<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; social phishing</title>
	<atom:link href="http://securitywandering.com/?feed=rss2&#038;cat=13" rel="self" type="application/rss+xml" />
	<link>http://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>what happens when airlines merge&#8230;or why no ones cares once they get your cash</title>
		<link>http://securitywandering.com/?p=266</link>
		<comments>http://securitywandering.com/?p=266#comments</comments>
		<pubDate>Thu, 07 Jul 2011 13:05:53 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[Staying off the grid]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=266</guid>
		<description><![CDATA[<p>So the story goes something like this. bout airplane tickest a while ago&#8230;..great priceDay before try to get 2 seats together  online at check in&#8230;. That did not happen, normal not a big deal.but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife. [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>So the story goes something like this.</p>
<p>bout airplane tickest a while ago&#8230;..great price<br />Day before try to get 2 seats together  online at check in&#8230;.</p>
<p>That did not happen, normal not a big deal.<br />but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife.</p>
<p>Security at the airport was a breeze for everyone including the wife in her ankle boot contraption.<br />security made sure that the kid did not go wondering off well mom got scanned.<br />I get to deal with the 10 little gray bins and getting them thru the xray thing<br />as odd as it sounds it was like they wanted to help&#8230;.got to love that.</p>
<p>Get to the gate wait for the gate folks to get there.<br />Now the gate folks had always been very helpful  for me</p>
<p>So I know they could easily fix the seating issue for me&#8230;..</p>
<p>WRONG<br />&#8220;the flight is full figure it out yourself when you get on the plane&#8221; <br />The message from the gate folks</p>
<p>it was like they were more concerned about themselves then helping me an mine.<br />no even an earl boarding invite&#8230;.wife in a walking boot for her ankle injure and 7 year old boy&#8230;.</p>
<p>so we wait and yet more self involved airline folks come and go.</p>
<p>they open the plane for boarding&#8230;</p>
<p>final yet another group of airline folks&#8230;<br />about half way thu boarding we get invited to board after the wife hobbles around in the waiting line.</p>
<p>I new face from airline&#8230;.who had just helped a 13 year old traveling alone&#8230; was the yes please go bored voice of reason</p>
<p>we go down the empty gate ramp took like 5 minutes down hill walking slow&#8230;.<br />get on the plane and there are people sitting in all of our seats&#8230;.<br />kid starts crying&#8230; have i mentioned yet that the wife &#8220;does not like to fly &#8220;motion sickens&#8221;&#8221;</p>
<p>get the tickets from the wife&#8230;<br />kick an old couple out of my seat and the 13 year old seat&#8230;.<br />then the 13 year old says I&#8217;ll change with you..</p>
<p>So the the wife and the kids get 2 seats together&#8230;..finally<br />the 13 year old stranger gets a window seat beind me&#8230;</p>
<p>Oh yeah forgot to mention the flight crew losing it because we had stopped anyone from boarding  the plane.<br />that kind of happens on the small jets  when you are in row 3 waiting for some folks to move out of your seats&#8230;.</p>
<p>longer story short..</p>
<p>flight was great 20 minutes early kind of great.</p>
<p>moral of the story you should always call the airplane phone support folks to fix seating issues and wait on hold for an hour to talk to <br />SAM &#8220;shrewas&#8221;  who think that the yankees are a florida baseball team&#8230;&#8230;</p>
<p> </p>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=266</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Facebook spam prevention scam spreading like wildfire • The Register</title>
		<link>http://securitywandering.com/?p=239</link>
		<comments>http://securitywandering.com/?p=239#comments</comments>
		<pubDate>Thu, 12 May 2011 11:46:03 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=239</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Facebook spam prevention scam spreading like wildfire • The Register&#8221; contains this text: Facebook spam prevention scam spreading like wildfire Alert Print Post comment Retweet Facebook Social media worm d&#8217;jour By John Leyden • Get more from this author Posted in Spam, 12th May 2011 10:22 GMT Free whitepaper – BitDefender [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=239">Facebook spam prevention scam spreading like wildfire • The Register</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.theregister.co.uk/2011/05/12/facebook_spam_prevention_scam/">Facebook spam prevention scam spreading like wildfire • The Register</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p>Facebook spam prevention scam spreading like wildfire Alert Print Post comment Retweet Facebook Social media worm d&#8217;jour By John Leyden • Get more from this author</p>
<p>Posted in Spam, 12th May 2011 10:22 GMT Free whitepaper – BitDefender Business Solutions v3.5 The growing prevalence of junk messages on Facebook is been used to bait a new scam doing the rounds on the social network.</p>
<p>Prospective marks in receipt of the fraudulent messages are invited to &#8216;verify&#8217; their account in order to &#8216;prevent spam&#8217;. Recipients who respond to the message by clicking on a link end up sharing it on their wall as well as spreading highly obfuscated JavaScript.</p>
<p></em></p>
<p><em>&#8216;With all the unexpected Sharing going on, this message has spread like wild-fire,&#8217; warns net security firm Sophos. &#8216;Instead of preventing spam, this par&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=239">Facebook spam prevention scam spreading like wildfire • The Register</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=239</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Lab Matters &#8211; At the Halfway Mark: Malware Predictions in 2011 &#8211; Securelist</title>
		<link>http://securitywandering.com/?p=237</link>
		<comments>http://securitywandering.com/?p=237#comments</comments>
		<pubDate>Thu, 12 May 2011 11:36:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=237</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Lab Matters &#8211; At the Halfway Mark: Malware Predictions in 2011 &#8211; Securelist&#8221; contains this text In this newest edition of Lab Matters, Director of Kaspersky Lab&#8217;s Global Research and Analysis Team Costin Raiu offers some predictions about what we will see in the second half of 2011. Raiu&#8217;s predictions [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=237">Lab Matters &#8211; At the Halfway Mark: Malware Predictions in 2011 &#8211; Securelist</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.securelist.com/en/blog/472/Lab_Matters_At_the_Halfway_Mark_Malware_Predictions_in_2011">Lab Matters &#8211; At the Halfway Mark: Malware Predictions in 2011 &#8211; Securelist</a></em>&#8221; contains this text<em> </em></p>
<blockquote><p><em></p>
<p><span style="font-style: normal;"><em></p>
<p style="display: inline !important;">In this newest edition of Lab Matters, Director of Kaspersky Lab&#8217;s Global Research and Analysis Team Costin Raiu offers some predictions about what we will see in the second half of 2011. Raiu&#8217;s predictions include a surge in malicious activity on mobile device app stores.</p>
<p></em></span></p>
<p> </p>
<p></em></p></blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=237">Lab Matters &#8211; At the Halfway Mark: Malware Predictions in 2011 &#8211; Securelist</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=237</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Don&#8217;t fall for &#8216;First Exposure: iPhone 5&#8242; Facebook scam &#124; InSecurity Complex &#8211; CNET News</title>
		<link>http://securitywandering.com/?p=235</link>
		<comments>http://securitywandering.com/?p=235#comments</comments>
		<pubDate>Thu, 12 May 2011 11:17:36 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[social phishing]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=235</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Don&#8217;t fall for &#8216;First Exposure: iPhone 5&#8242; Facebook scam &#124; InSecurity Complex &#8211; CNET News&#8221; contains this text: MAY 11, 2011 5:55 PM PDT Don&#8217;t fall for &#8216;First Exposure: iPhone 5&#8242; Facebook scam by Elinor Mills Print E-mail 4 comments Share If you see this post on Facebook, don&#8217;t click [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=235">Don&#8217;t fall for &#8216;First Exposure: iPhone 5&#8242; Facebook scam | InSecurity Complex &#8211; CNET News</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://news.cnet.com/8301-27080_3-20062055-245.html?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">Don&#8217;t fall for &#8216;First Exposure: iPhone 5&#8242; Facebook scam | InSecurity Complex &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p>MAY 11, 2011 5:55 PM PDT Don&#8217;t fall for &#8216;First Exposure: iPhone 5&#8242; Facebook scam by Elinor Mills Print E-mail 4 comments</p>
<p>Share</p>
<p></em></p>
<p><em>If you see this post on Facebook, don&#8217;t click on it. Facebook users are being duped into unwittingly spreading spam by clicking on what looks like a link to news entitled &#8216;First Exposure: iPhone 5.&#8217; A version of the scam, exploiting peoples&#8217; interest in the next-generation iPhone, went around Facebook earlier this month, and it&#8217;s back today with minor changes. The scam starts when you see someone in your social network comment on a link in a post that looks like it leads to a news story about the iPhone 5 at a Web address of &#8216;greatlakesnews.info.&#8217; Clicking on the link takes you to a different Web page,&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=235">Don&#8217;t fall for &#8216;First Exposure: iPhone 5&#8242; Facebook scam | InSecurity Complex &#8211; CNET News</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=235</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Newly emerged banking Trojan challenges ZeuS-SpyEye duopoly • The Register</title>
		<link>http://securitywandering.com/?p=223</link>
		<comments>http://securitywandering.com/?p=223#comments</comments>
		<pubDate>Wed, 11 May 2011 19:30:28 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=223</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;Newly emerged banking Trojan challenges ZeuS-SpyEye duopoly • The Register&#8221; contains this text: The Sunspot Trojan has already been linked to instances of fraudulent losses, according to transaction security firm Trusteer. The Windows-based malware is designed to carry out man-in-the-browser attacks, including web injections, page-grabbing, key-logging and screen shooting (a [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=223">Newly emerged banking Trojan challenges ZeuS-SpyEye duopoly • The Register</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/">Newly emerged banking Trojan challenges ZeuS-SpyEye duopoly • The Register</a></em>&#8221; contains this text:</p>
<blockquote><p><em> </em></p>
<p><em>The Sunspot Trojan has already been linked to instances of fraudulent losses, according to transaction security firm Trusteer. The Windows-based malware is designed to carry out man-in-the-browser attacks, including web injections, page-grabbing, key-logging and screen shooting (a feature that captures screenshots of the location of a mouse as a user types his/her password on a virtual keyboard).</p>
<p></em><em> </em></p>
<p><em>&#8220;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=223">Newly emerged banking Trojan challenges ZeuS-SpyEye duopoly • The Register</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=223</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Unfollowed Me rogue application spreads virally on Twitter &#124; Naked Security</title>
		<link>http://securitywandering.com/?p=174</link>
		<comments>http://securitywandering.com/?p=174#comments</comments>
		<pubDate>Wed, 20 Apr 2011 19:21:58 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[social phishing]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=174</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Unfollowed Me rogue application spreads virally on Twitter &#124; Naked Security&#8221; contains this text: &#8220;Unfollowed Me rogue application spreads virally on Twitter Hi there! If you&#8217;re new here, you might want to subscribe to the RSS feed for updates. X   by Graham Cluley on April 19, 2011 &#124; Be [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=174">Unfollowed Me rogue application spreads virally on Twitter | Naked Security</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://nakedsecurity.sophos.com/2011/04/19/unfollowed-me-rogue-application-spreads-virally-on-twitter/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29">Unfollowed Me rogue application spreads virally on Twitter | Naked Security</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Unfollowed Me rogue application spreads virally on Twitter Hi there! If you&#8217;re new here, you might want to subscribe to the RSS feed for updates. X</p>
<p> </p>
<p>by Graham Cluley on April 19, 2011	 | Be the first to comment FILED UNDER: Featured, Social networks, Spam Once again Twitter users are finding themselves hit by a fast-infecting attack, more commonly encountered by their Facebook-using cousins: a rogue application spreading virally across the network.</p>
<p></em></p>
<p><em>Thousands of Twitter users have fallen into the trap of allowing rogue third-party applications access their Twitter accounts, believing that it would tell them how many people have unfollowed them.&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=174">Unfollowed Me rogue application spreads virally on Twitter | Naked Security</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=174</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>&#8216;Spear phisher&#8217; proves why you should be skeptical of LinkedIn updates &gt; Social Networking &gt; Vulnerabilities &amp; Exploits &gt; News &gt; SC Magazine Australia/NZ</title>
		<link>http://securitywandering.com/?p=122</link>
		<comments>http://securitywandering.com/?p=122#comments</comments>
		<pubDate>Fri, 15 Apr 2011 12:07:20 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[social phishing]]></category>

		<guid isPermaLink="false">https://securitywandering.wordpress.com/?p=122</guid>
		<description><![CDATA[<p>  Over on the post &#8220;&#8216;Spear phisher&#8217; proves why you should be skeptical of LinkedIn updates &#62; Social Networking &#62; Vulnerabilities &#38; Exploits &#62; News &#62; SC Magazine Australia/NZ&#8221; contains this text: &#8220;Spear phisher&#8217; proves why you should be skeptical of LinkedIn updates   Bugat trojan delivered in LinkedIn spam By SC Staff Apr 15, [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=122">&#8216;Spear phisher&#8217; proves why you should be skeptical of LinkedIn updates > Social Networking > Vulnerabilities &#038; Exploits > News > SC Magazine Australia/NZ</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.securecomputing.net.au/News/254600,spear-phisher-proves-why-you-should-be-skeptical-of-linkedin-updates.aspx">&#8216;Spear phisher&#8217; proves why you should be skeptical of LinkedIn updates &gt; Social Networking &gt; Vulnerabilities &amp; Exploits &gt; News &gt; SC Magazine Australia/NZ</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Spear phisher&#8217; proves why you should be skeptical of LinkedIn updates</p>
<p> </p>
<p>Bugat trojan delivered in LinkedIn spam By SC Staff Apr 15, 2011 9:52 AM Tags: linkedin | spear | phish Trusteer experiment found half of social networkers would go to a landing page if asked. A recent spear phishing experiment led to half of a targeted audience reaching a specifically designed landing page in 48 hours.</p>
<p>Trusteer admitted that it picked 100 LinkedIn users, created a new identity and sent a fake job alert.</p>
<p>It said: ‘Since LinkedIn sends an alert when one of your connections has a new job, we decided to use this update method to create a fraudulent email. For each one of our targets we crafted a fictitious new job alert. We chose one of their LinkedIn connections and announced that this person was now working for a company that directly competes with our victim&#8217;s company.</p>
<p></em></p>
<p><em>‘We included a big button ‘View [friend&#8217;s name] new Title&#8217; and we also included the friend&#8217;s photo. Clicking on the button redirects the victim to a different website, not LinkedIn. The website we used was innocuous, but it was a place holder for a potentially malicious website that places malware on the victim&#8217;s computer.’&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=122">&#8216;Spear phisher&#8217; proves why you should be skeptical of LinkedIn updates > Social Networking > Vulnerabilities &#038; Exploits > News > SC Magazine Australia/NZ</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=122</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Facebook password changed? Malware attack poses as message from Facebook support &#124; Naked Security</title>
		<link>http://securitywandering.com/?p=60</link>
		<comments>http://securitywandering.com/?p=60#comments</comments>
		<pubDate>Wed, 13 Apr 2011 18:44:57 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[event]]></category>

		<guid isPermaLink="false">https://securitywandering.wordpress.com/?p=60</guid>
		<description><![CDATA[<p>Over on the post &#8220;Facebook password changed? Malware attack poses as message from Facebook support &#124; Naked Security&#8221; contains this text: &#8220;Facebook password changed? Malware attack poses as message from Facebook support by Graham Cluley on April 13, 2011 &#124; Be the first to comment FILED UNDER: Malware, Social networks, Spam Repeat after me: It&#8217;s [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=60">Facebook password changed? Malware attack poses as message from Facebook support | Naked Security</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://nakedsecurity.sophos.com/2011/04/13/facebook-password-changed-malware-attack-support/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29">Facebook password changed? Malware attack poses as message from Facebook support | Naked Security</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Facebook password changed? Malware attack poses as message from Facebook support</em></p>
<p><em>by Graham Cluley on April 13, 2011	 | Be the first to comment<br />
FILED UNDER: Malware, Social networks, Spam<br />
Repeat after me: It&#8217;s &#8216;Facebook&#8217;, not &#8216;FaceBook&#8217;.</em></p>
<p><em>Learn that lesson and it can be one of the tricks you can use to protect yourself against a spammed-out malware campaign, which tries to trick you into believing that Facebook support has changed your password.</em></p>
<p><em>Computer users are receiving emails claiming that the popular social network has automatically changed their password to secure their account.</p>
<p>Here&#8217;s a typical message:</p>
<p></em><em></em><em></em><em>&#8220;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=60">Facebook password changed? Malware attack poses as message from Facebook support | Naked Security</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=60</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>&#8216;Twilight&#8217; fans targeted in Facebook scam &#124; InSecurity Complex &#8211; CNET News</title>
		<link>http://securitywandering.com/?p=48</link>
		<comments>http://securitywandering.com/?p=48#comments</comments>
		<pubDate>Wed, 13 Apr 2011 09:14:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[social phishing]]></category>

		<guid isPermaLink="false">https://securitywandering.wordpress.com/?p=48</guid>
		<description><![CDATA[<p>Over on the post &#8220;&#8216;Twilight&#8217; fans targeted in Facebook scam &#124; InSecurity Complex &#8211; CNET News&#8221; contains this text: &#8220;&#8216;Twilight&#8217; fans targeted in Facebook scam by Elinor Mills New scam tricks people into thinking they will get to play a new game related to the &#8216;Twilight&#8217; teen vampire movies. (Credit: Sophos) Fans of the &#8216;Twilight&#8217; [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=48">&#8216;Twilight&#8217; fans targeted in Facebook scam | InSecurity Complex &#8211; CNET News</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://news.cnet.com/8301-27080_3-20053234-245.html?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">&#8216;Twilight&#8217; fans targeted in Facebook scam | InSecurity Complex &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;&#8216;Twilight&#8217; fans targeted in Facebook scam<br />
by Elinor Mills</p>
<p>New scam tricks people into thinking they will get to play a new game related to the &#8216;Twilight&#8217; teen vampire movies.<br />
(Credit: Sophos)<br />
Fans of the &#8216;Twilight&#8217; movies are falling prey to a scam that can end up hijacking their accounts and sending the scam on to unsuspecting friends.&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=48">&#8216;Twilight&#8217; fans targeted in Facebook scam | InSecurity Complex &#8211; CNET News</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=48</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
