<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; Hack and Hackers</title>
	<atom:link href="https://securitywandering.com/?cat=10&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>UH notifies 7,100 patients of stolen hard drive with personal medical information on it</title>
		<link>https://securitywandering.com/?p=520</link>
		<comments>https://securitywandering.com/?p=520#comments</comments>
		<pubDate>Thu, 07 Nov 2013 01:09:55 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Sec for Dumies]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=520</guid>
		<description><![CDATA[<p>CLEVELAND, Ohio &#8212; More than 7,100 University Hospitals patients received notification by mail this week that their protected personal medical information was potentially exposed after a hard drive containing physician office data was stolen from a third-party vendor helping to upgrade the health system&#8217;s computer systems . Someone stole the hard drive from the car [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=520">UH notifies 7,100 patients of stolen hard drive with personal medical information on it</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">CLEVELAND, Ohio &#8212; More than 7,100 University Hospitals patients received notification by mail this week that their protected personal medical information was potentially exposed after a hard drive containing physician office data was stolen from a third-party vendor helping to upgrade the health system&#8217;s computer systems .</p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Someone stole the hard drive from the car of one of the vendor’s employees, according to the letter. UH was informed of the theft Aug. 8, and the hospital system has been determining the exact information that was on the drive since then, said hospital spokeswoman Janice Guhl. </p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Link to full story</p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"><a href="http://www.cleveland.com/healthfit/index.ssf/2013/11/uh_notifies_7100_patients_of_l.html">http://www.cleveland.com/healthfit/index.ssf/2013/11/uh_notifies_7100_patients_of_l.html</a></p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=520">UH notifies 7,100 patients of stolen hard drive with personal medical information on it</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=520</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</title>
		<link>https://securitywandering.com/?p=516</link>
		<comments>https://securitywandering.com/?p=516#comments</comments>
		<pubDate>Fri, 01 Nov 2013 15:12:28 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=516</guid>
		<description><![CDATA[<p>Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent.   Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=516">Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h1 class="heading" style="list-style: none; padding: 0px; margin: 0px; -webkit-font-smoothing: antialiased; text-rendering: optimizelegibility; font-family: NoticiaBold, 'Times New Roman', serif; text-decoration: none; color: #263034; font-size: 30px; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps</h1>
<h2 class="standalone-deck" style="list-style: none; padding: 0px 0px 12px; margin: 0px 0px 8px; color: #657b83; font-size: 16px; font-weight: normal; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #dddddd; font-family: Arial, sans-serif; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent.</h2>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"> </p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"><span class="Apple-style-span" style="color: #000000; font-family: Helvetica; line-height: normal; font-size: medium;"><img title="badbios.jpg" src="http://securitywandering.com/wp-content/uploads/2013/11/badbios.jpg" alt="Badbios" width="600" height="337" border="0" /></span>Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused. He also found that the machine could delete data and undo configuration changes with no prompting. He didn&#8217;t know it then, but that odd firmware update would become a high-stakes malware mystery that would consume most of his waking hours.</p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">linked from:<br /> <a href="http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/">http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/</a></p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">it was just a matter of time before microcode injections into the controller on various sub systems of a computer would be targeted.<br />This is a very troubling discovery for many people. </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=516">Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=516</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</title>
		<link>https://securitywandering.com/?p=512</link>
		<comments>https://securitywandering.com/?p=512#comments</comments>
		<pubDate>Thu, 31 Oct 2013 21:16:56 +0000</pubDate>
		<dc:creator><![CDATA[lxc152]]></dc:creator>
				<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[Staying off the grid]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=512</guid>
		<description><![CDATA[<p>Driven by the people element. End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from &#8220;DEAD cousin NED&#8221;  and we apparently all [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=512">Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><strong>Driven by the people element.</strong></p>
<p>End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from &#8220;DEAD cousin NED&#8221;  and we apparently all have a &#8220;Nigerian relative that needs our help&#8221;.</p>
<p>I was just at a security conference were David Kennedy  aka rel1c the author of SET the founder of <a title="Trustedsec" href="https://www.trustedsec.com/">truestedsec</a> was presenting. His talk was on burning down security as we know it and his demo did not work because of the OSX maverick upgrade. OR as I see it Steve jobs from the great beyond,  the demo portion of these talks used to be the real value of security conferences.  They provide good stories and the proof of what we all know and a way to show the risk.  Over the last Year FUD and good stories have really gone the way of the dinosaurs.  Having to prove that something bad could and does happens seems to have gone from a lot of proof  and good stories to just de facto accepted thanks to <a title="Adobe" href="http://www.usatoday.com/story/cybertruth/2013/10/03/adobe-loses-29-mil-customer-records-source-code/2919229/">Adobe</a> and their issues&#8230;&#8230; and Dave on the <a href="http://katiecouric.com/features/how-to-protect-yourself-against-cyber-attacks/">Katie Couric show</a><a title="Kaltie Couric show" href="http://katiecouric.com/features/how-to-protect-yourself-against-cyber-attacks/"> </a> .</p>
<p>Oh yeah back to Steve Jobs and his hate for all things Adobe&#8230;<br />
As a senior checkpoint executive said at the same conference Steve dies and 6 months later Apple is softer on Adobe and he see on his home network from a mac his first malware/trojanware.</p>
<p>How very odd java is getting harder to manipulate but Flash and Air maybe it&#8217;s replacement for the darkside who generally also want your browsers cookies&#8230;Or yes they have cookies&#8230;</p>
<p>&nbsp;</p>
<p>till later</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=512">Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=512</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hackers reveal critical vulnerabilities in Huawei routers at Defcon</title>
		<link>https://securitywandering.com/?p=463</link>
		<comments>https://securitywandering.com/?p=463#comments</comments>
		<pubDate>Tue, 31 Jul 2012 15:42:50 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=463</guid>
		<description><![CDATA[<p>Over on InfoWorld SECURITY Feed the post &#8220;Hackers reveal critical vulnerabilities in Huawei routers at Defcon&#8221; contains this text: &#8220; Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. The vulnerabilities &#8212; a session hijack, a heap overflow, and a stack overflow [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=463">Hackers reveal critical vulnerabilities in Huawei routers at Defcon</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href="http://www.infoworld.com/t/2535">InfoWorld SECURITY Feed</a></em> the post &#8220;<em><a href="http://www.infoworld.com/d/security/hackers-reveal-critical-vulnerabilities-in-huawei-routers-defcon-198983?source=rss_security">Hackers reveal critical vulnerabilities in Huawei routers at Defcon</a></em>&#8221; contains this text:</p>
<blockquote><p><em><em>&#8220;</em></em></p>
<p>Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday.</p>
<p>The vulnerabilities &#8212; a session hijack, a heap overflow, and a stack overflow &#8212; were found in the firmware of Huawei AR18 and AR29 series routers and could be exploited to take control of the devices over the Internet, said Felix Lindner, the head of security firm Recurity Labs and one of the two researchers who found the flaws.</p>
<p><em>&#8220;</em></p></blockquote>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=463">Hackers reveal critical vulnerabilities in Huawei routers at Defcon</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=463</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SQL Injection Attacks Up 69% ? Packet Storm</title>
		<link>https://securitywandering.com/?p=457</link>
		<comments>https://securitywandering.com/?p=457#comments</comments>
		<pubDate>Mon, 30 Jul 2012 20:04:52 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=457</guid>
		<description><![CDATA[<p>Over on the post &#8220;SQL Injection Attacks Up 69% ? Packet Storm&#8221; contains this text: &#8221; SQL Injection Attacks Up 69%Source ZDNetLink &#124; Favorite &#124; Comments (0)Close&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=457">SQL Injection Attacks Up 69% ? Packet Storm</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://packetstormsecurity.org/news/view/21296/SQL-Injection-Attacks-Up-69.html">SQL Injection Attacks Up 69% ? Packet Storm</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8221; SQL Injection Attacks Up 69%Source ZDNetLink | Favorite | Comments (0)Close&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=457">SQL Injection Attacks Up 69% ? Packet Storm</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=457</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tools boast easy cracking of Microsoft crypto for businesses</title>
		<link>https://securitywandering.com/?p=454</link>
		<comments>https://securitywandering.com/?p=454#comments</comments>
		<pubDate>Mon, 30 Jul 2012 19:55:26 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=454</guid>
		<description><![CDATA[<p>Over on CNET News.com &#8211; Threats the post &#8220;Tools boast easy cracking of Microsoft crypto for businesses&#8221; contains this text: &#8220;ChapCrack and CloudCracker reveal sensitive corporate communications &#8212; including passwords &#8212; protected by the popular PPTP encryption protocol, which is based on an algorithm from Microsoft, a researcher says at Defcon.&#8220;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=454">Tools boast easy cracking of Microsoft crypto for businesses</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href="http://news.cnet.com/">CNET News.com &#8211; Threats</a></em> the post &#8220;<em><a href="http://rss.feedsportal.com/c/32447/f/475521/s/21cfe058/l/0Lnews0Bcnet0N0C830A10E10A0A90I30E574818550E830Ctools0Eboast0Eeasy0Ecracking0Eof0Emicrosoft0Ecrypto0Efor0Ebusinesses0C0Dpart0Frss0Gsubj0Fnews0Gtag0F25470E10I30E0A0E20A/story01.htm">Tools boast easy cracking of Microsoft crypto for businesses</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;ChapCrack and CloudCracker reveal sensitive corporate communications &#8212; including passwords &#8212; protected by the popular PPTP encryption protocol, which is based on an algorithm from Microsoft, a researcher says at Defcon.<img src="http://rss.feedsportal.com/c/32447/f/475521/s/21cfe058/mf.gif" alt="" width="1" height="1" border="0" /><img src="http://feeds.feedburner.com/~r/CNETNewsSecurity/~4/sPNAlpWTClM" alt="" width="1" height="1" />&#8220;</em></p></blockquote>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=454">Tools boast easy cracking of Microsoft crypto for businesses</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=454</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Flame malware: So big, so overlooked &#124; Security &amp; Privacy &#8211; CNET News</title>
		<link>https://securitywandering.com/?p=449</link>
		<comments>https://securitywandering.com/?p=449#comments</comments>
		<pubDate>Tue, 29 May 2012 22:29:54 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=449</guid>
		<description><![CDATA[<p>Over on the post &#8220;Flame malware: So big, so overlooked &#124; Security &#38; Privacy &#8211; CNET News&#8221; contains this text: &#8220; CNET News HomeReviews News Download CNET TV How To Marketplace Log In &#124; Join CNET News Security &#38; Privacy Flame malware: So big, so overlooked The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=449">Flame malware: So big, so overlooked | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-57442675-83/flame-malware-so-big-so-overlooked/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">Flame malware: So big, so overlooked | Security &amp; Privacy &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;</em></p></blockquote>
<p>CNET News</p>
<p>HomeReviews News Download CNET TV How To Marketplace Log In | Join</p>
<p>CNET News Security &amp; Privacy Flame malware: So big, so overlooked The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; has taken the information security world by surprise. Given that it is said to have been around for years, how did everyone miss it?</p>
<p>by Michael Lee May 29, 2012 4:53 AM PDT 8 CommentsFacebook24Twitter71Linked In19More</p>
<p>The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; has taken the information security world by surprise. Given that it is said to have been around for years, how did everyone miss it? Several security research firms, including Symantec, Kaspersky, and McAfee, have been hard at work analyzing a specific piece of malware in the past few days after the Iranian Computer Emergency Response Team posted an alert about malicious code designed to steal and exfiltrate information from infected computers back to a network of at least 10 command and control servers. However, as Budape&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=449">Flame malware: So big, so overlooked | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=449</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</title>
		<link>https://securitywandering.com/?p=446</link>
		<comments>https://securitywandering.com/?p=446#comments</comments>
		<pubDate>Fri, 11 May 2012 14:44:07 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=446</guid>
		<description><![CDATA[<p>Over on the post &#8220;Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab&#8221;    &#60;&#60;&#60; Tuesday, May 8, 2012 &#62;&#62;&#62;   Java Drive-by Generator Posted by Karmina @ 15:27 GMT &#124; Comments Ran across quite an interesting infection today. I visited a site that prompted me with a security warning about a &#8216;Microsoft&#8217; [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=446">Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://www.f-secure.com/weblog/archives/00002360.html">Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</a></em>&#8221; </p>
<p> </p>
<p>&lt;&lt;&lt; Tuesday, May 8, 2012 &gt;&gt;&gt;   Java Drive-by Generator Posted by Karmina @ 15:27 GMT | Comments Ran across quite an interesting infection today. I visited a site that prompted me with a security warning about a &#8216;Microsoft&#8217; application from an unknown publisher. The site is actually pretending to be a Gmail Attachment Viewer. Microsoft+Gmail? Fail.</p>
<p>After allowing the application to run, it redirects to a Cisco Foundation invitation while downloading a malware binary in the background.</p>
<p>The message also contains a malicious link that downloads the same malware. Perhaps to make sure that you really get infected.</p>
<p>Anyway, this infection is generated using iJava Drive-by Generator, which apparently has been around f&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=446">Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=446</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New malware strain locks up computers unless ransom is paid &#124; Security &amp; Privacy &#8211; CNET News</title>
		<link>https://securitywandering.com/?p=443</link>
		<comments>https://securitywandering.com/?p=443#comments</comments>
		<pubDate>Mon, 07 May 2012 19:47:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=443</guid>
		<description><![CDATA[<p>Over on the post &#8220;New malware strain locks up computers unless ransom is paid &#124; Security &#38; Privacy &#8211; CNET News&#8221; contains this text: &#8220; CNET News HomeReviews News Download CNET TV How To Marketplace Log In &#124; Join Breaking news Oracle v. Google jury returns partial verdict, favoring OracleShare: CNET News Security &#38; Privacy [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=443">New malware strain locks up computers unless ransom is paid | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-57429139-83/new-malware-strain-locks-up-computers-unless-ransom-is-paid/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">New malware strain locks up computers unless ransom is paid | Security &amp; Privacy &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;</em></p></blockquote>
<p>CNET News</p>
<p>HomeReviews News Download CNET TV How To Marketplace Log In | Join</p>
<p>Breaking news Oracle v. Google jury returns partial verdict, favoring OracleShare: CNET News Security &amp; Privacy New malware strain locks up computers unless ransom is paid A type of &#8216;ransomware&#8217; hitting users across Europe demands payment for alleged copyright violations, according to a Swiss security blog.</p>
<p>by Lance Whitney May 7, 2012 8:50 AM PDT 20 CommentsFacebook54Twitter71Linked In23More (Credit: abuse.ch) A campaign of &#8216;ransomware&#8217; is locking people out of their computers unless they pony up the right amount of money. Spotted by security blog abuse.ch, the malware taps into an exploit kit known as &#8216;Blackhole.&#8217; Sold underground, Blackhole is used by criminals to infect computers through security holes in the browser or third-party plug-ins, such as Java and Adobe Reader. If the version of Java, for example, is not up to date with the latest patches, the downloaded file will exploit the software'&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=443">New malware strain locks up computers unless ransom is paid | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=443</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Microsoft detects new malware targeting Apple computers &#8211; Computerworld</title>
		<link>https://securitywandering.com/?p=434</link>
		<comments>https://securitywandering.com/?p=434#comments</comments>
		<pubDate>Thu, 03 May 2012 12:56:57 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=434</guid>
		<description><![CDATA[<p>Over on the post &#8220;Microsoft detects new malware targeting Apple computers &#8211; Computerworld&#8221; contains this text: &#8220;Skip the navigation Computerworld White Papers Webcasts Newsletters Solution Centers Events Magazine Twitter Facebook RSS Topics News In Depth Reviews Blogs Opinion Shark Tank IT Jobs More IT Verticals Security App Security&#124;Business Continuity&#124;Cybercrime and Hacking&#124;DRM and Legal Issues&#124;Data Security&#124;Malware [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=434">Microsoft detects new malware targeting Apple computers &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://www.computerworld.com/s/article/9226777/Microsoft_detects_new_malware_targeting_Apple_computers?source=rss_security&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+computerworld%2Fs%2Ffeed%2Ftopic%2F17+%28Computerworld+Security+News%29">Microsoft detects new malware targeting Apple computers &#8211; Computerworld</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Skip the navigation</em></p></blockquote>
<p>Computerworld White Papers Webcasts Newsletters Solution Centers Events Magazine Twitter Facebook RSS</p>
<p>Topics News In Depth Reviews Blogs Opinion Shark Tank IT Jobs More IT Verticals Security App Security|Business Continuity|Cybercrime and Hacking|DRM and Legal Issues|Data Security|Malware and Vulnerabilities|Privacy|Security Hardware and Software</p>
<p>74  </p>
<p>3   1 Submit 6 Email</p>
<p>Home &gt; Security &gt; Malware and Vulnerabilities News Microsoft detects new malware targeting Apple computers Apple users should be sure their Mac version of Office has up-to-date patches</p>
<p>By Jeremy Kirk May 2, 2012 12:18 AM ET2 Comments . What&#8217;s this? IDG News Service &#8211; Microsoft has detected a new piece of malware targeting Apple OS X computers that exploits a vulnerability in the Office productivity suite patched nearly three years ago.</p>
<p>The malware is not widespread, wrote Jeong Wook Oh of Microsoft&#8217;s Malware Protection Center. But it does show that hackers pay attention if it&#8217;s found pe&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=434">Microsoft detects new malware targeting Apple computers &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=434</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
