[8240] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, November 4, 2013
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Nov 4 16:09:20 2013
Resent-From: ist-security-fyi@mit.edu
From: Monique Yeaton <myeaton@mit.edu>
To: ist-security-fyi <ist-security-fyi@mit.edu>
Date: Mon, 4 Nov 2013 21:06:59 +0000
Message-ID: <3ACED3B2A8CEFB4598A845F07FD4A05F3AA0FFF9@OC11EXPO24.exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============1158005467=="
Errors-To: ist-security-fyi-bounces@mit.edu
--===============1158005467==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AA0FFF9OC11EXPO24excha_"
--_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AA0FFF9OC11EXPO24excha_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. Results of the 'Securing the Human' Prize Giveaway
2. EVENT: Laptop Tagging & Registration, Nov. 6
3. Monthly Sophos Reports
-------------------------------------------------------------------------
1. Results of the 'Securing the Human' Prize Giveaway
-------------------------------------------------------------------------
The prize giveaway contest for attendees of the MIT 'Securing the Human' on=
line courses has ended, as of noon today (November 4, 2013).
I am happy to announce that we had three winners, selected from the attende=
es who completed all 5 courses.
1st prize: Carol A. Roberts
2nd prize: Charles J. Hale
3rd prize: Gregory Torrales, Jr.
Thank you to all who have been taking the time to attend the online courses=
. Please pass along their availability to your MIT colleagues. If you have =
not yet taken the courses, they are free and available to anyone with an MI=
T web certificate.
Links and descriptions of the courses are posted here<http://kb.mit.edu/con=
fluence/x/bB4YCQ>.
------------------------------------------------------------------
2. EVENT: Laptop Tagging & Registration, Nov. 6
------------------------------------------------------------------
This Wednesday, there is an opportunity to register and tag your laptop:
Where: Lobby of Building 10
When: November 6, 11:00 am - 12:30 pm
Cost: $10 cash only or MIT Cash Object
Just as you might register a bike with the police, you can also register yo=
ur laptop. Information Services & Technology partners with MIT Police to pr=
ovide STOP tags for laptops. The tag is affixed to the device, has a unique=
number, and is registered with a world-wide database.
Sgt. Cheryl Vossmer of the MIT Police says that although a STOP tag is not =
software that can track a device via GPS or other means, it has been very e=
ffective at providing a way for lost or stolen laptops to be returned to th=
eir rightful owners.
For example, a laptop that was stolen from a MIT student last year turned u=
p at a Boston homeless shelter. When one of the residents of the shelter tr=
ied to sell the laptop to another resident, a person working at the shelter=
noticed and intervened. He called the number on the STOP tag that was atta=
ched to the laptop. The owner was eventually tracked down via the MIT Polic=
e. When he got the call from the police, he was surprised; he thought the l=
aptop was gone forever.
Read more laptop recovery stories here<https://www.stoptheft.com/>.
Learn more about laptop registration at MIT<http://kb.mit.edu/confluence/di=
splay/istcontrib/MIT+Police+Laptop+Tagging+and+Registration>.
-------------------------------------
3. Monthly Sophos Reports
-------------------------------------
Each month, IS&T is able to track via Sophos Anti-Virus the top 10 most dan=
gerous malware that is accessing or trying to access the computers on the M=
IT network.
Learn more about the monthly Sophos reports<http://kb.mit.edu/confluence/x/=
7SkYCQ>, what they can tell us, and how they can help us.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Coordinator
Information Services & Technology, MIT
617.253.2715
www.ist.mit.edu/security
--_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AA0FFF9OC11EXPO24excha_
Content-Type: text/html; charset="us-ascii"
Content-ID: <A72D3CF799761B4DAC2F7A042394402D@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif; ">
<div>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; ">In thi=
s issue:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1. Results of the 'Secur=
ing the Human' Prize Giveaway</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2. EVENT: Laptop Tagging=
& Registration, Nov. 6</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">3. Monthly Sophos Report=
s</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1. Results of the 'Secur=
ing the Human' Prize Giveaway</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">The prize giveaway conte=
st for attendees of the MIT 'Securing the Human' online courses has ended, =
as of noon today (November 4, 2013). </p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">I am happy to announce t=
hat we had three winners, selected from the attendees who completed all 5 c=
ourses.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1st prize: Carol A. Robe=
rts</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2nd prize: Charles J. Ha=
le</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">3rd prize: Gregory Torra=
les, Jr.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Thank you to all who hav=
e been taking the time to attend the online courses. Please pass along thei=
r availability to your MIT colleagues. If you have not yet taken the course=
s, they are free and available to
anyone with an MIT web certificate. </p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; "><a href=3D"http://kb.mit=
.edu/confluence/x/bB4YCQ">Links and descriptions of the courses are posted =
here</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2. EVENT: Laptop Tagging=
& Registration, Nov. 6</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">This Wednesday, there is=
an opportunity to register and tag your laptop:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Where: Lobby of Building=
10</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">When: November 6, 11:00 =
am - 12:30 pm</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Cost: $10 cash only or M=
IT Cash Object</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Just as you might regist=
er a bike with the police, you can also register your laptop. Information S=
ervices & Technology partners with MIT Police to provide STOP tags for =
laptops. The tag is affixed to the device,
has a unique number, and is registered with a world-wide database.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Sgt. Cheryl Vossmer of t=
he MIT Police says that although a STOP tag is not software that can track =
a device via GPS or other means, it has been very effective at providing a =
way for lost or stolen laptops to
be returned to their rightful owners.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">For example, a laptop th=
at was stolen from a MIT student last year turned up at a Boston homeless s=
helter. When one of the residents of the shelter tried to sell the laptop t=
o another resident, a person working
at the shelter noticed and intervened. He called the number on the STOP ta=
g that was attached to the laptop. The owner was eventually tracked down vi=
a the MIT Police. When he got the call from the police, he was surprised; h=
e thought the laptop was gone forever.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; color: rgb(4, 46, 238); ">=
<span style=3D"color: #000000">Read more
<a href=3D"https://www.stoptheft.com/">laptop recovery stories here</a>.</s=
pan></p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; color: rgb(4, 46, 238); ">=
<span style=3D"text-decoration: underline"><a href=3D"http://kb.mit.edu/con=
fluence/display/istcontrib/MIT+Police+Laptop+Tagging+and=
3;Registration">Learn more about laptop registration at MIT</a></span><span=
style=3D"color: #000000">.</span></p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">3. Monthly Sophos Report=
s</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Each month, IS&T is =
able to track via Sophos Anti-Virus the top 10 most dangerous malware that =
is accessing or trying to access the computers on the MIT network.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Learn more about the <a =
href=3D"http://kb.mit.edu/confluence/x/7SkYCQ">
monthly Sophos reports</a>, what they can tell us, and how they can help us=
.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Read all Security FYI Ne=
wsletter articles and submit comments online at
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"color: rgb(4, =
46, 238); ">http://securityfyi.wordpress.com/</span></a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
</p>
</div>
<div>
<div>
<div><font class=3D"Apple-style-span" color=3D"#000000"><font class=3D"Appl=
e-style-span" face=3D"Calibri"><br>
</font></font></div>
<div><font class=3D"Apple-style-span" color=3D"#000000"><font class=3D"Appl=
e-style-span" face=3D"Calibri"><br>
</font></font></div>
<div><font class=3D"Apple-style-span" color=3D"#000000"><font class=3D"Appl=
e-style-span" face=3D"Calibri">Monique Yeaton</font></font></div>
<div><font class=3D"Apple-style-span" color=3D"#000000"><font class=3D"Appl=
e-style-span" face=3D"Calibri">IT Security Communications Coordinator</font=
></font></div>
<div><font class=3D"Apple-style-span" color=3D"#000000"><font class=3D"Appl=
e-style-span" face=3D"Calibri">Information Services & Technology, MIT</=
font></font></div>
<div>617.253.2715</div>
<div>www.ist.mit.edu/security</div>
</div>
</div>
</body>
</html>
--_000_3ACED3B2A8CEFB4598A845F07FD4A05F3AA0FFF9OC11EXPO24excha_--
--===============1158005467==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============1158005467==--