<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; Interesting information</title>
	<atom:link href="https://securitywandering.com/?cat=25&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>UH notifies 7,100 patients of stolen hard drive with personal medical information on it</title>
		<link>https://securitywandering.com/?p=520</link>
		<comments>https://securitywandering.com/?p=520#comments</comments>
		<pubDate>Thu, 07 Nov 2013 01:09:55 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Sec for Dumies]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=520</guid>
		<description><![CDATA[<p>CLEVELAND, Ohio &#8212; More than 7,100 University Hospitals patients received notification by mail this week that their protected personal medical information was potentially exposed after a hard drive containing physician office data was stolen from a third-party vendor helping to upgrade the health system&#8217;s computer systems . Someone stole the hard drive from the car [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=520">UH notifies 7,100 patients of stolen hard drive with personal medical information on it</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">CLEVELAND, Ohio &#8212; More than 7,100 University Hospitals patients received notification by mail this week that their protected personal medical information was potentially exposed after a hard drive containing physician office data was stolen from a third-party vendor helping to upgrade the health system&#8217;s computer systems .</p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Someone stole the hard drive from the car of one of the vendor’s employees, according to the letter. UH was informed of the theft Aug. 8, and the hospital system has been determining the exact information that was on the drive since then, said hospital spokeswoman Janice Guhl. </p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Link to full story</p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"><a href="http://www.cleveland.com/healthfit/index.ssf/2013/11/uh_notifies_7100_patients_of_l.html">http://www.cleveland.com/healthfit/index.ssf/2013/11/uh_notifies_7100_patients_of_l.html</a></p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=520">UH notifies 7,100 patients of stolen hard drive with personal medical information on it</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=520</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</title>
		<link>https://securitywandering.com/?p=516</link>
		<comments>https://securitywandering.com/?p=516#comments</comments>
		<pubDate>Fri, 01 Nov 2013 15:12:28 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=516</guid>
		<description><![CDATA[<p>Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent.   Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=516">Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h1 class="heading" style="list-style: none; padding: 0px; margin: 0px; -webkit-font-smoothing: antialiased; text-rendering: optimizelegibility; font-family: NoticiaBold, 'Times New Roman', serif; text-decoration: none; color: #263034; font-size: 30px; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps</h1>
<h2 class="standalone-deck" style="list-style: none; padding: 0px 0px 12px; margin: 0px 0px 8px; color: #657b83; font-size: 16px; font-weight: normal; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #dddddd; font-family: Arial, sans-serif; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent.</h2>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"> </p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"><span class="Apple-style-span" style="color: #000000; font-family: Helvetica; line-height: normal; font-size: medium;"><img title="badbios.jpg" src="http://securitywandering.com/wp-content/uploads/2013/11/badbios.jpg" alt="Badbios" width="600" height="337" border="0" /></span>Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused. He also found that the machine could delete data and undo configuration changes with no prompting. He didn&#8217;t know it then, but that odd firmware update would become a high-stakes malware mystery that would consume most of his waking hours.</p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">linked from:<br /> <a href="http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/">http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/</a></p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">it was just a matter of time before microcode injections into the controller on various sub systems of a computer would be targeted.<br />This is a very troubling discovery for many people. </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=516">Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=516</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</title>
		<link>https://securitywandering.com/?p=512</link>
		<comments>https://securitywandering.com/?p=512#comments</comments>
		<pubDate>Thu, 31 Oct 2013 21:16:56 +0000</pubDate>
		<dc:creator><![CDATA[lxc152]]></dc:creator>
				<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[Staying off the grid]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=512</guid>
		<description><![CDATA[<p>Driven by the people element. End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from &#8220;DEAD cousin NED&#8221;  and we apparently all [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=512">Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><strong>Driven by the people element.</strong></p>
<p>End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from &#8220;DEAD cousin NED&#8221;  and we apparently all have a &#8220;Nigerian relative that needs our help&#8221;.</p>
<p>I was just at a security conference were David Kennedy  aka rel1c the author of SET the founder of <a title="Trustedsec" href="https://www.trustedsec.com/">truestedsec</a> was presenting. His talk was on burning down security as we know it and his demo did not work because of the OSX maverick upgrade. OR as I see it Steve jobs from the great beyond,  the demo portion of these talks used to be the real value of security conferences.  They provide good stories and the proof of what we all know and a way to show the risk.  Over the last Year FUD and good stories have really gone the way of the dinosaurs.  Having to prove that something bad could and does happens seems to have gone from a lot of proof  and good stories to just de facto accepted thanks to <a title="Adobe" href="http://www.usatoday.com/story/cybertruth/2013/10/03/adobe-loses-29-mil-customer-records-source-code/2919229/">Adobe</a> and their issues&#8230;&#8230; and Dave on the <a href="http://katiecouric.com/features/how-to-protect-yourself-against-cyber-attacks/">Katie Couric show</a><a title="Kaltie Couric show" href="http://katiecouric.com/features/how-to-protect-yourself-against-cyber-attacks/"> </a> .</p>
<p>Oh yeah back to Steve Jobs and his hate for all things Adobe&#8230;<br />
As a senior checkpoint executive said at the same conference Steve dies and 6 months later Apple is softer on Adobe and he see on his home network from a mac his first malware/trojanware.</p>
<p>How very odd java is getting harder to manipulate but Flash and Air maybe it&#8217;s replacement for the darkside who generally also want your browsers cookies&#8230;Or yes they have cookies&#8230;</p>
<p>&nbsp;</p>
<p>till later</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=512">Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=512</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SQL Injection Attacks Up 69% ? Packet Storm</title>
		<link>https://securitywandering.com/?p=457</link>
		<comments>https://securitywandering.com/?p=457#comments</comments>
		<pubDate>Mon, 30 Jul 2012 20:04:52 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=457</guid>
		<description><![CDATA[<p>Over on the post &#8220;SQL Injection Attacks Up 69% ? Packet Storm&#8221; contains this text: &#8221; SQL Injection Attacks Up 69%Source ZDNetLink &#124; Favorite &#124; Comments (0)Close&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=457">SQL Injection Attacks Up 69% ? Packet Storm</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://packetstormsecurity.org/news/view/21296/SQL-Injection-Attacks-Up-69.html">SQL Injection Attacks Up 69% ? Packet Storm</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8221; SQL Injection Attacks Up 69%Source ZDNetLink | Favorite | Comments (0)Close&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=457">SQL Injection Attacks Up 69% ? Packet Storm</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=457</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tools boast easy cracking of Microsoft crypto for businesses</title>
		<link>https://securitywandering.com/?p=454</link>
		<comments>https://securitywandering.com/?p=454#comments</comments>
		<pubDate>Mon, 30 Jul 2012 19:55:26 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=454</guid>
		<description><![CDATA[<p>Over on CNET News.com &#8211; Threats the post &#8220;Tools boast easy cracking of Microsoft crypto for businesses&#8221; contains this text: &#8220;ChapCrack and CloudCracker reveal sensitive corporate communications &#8212; including passwords &#8212; protected by the popular PPTP encryption protocol, which is based on an algorithm from Microsoft, a researcher says at Defcon.&#8220;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=454">Tools boast easy cracking of Microsoft crypto for businesses</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href="http://news.cnet.com/">CNET News.com &#8211; Threats</a></em> the post &#8220;<em><a href="http://rss.feedsportal.com/c/32447/f/475521/s/21cfe058/l/0Lnews0Bcnet0N0C830A10E10A0A90I30E574818550E830Ctools0Eboast0Eeasy0Ecracking0Eof0Emicrosoft0Ecrypto0Efor0Ebusinesses0C0Dpart0Frss0Gsubj0Fnews0Gtag0F25470E10I30E0A0E20A/story01.htm">Tools boast easy cracking of Microsoft crypto for businesses</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;ChapCrack and CloudCracker reveal sensitive corporate communications &#8212; including passwords &#8212; protected by the popular PPTP encryption protocol, which is based on an algorithm from Microsoft, a researcher says at Defcon.<img src="http://rss.feedsportal.com/c/32447/f/475521/s/21cfe058/mf.gif" alt="" width="1" height="1" border="0" /><img src="http://feeds.feedburner.com/~r/CNETNewsSecurity/~4/sPNAlpWTClM" alt="" width="1" height="1" />&#8220;</em></p></blockquote>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=454">Tools boast easy cracking of Microsoft crypto for businesses</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=454</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Flame malware: So big, so overlooked &#124; Security &amp; Privacy &#8211; CNET News</title>
		<link>https://securitywandering.com/?p=449</link>
		<comments>https://securitywandering.com/?p=449#comments</comments>
		<pubDate>Tue, 29 May 2012 22:29:54 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=449</guid>
		<description><![CDATA[<p>Over on the post &#8220;Flame malware: So big, so overlooked &#124; Security &#38; Privacy &#8211; CNET News&#8221; contains this text: &#8220; CNET News HomeReviews News Download CNET TV How To Marketplace Log In &#124; Join CNET News Security &#38; Privacy Flame malware: So big, so overlooked The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=449">Flame malware: So big, so overlooked | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-57442675-83/flame-malware-so-big-so-overlooked/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">Flame malware: So big, so overlooked | Security &amp; Privacy &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;</em></p></blockquote>
<p>CNET News</p>
<p>HomeReviews News Download CNET TV How To Marketplace Log In | Join</p>
<p>CNET News Security &amp; Privacy Flame malware: So big, so overlooked The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; has taken the information security world by surprise. Given that it is said to have been around for years, how did everyone miss it?</p>
<p>by Michael Lee May 29, 2012 4:53 AM PDT 8 CommentsFacebook24Twitter71Linked In19More</p>
<p>The most &#8216;complex malware ever found&#8217; &#8212; Flame &#8212; has taken the information security world by surprise. Given that it is said to have been around for years, how did everyone miss it? Several security research firms, including Symantec, Kaspersky, and McAfee, have been hard at work analyzing a specific piece of malware in the past few days after the Iranian Computer Emergency Response Team posted an alert about malicious code designed to steal and exfiltrate information from infected computers back to a network of at least 10 command and control servers. However, as Budape&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=449">Flame malware: So big, so overlooked | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=449</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</title>
		<link>https://securitywandering.com/?p=446</link>
		<comments>https://securitywandering.com/?p=446#comments</comments>
		<pubDate>Fri, 11 May 2012 14:44:07 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=446</guid>
		<description><![CDATA[<p>Over on the post &#8220;Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab&#8221;    &#60;&#60;&#60; Tuesday, May 8, 2012 &#62;&#62;&#62;   Java Drive-by Generator Posted by Karmina @ 15:27 GMT &#124; Comments Ran across quite an interesting infection today. I visited a site that prompted me with a security warning about a &#8216;Microsoft&#8217; [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=446">Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://www.f-secure.com/weblog/archives/00002360.html">Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</a></em>&#8221; </p>
<p> </p>
<p>&lt;&lt;&lt; Tuesday, May 8, 2012 &gt;&gt;&gt;   Java Drive-by Generator Posted by Karmina @ 15:27 GMT | Comments Ran across quite an interesting infection today. I visited a site that prompted me with a security warning about a &#8216;Microsoft&#8217; application from an unknown publisher. The site is actually pretending to be a Gmail Attachment Viewer. Microsoft+Gmail? Fail.</p>
<p>After allowing the application to run, it redirects to a Cisco Foundation invitation while downloading a malware binary in the background.</p>
<p>The message also contains a malicious link that downloads the same malware. Perhaps to make sure that you really get infected.</p>
<p>Anyway, this infection is generated using iJava Drive-by Generator, which apparently has been around f&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=446">Java Drive-by Generator &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=446</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New malware strain locks up computers unless ransom is paid &#124; Security &amp; Privacy &#8211; CNET News</title>
		<link>https://securitywandering.com/?p=443</link>
		<comments>https://securitywandering.com/?p=443#comments</comments>
		<pubDate>Mon, 07 May 2012 19:47:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=443</guid>
		<description><![CDATA[<p>Over on the post &#8220;New malware strain locks up computers unless ransom is paid &#124; Security &#38; Privacy &#8211; CNET News&#8221; contains this text: &#8220; CNET News HomeReviews News Download CNET TV How To Marketplace Log In &#124; Join Breaking news Oracle v. Google jury returns partial verdict, favoring OracleShare: CNET News Security &#38; Privacy [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=443">New malware strain locks up computers unless ransom is paid | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-57429139-83/new-malware-strain-locks-up-computers-unless-ransom-is-paid/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">New malware strain locks up computers unless ransom is paid | Security &amp; Privacy &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;</em></p></blockquote>
<p>CNET News</p>
<p>HomeReviews News Download CNET TV How To Marketplace Log In | Join</p>
<p>Breaking news Oracle v. Google jury returns partial verdict, favoring OracleShare: CNET News Security &amp; Privacy New malware strain locks up computers unless ransom is paid A type of &#8216;ransomware&#8217; hitting users across Europe demands payment for alleged copyright violations, according to a Swiss security blog.</p>
<p>by Lance Whitney May 7, 2012 8:50 AM PDT 20 CommentsFacebook54Twitter71Linked In23More (Credit: abuse.ch) A campaign of &#8216;ransomware&#8217; is locking people out of their computers unless they pony up the right amount of money. Spotted by security blog abuse.ch, the malware taps into an exploit kit known as &#8216;Blackhole.&#8217; Sold underground, Blackhole is used by criminals to infect computers through security holes in the browser or third-party plug-ins, such as Java and Adobe Reader. If the version of Java, for example, is not up to date with the latest patches, the downloaded file will exploit the software'&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=443">New malware strain locks up computers unless ransom is paid | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=443</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</title>
		<link>https://securitywandering.com/?p=440</link>
		<comments>https://securitywandering.com/?p=440#comments</comments>
		<pubDate>Thu, 03 May 2012 13:02:21 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>
		<category><![CDATA[software issues]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=440</guid>
		<description><![CDATA[<p>Over on the post &#8220;Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab&#8221;  &#60;&#60;&#60; Wednesday, May 2, 2012 &#62;&#62;&#62;   Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster Posted by Sean @ 14:25 GMT &#124; Comments So how bad was last month&#8217;s Mac Flashback outbreak and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=440">Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://www.f-secure.com/weblog/archives/00002355.html">Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</a></em>&#8221; </p>
<p>&lt;&lt;&lt; Wednesday, May 2, 2012 &gt;&gt;&gt;   Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster Posted by Sean @ 14:25 GMT | Comments So how bad was last month&#8217;s Mac Flashback outbreak and who suffered the most? Our guess: it was bad, and university IT help desks. And it looks like our guess might not be far off the mark.</p>
<p>Oxford University Computing Services&#8217; network security team (aka OxCERT) has written that they dealt &#8216;with what is probably the biggest outbreak since Blaster struck the Windows world all the way back in the summer of 2003.&#8217;</p>
<p>OxCERT dealt with around 1000 incidents for Blaster. They&#8217;ve seen several hundred Flashback incidents… &#8216;and they keep on coming.&#8217;</p>
<p>Other institutions, such as The University o&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=440">Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=440</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Sneak a Claymore Onto a Flight &#124; Defense Tech</title>
		<link>https://securitywandering.com/?p=437</link>
		<comments>https://securitywandering.com/?p=437#comments</comments>
		<pubDate>Thu, 03 May 2012 13:00:33 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Interesting information]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=437</guid>
		<description><![CDATA[<p>Over on the post &#8220;How to Sneak a Claymore Onto a Flight &#124; Defense Tech&#8221; contains this text: &#8221; Air Ground Sea Space Spec Ops Spies Weapons Gear News Cyber Wars About Home » Air » How to Sneak a Claymore Onto a Flight How to Sneak a Claymore Onto a Flight Well, this is [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=437">How to Sneak a Claymore Onto a Flight | Defense Tech</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://defensetech.org/2012/05/02/how-to-sneak-a-claymore-onto-a-flight/">How to Sneak a Claymore Onto a Flight | Defense Tech</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8221; Air Ground Sea Space Spec Ops Spies Weapons Gear News Cyber Wars About</em></p></blockquote>
<p>Home » Air » How to Sneak a Claymore Onto a Flight How to Sneak a Claymore Onto a Flight</p>
<p>Well, this is embarrasing. In addition to patting down harmless old ladies and small children in the name of security, the TSA is also really good at letting Claymore antipersonnel mines through its screenings. Yup, TSA agents at Newark International Airport in New Jersey stopped an employee of the Army’s Picatinny Arsenal with two inert Claymores in her carry-on baggage (well done, TSA) but they failed to detect a third mine that was being loaded into the plane’s hold inside her checked bags (doh!).</p>
<p>A: What was she thinking even trying to bring these aboard an airplane</p>
<p>B: Thank God these were inert mines and not real explosives.</p>
<p>This reminds me of an experience I had at Oakland International years ago (actually, it was the day the TSA freaked out about liquids aboard flights) where a TSA agent found an antique lette&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=437">How to Sneak a Claymore Onto a Flight | Defense Tech</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=437</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
