[7904] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, July 23, 2013

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue Jul 23 14:44:16 2013

Resent-From: ist-security-fyi@MIT.EDU
From: Monique Yeaton <myeaton@MIT.EDU>
To: ist-security-fyi <ist-security-fyi@MIT.EDU>
Date: Tue, 23 Jul 2013 18:41:40 +0000
Message-ID: <3ACED3B2A8CEFB4598A845F07FD4A05F2F35FDCC@OC11EXPO24.exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============1191010146=="
Errors-To: ist-security-fyi-bounces@MIT.EDU

--===============1191010146==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_3ACED3B2A8CEFB4598A845F07FD4A05F2F35FDCCOC11EXPO24excha_"

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F2F35FDCCOC11EXPO24excha_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

In this issue:


1. Research Universities Subject to Cyber Attacks

2. Social Media Security Tips

3. Event: Security Camp @ BU on August 22nd



-------------------------------------------------------------------

1. Research Universities Subject to Cyber Attacks

-------------------------------------------------------------------


According to the New York Times, leading US research universities have been=
 subject to millions of hacking attempts on a weekly basis. Professors at t=
hese universities, including MIT, receive thousands of patents each year in=
 areas such as prescription drugs, computer chips, fuel cells, aircraft, me=
dical devices, food production and more.


Bill Mellon of the University of Wisconsin told the Times they get 90,000 t=
o 100,000 hacking attempts per day, from China alone, to penetrate their sy=
stem.


Although it is difficult to track where the attacks are coming from, US gov=
ernment officials, security experts and university and corporate officials =
say that China is clearly the leading source of efforts to steal informatio=
n. Other suspected countries are Russia and Vietnam.


A growing number of schools no longer allow their professors to take their =
laptops and smart phones to certain countries for fear of the information b=
eing copied or malware being planted in hopes that the device is taken home=
 and connected to a network, allowing the thieves to get in.


Read this story online<http://www.nytimes.com/2013/07/17/education/barrage-=
of-cyberattacks-challenges-campus-culture.html>.



---------------------------------------

2. Social Media Security Tips

---------------------------------------


There are various ways you can get scammed or, at the least, embarrassed if=
 you don't follow general security practices when using social networking s=
ites such as Facebook and Twitter. Don't worry, if it happened to you, you'=
re not the only one. The Associated Press, Burger King and The Onion have a=
ll recently had their Twitter accounts hacked. Various celebrities have had=
 their Facebook accounts hijacked. They are then used to spread misinformat=
ion or to post links that lead to malware.


Twitter recently implemented two-factor authentication to crack down on the=
 problem. No word yet on whether Facebook will follow suit. Facebook does o=
ffer something called Login Approvals<https://www.facebook.com/help/www/148=
233965247823>, its version of two-factor authentication, to protect users f=
rom takeover attempts of their account.


To learn more on protecting accounts and preventing scams, go to the compan=
ies' security guidelines pages:


  *   Security on Facebook<https://www.facebook.com/about/security> and Des=
ktop Help/Security<https://www.facebook.com/help/www/131719720300233/> (Fac=
ebook)
  *   Safe Tweeting<https://support.twitter.com/articles/76036-keeping-your=
-account-secure> (Twitter)



---------------------------------------------------------------

3. Event: Security Camp @ BU on August 22nd

---------------------------------------------------------------


Boston University will once again be hosting the free, one-day Security Cam=
p conference. The date is Thursday, August 22, 2013. Please mark your calen=
dars if interested.


This conference is for system, network, and security administrators and sec=
urity managers. The goal is to provide a forum where these staff in higher =
education can share and benefit from collective experiences.


More information on Security Camp at Boston University is here<http://www.b=
u.edu/tech/security/services/security-events-training/camp/>.



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_3ACED3B2A8CEFB4598A845F07FD4A05F2F35FDCCOC11EXPO24excha_
Content-Type: text/html; charset="us-ascii"
Content-ID: <F587446978E1D04EAAC80EF30775C906@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif; ">
<div>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; ">In thi=
s issue:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1. Research Universities=
 Subject to Cyber Attacks</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2. Social Media Security=
 Tips</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">3. Event: Security Camp =
@ BU on August 22nd</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1. Research Universities=
 Subject to Cyber Attacks</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">According to the <i>New =
York Times</i>, leading US research universities have been subject to milli=
ons of hacking attempts on a weekly basis. Professors at these universities=
, including MIT, receive thousands
 of patents each year in areas such as prescription drugs, computer chips, =
fuel cells, aircraft, medical devices, food production and more.&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Bill Mellon of the Unive=
rsity of Wisconsin told the Times they get 90,000 to 100,000 hacking attemp=
ts per day, from China alone, to penetrate their system.&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Although it is difficult=
 to track where the attacks are coming from, US government officials, secur=
ity experts and university and corporate officials say that China is clearl=
y the leading source of efforts to
 steal information.&nbsp;Other suspected countries are Russia and Vietnam.<=
/p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">A growing number of scho=
ols no longer allow their professors to take their laptops and smart phones=
 to certain countries for fear of the information being copied or malware b=
eing planted in hopes that the device
 is taken home and connected to a network, allowing the thieves to get in.&=
nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; "><a href=3D"http://www.ny=
times.com/2013/07/17/education/barrage-of-cyberattacks-challenges-campus-cu=
lture.html">Read this story online</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
---------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2. Social Media Security=
 Tips</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
---------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">There are various ways y=
ou can get scammed or, at the least, embarrassed if you don't follow genera=
l security practices when using social networking sites such as Facebook an=
d Twitter. Don't worry, if it happened
 to you, you're not the only one. The Associated Press, Burger King and The=
 Onion have all recently had their Twitter accounts hacked. Various celebri=
ties have had their Facebook accounts hijacked. They are then used to sprea=
d misinformation or to post links
 that lead to malware.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Twitter recently impleme=
nted two-factor authentication to crack down on the problem. No word yet on=
 whether Facebook will follow suit. Facebook does offer something called
<a href=3D"https://www.facebook.com/help/www/148233965247823">Login Approva=
ls</a>, its version of two-factor authentication, to protect users from tak=
eover attempts of their account.&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">To learn more on protect=
ing accounts and preventing scams, go to the companies' security guidelines=
 pages:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<ul>
<li style=3D"margin: 0px; font-family: Helvetica; "><a href=3D"https://www.=
facebook.com/about/security">Security on Facebook</a> and
<a href=3D"https://www.facebook.com/help/www/131719720300233/">Desktop Help=
/Security</a> (Facebook)
</li><li style=3D"margin: 0px; font-family: Helvetica; "><a href=3D"https:/=
/support.twitter.com/articles/76036-keeping-your-account-secure">Safe Tweet=
ing</a> (Twitter)
</li></ul>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
---------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">3. Event: Security Camp =
@ BU on August 22nd</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
---------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Boston University will o=
nce again be hosting the free, one-day Security Camp conference. The date i=
s Thursday, August 22, 2013. Please mark your calendars if interested.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">This conference is for s=
ystem, network, and security administrators and security managers. The goal=
 is to provide a forum where these staff in higher education can share and =
benefit from collective experiences.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">More information on Secu=
rity Camp at Boston University is
<a href=3D"http://www.bu.edu/tech/security/services/security-events-trainin=
g/camp/">
here</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Arial; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p=
>
<p style=3D"margin: 0px; font-family: Arial; ">Read all Security FYI Newsle=
tter articles and submit comments&nbsp;online&nbsp;at
<a href=3D"http://securityfyi.wordpress.com/">http://securityfyi.wordpress.=
com/</a>.</p>
<p style=3D"margin: 0px; font-family: Arial; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p=
>
</div>
<div><span class=3D"Apple-style-span" style=3D"border-collapse: separate; f=
ont-family: Calibri; font-size: medium; border-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacing: 0=
px; font-family: Helvetica; font-size: 14px; ">
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; border=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
 separate; border-spacing: 0px; "><span class=3D"Apple-style-span" style=3D=
"border-collapse: separate; border-spacing: 0px; "><span class=3D"Apple-sty=
le-span" style=3D"border-collapse: separate; border-spacing: 0px; "><span c=
lass=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacin=
g: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separa=
te; border-spacing: 0px; font-size: 12px; ">
<div><br>
</div>
<div>Monique Yeaton</div>
<div>IT Security Communications Consultant</div>
<div>MIT Information Services &amp; Technology (IS&amp;T)</div>
<div>(617) 253-2715</div>
<div>http://ist.mit.edu/security</div>
<div><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></div>
</span></span></div>
</body>
</html>

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F2F35FDCCOC11EXPO24excha_--

--===============1191010146==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============1191010146==--

home help back first fref pref prev next nref lref last post