<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; Product info</title>
	<atom:link href="https://securitywandering.com/?cat=12&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Symantec scraps RSA tokens &#8211; Web/client &#8211; SC Magazine Australia &#8211; Secure Business Intelligence</title>
		<link>https://securitywandering.com/?p=272</link>
		<comments>https://securitywandering.com/?p=272#comments</comments>
		<pubDate>Fri, 08 Jul 2011 12:36:42 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=272</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Symantec scraps RSA tokens &#8211; Web/client &#8211; SC Magazine Australia &#8211; Secure Business Intelligence&#8221; contains this text: &#8220;Symantec scraps RSA tokens By Darren Pauli on Jul 8, 2011 2:16 PM Filed under Web/client Managed Security Services? customers &#8220;encouraged&#8221; to dump RSA. inShare Comment Now and 3 Reactions Symantec has begun [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=272">Symantec scraps RSA tokens &#8211; Web/client &#8211; SC Magazine Australia &#8211; Secure Business Intelligence</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.scmagazine.com.au/News/263046,symantec-scraps-rsa-tokens.aspx">Symantec scraps RSA tokens &#8211; Web/client &#8211; SC Magazine Australia &#8211; Secure Business Intelligence</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Symantec scraps RSA tokens By Darren Pauli on Jul 8, 2011 2:16 PM Filed under Web/client Managed Security Services? customers &#8220;encouraged&#8221; to dump RSA.</p>
<p><span style="font-style: normal;"><em></p>
<p style="display: inline !important;">inShare  Comment Now and 3 Reactions Symantec has begun to replace its global fleet of RSA SecurID tokens following its acquisition of VeriSign&#8217;s Authentication Services last year.</p>
<p></em></span></p>
<p>The swap comes in the wake of the high-profile breach of RSA tokens in March, although the company said it already had planned to &#8220;eat its own cookie&#8221; and  dump RSA for Versign&#8217;s Public Key Infrastructure platform.</p>
<p>The SecurID token system, used globally by Symantec, was compromised in a multi-pronged attack this year, forcing RSA to replace the keys for some affected customers and offer security services to others.</p>
<p>&#8220;There has been a long-running transition to Versign since the acqusition,&#8221; Symantec said.</p>
<p>Symantec reportedly kicked off the transition overnight by enabling support of VeriSign Identity Protection (VIP) and X.509 certificates for its Managed Security Services (MSS).</p>
<p>&#8220;&#8230; customers accessing the MSS portal will see these new capabilities. This release begins Symantec MSS’ migration away from using RSA SecurID tokens for portal access,&#8221; a unverified pastebin post said. Symantec spokeswoman Debbie Sassine could not immediately validate the information this morning.</p>
<p></em></p>
<p><em>&#8220;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=272">Symantec scraps RSA tokens &#8211; Web/client &#8211; SC Magazine Australia &#8211; Secure Business Intelligence</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=272</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>what happens when airlines merge&#8230;or why no ones cares once they get your cash</title>
		<link>https://securitywandering.com/?p=266</link>
		<comments>https://securitywandering.com/?p=266#comments</comments>
		<pubDate>Thu, 07 Jul 2011 13:05:53 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[Staying off the grid]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=266</guid>
		<description><![CDATA[<p>So the story goes something like this. bout airplane tickest a while ago&#8230;..great priceDay before try to get 2 seats together  online at check in&#8230;. That did not happen, normal not a big deal.but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>So the story goes something like this.</p>
<p>bout airplane tickest a while ago&#8230;..great price<br />Day before try to get 2 seats together  online at check in&#8230;.</p>
<p>That did not happen, normal not a big deal.<br />but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife.</p>
<p>Security at the airport was a breeze for everyone including the wife in her ankle boot contraption.<br />security made sure that the kid did not go wondering off well mom got scanned.<br />I get to deal with the 10 little gray bins and getting them thru the xray thing<br />as odd as it sounds it was like they wanted to help&#8230;.got to love that.</p>
<p>Get to the gate wait for the gate folks to get there.<br />Now the gate folks had always been very helpful  for me</p>
<p>So I know they could easily fix the seating issue for me&#8230;..</p>
<p>WRONG<br />&#8220;the flight is full figure it out yourself when you get on the plane&#8221; <br />The message from the gate folks</p>
<p>it was like they were more concerned about themselves then helping me an mine.<br />no even an earl boarding invite&#8230;.wife in a walking boot for her ankle injure and 7 year old boy&#8230;.</p>
<p>so we wait and yet more self involved airline folks come and go.</p>
<p>they open the plane for boarding&#8230;</p>
<p>final yet another group of airline folks&#8230;<br />about half way thu boarding we get invited to board after the wife hobbles around in the waiting line.</p>
<p>I new face from airline&#8230;.who had just helped a 13 year old traveling alone&#8230; was the yes please go bored voice of reason</p>
<p>we go down the empty gate ramp took like 5 minutes down hill walking slow&#8230;.<br />get on the plane and there are people sitting in all of our seats&#8230;.<br />kid starts crying&#8230; have i mentioned yet that the wife &#8220;does not like to fly &#8220;motion sickens&#8221;&#8221;</p>
<p>get the tickets from the wife&#8230;<br />kick an old couple out of my seat and the 13 year old seat&#8230;.<br />then the 13 year old says I&#8217;ll change with you..</p>
<p>So the the wife and the kids get 2 seats together&#8230;..finally<br />the 13 year old stranger gets a window seat beind me&#8230;</p>
<p>Oh yeah forgot to mention the flight crew losing it because we had stopped anyone from boarding  the plane.<br />that kind of happens on the small jets  when you are in row 3 waiting for some folks to move out of your seats&#8230;.</p>
<p>longer story short..</p>
<p>flight was great 20 minutes early kind of great.</p>
<p>moral of the story you should always call the airplane phone support folks to fix seating issues and wait on hold for an hour to talk to <br />SAM &#8220;shrewas&#8221;  who think that the yankees are a florida baseball team&#8230;&#8230;</p>
<p> </p>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=266</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Facebook spam prevention scam spreading like wildfire • The Register</title>
		<link>https://securitywandering.com/?p=239</link>
		<comments>https://securitywandering.com/?p=239#comments</comments>
		<pubDate>Thu, 12 May 2011 11:46:03 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=239</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Facebook spam prevention scam spreading like wildfire • The Register&#8221; contains this text: Facebook spam prevention scam spreading like wildfire Alert Print Post comment Retweet Facebook Social media worm d&#8217;jour By John Leyden • Get more from this author Posted in Spam, 12th May 2011 10:22 GMT Free whitepaper – BitDefender [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=239">Facebook spam prevention scam spreading like wildfire • The Register</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.theregister.co.uk/2011/05/12/facebook_spam_prevention_scam/">Facebook spam prevention scam spreading like wildfire • The Register</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p>Facebook spam prevention scam spreading like wildfire Alert Print Post comment Retweet Facebook Social media worm d&#8217;jour By John Leyden • Get more from this author</p>
<p>Posted in Spam, 12th May 2011 10:22 GMT Free whitepaper – BitDefender Business Solutions v3.5 The growing prevalence of junk messages on Facebook is been used to bait a new scam doing the rounds on the social network.</p>
<p>Prospective marks in receipt of the fraudulent messages are invited to &#8216;verify&#8217; their account in order to &#8216;prevent spam&#8217;. Recipients who respond to the message by clicking on a link end up sharing it on their wall as well as spreading highly obfuscated JavaScript.</p>
<p></em></p>
<p><em>&#8216;With all the unexpected Sharing going on, this message has spread like wild-fire,&#8217; warns net security firm Sophos. &#8216;Instead of preventing spam, this par&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=239">Facebook spam prevention scam spreading like wildfire • The Register</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=239</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Spot Connect sends location data when there&#8217;s no wireless available</title>
		<link>https://securitywandering.com/?p=221</link>
		<comments>https://securitywandering.com/?p=221#comments</comments>
		<pubDate>Wed, 11 May 2011 19:28:03 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=221</guid>
		<description><![CDATA[<p>  Over on the post &#8220;The Spot Connect sends location data when there&#8217;s no wireless available&#8221; contains this text: The Spot Connect sends location data when there&#8217;s no wireless available By Mark Gibbs, Network World May 11, 2011 09:56 AM ET Comment Print Do you need to boldly go where you haven&#8217;t gone before and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=221">The Spot Connect sends location data when there&#8217;s no wireless available</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.networkworld.com/columnists/2011/051111-gearhead.html?source=nww_rss">The Spot Connect sends location data when there&#8217;s no wireless available</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p><span style="font-style: normal;"><em></p>
<p style="display: inline !important;">The Spot Connect sends location data when there&#8217;s no wireless available By Mark Gibbs, Network World May 11, 2011 09:56 AM ET</p>
<p></em></span></p>
<p>Comment Print</p>
<p></em></p>
<p><em>Do you need to boldly go where you haven&#8217;t gone before and where cellphone service may not be available? You might just need the Spot Connect, a waterproof (to 1 meter for 30 minutes) GPS receiver combined with a low earth orbit satellite messaging system that connects via Bluetooth to smartphones in a package that is just 3-inch-by-2.6-inch-by-1.2-inch and &#8220;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=221">The Spot Connect sends location data when there&#8217;s no wireless available</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=221</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>What LastPass security issue means for RoboForm (Q&amp;A) &#124; Security &#8211; CNET News</title>
		<link>https://securitywandering.com/?p=213</link>
		<comments>https://securitywandering.com/?p=213#comments</comments>
		<pubDate>Wed, 11 May 2011 19:08:41 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=213</guid>
		<description><![CDATA[<p>  Over on the post &#8220;What LastPass security issue means for RoboForm (Q&#38;A) &#124; Security &#8211; CNET News&#8221; contains this text: MAY 11, 2011 6:33 AM PDT What LastPass security issue means for RoboForm (Q&#38;A) by Lance Whitney Print E-mail 8 comments Share After LastPass reported a possible security breach and potential theft of some [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=213">What LastPass security issue means for RoboForm (Q&#038;A) | Security &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-20061445-83.html?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">What LastPass security issue means for RoboForm (Q&amp;A) | Security &#8211; CNET News</a></em>&#8221; contains this text:</p>
<p><em></p>
<p style="display: inline !important;">MAY 11, 2011 6:33 AM PDT What LastPass security issue means for RoboForm (Q&amp;A) by Lance Whitney Print E-mail 8 comments</p>
<p></em></p>
<blockquote><p><em></p>
<p>Share After LastPass reported a possible security breach and potential theft of some of its users&#8217; master passwords last week, we wondered what it meant for other password managers, such as RoboForm. Both LastPass and RoboForm help you create and manage strong passwords to log into the increasing array of secure Web sites that we all juggle these days. But is there an inherent vulnerability in relying on a single service to keep track of all your passwords? Should RoboForm users be concerned about the possibility of a similar &#8216;anomaly&#8217; exposing any of their data?</p>
<p></em></p>
<p><em>Bill Carey, RoboForm&#8217;s vice president of marketing (Credit: RoboFor&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=213">What LastPass security issue means for RoboForm (Q&#038;A) | Security &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=213</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Enterprise Security Today &#124; EC2 Outage Takes Out Multiple Sites, Including Foursquare</title>
		<link>https://securitywandering.com/?p=184</link>
		<comments>https://securitywandering.com/?p=184#comments</comments>
		<pubDate>Fri, 22 Apr 2011 13:12:44 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=184</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;Enterprise Security Today &#124; EC2 Outage Takes Out Multiple Sites, Including Foursquare&#8221; contains this text: &#8220;EC2 Outage Takes Out Multiple Sites, Including Foursquare By Barry Levine April 21, 2011 1:54PM Foursquare and other web sites were affected by problems at Amazon&#8217;s Elastic Compute Cloud data center. Amazon said additional capacity [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=184">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.enterprise-security-today.com/story.xhtml?story_id=78253">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;EC2 Outage Takes Out Multiple Sites, Including Foursquare By Barry Levine April 21, 2011 1:54PM</em></p>
<p><em> </em></p>
<p><em>Foursquare and other web sites were affected by problems at Amazon&#8217;s Elastic Compute Cloud data center. Amazon said additional capacity was added to support EC2&#8217;s &#8216;affected availability zone&#8217; in Virginia. The outage is likely to add to the debate about reliability and security when using a vendor data center like Amazon&#8217;s EC2.   Related Topics 	Foursquare 	Amazon 	EC2 	Outage 	Data Center 	Security Latest News 	EC2 Outage Takes Out Multiple Sites 	National Lab Needs Cybersecurity 	Your iPhone Knows Where You Were 	U.S. CIO Sets Ambitious Cloud Goals 	Windows 8: What&#8217;s in Store for OS?</p>
<p></em><em> </em><em> </em></p>
<p><em>Amazon&#8217;s cloud -based platform suffered outages Thursday. The company said the problems involved latency and other errors, and it brought down the web sites of Foursquare, Quora, HootSuite, Reddit and other companies. The problems hit the part of Amazon Elastic Compute Cloud (EC2) that supports start-ups. In a statement, Amazon said it is &#8216;now seeing significantly reduced failures and latency,&#8217; and it continues to recover. It added that additional capacity has been brought online to support &#8216;the affected availability zone.'&#8221;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=184">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=184</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</title>
		<link>https://securitywandering.com/?p=180</link>
		<comments>https://securitywandering.com/?p=180#comments</comments>
		<pubDate>Thu, 21 Apr 2011 17:02:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[software issues]]></category>
		<category><![CDATA[feat]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=180</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App&#8221; contains this text: &#8220;iSpy Conspiracy: Break Apple’s Secret Tracking with This App &#160; Sam Biddle — Not entirely cool with the idea of your iPhone or iPad following your every move without your consent? Understandable! Luckily, only a day after the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=180">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://gizmodo.com/#!5794369/ispy-conspiracy-break-apples-secret-tracking-with-this-app">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;iSpy Conspiracy: Break Apple’s Secret Tracking with This App</em></p>
<p><em>&nbsp;</p>
<p>Sam Biddle — Not entirely cool with the idea of your iPhone or iPad following your every move without your consent? Understandable! Luckily, only a day after the privacy revelation, a fix has been cooked up that switches off Apple&#8217;s covert tracking. The root of the tracking problem is a single file that logs your location. Untrackerd nukes the location logs from that database. Although it requires a jailbroken device, it&#8217;s a cinch to use—it simply runs in the background, erasing that dubious info: &#8216;A package installs a daemon (process that can run in the background) to clean consolidated.db file. No new icons are added to your homescreen. There are no options to configure.&#8217;</p>
<p>Sounds good to us! This is, however, only a bandaid—a fairly inconvenient bandaid. This is a problem that affects and potentially compromises the privacy of every single iPhone and iPad user. And most of these users aren&#8217;t ever going to consider jailbreaking.</p>
<p></em><em> </em></p>
<p><em>So as much as Untrackerd is a laudable effort, it answers none of the underlying questions about why this data was being logged in the first place where normal—not just carriers and law enforcement—can get to it from our computers and handsets. The only real fix will be one that comes from Apple, allowing all users to opt-out of the tracking with a simple tap. Or hey, crazy idea—don&#8217;t have it enabled to begin with. [via TNW]&#8221;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=180">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=180</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Facebook’s two-factor authentication announcement raises questions &#124; Naked Security</title>
		<link>https://securitywandering.com/?p=178</link>
		<comments>https://securitywandering.com/?p=178#comments</comments>
		<pubDate>Thu, 21 Apr 2011 14:12:19 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[good practices]]></category>
		<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=178</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Facebook’s two-factor authentication announcement raises questions &#124; Naked Security&#8221; contains this text: &#8220;cebook&#8217;s two-factor authentication announcement raises questions Hi there! If you&#8217;re new here, you might want to subscribe to the RSS feed for updates. X   by Graham Cluley on April 21, 2011 &#124; Comments (8) FILED UNDER: Data [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=178">Facebook’s two-factor authentication announcement raises questions | Naked Security</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://nakedsecurity.sophos.com/2011/04/21/facebook-two-factor-authentication-announcement-raises-questions/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29">Facebook’s two-factor authentication announcement raises questions | Naked Security</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;cebook&#8217;s two-factor authentication announcement raises questions Hi there! If you&#8217;re new here, you might want to subscribe to the RSS feed for updates. X</p>
<p> </p>
<p>by Graham Cluley on April 21, 2011	 | Comments (8) FILED UNDER: Data loss, Featured, Mobile, Social networks Amid mounting criticism of Facebook&#8217;s attitude to its users&#8217; privacy and safety, the social network has announced that it is introducing a two-factor authentication system in an attempt to prevent unauthorised logins to accounts.</p>
<p></em></p>
<p><em>The idea is that if you log into your Facebook account from a computer or mobile device that Facebook doesn&#8217;t recognise as one that you have used before to access the website, then you&#8217;ll have to enter a code to confirm you are who you say you are.&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=178">Facebook’s two-factor authentication announcement raises questions | Naked Security</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=178</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Actually, iPhone sends your location to Apple twice a day &#8211; F-Secure Weblog : News from the Lab</title>
		<link>https://securitywandering.com/?p=176</link>
		<comments>https://securitywandering.com/?p=176#comments</comments>
		<pubDate>Thu, 21 Apr 2011 14:08:02 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=176</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Actually, iPhone sends your location to Apple twice a day &#8211; F-Secure Weblog : News from the Lab&#8221; contains this text: &#8220;esterday, security researchers Pete Warden and Alasdair Allan released an application that can take such a file and show your movements on a map.   Now, this sounds bad [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=176">Actually, iPhone sends your location to Apple twice a day &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.f-secure.com/weblog/archives/00002145.html">Actually, iPhone sends your location to Apple twice a day &#8211; F-Secure Weblog : News from the Lab</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;esterday, security researchers Pete Warden and Alasdair Allan released an application that can take such a file and show your movements on a map.</p>
<p> </p>
<p>Now, this sounds bad from a privacy viewpoint. For example, authorities could gain a court order to do a forensic examination on your phone to figure out where you&#8217;ve been.</p>
<p>But why is Apple collecting this information to begin with? We don&#8217;t know for sure. But we&#8217;re guessing it&#8217;s likely related to Apple&#8217;s global location database.</p>
<p>Like Google, Apple maintains a global database of the locations of Wi-Fi networks. They use this to get an estimate of your location without using GPS. For example, if your handset sees three hotspots which have MAC addresses that Apple knows are within a certain city block in London, it&#8217;s a fair bet you&#8217;re in that city block.</p>
<p>We know how Google collected their location database: they recorded them world-wide while they had their Google Maps Street View cars driving around the globe.</p>
<p>Where did Apple get their location database? They used to license it from a company called Skyhook. How did Skyhook obtain this information? Well, they had their own cars drive around the world, just like Google.</p>
<p>However, the Skyhook database is expensive. So beginning with iPhone OS 3.2 released in April 2010, Apple started replacing the Skyhook location database with their own location database.</p>
<p>And the real question is: How did Apple create their own location database? They did not have cars driving around the world. They didn&#8217;t need to. They had existing iPhone owners around the world do the work for them.</p>
<p>If you run a modern iPhone, it will send your location history to Apple twice a day. This is the default operation of the device.</p>
<p>How can they do this? By asking for your permission first. There is an opt-in process during initial iTunes installation, but the prompt is highly misleading:</p>
<p>The iTunes prompt talks about helping Apple with Diagnostics information. It says nothing about recording your locations. If you take the time to read Apple&#8217;s Privacy Policy, it does explain what they are doing:</p>
<p>To provide location-based services on Apple products, Apple and our partners    and licensees may collect, use, and share precise location data, including the    real-time geographic location of your Apple computer or device.    This location data is collected anonymously in a form that does not personally    identify you and is used by Apple and our partners and licensees to provide and    improve location-based products and services.</p>
<p></em></p>
<p><em>We believe the new secret location database found on the devices is connected to this functionality. Apparently iPhones always collect your location information, even if it&#8217;s not getting sent to Apple. &#8220;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=176">Actually, iPhone sends your location to Apple twice a day &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=176</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Oracle to fix 73 security bugs next week &#124; Security &#8211; InfoWorld</title>
		<link>https://securitywandering.com/?p=146</link>
		<comments>https://securitywandering.com/?p=146#comments</comments>
		<pubDate>Mon, 18 Apr 2011 11:57:34 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=146</guid>
		<description><![CDATA[<p>Over on the post &#8220;Oracle to fix 73 security bugs next week &#124; Security &#8211; InfoWorld&#8221; contains this text: &#8220;Oracle to fix 73 security bugs next week But Java SE and Java for Business are not set to be updated By Robert McMillan &#124; IDG News Service Print&#124;Add a comment Oracle plans to release a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=146">Oracle to fix 73 security bugs next week | Security &#8211; InfoWorld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://www.infoworld.com/d/security/oracle-fix-73-security-bugs-next-week-001">Oracle to fix 73 security bugs next week | Security &#8211; InfoWorld</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Oracle to fix 73 security bugs next week<br />
But Java SE and Java for Business are not set to be updated</p>
<p>By Robert McMillan | IDG News Service<br />
Print|Add a comment</p>
<p>Oracle plans to release a large number of security patches for its various software products next week, including six bug-fixes for its flagship database software.</p>
<p>All told, there will be 73 security vulnerabilities fixed across Oracle&#8217;s various product lines. Oracle releases patches for all of its software &#8212; except the Java virtual machine &#8212; quarterly, in a set of patches it calls the Critical Patch Update (CPU).</p>
<p>[ Learn how to greatly reduce the threat of malicious attacks with InfoWorld&#8217;s Insider Threat Deep Dive PDF special report. ]</p>
<p>Next week&#8217;s CPU is due on Tuesday. There are nine fixes set for Oracle Fusion middleware, 14 for the PeopleSoft Suite and eight for the JD Edwards Suite.</p>
<p>Two of the database flaws are considered critical, meaning they &#8216;may be exploited over a network without the need for a username and password,&#8217; Oracle said in a statement posted to its website Thursday.&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=146">Oracle to fix 73 security bugs next week | Security &#8211; InfoWorld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=146</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
