<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; exploits</title>
	<atom:link href="http://securitywandering.com/?cat=6&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Tools boast easy cracking of Microsoft crypto for businesses</title>
		<link>http://securitywandering.com/?p=454</link>
		<comments>http://securitywandering.com/?p=454#comments</comments>
		<pubDate>Mon, 30 Jul 2012 19:55:26 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=454</guid>
		<description><![CDATA[<p>Over on CNET News.com &#8211; Threats the post &#8220;Tools boast easy cracking of Microsoft crypto for businesses&#8221; contains this text: &#8220;ChapCrack and CloudCracker reveal sensitive corporate communications &#8212; including passwords &#8212; protected by the popular PPTP encryption protocol, which is based on an algorithm from Microsoft, a researcher says at Defcon.&#8220;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=454">Tools boast easy cracking of Microsoft crypto for businesses</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href="http://news.cnet.com/">CNET News.com &#8211; Threats</a></em> the post &#8220;<em><a href="http://rss.feedsportal.com/c/32447/f/475521/s/21cfe058/l/0Lnews0Bcnet0N0C830A10E10A0A90I30E574818550E830Ctools0Eboast0Eeasy0Ecracking0Eof0Emicrosoft0Ecrypto0Efor0Ebusinesses0C0Dpart0Frss0Gsubj0Fnews0Gtag0F25470E10I30E0A0E20A/story01.htm">Tools boast easy cracking of Microsoft crypto for businesses</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;ChapCrack and CloudCracker reveal sensitive corporate communications &#8212; including passwords &#8212; protected by the popular PPTP encryption protocol, which is based on an algorithm from Microsoft, a researcher says at Defcon.<img src="http://rss.feedsportal.com/c/32447/f/475521/s/21cfe058/mf.gif" alt="" width="1" height="1" border="0" /><img src="http://feeds.feedburner.com/~r/CNETNewsSecurity/~4/sPNAlpWTClM" alt="" width="1" height="1" />&#8220;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=454">Tools boast easy cracking of Microsoft crypto for businesses</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=454</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Flame malware: So big, so overlooked &#124; Security &amp; Privacy &#8211; CNET News</title>
		<link>http://securitywandering.com/?p=449</link>
		<comments>http://securitywandering.com/?p=449#comments</comments>
		<pubDate>Tue, 29 May 2012 22:29:54 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=449</guid>
		<description><![CDATA[<p>Over on the post &#8220;Flame malware: So big, so overlooked &#124; Security &#38; Privacy &#8211; CNET News&#8221; contains this text: &#8220; CNET News HomeReviews News Download CNET TV How To Marketplace Log In &#124; Join CNET News Security &#38; Privacy Flame malware: So big, so overlooked The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=449">Flame malware: So big, so overlooked | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-57442675-83/flame-malware-so-big-so-overlooked/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">Flame malware: So big, so overlooked | Security &amp; Privacy &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;</em></p></blockquote>
<p>CNET News</p>
<p>HomeReviews News Download CNET TV How To Marketplace Log In | Join</p>
<p>CNET News Security &amp; Privacy Flame malware: So big, so overlooked The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; has taken the information security world by surprise. Given that it is said to have been around for years, how did everyone miss it?</p>
<p>by Michael Lee May 29, 2012 4:53 AM PDT 8 CommentsFacebook24Twitter71Linked In19More</p>
<p>The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; has taken the information security world by surprise. Given that it is said to have been around for years, how did everyone miss it? Several security research firms, including Symantec, Kaspersky, and McAfee, have been hard at work analyzing a specific piece of malware in the past few days after the Iranian Computer Emergency Response Team posted an alert about malicious code designed to steal and exfiltrate information from infected computers back to a network of at least 10 command and control servers. However, as Budape&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=449">Flame malware: So big, so overlooked | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=449</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</title>
		<link>http://securitywandering.com/?p=446</link>
		<comments>http://securitywandering.com/?p=446#comments</comments>
		<pubDate>Fri, 11 May 2012 14:44:07 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=446</guid>
		<description><![CDATA[<p>Over on the post &#8220;Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab&#8221;    &#60;&#60;&#60; Tuesday, May 8, 2012 &#62;&#62;&#62;   Java Drive-by Generator Posted by Karmina @ 15:27 GMT &#124; Comments Ran across quite an interesting infection today. I visited a site that prompted me with a security warning about a &#8216;Microsoft&#8217; [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=446">Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://www.f-secure.com/weblog/archives/00002360.html">Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</a></em>&#8221; </p>
<p> </p>
<p>&lt;&lt;&lt; Tuesday, May 8, 2012 &gt;&gt;&gt;   Java Drive-by Generator Posted by Karmina @ 15:27 GMT | Comments Ran across quite an interesting infection today. I visited a site that prompted me with a security warning about a &#8216;Microsoft&#8217; application from an unknown publisher. The site is actually pretending to be a Gmail Attachment Viewer. Microsoft+Gmail? Fail.</p>
<p>After allowing the application to run, it redirects to a Cisco Foundation invitation while downloading a malware binary in the background.</p>
<p>The message also contains a malicious link that downloads the same malware. Perhaps to make sure that you really get infected.</p>
<p>Anyway, this infection is generated using iJava Drive-by Generator, which apparently has been around f&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=446">Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=446</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New malware strain locks up computers unless ransom is paid &#124; Security &amp; Privacy &#8211; CNET News</title>
		<link>http://securitywandering.com/?p=443</link>
		<comments>http://securitywandering.com/?p=443#comments</comments>
		<pubDate>Mon, 07 May 2012 19:47:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=443</guid>
		<description><![CDATA[<p>Over on the post &#8220;New malware strain locks up computers unless ransom is paid &#124; Security &#38; Privacy &#8211; CNET News&#8221; contains this text: &#8220; CNET News HomeReviews News Download CNET TV How To Marketplace Log In &#124; Join Breaking news Oracle v. Google jury returns partial verdict, favoring OracleShare: CNET News Security &#38; Privacy [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=443">New malware strain locks up computers unless ransom is paid | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-57429139-83/new-malware-strain-locks-up-computers-unless-ransom-is-paid/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">New malware strain locks up computers unless ransom is paid | Security &amp; Privacy &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;</em></p></blockquote>
<p>CNET News</p>
<p>HomeReviews News Download CNET TV How To Marketplace Log In | Join</p>
<p>Breaking news Oracle v. Google jury returns partial verdict, favoring OracleShare: CNET News Security &amp; Privacy New malware strain locks up computers unless ransom is paid A type of &#8216;ransomware&#8217; hitting users across Europe demands payment for alleged copyright violations, according to a Swiss security blog.</p>
<p>by Lance Whitney May 7, 2012 8:50 AM PDT 20 CommentsFacebook54Twitter71Linked In23More (Credit: abuse.ch) A campaign of &#8216;ransomware&#8217; is locking people out of their computers unless they pony up the right amount of money. Spotted by security blog abuse.ch, the malware taps into an exploit kit known as &#8216;Blackhole.&#8217; Sold underground, Blackhole is used by criminals to infect computers through security holes in the browser or third-party plug-ins, such as Java and Adobe Reader. If the version of Java, for example, is not up to date with the latest patches, the downloaded file will exploit the software'&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=443">New malware strain locks up computers unless ransom is paid | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=443</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Microsoft detects new malware targeting Apple computers &#8211; Computerworld</title>
		<link>http://securitywandering.com/?p=434</link>
		<comments>http://securitywandering.com/?p=434#comments</comments>
		<pubDate>Thu, 03 May 2012 12:56:57 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=434</guid>
		<description><![CDATA[<p>Over on the post &#8220;Microsoft detects new malware targeting Apple computers &#8211; Computerworld&#8221; contains this text: &#8220;Skip the navigation Computerworld White Papers Webcasts Newsletters Solution Centers Events Magazine Twitter Facebook RSS Topics News In Depth Reviews Blogs Opinion Shark Tank IT Jobs More IT Verticals Security App Security&#124;Business Continuity&#124;Cybercrime and Hacking&#124;DRM and Legal Issues&#124;Data Security&#124;Malware [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=434">Microsoft detects new malware targeting Apple computers &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://www.computerworld.com/s/article/9226777/Microsoft_detects_new_malware_targeting_Apple_computers?source=rss_security&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+computerworld%2Fs%2Ffeed%2Ftopic%2F17+%28Computerworld+Security+News%29">Microsoft detects new malware targeting Apple computers &#8211; Computerworld</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Skip the navigation</em></p></blockquote>
<p>Computerworld White Papers Webcasts Newsletters Solution Centers Events Magazine Twitter Facebook RSS</p>
<p>Topics News In Depth Reviews Blogs Opinion Shark Tank IT Jobs More IT Verticals Security App Security|Business Continuity|Cybercrime and Hacking|DRM and Legal Issues|Data Security|Malware and Vulnerabilities|Privacy|Security Hardware and Software</p>
<p>74  </p>
<p>3   1 Submit 6 Email</p>
<p>Home &gt; Security &gt; Malware and Vulnerabilities News Microsoft detects new malware targeting Apple computers Apple users should be sure their Mac version of Office has up-to-date patches</p>
<p>By Jeremy Kirk May 2, 2012 12:18 AM ET2 Comments . What&#8217;s this? IDG News Service &#8211; Microsoft has detected a new piece of malware targeting Apple OS X computers that exploits a vulnerability in the Office productivity suite patched nearly three years ago.</p>
<p>The malware is not widespread, wrote Jeong Wook Oh of Microsoft&#8217;s Malware Protection Center. But it does show that hackers pay attention if it&#8217;s found pe&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=434">Microsoft detects new malware targeting Apple computers &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=434</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Windows Remote Desktop worm &#8220;Morto&#8221; spreading &#8211; F-Secure Weblog : News from the Lab</title>
		<link>http://securitywandering.com/?p=294</link>
		<comments>http://securitywandering.com/?p=294#comments</comments>
		<pubDate>Tue, 30 Aug 2011 14:07:38 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=294</guid>
		<description><![CDATA[<p>Over on the post &#8220;Windows Remote Desktop worm &#8220;Morto&#8221; spreading &#8211; F-Secure Weblog : News from the Lab&#8221; contains this text: &#8221; &#60;&#60;&#60; Sunday, August 28, 2011 &#62;&#62;&#62;   Windows Remote Desktop worm &#8220;Morto&#8221; spreading Posted by Mikko @ 13:23 GMT &#124; Comments We don&#8217;t see that many internet worms these days. It&#8217;s mostly just [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=294">Windows Remote Desktop worm &#8220;Morto&#8221; spreading &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.f-secure.com/weblog/archives/00002227.html">Windows Remote Desktop worm &#8220;Morto&#8221; spreading &#8211; F-Secure Weblog : News from the Lab</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8221; &lt;&lt;&lt; Sunday, August 28, 2011 &gt;&gt;&gt;   Windows Remote Desktop worm &#8220;Morto&#8221; spreading	Posted by Mikko @ 13:23 GMT | Comments We don&#8217;t see that many internet worms these days. It&#8217;s mostly just bots and trojans. But we just found a new internet worm, and it&#8217;s spreading in the wild.</p>
<p> </p>
<p>The worm is called Morto and it infects Windows workstations and servers. It uses a new spreading vector that we haven&#8217;t seen before: RDP.</p>
<p>RDP stands for Remote Desktop Protocol. Windows has built-in support for this protocol via Windows Remote Desktop Connection. Once you enable a computer for remote use, you can use any other computer to access it.</p>
<p>When you connect to another computer with this tool, you can remotely use the computer, just like you&#8217;d use a local computer.</p>
<p>Once a machine gets infected, the Morto worm starts scanning the local network for machines that have Remote Desktop Connection enabled. This creates a lot of traffic for port 3389/TCP, which is the RDP port.</p>
<p>When Morto finds a Remote Desktop server, it tries logging in as Administrator and tries a series of passwords:</p>
<p></em></p>
<p><em> admin  password  server  test  user  pass  letmein  1234qwer  1q2w3e  1qaz2wsx  aaa  abc123  abcd1234&#8243;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=294">Windows Remote Desktop worm &#8220;Morto&#8221; spreading &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=294</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Malware attack spreads to 5 million pages (and counting) • The Register</title>
		<link>http://securitywandering.com/?p=284</link>
		<comments>http://securitywandering.com/?p=284#comments</comments>
		<pubDate>Tue, 02 Aug 2011 23:47:48 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[Hack and Hackers]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=284</guid>
		<description><![CDATA[<p>Over on the post &#8220;Malware attack spreads to 5 million pages (and counting) • The Register&#8221; contains this text: &#8220;The iframes silently redirect visitors to malicious files located on willysy.com and exero.eu. Those domain names, in turn redirect visitors to a series of intermediate websites that ultimately try to exploit several Windows vulnerabilities.&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=284">Malware attack spreads to 5 million pages (and counting) • The Register</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.theregister.co.uk/2011/08/02/mass_injection_attack_goes_viral/">Malware attack spreads to 5 million pages (and counting) • The Register</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;The iframes silently redirect visitors to malicious files located on willysy.com and exero.eu. Those domain names, in turn redirect visitors to a series of intermediate websites that ultimately try to exploit several Windows vulnerabilities.&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=284">Malware attack spreads to 5 million pages (and counting) • The Register</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=284</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Zero day bug threatens many WordPress sites • The Register</title>
		<link>http://securitywandering.com/?p=282</link>
		<comments>http://securitywandering.com/?p=282#comments</comments>
		<pubDate>Tue, 02 Aug 2011 23:45:51 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[Hack and Hackers]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=282</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Zero day bug threatens many WordPress sites • The Register&#8221; contains this text: Zero day bug threatens many WordPress sites TimThumb developer pwned by own creation By Dan Goodin in San Francisco • Get more from this author Posted in Security, 2nd August 2011 18:44 GMT Free whitepaper – The Different [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=282">Zero day bug threatens many WordPress sites • The Register</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.theregister.co.uk/2011/08/02/wordpress_zero_day/">Zero day bug threatens many WordPress sites • The Register</a></em>&#8221; contains this text:</p>
<p><em></p>
<p style="display: inline !important;">Zero day bug threatens many WordPress sites</p>
<p></em></p>
<blockquote><p><em></p>
<p>TimThumb developer pwned by own creation By Dan Goodin in San Francisco • Get more from this author</p>
<p>Posted in Security, 2nd August 2011 18:44 GMT Free whitepaper – The Different Types of UPS Systems Attackers are exploiting a widely used extension for the WordPress publishing platform to take control of vulnerable websites, one of the victims has warned.</p>
<p></em></p>
<p><em>The vulnerability affects virtually all websites that have an image-resizing utility called TimThumb running with WordPress, Mark Maunder, CEO of Seattle-based Feedjit, wrote in a post published Monday. The extension is &#8220;inherently insecure&#8221; because it makes it easy for hackers to execute malicious code on websites that use it. At least two websites have already been compromised, he reporte&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=282">Zero day bug threatens many WordPress sites • The Register</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=282</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Enterprise Security Today &#124; Security Experts Warn of Microsoft Bluetooth Vulnerability</title>
		<link>http://securitywandering.com/?p=274</link>
		<comments>http://securitywandering.com/?p=274#comments</comments>
		<pubDate>Fri, 15 Jul 2011 18:41:43 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=274</guid>
		<description><![CDATA[<p>Over on the post &#8220;Enterprise Security Today &#124; Security Experts Warn of Microsoft Bluetooth Vulnerability&#8221; contains this text: &#8220;Security Experts Warn of Microsoft Bluetooth Vulnerability By Jennifer LeClaire July 13, 2011 1:07PM There&#8217;s danger on the wireless front, in the form of a Bluetooth stack vulnerability. Amid an otherwise mild Patch Tuesday for Microsoft, security [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=274">Enterprise Security Today | Security Experts Warn of Microsoft Bluetooth Vulnerability</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.enterprise-security-today.com/story.xhtml?story_id=79342">Enterprise Security Today | Security Experts Warn of Microsoft Bluetooth Vulnerability</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Security Experts Warn of Microsoft Bluetooth Vulnerability By Jennifer LeClaire July 13, 2011 1:07PM</em></p></blockquote>
<blockquote><p><em> </em><em></p>
<p style="display: inline !important;"><span style="font-style: normal;"><em> </em></span></p>
<p><em></p>
<p style="display: inline !important;">There&#8217;s danger on the wireless front, in the form of a Bluetooth stack vulnerability. Amid an otherwise mild Patch Tuesday for Microsoft, security researchers said the Bluetooth problem could be used to launch a targeted attack by sending specific malicious data to the targeted computer while establishing a Bluetooth connection.   Related Topics 	Microsoft 	Patch Tuesday 	Bluetooth 	Symantec 	Wireless Security Latest News 	Pentagon To Publish Cyberwar Rules 	Israeli App Merges Facebook, Google+ 	Microsoft Bluetooth Vulnerability Seen 	Rupert Murdoch Drops Bid for BSkyB 	Julian Assange Fighting Extradition</p>
<p></em></em><em></p>
<p> </p>
<p></em></p></blockquote>
<blockquote>
<p><em>After a heavy June release, Microsoft on Tuesday issued a mere four security  bulletins to address 22 vulnerabilities. Only one is rated critical. Still, security researchers agree there is an element of danger present on the wireless  front. &#8220;An attacker could use the Bluetooth stack vulnerability to launch a targeted attack,&#8221; said Joshua Talbot, security intelligence manager at Symantec Security Response. &#8220;However, it&#8217;s unlikely it could be used in a widespread attack because an attacker would have to be within Bluetooth range to exploit it. A specific target would likely already have to be identified and that person&#8217;s whereabouts known to the attacker.&#8221;&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=274">Enterprise Security Today | Security Experts Warn of Microsoft Bluetooth Vulnerability</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=274</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>what happens when airlines merge&#8230;or why no ones cares once they get your cash</title>
		<link>http://securitywandering.com/?p=266</link>
		<comments>http://securitywandering.com/?p=266#comments</comments>
		<pubDate>Thu, 07 Jul 2011 13:05:53 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[Staying off the grid]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=266</guid>
		<description><![CDATA[<p>So the story goes something like this. bout airplane tickest a while ago&#8230;..great priceDay before try to get 2 seats together  online at check in&#8230;. That did not happen, normal not a big deal.but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife. [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>So the story goes something like this.</p>
<p>bout airplane tickest a while ago&#8230;..great price<br />Day before try to get 2 seats together  online at check in&#8230;.</p>
<p>That did not happen, normal not a big deal.<br />but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife.</p>
<p>Security at the airport was a breeze for everyone including the wife in her ankle boot contraption.<br />security made sure that the kid did not go wondering off well mom got scanned.<br />I get to deal with the 10 little gray bins and getting them thru the xray thing<br />as odd as it sounds it was like they wanted to help&#8230;.got to love that.</p>
<p>Get to the gate wait for the gate folks to get there.<br />Now the gate folks had always been very helpful  for me</p>
<p>So I know they could easily fix the seating issue for me&#8230;..</p>
<p>WRONG<br />&#8220;the flight is full figure it out yourself when you get on the plane&#8221; <br />The message from the gate folks</p>
<p>it was like they were more concerned about themselves then helping me an mine.<br />no even an earl boarding invite&#8230;.wife in a walking boot for her ankle injure and 7 year old boy&#8230;.</p>
<p>so we wait and yet more self involved airline folks come and go.</p>
<p>they open the plane for boarding&#8230;</p>
<p>final yet another group of airline folks&#8230;<br />about half way thu boarding we get invited to board after the wife hobbles around in the waiting line.</p>
<p>I new face from airline&#8230;.who had just helped a 13 year old traveling alone&#8230; was the yes please go bored voice of reason</p>
<p>we go down the empty gate ramp took like 5 minutes down hill walking slow&#8230;.<br />get on the plane and there are people sitting in all of our seats&#8230;.<br />kid starts crying&#8230; have i mentioned yet that the wife &#8220;does not like to fly &#8220;motion sickens&#8221;&#8221;</p>
<p>get the tickets from the wife&#8230;<br />kick an old couple out of my seat and the 13 year old seat&#8230;.<br />then the 13 year old says I&#8217;ll change with you..</p>
<p>So the the wife and the kids get 2 seats together&#8230;..finally<br />the 13 year old stranger gets a window seat beind me&#8230;</p>
<p>Oh yeah forgot to mention the flight crew losing it because we had stopped anyone from boarding  the plane.<br />that kind of happens on the small jets  when you are in row 3 waiting for some folks to move out of your seats&#8230;.</p>
<p>longer story short..</p>
<p>flight was great 20 minutes early kind of great.</p>
<p>moral of the story you should always call the airplane phone support folks to fix seating issues and wait on hold for an hour to talk to <br />SAM &#8220;shrewas&#8221;  who think that the yankees are a florida baseball team&#8230;&#8230;</p>
<p> </p>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=266</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
