<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; Uncategorized</title>
	<atom:link href="http://securitywandering.com/?cat=1&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Windows zero-day exploit used in targeted attacks by FruityArmor APT</title>
		<link>http://securitywandering.com/?p=642</link>
		<comments>http://securitywandering.com/?p=642#comments</comments>
		<pubDate>Fri, 21 Oct 2016 15:55:54 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=642</guid>
		<description><![CDATA[<p>Windows zero-day exploit used in targeted attacks by FruityArmor APT: &#8220; A few days ago, Microsoft published the ‘critical’ MS16-120 security bulletin with fixes for vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, Silverlight and Microsoft Lync. One of the vulnerabilities &#8211; CVE-2016-3393 &#8211; was reported to Microsoft by Kaspersky Lab in September 2016. [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=642">Windows zero-day exploit used in targeted attacks by FruityArmor APT</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="https://securelist.com/blog/research/76396/windows-zero-day-exploit-used-in-targeted-attacks-by-fruityarmor-apt/">Windows zero-day exploit used in targeted attacks by FruityArmor APT</a>: &#8220;</p>
<p><img class="attachment-post-thumbnail wp-post-image no-image" src="https://securelist.com/wp-content/themes/securelist/images/article-default/abstraction_2.jpg" alt="no-image" width="400" height="280" /></p>
<p>A few days ago, Microsoft published the ‘critical’ <a href="https://technet.microsoft.com/en-us/library/security/ms16-120.aspx" target="_blank">MS16-120 security bulletin</a> with fixes for vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, Silverlight and Microsoft Lync.</p>
<p>One of the vulnerabilities &#8211; CVE-2016-3393 &#8211; was reported to Microsoft by Kaspersky Lab in September 2016.</p>
<p><a class="magnificImage" href="https://securelist.com/files/2016/10/fruity_armor_01.png"><img class="aligncenter size-large wp-image-76399" src="https://securelist.com/files/2016/10/fruity_armor_01-1024x276.png" alt="fruity_armor_01" width="604" height="163" /></a></p>
<p>Here’s a bit of background on how this zero-day was discovered. A few of months ago, we deployed a new set of technologies in our products to identify and block zero-day attacks. These technologies proved their effectiveness earlier this year, when we discovered two <a href="https://securelist.com/blog/research/73255/the-mysterious-case-of-cve-2016-0034-the-hunt-for-a-microsoft-silverlight-0-day/" target="_blank">Adobe Flash zero-day exploits</a> &#8211; CVE-2016-1010 and CVE-2016-4171. Two Windows EoP exploits have also been found with the help of this technology. One is CVE-2016-0165. The other is CVE-2016-3393.</p>
<p>Like most zero-day exploits found in the wild today, CVE-2016-3393 is used by an APT group we call <strong>FruityArmor</strong>. FruityArmor is perhaps a bit unusual due to the fact that it leverages an attack platform that is built entirely around PowerShell. The group’s primary malware implant is written in PowerShell and all commands from the operators are also sent in the form of PowerShell scripts.</p>
<p>In this report we describe the vulnerability that was used by this group to elevate privileges on a victim’s machine. Please keep in mind that we will not be publishing all the details about this vulnerability because of the risk that other threat actors may use them in their attacks.</p>
<h1 id="attack-chain-description">Attack chain description</h1>
<p>To achieve remote code execution on a victim’s machine, FruityArmor normally relies on a browser exploit. Since many modern browsers are built around sandboxes, a single exploit is generally not sufficient to allow full access to a targeted machine. Most of the recent attacks we’ve seen that rely on a browser exploit are combined with an EoP exploit, which allows for a reliable sandbox escape.</p>
<p>In the case of FruityArmor, the initial browser exploitation is always followed by an EoP exploit. This comes in the form of a module, which runs directly in memory. The main goal of this module is to unpack a specially crafted TTF font containing the CVE-2016-3393 exploit. After unpacking, the module directly loads the code exploit from memory with the help of AddFontMemResourceEx. After successfully leveraging CVE-2016-3393, a second stage payload is executed with higher privileges to execute PowerShell with a meterpreter-style script that connects to the C&amp;C.</p>
<h1 id="eop-zero-day-details">EOP zero-day details</h1>
<p>The vulnerability is located in the <strong>cjComputeGLYPHSET_MSFT_GENERAL</strong> function from the Win32k.sys system module. This function parses the cmap table and fills internal structures. The CMAP structure looks like this:</p>
<p><a class="magnificImage" href="https://securelist.com/files/2016/10/fruity_armor_02.png"><img class="aligncenter size-full wp-image-76400" src="https://securelist.com/files/2016/10/fruity_armor_02.png" alt="fruity_armor_02" width="566" height="265" /></a></p>
<p>The most interesting parts of this structure are two arrays &#8211; endCount and startCount. The exploit contains the next cmap table with segments:</p>
<p><a class="magnificImage" href="https://securelist.com/files/2016/10/fruity_armor_03.png"><img class="aligncenter size-full wp-image-76401" src="https://securelist.com/files/2016/10/fruity_armor_03.png" alt="fruity_armor_03" width="624" height="613" /></a></p>
<p>To compute how much memory to allocate to internal structures, the function executes this code:</p>
<p><a class="magnificImage" href="https://securelist.com/files/2016/10/fruity_armor_04.png"><img class="aligncenter size-full wp-image-76402" src="https://securelist.com/files/2016/10/fruity_armor_04.png" alt="fruity_armor_04" width="364" height="77" /></a></p>
<p>After computing this number, the function allocates memory for structures in the following way:</p>
<p><a class="magnificImage" href="https://securelist.com/files/2016/10/fruity_armor_05.png"><img class="aligncenter size-full wp-image-76403" src="https://securelist.com/files/2016/10/fruity_armor_05.png" alt="fruity_armor_05" width="623" height="79" /></a></p>
<p>The problem is that if we compute the entire table, we will achieve an integer overflow and the <strong>cnt</strong> variable will contain an incorrect value.</p>
<p>In kernel, we see the following picture:</p>
<p><a class="magnificImage" href="https://securelist.com/files/2016/10/fruity_armor_06.png"><img class="aligncenter size-full wp-image-76404" src="https://securelist.com/files/2016/10/fruity_armor_06.png" alt="fruity_armor_06" width="623" height="226" /></a></p>
<p>The code allocates memory only for 0x18 InternalStruct but then there is a loop for all the segments range (this value was extracted from the file directly):</p>
<p><a class="magnificImage" href="https://securelist.com/files/2016/10/fruity_armor_07.png"><img class="aligncenter size-full wp-image-76405" src="https://securelist.com/files/2016/10/fruity_armor_07.png" alt="fruity_armor_07" width="624" height="458" /></a></p>
<p>Using the cmap table, the v44 variable (index) could be controlled and, as a result, we get memory corruption. To achieve it, the attacker can do the following:</p>
<ol>
<li>Make an integer overflow in <strong>win32k!cjComputeGLYPHSET_MSFT_GENERAL</strong></li>
<li>Make a specific segment ranges in font file to access interesting memory.</li>
</ol>
<p>What about Windows 10? As most of you know, the font processing in Windows 10 is performed in a special user mode process with restricted privileges. This is a very good solution but the code has the same bug in the TTF processing.</p>
<p><a class="magnificImage" href="https://securelist.com/files/2016/10/fruity_armor_08.png"><img class="aligncenter size-full wp-image-76406" src="https://securelist.com/files/2016/10/fruity_armor_08.png" alt="fruity_armor_08" width="376" height="205" /></a></p>
<p>As a result, if you load/open this font exploit in Windows 10, you will see the crash of fontdrvhost.exe:</p>
<p><a class="magnificImage" href="https://securelist.com/files/2016/10/fruity_armor_09.png"><img class="aligncenter size-full wp-image-76407" src="https://securelist.com/files/2016/10/fruity_armor_09.png" alt="fruity_armor_09" width="481" height="280" /></a></p>
<p>Kaspersky Lab detects this exploit as:</p>
<ul>
<li>HEUR:Exploit.Win32.Generic</li>
<li>PDM:Exploit.Win32.Generic</li>
</ul>
<p>We would like to thank Microsoft for their swift response in closing this security hole.</p>
<p><em>* More information about the FruityArmor APT group is available to customers of Kaspersky Intelligence Services. Contact: intelreports@kaspersky.com</em></p>
<p><a href="https://kas.pr/APT_reporting_SL_text_button" target="_blank"><img class="aligncenter size-full wp-image-73094" src="https://securelist.com/files/2015/11/640x60_apt_subscribe_banner.png" alt="Subscribe now For Kaspersky Lab's APT Intelligence Reports" width="640" height="60" /></a></p>
<p>&#8220;</p>
<p>(Via.)</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=642">Windows zero-day exploit used in targeted attacks by FruityArmor APT</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=642</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Subpoena for Signal Messaging Data Renders Little &#124; Threatpost &#124; The first stop for security news</title>
		<link>http://securitywandering.com/?p=640</link>
		<comments>http://securitywandering.com/?p=640#comments</comments>
		<pubDate>Wed, 05 Oct 2016 18:50:11 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=640</guid>
		<description><![CDATA[<p>Over on the post &#8220;Subpoena for Signal Messaging Data Renders Little &#124; Threatpost &#124; The first stop for security news&#8221; contains this text: &#8220;&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=640">Subpoena for Signal Messaging Data Renders Little | Threatpost | The first stop for security news</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="https://threatpost.com/subpoena-for-signal-messaging-data-renders-little/121081/">Subpoena for Signal Messaging Data Renders Little | Threatpost | The first stop for security news</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=640">Subpoena for Signal Messaging Data Renders Little | Threatpost | The first stop for security news</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=640</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Yahoo Slams Email Surveillance Story: Experts Demand Details &#124; Threatpost &#124; The first stop for security news</title>
		<link>http://securitywandering.com/?p=638</link>
		<comments>http://securitywandering.com/?p=638#comments</comments>
		<pubDate>Wed, 05 Oct 2016 18:49:00 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=638</guid>
		<description><![CDATA[<p>Over on the post &#8220;Yahoo Slams Email Surveillance Story: Experts Demand Details &#124; Threatpost &#124; The first stop for security news&#8221; contains this text: &#8220;&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=638">Yahoo Slams Email Surveillance Story: Experts Demand Details | Threatpost | The first stop for security news</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="https://threatpost.com/yahoo-slams-email-surveillance-story-experts-demand-details/121100/">Yahoo Slams Email Surveillance Story: Experts Demand Details | Threatpost | The first stop for security news</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=638">Yahoo Slams Email Surveillance Story: Experts Demand Details | Threatpost | The first stop for security news</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=638</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Who Makes the IoT Things Under Attack? — Krebs on Security</title>
		<link>http://securitywandering.com/?p=636</link>
		<comments>http://securitywandering.com/?p=636#comments</comments>
		<pubDate>Wed, 05 Oct 2016 18:46:57 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=636</guid>
		<description><![CDATA[<p>Over on the post &#8220;Who Makes the IoT Things Under Attack? — Krebs on Security&#8221; contains this text: &#8220;&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=636">Who Makes the IoT Things Under Attack? — Krebs on Security</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack/">Who Makes the IoT Things Under Attack? — Krebs on Security</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=636">Who Makes the IoT Things Under Attack? — Krebs on Security</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=636</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>InfoSec Handlers Diary Blog &#8211; The era of big DDOS?</title>
		<link>http://securitywandering.com/?p=634</link>
		<comments>http://securitywandering.com/?p=634#comments</comments>
		<pubDate>Sat, 24 Sep 2016 19:26:28 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=634</guid>
		<description><![CDATA[<p>Over on the post &#8220;InfoSec Handlers Diary Blog &#8211; The era of big DDOS?&#8221; contains this text: &#8220;&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=634">InfoSec Handlers Diary Blog &#8211; The era of big DDOS?</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="https://isc.sans.edu/diary/The+era+of+big+DDOS%3F/21511">InfoSec Handlers Diary Blog &#8211; The era of big DDOS?</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=634">InfoSec Handlers Diary Blog &#8211; The era of big DDOS?</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=634</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Repercussions of the massive Yahoo breach &#8211; Help Net Security</title>
		<link>http://securitywandering.com/?p=632</link>
		<comments>http://securitywandering.com/?p=632#comments</comments>
		<pubDate>Sat, 24 Sep 2016 19:23:11 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=632</guid>
		<description><![CDATA[<p>Over on the post &#8220;Repercussions of the massive Yahoo breach &#8211; Help Net Security&#8221; contains this text: &#8220;&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=632">Repercussions of the massive Yahoo breach &#8211; Help Net Security</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="https://www.helpnetsecurity.com/2016/09/23/repercussions-massive-yahoo-breach/">Repercussions of the massive Yahoo breach &#8211; Help Net Security</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=632">Repercussions of the massive Yahoo breach &#8211; Help Net Security</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=632</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Big Email Hack Doesn&#8217;t Exactly Send the Message Yahoo Needed &#124; Enterprise Security Today</title>
		<link>http://securitywandering.com/?p=630</link>
		<comments>http://securitywandering.com/?p=630#comments</comments>
		<pubDate>Sat, 24 Sep 2016 19:21:59 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=630</guid>
		<description><![CDATA[<p>Over on the post &#8220;Big Email Hack Doesn&#8217;t Exactly Send the Message Yahoo Needed &#124; Enterprise Security Today&#8221; contains this text: &#8220;&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=630">Big Email Hack Doesn&#8217;t Exactly Send the Message Yahoo Needed | Enterprise Security Today</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://www.enterprise-security-today.com/story.xhtml?story_id=103171">Big Email Hack Doesn&#8217;t Exactly Send the Message Yahoo Needed | Enterprise Security Today</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=630">Big Email Hack Doesn&#8217;t Exactly Send the Message Yahoo Needed | Enterprise Security Today</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=630</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Dancho Danchev&#8217;s Blog &#8211; Mind Streams of Information Security Knowledge: New Mobile Malware Hits Google Play, Hundreds of Users Affected</title>
		<link>http://securitywandering.com/?p=628</link>
		<comments>http://securitywandering.com/?p=628#comments</comments>
		<pubDate>Sat, 24 Sep 2016 19:21:07 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=628</guid>
		<description><![CDATA[<p>Over on the post &#8220;Dancho Danchev&#8217;s Blog &#8211; Mind Streams of Information Security Knowledge: New Mobile Malware Hits Google Play, Hundreds of Users Affected&#8221; contains this text: &#8220;&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=628">Dancho Danchev&#8217;s Blog &#8211; Mind Streams of Information Security Knowledge: New Mobile Malware Hits Google Play, Hundreds of Users Affected</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://ddanchev.blogspot.com/2016/09/new-mobile-malware-hits-google-play.html?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+DanchoDanchevOnSecurityAndNewMedia+%28Dancho+Danchev+-+Mind+Streams+of+Information+Security+Knowledge%21%29">Dancho Danchev&#8217;s Blog &#8211; Mind Streams of Information Security Knowledge: New Mobile Malware Hits Google Play, Hundreds of Users Affected</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=628">Dancho Danchev&#8217;s Blog &#8211; Mind Streams of Information Security Knowledge: New Mobile Malware Hits Google Play, Hundreds of Users Affected</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=628</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Before You Connect a New Computer to the Internet</title>
		<link>http://securitywandering.com/?p=626</link>
		<comments>http://securitywandering.com/?p=626#comments</comments>
		<pubDate>Sat, 24 Sep 2016 19:20:20 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=626</guid>
		<description><![CDATA[<p>Over on the post &#8220;Before You Connect a New Computer to the Internet&#8221; contains this text: &#8220;&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=626">Before You Connect a New Computer to the Internet</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="https://www.us-cert.gov/ncas/tips/ST15-003">Before You Connect a New Computer to the Internet</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=626">Before You Connect a New Computer to the Internet</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=626</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Yahoo hack hits 500 million users, but who are the suspects? &#8211; BBC Newsbeat</title>
		<link>http://securitywandering.com/?p=624</link>
		<comments>http://securitywandering.com/?p=624#comments</comments>
		<pubDate>Sat, 24 Sep 2016 19:17:42 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=624</guid>
		<description><![CDATA[<p>Over on the post &#8220;Yahoo hack hits 500 million users, but who are the suspects? &#8211; BBC Newsbeat&#8221; contains this text: &#8220;&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=624">Yahoo hack hits 500 million users, but who are the suspects? &#8211; BBC Newsbeat</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://www.bbc.co.uk/newsbeat/article/37449726/yahoo-hack-hits-500-million-users-but-who-are-the-suspects">Yahoo hack hits 500 million users, but who are the suspects? &#8211; BBC Newsbeat</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=624">Yahoo hack hits 500 million users, but who are the suspects? &#8211; BBC Newsbeat</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=624</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
