<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; Cool Tech</title>
	<atom:link href="https://securitywandering.com/?cat=24&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</title>
		<link>https://securitywandering.com/?p=512</link>
		<comments>https://securitywandering.com/?p=512#comments</comments>
		<pubDate>Thu, 31 Oct 2013 21:16:56 +0000</pubDate>
		<dc:creator><![CDATA[lxc152]]></dc:creator>
				<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[Staying off the grid]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=512</guid>
		<description><![CDATA[<p>Driven by the people element. End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from &#8220;DEAD cousin NED&#8221;  and we apparently all [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=512">Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><strong>Driven by the people element.</strong></p>
<p>End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from &#8220;DEAD cousin NED&#8221;  and we apparently all have a &#8220;Nigerian relative that needs our help&#8221;.</p>
<p>I was just at a security conference were David Kennedy  aka rel1c the author of SET the founder of <a title="Trustedsec" href="https://www.trustedsec.com/">truestedsec</a> was presenting. His talk was on burning down security as we know it and his demo did not work because of the OSX maverick upgrade. OR as I see it Steve jobs from the great beyond,  the demo portion of these talks used to be the real value of security conferences.  They provide good stories and the proof of what we all know and a way to show the risk.  Over the last Year FUD and good stories have really gone the way of the dinosaurs.  Having to prove that something bad could and does happens seems to have gone from a lot of proof  and good stories to just de facto accepted thanks to <a title="Adobe" href="http://www.usatoday.com/story/cybertruth/2013/10/03/adobe-loses-29-mil-customer-records-source-code/2919229/">Adobe</a> and their issues&#8230;&#8230; and Dave on the <a href="http://katiecouric.com/features/how-to-protect-yourself-against-cyber-attacks/">Katie Couric show</a><a title="Kaltie Couric show" href="http://katiecouric.com/features/how-to-protect-yourself-against-cyber-attacks/"> </a> .</p>
<p>Oh yeah back to Steve Jobs and his hate for all things Adobe&#8230;<br />
As a senior checkpoint executive said at the same conference Steve dies and 6 months later Apple is softer on Adobe and he see on his home network from a mac his first malware/trojanware.</p>
<p>How very odd java is getting harder to manipulate but Flash and Air maybe it&#8217;s replacement for the darkside who generally also want your browsers cookies&#8230;Or yes they have cookies&#8230;</p>
<p>&nbsp;</p>
<p>till later</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=512">Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=512</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Check Point aims for 1Tbps firewall &#124; Security &#8211; InfoWorld</title>
		<link>https://securitywandering.com/?p=286</link>
		<comments>https://securitywandering.com/?p=286#comments</comments>
		<pubDate>Tue, 02 Aug 2011 23:56:43 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Cool Tech]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=286</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Check Point aims for 1Tbps firewall &#124; Security &#8211; InfoWorld&#8221; contains this text: AUGUST 02, 2011 Check Point aims for 1Tbps firewall Among the company&#8217;s latest hardware offerings is a chassis that will grow to support 1Tbps throughput By Tim Greene &#124; Network World Print&#124;Add a comment Check Point Software [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=286">Check Point aims for 1Tbps firewall | Security &#8211; InfoWorld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.infoworld.com/d/security/check-point-aims-1tbps-firewall-168735?source=rss_security">Check Point aims for 1Tbps firewall | Security &#8211; InfoWorld</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p>AUGUST 02, 2011 Check Point aims for 1Tbps firewall Among the company&#8217;s latest hardware offerings is a chassis that will grow to support 1Tbps throughput</p>
<p>By Tim Greene | Network World Print|Add a comment</p>
<p>Check Point Software has new, heavy-duty security gateway hardware for data centers and service providers, including one chassis that will grow to support a 1Tbps firewall.</p>
<p>The new device, called Check Point 61000, is available now, and fully loaded the 14-slot chassis achieves 200Gbps firewall throughput, with that number growing to 400Gbps next year with new blades and eventually to 1Tbps with yet another generation of blades, the company says. Pricing starts at $195,000.</p>
<p></em></p>
<p><em>[ Master your security with InfoWorld&#8217;s interactive Security iGuide. | Stay up to date on t&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=286">Check Point aims for 1Tbps firewall | Security &#8211; InfoWorld</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=286</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Symantec scraps RSA tokens &#8211; Web/client &#8211; SC Magazine Australia &#8211; Secure Business Intelligence</title>
		<link>https://securitywandering.com/?p=272</link>
		<comments>https://securitywandering.com/?p=272#comments</comments>
		<pubDate>Fri, 08 Jul 2011 12:36:42 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=272</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Symantec scraps RSA tokens &#8211; Web/client &#8211; SC Magazine Australia &#8211; Secure Business Intelligence&#8221; contains this text: &#8220;Symantec scraps RSA tokens By Darren Pauli on Jul 8, 2011 2:16 PM Filed under Web/client Managed Security Services? customers &#8220;encouraged&#8221; to dump RSA. inShare Comment Now and 3 Reactions Symantec has begun [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=272">Symantec scraps RSA tokens &#8211; Web/client &#8211; SC Magazine Australia &#8211; Secure Business Intelligence</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.scmagazine.com.au/News/263046,symantec-scraps-rsa-tokens.aspx">Symantec scraps RSA tokens &#8211; Web/client &#8211; SC Magazine Australia &#8211; Secure Business Intelligence</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Symantec scraps RSA tokens By Darren Pauli on Jul 8, 2011 2:16 PM Filed under Web/client Managed Security Services? customers &#8220;encouraged&#8221; to dump RSA.</p>
<p><span style="font-style: normal;"><em></p>
<p style="display: inline !important;">inShare  Comment Now and 3 Reactions Symantec has begun to replace its global fleet of RSA SecurID tokens following its acquisition of VeriSign&#8217;s Authentication Services last year.</p>
<p></em></span></p>
<p>The swap comes in the wake of the high-profile breach of RSA tokens in March, although the company said it already had planned to &#8220;eat its own cookie&#8221; and  dump RSA for Versign&#8217;s Public Key Infrastructure platform.</p>
<p>The SecurID token system, used globally by Symantec, was compromised in a multi-pronged attack this year, forcing RSA to replace the keys for some affected customers and offer security services to others.</p>
<p>&#8220;There has been a long-running transition to Versign since the acqusition,&#8221; Symantec said.</p>
<p>Symantec reportedly kicked off the transition overnight by enabling support of VeriSign Identity Protection (VIP) and X.509 certificates for its Managed Security Services (MSS).</p>
<p>&#8220;&#8230; customers accessing the MSS portal will see these new capabilities. This release begins Symantec MSS’ migration away from using RSA SecurID tokens for portal access,&#8221; a unverified pastebin post said. Symantec spokeswoman Debbie Sassine could not immediately validate the information this morning.</p>
<p></em></p>
<p><em>&#8220;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=272">Symantec scraps RSA tokens &#8211; Web/client &#8211; SC Magazine Australia &#8211; Secure Business Intelligence</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=272</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>what happens when airlines merge&#8230;or why no ones cares once they get your cash</title>
		<link>https://securitywandering.com/?p=266</link>
		<comments>https://securitywandering.com/?p=266#comments</comments>
		<pubDate>Thu, 07 Jul 2011 13:05:53 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[Staying off the grid]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=266</guid>
		<description><![CDATA[<p>So the story goes something like this. bout airplane tickest a while ago&#8230;..great priceDay before try to get 2 seats together  online at check in&#8230;. That did not happen, normal not a big deal.but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>So the story goes something like this.</p>
<p>bout airplane tickest a while ago&#8230;..great price<br />Day before try to get 2 seats together  online at check in&#8230;.</p>
<p>That did not happen, normal not a big deal.<br />but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife.</p>
<p>Security at the airport was a breeze for everyone including the wife in her ankle boot contraption.<br />security made sure that the kid did not go wondering off well mom got scanned.<br />I get to deal with the 10 little gray bins and getting them thru the xray thing<br />as odd as it sounds it was like they wanted to help&#8230;.got to love that.</p>
<p>Get to the gate wait for the gate folks to get there.<br />Now the gate folks had always been very helpful  for me</p>
<p>So I know they could easily fix the seating issue for me&#8230;..</p>
<p>WRONG<br />&#8220;the flight is full figure it out yourself when you get on the plane&#8221; <br />The message from the gate folks</p>
<p>it was like they were more concerned about themselves then helping me an mine.<br />no even an earl boarding invite&#8230;.wife in a walking boot for her ankle injure and 7 year old boy&#8230;.</p>
<p>so we wait and yet more self involved airline folks come and go.</p>
<p>they open the plane for boarding&#8230;</p>
<p>final yet another group of airline folks&#8230;<br />about half way thu boarding we get invited to board after the wife hobbles around in the waiting line.</p>
<p>I new face from airline&#8230;.who had just helped a 13 year old traveling alone&#8230; was the yes please go bored voice of reason</p>
<p>we go down the empty gate ramp took like 5 minutes down hill walking slow&#8230;.<br />get on the plane and there are people sitting in all of our seats&#8230;.<br />kid starts crying&#8230; have i mentioned yet that the wife &#8220;does not like to fly &#8220;motion sickens&#8221;&#8221;</p>
<p>get the tickets from the wife&#8230;<br />kick an old couple out of my seat and the 13 year old seat&#8230;.<br />then the 13 year old says I&#8217;ll change with you..</p>
<p>So the the wife and the kids get 2 seats together&#8230;..finally<br />the 13 year old stranger gets a window seat beind me&#8230;</p>
<p>Oh yeah forgot to mention the flight crew losing it because we had stopped anyone from boarding  the plane.<br />that kind of happens on the small jets  when you are in row 3 waiting for some folks to move out of your seats&#8230;.</p>
<p>longer story short..</p>
<p>flight was great 20 minutes early kind of great.</p>
<p>moral of the story you should always call the airplane phone support folks to fix seating issues and wait on hold for an hour to talk to <br />SAM &#8220;shrewas&#8221;  who think that the yankees are a florida baseball team&#8230;&#8230;</p>
<p> </p>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=266</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Facebook spam prevention scam spreading like wildfire • The Register</title>
		<link>https://securitywandering.com/?p=239</link>
		<comments>https://securitywandering.com/?p=239#comments</comments>
		<pubDate>Thu, 12 May 2011 11:46:03 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=239</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Facebook spam prevention scam spreading like wildfire • The Register&#8221; contains this text: Facebook spam prevention scam spreading like wildfire Alert Print Post comment Retweet Facebook Social media worm d&#8217;jour By John Leyden • Get more from this author Posted in Spam, 12th May 2011 10:22 GMT Free whitepaper – BitDefender [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=239">Facebook spam prevention scam spreading like wildfire • The Register</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.theregister.co.uk/2011/05/12/facebook_spam_prevention_scam/">Facebook spam prevention scam spreading like wildfire • The Register</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p>Facebook spam prevention scam spreading like wildfire Alert Print Post comment Retweet Facebook Social media worm d&#8217;jour By John Leyden • Get more from this author</p>
<p>Posted in Spam, 12th May 2011 10:22 GMT Free whitepaper – BitDefender Business Solutions v3.5 The growing prevalence of junk messages on Facebook is been used to bait a new scam doing the rounds on the social network.</p>
<p>Prospective marks in receipt of the fraudulent messages are invited to &#8216;verify&#8217; their account in order to &#8216;prevent spam&#8217;. Recipients who respond to the message by clicking on a link end up sharing it on their wall as well as spreading highly obfuscated JavaScript.</p>
<p></em></p>
<p><em>&#8216;With all the unexpected Sharing going on, this message has spread like wild-fire,&#8217; warns net security firm Sophos. &#8216;Instead of preventing spam, this par&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=239">Facebook spam prevention scam spreading like wildfire • The Register</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=239</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Spot Connect sends location data when there&#8217;s no wireless available</title>
		<link>https://securitywandering.com/?p=221</link>
		<comments>https://securitywandering.com/?p=221#comments</comments>
		<pubDate>Wed, 11 May 2011 19:28:03 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=221</guid>
		<description><![CDATA[<p>  Over on the post &#8220;The Spot Connect sends location data when there&#8217;s no wireless available&#8221; contains this text: The Spot Connect sends location data when there&#8217;s no wireless available By Mark Gibbs, Network World May 11, 2011 09:56 AM ET Comment Print Do you need to boldly go where you haven&#8217;t gone before and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=221">The Spot Connect sends location data when there&#8217;s no wireless available</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.networkworld.com/columnists/2011/051111-gearhead.html?source=nww_rss">The Spot Connect sends location data when there&#8217;s no wireless available</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p><span style="font-style: normal;"><em></p>
<p style="display: inline !important;">The Spot Connect sends location data when there&#8217;s no wireless available By Mark Gibbs, Network World May 11, 2011 09:56 AM ET</p>
<p></em></span></p>
<p>Comment Print</p>
<p></em></p>
<p><em>Do you need to boldly go where you haven&#8217;t gone before and where cellphone service may not be available? You might just need the Spot Connect, a waterproof (to 1 meter for 30 minutes) GPS receiver combined with a low earth orbit satellite messaging system that connects via Bluetooth to smartphones in a package that is just 3-inch-by-2.6-inch-by-1.2-inch and &#8220;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=221">The Spot Connect sends location data when there&#8217;s no wireless available</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=221</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>What LastPass security issue means for RoboForm (Q&amp;A) &#124; Security &#8211; CNET News</title>
		<link>https://securitywandering.com/?p=213</link>
		<comments>https://securitywandering.com/?p=213#comments</comments>
		<pubDate>Wed, 11 May 2011 19:08:41 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=213</guid>
		<description><![CDATA[<p>  Over on the post &#8220;What LastPass security issue means for RoboForm (Q&#38;A) &#124; Security &#8211; CNET News&#8221; contains this text: MAY 11, 2011 6:33 AM PDT What LastPass security issue means for RoboForm (Q&#38;A) by Lance Whitney Print E-mail 8 comments Share After LastPass reported a possible security breach and potential theft of some [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=213">What LastPass security issue means for RoboForm (Q&#038;A) | Security &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-20061445-83.html?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">What LastPass security issue means for RoboForm (Q&amp;A) | Security &#8211; CNET News</a></em>&#8221; contains this text:</p>
<p><em></p>
<p style="display: inline !important;">MAY 11, 2011 6:33 AM PDT What LastPass security issue means for RoboForm (Q&amp;A) by Lance Whitney Print E-mail 8 comments</p>
<p></em></p>
<blockquote><p><em></p>
<p>Share After LastPass reported a possible security breach and potential theft of some of its users&#8217; master passwords last week, we wondered what it meant for other password managers, such as RoboForm. Both LastPass and RoboForm help you create and manage strong passwords to log into the increasing array of secure Web sites that we all juggle these days. But is there an inherent vulnerability in relying on a single service to keep track of all your passwords? Should RoboForm users be concerned about the possibility of a similar &#8216;anomaly&#8217; exposing any of their data?</p>
<p></em></p>
<p><em>Bill Carey, RoboForm&#8217;s vice president of marketing (Credit: RoboFor&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=213">What LastPass security issue means for RoboForm (Q&#038;A) | Security &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=213</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Enterprise Security Today &#124; EC2 Outage Takes Out Multiple Sites, Including Foursquare</title>
		<link>https://securitywandering.com/?p=184</link>
		<comments>https://securitywandering.com/?p=184#comments</comments>
		<pubDate>Fri, 22 Apr 2011 13:12:44 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=184</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;Enterprise Security Today &#124; EC2 Outage Takes Out Multiple Sites, Including Foursquare&#8221; contains this text: &#8220;EC2 Outage Takes Out Multiple Sites, Including Foursquare By Barry Levine April 21, 2011 1:54PM Foursquare and other web sites were affected by problems at Amazon&#8217;s Elastic Compute Cloud data center. Amazon said additional capacity [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=184">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.enterprise-security-today.com/story.xhtml?story_id=78253">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;EC2 Outage Takes Out Multiple Sites, Including Foursquare By Barry Levine April 21, 2011 1:54PM</em></p>
<p><em> </em></p>
<p><em>Foursquare and other web sites were affected by problems at Amazon&#8217;s Elastic Compute Cloud data center. Amazon said additional capacity was added to support EC2&#8217;s &#8216;affected availability zone&#8217; in Virginia. The outage is likely to add to the debate about reliability and security when using a vendor data center like Amazon&#8217;s EC2.   Related Topics 	Foursquare 	Amazon 	EC2 	Outage 	Data Center 	Security Latest News 	EC2 Outage Takes Out Multiple Sites 	National Lab Needs Cybersecurity 	Your iPhone Knows Where You Were 	U.S. CIO Sets Ambitious Cloud Goals 	Windows 8: What&#8217;s in Store for OS?</p>
<p></em><em> </em><em> </em></p>
<p><em>Amazon&#8217;s cloud -based platform suffered outages Thursday. The company said the problems involved latency and other errors, and it brought down the web sites of Foursquare, Quora, HootSuite, Reddit and other companies. The problems hit the part of Amazon Elastic Compute Cloud (EC2) that supports start-ups. In a statement, Amazon said it is &#8216;now seeing significantly reduced failures and latency,&#8217; and it continues to recover. It added that additional capacity has been brought online to support &#8216;the affected availability zone.'&#8221;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=184">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=184</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</title>
		<link>https://securitywandering.com/?p=180</link>
		<comments>https://securitywandering.com/?p=180#comments</comments>
		<pubDate>Thu, 21 Apr 2011 17:02:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[software issues]]></category>
		<category><![CDATA[feat]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=180</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App&#8221; contains this text: &#8220;iSpy Conspiracy: Break Apple’s Secret Tracking with This App &#160; Sam Biddle — Not entirely cool with the idea of your iPhone or iPad following your every move without your consent? Understandable! Luckily, only a day after the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=180">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://gizmodo.com/#!5794369/ispy-conspiracy-break-apples-secret-tracking-with-this-app">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;iSpy Conspiracy: Break Apple’s Secret Tracking with This App</em></p>
<p><em>&nbsp;</p>
<p>Sam Biddle — Not entirely cool with the idea of your iPhone or iPad following your every move without your consent? Understandable! Luckily, only a day after the privacy revelation, a fix has been cooked up that switches off Apple&#8217;s covert tracking. The root of the tracking problem is a single file that logs your location. Untrackerd nukes the location logs from that database. Although it requires a jailbroken device, it&#8217;s a cinch to use—it simply runs in the background, erasing that dubious info: &#8216;A package installs a daemon (process that can run in the background) to clean consolidated.db file. No new icons are added to your homescreen. There are no options to configure.&#8217;</p>
<p>Sounds good to us! This is, however, only a bandaid—a fairly inconvenient bandaid. This is a problem that affects and potentially compromises the privacy of every single iPhone and iPad user. And most of these users aren&#8217;t ever going to consider jailbreaking.</p>
<p></em><em> </em></p>
<p><em>So as much as Untrackerd is a laudable effort, it answers none of the underlying questions about why this data was being logged in the first place where normal—not just carriers and law enforcement—can get to it from our computers and handsets. The only real fix will be one that comes from Apple, allowing all users to opt-out of the tracking with a simple tap. Or hey, crazy idea—don&#8217;t have it enabled to begin with. [via TNW]&#8221;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=180">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=180</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Facebook’s two-factor authentication announcement raises questions &#124; Naked Security</title>
		<link>https://securitywandering.com/?p=178</link>
		<comments>https://securitywandering.com/?p=178#comments</comments>
		<pubDate>Thu, 21 Apr 2011 14:12:19 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[good practices]]></category>
		<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=178</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Facebook’s two-factor authentication announcement raises questions &#124; Naked Security&#8221; contains this text: &#8220;cebook&#8217;s two-factor authentication announcement raises questions Hi there! If you&#8217;re new here, you might want to subscribe to the RSS feed for updates. X   by Graham Cluley on April 21, 2011 &#124; Comments (8) FILED UNDER: Data [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=178">Facebook’s two-factor authentication announcement raises questions | Naked Security</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://nakedsecurity.sophos.com/2011/04/21/facebook-two-factor-authentication-announcement-raises-questions/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29">Facebook’s two-factor authentication announcement raises questions | Naked Security</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;cebook&#8217;s two-factor authentication announcement raises questions Hi there! If you&#8217;re new here, you might want to subscribe to the RSS feed for updates. X</p>
<p> </p>
<p>by Graham Cluley on April 21, 2011	 | Comments (8) FILED UNDER: Data loss, Featured, Mobile, Social networks Amid mounting criticism of Facebook&#8217;s attitude to its users&#8217; privacy and safety, the social network has announced that it is introducing a two-factor authentication system in an attempt to prevent unauthorised logins to accounts.</p>
<p></em></p>
<p><em>The idea is that if you log into your Facebook account from a computer or mobile device that Facebook doesn&#8217;t recognise as one that you have used before to access the website, then you&#8217;ll have to enter a code to confirm you are who you say you are.&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=178">Facebook’s two-factor authentication announcement raises questions | Naked Security</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=178</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
