[IS&T Security-FYI] Newsletter, July 25, 2008
Monique Yeaton
myeaton at MIT.EDU
Fri Jul 25 10:20:55 EDT 2008
!! Happy System Administrator Appreciation Day <http://www.sysadminday.com/
> !!
In this issue:
1. PHISHING WARNING: E-mail Allegedly from UPS Contains Virus
2. Five Easy Ways to Compromise Your Own Security
3. Misused SSNs are Not a New Phenomenon
-------------------------------------------------------------------------------------
1. PHISHING WARNING: E-mail Allegedly from UPS Contains Virus
-------------------------------------------------------------------------------------
Here is an example of how a virus is sent from a normally trusted
source. An e-mail informing recipients that they have a package that
the United Parcel Service could not deliver is actually a new computer
virus, company officials said.
The e-mail that appears to come from UPS contains an attachment that
recipients are told to open in order to make arrangements to pick up
their shipment. The attachment is actually a computer virus. UPS said
it may send official notification messages on occasion, but they
rarely contain attachments. For questions about shipments or the
authenticity of e-mails, UPS customers are asked to send and e-mail to customerservice at ups.com
.
IS&T at MIT has already been contacted by users whose computers were
infected by the virus after opening the attachment. These computers
had VirusScan installed but didn't have the definitions updated.
The email will look similar to this:
=======================
From: UPS Packet Service
Subject: UPS Packet N0328795951
Dear Sir/Madam,
Unfortunately we were not able to deliver postal package you sent on
July the 1st in time because the recipient's address is not correct.
Please print out the invoice copy attached and collect the package at
our office.
Your UPS Agent
Attachment included: invoice.zip
========================
Anybody who receives such an e-mail should delete it immediately. It
is also best practice to not open attachments you are not expecting.
To verify where an email originated from, a recipient can check the
full mail header. More information on full mail headers can be found
here: <http://web.mit.edu/stopit/fullheaders.html>
If you are an MIT computer user needing help, contact computing-help at mit.edu
.
More information on the virus can be found here:
<http://www.ups.com/content/us/en/about/news/service_updates/virus_us.html
>
--------------------------------------------------------------------
2. Five Easy Ways to Compromise Your Own Security
--------------------------------------------------------------------
Maybe you’ve effectively secured your IT resources against malicious
security crackers, as much as reasonably possible. Perhaps it’s even
secured against “acts of God.” There’s always at least one more
danger: the danger that you’ll accidentally compromise security
yourself.
There’s no way to compile a comprehensive list of all the ways you
might let a well-protected system’s security slip through your
fingers, of course. The kind of mistakes you can make are innumerable.
The following list offers just a few all too common examples of how
security is accidentally compromised from within, by someone
somewhere, every day in this world.
Read full article here: <http://blogs.techrepublic.com.com/security/?p=494&tag=nl.e036
>
----------------------------------------------------------
3. Misused SSNs are Not a New Phenomenon
----------------------------------------------------------
Here's an interesting tidbit of information. It goes to show that
misusing Social Security numbers (SSNs) are not a phenomenon new to
the digital age.
The most misused SSN of all time was 078-05-1120. In 1938, wallet
manufacturer the E. H. Ferree company in Lockport, New York decided to
promote its product by showing how a Social Security card would fit
into its wallets. A sample card, used for display purposes, was
inserted in each wallet. Company Vice President and Treasurer Douglas
Patterson thought it would be a clever idea to use the actual SSN of
his secretary, Mrs. Hilda Schrader Whitcher.
The wallet was sold by Woolworth stores and other department stores
all over the country. Even though the card was only half the size of a
real card, was printed all in red, and had the word "specimen" written
across the face, many purchasers of the wallet adopted the SSN as
their own. In the peak year of 1943, 5,755 people were using Hilda's
number.
Read full article here: <http://www.socialsecurity.gov/history/ssn/misused.html
>
=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security
More information about the ist-security-fyi
mailing list