<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; Staying off the grid</title>
	<atom:link href="http://securitywandering.com/?cat=15&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</title>
		<link>http://securitywandering.com/?p=512</link>
		<comments>http://securitywandering.com/?p=512#comments</comments>
		<pubDate>Thu, 31 Oct 2013 21:16:56 +0000</pubDate>
		<dc:creator><![CDATA[lxc152]]></dc:creator>
				<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[Staying off the grid]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=512</guid>
		<description><![CDATA[<p>Driven by the people element. End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from &#8220;DEAD cousin NED&#8221;  and we apparently all [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=512">Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><strong>Driven by the people element.</strong></p>
<p>End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from &#8220;DEAD cousin NED&#8221;  and we apparently all have a &#8220;Nigerian relative that needs our help&#8221;.</p>
<p>I was just at a security conference were David Kennedy  aka rel1c the author of SET the founder of <a title="Trustedsec" href="https://www.trustedsec.com/">truestedsec</a> was presenting. His talk was on burning down security as we know it and his demo did not work because of the OSX maverick upgrade. OR as I see it Steve jobs from the great beyond,  the demo portion of these talks used to be the real value of security conferences.  They provide good stories and the proof of what we all know and a way to show the risk.  Over the last Year FUD and good stories have really gone the way of the dinosaurs.  Having to prove that something bad could and does happens seems to have gone from a lot of proof  and good stories to just de facto accepted thanks to <a title="Adobe" href="http://www.usatoday.com/story/cybertruth/2013/10/03/adobe-loses-29-mil-customer-records-source-code/2919229/">Adobe</a> and their issues&#8230;&#8230; and Dave on the <a href="http://katiecouric.com/features/how-to-protect-yourself-against-cyber-attacks/">Katie Couric show</a><a title="Kaltie Couric show" href="http://katiecouric.com/features/how-to-protect-yourself-against-cyber-attacks/"> </a> .</p>
<p>Oh yeah back to Steve Jobs and his hate for all things Adobe&#8230;<br />
As a senior checkpoint executive said at the same conference Steve dies and 6 months later Apple is softer on Adobe and he see on his home network from a mac his first malware/trojanware.</p>
<p>How very odd java is getting harder to manipulate but Flash and Air maybe it&#8217;s replacement for the darkside who generally also want your browsers cookies&#8230;Or yes they have cookies&#8230;</p>
<p>&nbsp;</p>
<p>till later</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=512">Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=512</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>what happens when airlines merge&#8230;or why no ones cares once they get your cash</title>
		<link>http://securitywandering.com/?p=266</link>
		<comments>http://securitywandering.com/?p=266#comments</comments>
		<pubDate>Thu, 07 Jul 2011 13:05:53 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[Staying off the grid]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=266</guid>
		<description><![CDATA[<p>So the story goes something like this. bout airplane tickest a while ago&#8230;..great priceDay before try to get 2 seats together  online at check in&#8230;. That did not happen, normal not a big deal.but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife. [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>So the story goes something like this.</p>
<p>bout airplane tickest a while ago&#8230;..great price<br />Day before try to get 2 seats together  online at check in&#8230;.</p>
<p>That did not happen, normal not a big deal.<br />but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife.</p>
<p>Security at the airport was a breeze for everyone including the wife in her ankle boot contraption.<br />security made sure that the kid did not go wondering off well mom got scanned.<br />I get to deal with the 10 little gray bins and getting them thru the xray thing<br />as odd as it sounds it was like they wanted to help&#8230;.got to love that.</p>
<p>Get to the gate wait for the gate folks to get there.<br />Now the gate folks had always been very helpful  for me</p>
<p>So I know they could easily fix the seating issue for me&#8230;..</p>
<p>WRONG<br />&#8220;the flight is full figure it out yourself when you get on the plane&#8221; <br />The message from the gate folks</p>
<p>it was like they were more concerned about themselves then helping me an mine.<br />no even an earl boarding invite&#8230;.wife in a walking boot for her ankle injure and 7 year old boy&#8230;.</p>
<p>so we wait and yet more self involved airline folks come and go.</p>
<p>they open the plane for boarding&#8230;</p>
<p>final yet another group of airline folks&#8230;<br />about half way thu boarding we get invited to board after the wife hobbles around in the waiting line.</p>
<p>I new face from airline&#8230;.who had just helped a 13 year old traveling alone&#8230; was the yes please go bored voice of reason</p>
<p>we go down the empty gate ramp took like 5 minutes down hill walking slow&#8230;.<br />get on the plane and there are people sitting in all of our seats&#8230;.<br />kid starts crying&#8230; have i mentioned yet that the wife &#8220;does not like to fly &#8220;motion sickens&#8221;&#8221;</p>
<p>get the tickets from the wife&#8230;<br />kick an old couple out of my seat and the 13 year old seat&#8230;.<br />then the 13 year old says I&#8217;ll change with you..</p>
<p>So the the wife and the kids get 2 seats together&#8230;..finally<br />the 13 year old stranger gets a window seat beind me&#8230;</p>
<p>Oh yeah forgot to mention the flight crew losing it because we had stopped anyone from boarding  the plane.<br />that kind of happens on the small jets  when you are in row 3 waiting for some folks to move out of your seats&#8230;.</p>
<p>longer story short..</p>
<p>flight was great 20 minutes early kind of great.</p>
<p>moral of the story you should always call the airplane phone support folks to fix seating issues and wait on hold for an hour to talk to <br />SAM &#8220;shrewas&#8221;  who think that the yankees are a florida baseball team&#8230;&#8230;</p>
<p> </p>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=266</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Fix (Or Kill) Web Data About You &#8211; NYTimes.com</title>
		<link>http://securitywandering.com/?p=75</link>
		<comments>http://securitywandering.com/?p=75#comments</comments>
		<pubDate>Thu, 14 Apr 2011 12:32:45 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Staying off the grid]]></category>

		<guid isPermaLink="false">https://securitywandering.wordpress.com/?p=75</guid>
		<description><![CDATA[<p>Over on the post &#8220;How to Fix (Or Kill) Web Data About You &#8211; NYTimes.com&#8221; contains this text: &#8220;How to Fix (Or Kill) Web Data About You By RIVA RICHMOND Published: April 13, 2011 As more of our social lives, shopping sprees and dating misadventures take place online, we leave behind, purposely or not, a [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=75">How to Fix (Or Kill) Web Data About You &#8211; NYTimes.com</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://www.nytimes.com/2011/04/14/technology/personaltech/14basics.html?_r=1&amp;partner=rss&amp;emc=rss">How to Fix (Or Kill) Web Data About You &#8211; NYTimes.com</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;How to Fix (Or Kill) Web Data About You<br />
By RIVA RICHMOND<br />
Published: April 13, 2011</p>
<p>As more of our social lives, shopping sprees and dating misadventures take place online, we leave behind, purposely or not, a growing supply of personal information.<br />
Enlarge This Image</p>
<p>Katherine Streeter<br />
Marketers, employers, suitors and even thieves and stalkers are piecing together mosaics of who we are. Even when it is accurate, it may not present a pretty picture.</p>
<p>For a glimpse of your mosaic, type your name into Spokeo.com. Prepare to see estimates of your age, home value, marital status, phone number and your home address, even a photo of your front door. Spokeo, one of several services like this online, will encourage you to pay $15 or more, for a full report with details on income, hobbies and online social networks.&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=75">How to Fix (Or Kill) Web Data About You &#8211; NYTimes.com</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=75</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
