[3701] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, March 18, 2013

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Mar 18 16:56:27 2013

Resent-From: ist-security-fyi@MIT.EDU
From: Monique Yeaton <myeaton@MIT.EDU>
To: ist-security-fyi <ist-security-fyi@MIT.EDU>
Date: Mon, 18 Mar 2013 20:54:33 +0000
Message-ID: <3ACED3B2A8CEFB4598A845F07FD4A05F252D0674@OC11EXPO24.exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============0207579071=="
Errors-To: ist-security-fyi-bounces@MIT.EDU

--===============0207579071==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_3ACED3B2A8CEFB4598A845F07FD4A05F252D0674OC11EXPO24excha_"

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F252D0674OC11EXPO24excha_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

In this issue:


1. Microsoft Security Updates for March 2013

2. Cybersecurity Discussed in White House Situation Room

3. Is Your Site Hacked?



------------------------------------------------------------

1. Microsoft Security Updates for March 2013

------------------------------------------------------------


Last week on Patch Tuesday, Microsoft released six new security bulletins<h=
ttp://technet.microsoft.com/en-us/security/bulletin/ms13-mar>. Four are rat=
ed critical, two are important. The fixes affect the following products:


  *   Windows
  *   Internet Explorer
  *   Office
  *   Server Software
  *   Silverlight


The updates have been released to MIT WAUS subscribers, and are available f=
rom the Windows Update tool, the Windows Server Update Services or the Down=
load Center as well.


The update for IE 10 fully supports flash and if you have a Surface RT devi=
ce, there is another firmware update for that as well. More details about t=
he individual updates can be found here<http://blogs.technet.com/b/jeffa36/=
archive/2013/03/13/microsoft-security-bulletin-march-2013-release.aspx>.



---------------------------------------------------------------------------=
----

2. Cybersecurity Discussed in White House Situation Room

---------------------------------------------------------------------------=
----


The venue for a meeting last week between the President and CEOs of various=
 companies, underlined the importance of the topic. Last Wednesday, 13 CEOs=
 met with the President<http://www.usatoday.com/story/tech/2013/03/14/obama=
-cybersecurity-ceos-situation-room/1987559/> in the Situation Room for a "t=
wo-way" exchange of information on cybersecurity. They came after testimony=
 last Tuesday at a Senate hearing by the director of the National Security =
Agency and the director of National Intelligence, describing the prevalent =
nature of network breaches by data thieves and cyber spies.


The President sought to grab the attention of the CEOs and to put a stop to=
 petty resistance to his recently issues executive order designed to get th=
e federal government and private companies working more closely to protect =
the nation's critical infrastructure against cyber attacks. Cyber attacks t=
op the list of security threats<http://news.cnet.com/8301-1009_3-57573902-8=
3/intelligence-chief-offers-dire-warning-on-cyberattacks/> facing the count=
ry, according to the annual Worldwide Threat Assessment of the US Intellige=
nce Community report.



-------------------------------

3. Is Your Site Hacked?

-------------------------------


Google has launched a website<http://www.google.com/webmasters/hacked/> "He=
lp for Hacked Sites" with information to help web masters when their sites =
have been hacked. The site offers a series of articles and videos to help t=
he website owners regain control of their sites and tighten their security.


Some preventative steps include being vigilant about keeping software updat=
ed for the site and understanding security practices of all applications, p=
lug-ins, third-party software and other applications before you use them wi=
th your site.



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D



Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_3ACED3B2A8CEFB4598A845F07FD4A05F252D0674OC11EXPO24excha_
Content-Type: text/html; charset="us-ascii"
Content-ID: <0947C9EA0972794FB39F00B31C616448@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; ">
<div>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; ">In thi=
s issue:</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">1. Microsoft Security Up=
dates for March 2013</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">2. Cybersecurity Discuss=
ed in White House Situation Room</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">3. Is Your Site Hacked?<=
/p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">------------------------=
------------------------------------</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">1. Microsoft Security Up=
dates for March 2013</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">------------------------=
------------------------------------</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; "><span style=3D"font-family: Helvetica; ">Last we=
ek on Patch Tuesday, Microsoft released six new
<a href=3D"http://technet.microsoft.com/en-us/security/bulletin/ms13-mar">s=
ecurity bulletins</a>. Four are rated critical, two are important. The fixe=
s
</span><font face=3D"Helvetica">affect the following products:</font></p>
<p style=3D"margin: 0px; min-height: 17px; "><font face=3D"Helvetica"><br>
</font></p>
<ul>
<li style=3D"margin: 0px; "><font face=3D"Helvetica">Windows</font> </li><l=
i style=3D"margin: 0px; "><font face=3D"Helvetica">Internet Explorer</font>=
 </li><li style=3D"margin: 0px; "><font face=3D"Helvetica">Office</font> </=
li><li style=3D"margin: 0px; "><font face=3D"Helvetica">Server Software</fo=
nt> </li><li style=3D"margin: 0px; "><font face=3D"Helvetica">Silverlight</=
font> </li></ul>
<p style=3D"margin: 0px; min-height: 17px; "><font face=3D"Helvetica"><br>
</font></p>
<p style=3D"margin: 0px; "><font face=3D"Helvetica">The updates have been r=
eleased to MIT WAUS subscribers, and are available from the Windows Update =
tool, the Windows Server Update Services or the Download Center as well.</f=
ont></p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">The update for IE 10 ful=
ly supports flash and if you have a Surface RT device, there is another fir=
mware update for that as well. More details about the individual updates ca=
n be found
<a href=3D"http://blogs.technet.com/b/jeffa36/archive/2013/03/13/microsoft-=
security-bulletin-march-2013-release.aspx">
here</a>.</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">------------------------=
-------------------------------------------------------</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">2. Cybersecurity Discuss=
ed in White House Situation Room</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">------------------------=
-------------------------------------------------------</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">The venue for a meeting =
last week between the President and CEOs of various companies, underlined t=
he importance of the topic. Last Wednesday,
<a href=3D"http://www.usatoday.com/story/tech/2013/03/14/obama-cybersecurit=
y-ceos-situation-room/1987559/">
13 CEOs met with the President</a> in the Situation Room for a &quot;two-wa=
y&quot; exchange of information on cybersecurity. They came after testimony=
 last Tuesday at a Senate hearing by the director of the National Security =
Agency and the director of National Intelligence,
 describing the prevalent nature of network breaches by data thieves and cy=
ber spies.&nbsp;</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">The President sought to =
grab the attention of the CEOs and to put a stop to petty resistance to his=
 recently issues executive order designed to get the federal government and=
 private companies working more closely
 to protect the nation's critical infrastructure against cyber attacks. <a =
href=3D"http://news.cnet.com/8301-1009_3-57573902-83/intelligence-chief-off=
ers-dire-warning-on-cyberattacks/">
Cyber attacks top the list of security threats</a> facing the country, acco=
rding to the annual Worldwide Threat Assessment of the US Intelligence Comm=
unity report.</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">------------------------=
-------</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">3. Is Your Site Hacked?<=
/p>
<p style=3D"font-family: Helvetica; margin: 0px; ">------------------------=
-------</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">Google has launched <a h=
ref=3D"http://www.google.com/webmasters/hacked/">
a website</a> &quot;Help for Hacked Sites&quot; with information to help we=
b masters when their sites have been hacked. The site offers a series of ar=
ticles and videos to help the website owners regain control of their sites =
and tighten their security.</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; ">Some preventative steps =
include being vigilant about keeping software updated for the site and unde=
rstanding security practices of all applications, plug-ins, third-party sof=
tware and other applications before
 you use them with your site.&nbsp;</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Arial; margin: 0px; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p=
>
<p style=3D"font-family: Arial; margin: 0px; ">Read all Security FYI Newsle=
tter articles and submit comments&nbsp;online&nbsp;at
<a href=3D"http://securityfyi.wordpress.com/">http://securityfyi.wordpress.=
com/</a>.</p>
<p style=3D"font-family: Arial; margin: 0px; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p=
>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
<p style=3D"font-family: Helvetica; margin: 0px; min-height: 17px; "><br>
</p>
</div>
<div style=3D"font-family: Garamond, sans-serif; "><span class=3D"Apple-sty=
le-span" style=3D"border-collapse: separate; font-family: Calibri; font-siz=
e: medium; border-spacing: 0px; "><span class=3D"Apple-style-span" style=3D=
"border-collapse: separate; border-spacing: 0px; font-family: Helvetica; fo=
nt-size: 14px; ">
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; border=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
 separate; border-spacing: 0px; "><span class=3D"Apple-style-span" style=3D=
"border-collapse: separate; border-spacing: 0px; "><span class=3D"Apple-sty=
le-span" style=3D"border-collapse: separate; border-spacing: 0px; "><span c=
lass=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacin=
g: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separa=
te; border-spacing: 0px; font-size: 12px; ">
<div>Monique Yeaton</div>
<div>IT Security Communications Consultant</div>
<div>MIT Information Services &amp; Technology (IS&amp;T)</div>
<div>(617) 253-2715</div>
<div>http://ist.mit.edu/security</div>
<div><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></div>
</span></span></div>
</body>
</html>

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F252D0674OC11EXPO24excha_--

--===============0207579071==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0207579071==--

home help back first fref pref prev next nref lref last post