[8240] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, November 4, 2013

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Nov 4 16:09:20 2013

Resent-From: ist-security-fyi@mit.edu
From: Monique Yeaton <myeaton@mit.edu>
To: ist-security-fyi <ist-security-fyi@mit.edu>
Date: Mon, 4 Nov 2013 21:06:59 +0000
Message-ID: <3ACED3B2A8CEFB4598A845F07FD4A05F3AA0FFF9@OC11EXPO24.exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============1158005467=="
Errors-To: ist-security-fyi-bounces@mit.edu

--===============1158005467==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AA0FFF9OC11EXPO24excha_"

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AA0FFF9OC11EXPO24excha_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

In this issue:


1. Results of the 'Securing the Human' Prize Giveaway

2. EVENT: Laptop Tagging & Registration, Nov. 6

3. Monthly Sophos Reports



-------------------------------------------------------------------------

1. Results of the 'Securing the Human' Prize Giveaway

-------------------------------------------------------------------------


The prize giveaway contest for attendees of the MIT 'Securing the Human' on=
line courses has ended, as of noon today (November 4, 2013).


I am happy to announce that we had three winners, selected from the attende=
es who completed all 5 courses.


1st prize: Carol A. Roberts

2nd prize: Charles J. Hale

3rd prize: Gregory Torrales, Jr.


Thank you to all who have been taking the time to attend the online courses=
. Please pass along their availability to your MIT colleagues. If you have =
not yet taken the courses, they are free and available to anyone with an MI=
T web certificate.


Links and descriptions of the courses are posted here<http://kb.mit.edu/con=
fluence/x/bB4YCQ>.



------------------------------------------------------------------

2. EVENT: Laptop Tagging & Registration, Nov. 6

------------------------------------------------------------------


This Wednesday, there is an opportunity to register and tag your laptop:


Where: Lobby of Building 10

When: November 6, 11:00 am - 12:30 pm


Cost: $10 cash only or MIT Cash Object


Just as you might register a bike with the police, you can also register yo=
ur laptop. Information Services & Technology partners with MIT Police to pr=
ovide STOP tags for laptops. The tag is affixed to the device, has a unique=
 number, and is registered with a world-wide database.


Sgt. Cheryl Vossmer of the MIT Police says that although a STOP tag is not =
software that can track a device via GPS or other means, it has been very e=
ffective at providing a way for lost or stolen laptops to be returned to th=
eir rightful owners.


For example, a laptop that was stolen from a MIT student last year turned u=
p at a Boston homeless shelter. When one of the residents of the shelter tr=
ied to sell the laptop to another resident, a person working at the shelter=
 noticed and intervened. He called the number on the STOP tag that was atta=
ched to the laptop. The owner was eventually tracked down via the MIT Polic=
e. When he got the call from the police, he was surprised; he thought the l=
aptop was gone forever.


Read more laptop recovery stories here<https://www.stoptheft.com/>.


Learn more about laptop registration at MIT<http://kb.mit.edu/confluence/di=
splay/istcontrib/MIT+Police+Laptop+Tagging+and+Registration>.



-------------------------------------

3. Monthly Sophos Reports

-------------------------------------


Each month, IS&T is able to track via Sophos Anti-Virus the top 10 most dan=
gerous malware that is accessing or trying to access the computers on the M=
IT network.


Learn more about the monthly Sophos reports<http://kb.mit.edu/confluence/x/=
7SkYCQ>, what they can tell us, and how they can help us.



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D


Monique Yeaton
IT Security Communications Coordinator
Information Services & Technology, MIT
617.253.2715
www.ist.mit.edu/security

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AA0FFF9OC11EXPO24excha_
Content-Type: text/html; charset="us-ascii"
Content-ID: <A72D3CF799761B4DAC2F7A042394402D@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif; ">
<div>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; ">In thi=
s issue:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1. Results of the 'Secur=
ing the Human' Prize Giveaway</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2. EVENT: Laptop Tagging=
 &amp; Registration, Nov. 6</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">3. Monthly Sophos Report=
s</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1. Results of the 'Secur=
ing the Human' Prize Giveaway</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">The prize giveaway conte=
st for attendees of the MIT 'Securing the Human' online courses has ended, =
as of noon today (November 4, 2013).&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">I am happy to announce t=
hat we had three winners, selected from the attendees who completed all 5 c=
ourses.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1st prize: Carol A. Robe=
rts</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2nd prize: Charles J. Ha=
le</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">3rd prize: Gregory Torra=
les, Jr.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Thank you to all who hav=
e been taking the time to attend the online courses. Please pass along thei=
r availability to your MIT colleagues. If you have not yet taken the course=
s, they are free and available to
 anyone with an MIT web certificate.&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; "><a href=3D"http://kb.mit=
.edu/confluence/x/bB4YCQ">Links and descriptions of the courses are posted =
here</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2. EVENT: Laptop Tagging=
 &amp; Registration, Nov. 6</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">This Wednesday, there is=
 an opportunity to register and tag your laptop:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Where: Lobby of Building=
 10</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">When: November 6, 11:00 =
am - 12:30 pm</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Cost: $10 cash only or M=
IT Cash Object</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Just as you might regist=
er a bike with the police, you can also register your laptop. Information S=
ervices &amp; Technology partners with MIT Police to provide STOP tags for =
laptops. The tag is affixed to the device,
 has a unique number, and is registered with a world-wide database.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Sgt. Cheryl Vossmer of t=
he MIT Police says that although a STOP tag is not software that can track =
a device via GPS or other means, it has been very effective at providing a =
way for lost or stolen laptops to
 be returned to their rightful owners.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">For example, a laptop th=
at was stolen from a MIT student last year turned up at a Boston homeless s=
helter. When one of the residents of the shelter tried to sell the laptop t=
o another resident, a person working
 at the shelter noticed and intervened. He called the number on the STOP ta=
g that was attached to the laptop. The owner was eventually tracked down vi=
a the MIT Police. When he got the call from the police, he was surprised; h=
e thought the laptop was gone forever.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; color: rgb(4, 46, 238); ">=
<span style=3D"color: #000000">Read more
<a href=3D"https://www.stoptheft.com/">laptop recovery stories here</a>.</s=
pan></p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; color: rgb(4, 46, 238); ">=
<span style=3D"text-decoration: underline"><a href=3D"http://kb.mit.edu/con=
fluence/display/istcontrib/MIT&#43;Police&#43;Laptop&#43;Tagging&#43;and&#4=
3;Registration">Learn more about laptop registration at MIT</a></span><span=
 style=3D"color: #000000">.</span></p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">3. Monthly Sophos Report=
s</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Each month, IS&amp;T is =
able to track via Sophos Anti-Virus the top 10 most dangerous malware that =
is accessing or trying to access the computers on the MIT network.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Learn more about the <a =
href=3D"http://kb.mit.edu/confluence/x/7SkYCQ">
monthly Sophos reports</a>, what they can tell us, and how they can help us=
.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Read all Security FYI Ne=
wsletter articles and submit comments&nbsp;online&nbsp;at
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"color: rgb(4, =
46, 238); ">http://securityfyi.wordpress.com/</span></a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
</p>
</div>
<div>
<div>
<div><font class=3D"Apple-style-span" color=3D"#000000"><font class=3D"Appl=
e-style-span" face=3D"Calibri"><br>
</font></font></div>
<div><font class=3D"Apple-style-span" color=3D"#000000"><font class=3D"Appl=
e-style-span" face=3D"Calibri"><br>
</font></font></div>
<div><font class=3D"Apple-style-span" color=3D"#000000"><font class=3D"Appl=
e-style-span" face=3D"Calibri">Monique Yeaton</font></font></div>
<div><font class=3D"Apple-style-span" color=3D"#000000"><font class=3D"Appl=
e-style-span" face=3D"Calibri">IT Security Communications Coordinator</font=
></font></div>
<div><font class=3D"Apple-style-span" color=3D"#000000"><font class=3D"Appl=
e-style-span" face=3D"Calibri">Information Services &amp; Technology, MIT</=
font></font></div>
<div>617.253.2715</div>
<div>www.ist.mit.edu/security</div>
</div>
</div>
</body>
</html>

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AA0FFF9OC11EXPO24excha_--

--===============1158005467==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============1158005467==--

home help back first fref pref prev next nref lref last post