<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; software issues</title>
	<atom:link href="https://securitywandering.com/?cat=14&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</title>
		<link>https://securitywandering.com/?p=440</link>
		<comments>https://securitywandering.com/?p=440#comments</comments>
		<pubDate>Thu, 03 May 2012 13:02:21 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>
		<category><![CDATA[software issues]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=440</guid>
		<description><![CDATA[<p>Over on the post &#8220;Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab&#8221;  &#60;&#60;&#60; Wednesday, May 2, 2012 &#62;&#62;&#62;   Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster Posted by Sean @ 14:25 GMT &#124; Comments So how bad was last month&#8217;s Mac Flashback outbreak and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=440">Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://www.f-secure.com/weblog/archives/00002355.html">Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</a></em>&#8221; </p>
<p>&lt;&lt;&lt; Wednesday, May 2, 2012 &gt;&gt;&gt;   Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster Posted by Sean @ 14:25 GMT | Comments So how bad was last month&#8217;s Mac Flashback outbreak and who suffered the most? Our guess: it was bad, and university IT help desks. And it looks like our guess might not be far off the mark.</p>
<p>Oxford University Computing Services&#8217; network security team (aka OxCERT) has written that they dealt &#8216;with what is probably the biggest outbreak since Blaster struck the Windows world all the way back in the summer of 2003.&#8217;</p>
<p>OxCERT dealt with around 1000 incidents for Blaster. They&#8217;ve seen several hundred Flashback incidents… &#8216;and they keep on coming.&#8217;</p>
<p>Other institutions, such as The University o&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=440">Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=440</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Newest MacDefender scareware installs without a password &#8211; Computerworld</title>
		<link>https://securitywandering.com/?p=250</link>
		<comments>https://securitywandering.com/?p=250#comments</comments>
		<pubDate>Fri, 27 May 2011 15:11:47 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[software issues]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=250</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Newest MacDefender scareware installs without a password &#8211; Computerworld&#8221; contains this text: Security News Newest MacDefender scareware installs without a password Criminals &#8216;give Apple the finger,&#8217; says security researcher, by releasing new version just hours after Apple warned of fake AV software By Gregg Keizer May 25, 2011 03:35 PM [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=250">Newest MacDefender scareware installs without a password &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.computerworld.com/s/article/9217061/Newest_MacDefender_scareware_installs_without_a_password?source=rss_security&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+computerworld%2Fs%2Ffeed%2Ftopic%2F17+%28Computerworld+Security+News%29">Newest MacDefender scareware installs without a password &#8211; Computerworld</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p>Security News Newest MacDefender scareware installs without a password Criminals &#8216;give Apple the finger,&#8217; says security researcher, by releasing new version just hours after Apple warned of fake AV software<span style="font-style: normal;"><em></p>
<p style="display: inline !important;">By Gregg Keizer May 25, 2011 03:35 PM ETComments (24)Recommended (53) Computerworld &#8211; Hours after Apple owned up to a fake security software scam campaign, the &#8216;scareware&#8217; gang released a new variant, with a new name and a streamlined installation process that doesn&#8217;t prompt victims for their password, a French antivirus firm said today.</p>
<p></em></span></p>
<p></em></p>
<p><em>&#8216;Given the timing, and&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=250">Newest MacDefender scareware installs without a password &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=250</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Amazon EC2 cloud crashes &gt; Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security &gt; Network Access &gt; Access Control &gt; News &gt; SC Magazine Australia/NZ</title>
		<link>https://securitywandering.com/?p=182</link>
		<comments>https://securitywandering.com/?p=182#comments</comments>
		<pubDate>Thu, 21 Apr 2011 17:03:54 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[software issues]]></category>
		<category><![CDATA[feat]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=182</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;Amazon EC2 cloud crashes &#62; Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security &#62; Network Access &#62; Access Control &#62; News &#62; SC Magazine Australia/NZ&#8221; contains this text: &#8220;Amazon EC2 cloud crashes &#160; RELATED ARTICLES Amazon Web Services gains PCI security approval Cloud customers risk collateral DDoS Police.uk&#8217;s [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=182">Amazon EC2 cloud crashes > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.securecomputing.net.au/News/255332,amazon-ec2-cloud-crashes.aspx">Amazon EC2 cloud crashes &gt; Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security &gt; Network Access &gt; Access Control &gt; News &gt; SC Magazine Australia/NZ</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Amazon EC2 cloud crashes</em></p>
<p><em>&nbsp;</p>
<p>RELATED ARTICLES Amazon Web Services gains PCI security approval Cloud customers risk collateral DDoS Police.uk&#8217;s EC2-hosted crime site toppled WikiLeaks furious over Amazon ousting WikiLeaks suffers DDoS attack Amazon EC2 GPU becomes password cracker WikiLeaks war logs off Amazon&#8217;s US EC2 By Paul Briden Apr 22, 2011 1:38 AM Tags: Amazon | EC2 | Cloud | crashes Reddit, Foursquare, Quora and Hootsuite all fall victim to the downtime. Rumours of Amazon’s Elastic Compute Cloud hosting service going down today turned out to be true when Reddit, Foursquare, Quora and Hootsuite all went with it. Amazon’s Relational Database Service was also affected.</p>
<p></em><em> </em></p>
<p><em>The Virginia based EC2 appears to have started hiccupping around 1.48 AM PDT, which is around 9am UK time. Foursquare, Quora and Reddit all posted messages on their sites explaining the cause of their downtime while Amazon posted continual status updates:&#8221;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=182">Amazon EC2 cloud crashes > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=182</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</title>
		<link>https://securitywandering.com/?p=180</link>
		<comments>https://securitywandering.com/?p=180#comments</comments>
		<pubDate>Thu, 21 Apr 2011 17:02:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[software issues]]></category>
		<category><![CDATA[feat]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=180</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App&#8221; contains this text: &#8220;iSpy Conspiracy: Break Apple’s Secret Tracking with This App &#160; Sam Biddle — Not entirely cool with the idea of your iPhone or iPad following your every move without your consent? Understandable! Luckily, only a day after the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=180">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://gizmodo.com/#!5794369/ispy-conspiracy-break-apples-secret-tracking-with-this-app">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;iSpy Conspiracy: Break Apple’s Secret Tracking with This App</em></p>
<p><em>&nbsp;</p>
<p>Sam Biddle — Not entirely cool with the idea of your iPhone or iPad following your every move without your consent? Understandable! Luckily, only a day after the privacy revelation, a fix has been cooked up that switches off Apple&#8217;s covert tracking. The root of the tracking problem is a single file that logs your location. Untrackerd nukes the location logs from that database. Although it requires a jailbroken device, it&#8217;s a cinch to use—it simply runs in the background, erasing that dubious info: &#8216;A package installs a daemon (process that can run in the background) to clean consolidated.db file. No new icons are added to your homescreen. There are no options to configure.&#8217;</p>
<p>Sounds good to us! This is, however, only a bandaid—a fairly inconvenient bandaid. This is a problem that affects and potentially compromises the privacy of every single iPhone and iPad user. And most of these users aren&#8217;t ever going to consider jailbreaking.</p>
<p></em><em> </em></p>
<p><em>So as much as Untrackerd is a laudable effort, it answers none of the underlying questions about why this data was being logged in the first place where normal—not just carriers and law enforcement—can get to it from our computers and handsets. The only real fix will be one that comes from Apple, allowing all users to opt-out of the tracking with a simple tap. Or hey, crazy idea—don&#8217;t have it enabled to begin with. [via TNW]&#8221;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=180">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=180</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
