"margin: 0px; font-size: 14px; ">-------------------------------=
--</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">Researchers have found two new =
Java zero-day vulnerabilities. Browsers running Java 1.6 update 41 and Java=
 1.7 update 15 are now vulnerable to malware attack that installs a remote =
access tool called McRAT.&nbsp;</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">Apple released an update to Jav=
a following an earlier attack. The vulnerability exists only in the browser=
 plug-in for Java, not in applications that use Java Runtime.</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">The recommendation is for users=
 to disable Java in the browser until Oracle addresses the issue. If you ha=
ve a Java plug-in in your browser, you can learn how to disable it
<a href=3D"http://www.zdnet.com/how-to-disable-java-in-your-browser-on-wind=
ows-mac-7000009732/">
here</a>.</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; "><a href=3D"http://www.zdnet.com=
/oracle-investigating-after-two-more-java-7-zero-day-flaws-found-7000011965=
">Read the full story online</a>.</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">-------------------------------=
------------------------</p>
<p style=3D"margin: 0px; font-size: 14px; ">4. Future of Security Doomed fo=
r Failure?</p>
<p style=3D"margin: 0px; font-size: 14px; ">-------------------------------=
------------------------</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">Speaking at the 2013 RSA Confer=
ence last week, Mike Fey, CTO of McAfee said that many companies just aren'=
t ready for the sophisticated attacks headed their way these days.</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; ">Basically, Fey suggested that b=
ased on the way the enterprise landscape looks now, we're on our way to com=
plete breakdown if companies don't change their security strategies immedia=
tely.</p>
<p style=3D"margin: 0px; font-size: 14px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; "><a href=3D"http://www.zdnet.com=
/mcafee-cto-current-security-landscape-is-on-its-way-to-failure-7000011914"=
>Read the full article online</a>.</p>
<p style=3D"margin: 0px; font-size: 14px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; "><br>
</p>
<p style=3D"margin: 0px; font-size: 14px; "></p>
<p style=3D"margin: 0px; font-family: Arial; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p=
>
<p style=3D"margin: 0px; font-family: Arial; ">Read all Security FYI Newsle=
tter articles and submit comments&nbsp;online&nbsp;at
<a href=3D"http://securityfyi.wordpress.com/">http://securityfyi.wordpress.=
com/</a>.</p>
<p style=3D"margin: 0px; font-family: Arial; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p=
>
<p style=3D"margin: 0px; font-family: Arial; "><br>
</p>
<p></p>
<p style=3D"margin: 0px; font-size: 14px; "><br>
</p>
</div>
<div>Monique Yeaton</div>
<div>IT Security Communications Consultant</div>
<div>MIT Information Services &amp; Technology (IS&amp;T)</div>
<div>(617) 253-2715</div>
<div>http://ist.mit.edu/security</div>
<div><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></div>
</span></span></div>
</body>
</html>

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F252BBE35OC11EXPO24excha_--

--===============1324819906==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============1324819906==--

home help back first fref pref prev next nref lref last post