<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; Sec for Dumies</title>
	<atom:link href="https://securitywandering.com/?cat=27&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>UH notifies 7,100 patients of stolen hard drive with personal medical information on it</title>
		<link>https://securitywandering.com/?p=520</link>
		<comments>https://securitywandering.com/?p=520#comments</comments>
		<pubDate>Thu, 07 Nov 2013 01:09:55 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Sec for Dumies]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=520</guid>
		<description><![CDATA[<p>CLEVELAND, Ohio &#8212; More than 7,100 University Hospitals patients received notification by mail this week that their protected personal medical information was potentially exposed after a hard drive containing physician office data was stolen from a third-party vendor helping to upgrade the health system&#8217;s computer systems . Someone stole the hard drive from the car [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=520">UH notifies 7,100 patients of stolen hard drive with personal medical information on it</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">CLEVELAND, Ohio &#8212; More than 7,100 University Hospitals patients received notification by mail this week that their protected personal medical information was potentially exposed after a hard drive containing physician office data was stolen from a third-party vendor helping to upgrade the health system&#8217;s computer systems .</p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Someone stole the hard drive from the car of one of the vendor’s employees, according to the letter. UH was informed of the theft Aug. 8, and the hospital system has been determining the exact information that was on the drive since then, said hospital spokeswoman Janice Guhl. </p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Link to full story</p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"><a href="http://www.cleveland.com/healthfit/index.ssf/2013/11/uh_notifies_7100_patients_of_l.html">http://www.cleveland.com/healthfit/index.ssf/2013/11/uh_notifies_7100_patients_of_l.html</a></p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=520">UH notifies 7,100 patients of stolen hard drive with personal medical information on it</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=520</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</title>
		<link>https://securitywandering.com/?p=512</link>
		<comments>https://securitywandering.com/?p=512#comments</comments>
		<pubDate>Thu, 31 Oct 2013 21:16:56 +0000</pubDate>
		<dc:creator><![CDATA[lxc152]]></dc:creator>
				<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[Staying off the grid]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=512</guid>
		<description><![CDATA[<p>Driven by the people element. End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from &#8220;DEAD cousin NED&#8221;  and we apparently all [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=512">Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><strong>Driven by the people element.</strong></p>
<p>End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from &#8220;DEAD cousin NED&#8221;  and we apparently all have a &#8220;Nigerian relative that needs our help&#8221;.</p>
<p>I was just at a security conference were David Kennedy  aka rel1c the author of SET the founder of <a title="Trustedsec" href="https://www.trustedsec.com/">truestedsec</a> was presenting. His talk was on burning down security as we know it and his demo did not work because of the OSX maverick upgrade. OR as I see it Steve jobs from the great beyond,  the demo portion of these talks used to be the real value of security conferences.  They provide good stories and the proof of what we all know and a way to show the risk.  Over the last Year FUD and good stories have really gone the way of the dinosaurs.  Having to prove that something bad could and does happens seems to have gone from a lot of proof  and good stories to just de facto accepted thanks to <a title="Adobe" href="http://www.usatoday.com/story/cybertruth/2013/10/03/adobe-loses-29-mil-customer-records-source-code/2919229/">Adobe</a> and their issues&#8230;&#8230; and Dave on the <a href="http://katiecouric.com/features/how-to-protect-yourself-against-cyber-attacks/">Katie Couric show</a><a title="Kaltie Couric show" href="http://katiecouric.com/features/how-to-protect-yourself-against-cyber-attacks/"> </a> .</p>
<p>Oh yeah back to Steve Jobs and his hate for all things Adobe&#8230;<br />
As a senior checkpoint executive said at the same conference Steve dies and 6 months later Apple is softer on Adobe and he see on his home network from a mac his first malware/trojanware.</p>
<p>How very odd java is getting harder to manipulate but Flash and Air maybe it&#8217;s replacement for the darkside who generally also want your browsers cookies&#8230;Or yes they have cookies&#8230;</p>
<p>&nbsp;</p>
<p>till later</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=512">Well it&#8217;s been a year or so since I last mused about security and it&#8217;s still</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=512</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>what happens when airlines merge&#8230;or why no ones cares once they get your cash</title>
		<link>https://securitywandering.com/?p=266</link>
		<comments>https://securitywandering.com/?p=266#comments</comments>
		<pubDate>Thu, 07 Jul 2011 13:05:53 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[Staying off the grid]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=266</guid>
		<description><![CDATA[<p>So the story goes something like this. bout airplane tickest a while ago&#8230;..great priceDay before try to get 2 seats together  online at check in&#8230;. That did not happen, normal not a big deal.but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>So the story goes something like this.</p>
<p>bout airplane tickest a while ago&#8230;..great price<br />Day before try to get 2 seats together  online at check in&#8230;.</p>
<p>That did not happen, normal not a big deal.<br />but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife.</p>
<p>Security at the airport was a breeze for everyone including the wife in her ankle boot contraption.<br />security made sure that the kid did not go wondering off well mom got scanned.<br />I get to deal with the 10 little gray bins and getting them thru the xray thing<br />as odd as it sounds it was like they wanted to help&#8230;.got to love that.</p>
<p>Get to the gate wait for the gate folks to get there.<br />Now the gate folks had always been very helpful  for me</p>
<p>So I know they could easily fix the seating issue for me&#8230;..</p>
<p>WRONG<br />&#8220;the flight is full figure it out yourself when you get on the plane&#8221; <br />The message from the gate folks</p>
<p>it was like they were more concerned about themselves then helping me an mine.<br />no even an earl boarding invite&#8230;.wife in a walking boot for her ankle injure and 7 year old boy&#8230;.</p>
<p>so we wait and yet more self involved airline folks come and go.</p>
<p>they open the plane for boarding&#8230;</p>
<p>final yet another group of airline folks&#8230;<br />about half way thu boarding we get invited to board after the wife hobbles around in the waiting line.</p>
<p>I new face from airline&#8230;.who had just helped a 13 year old traveling alone&#8230; was the yes please go bored voice of reason</p>
<p>we go down the empty gate ramp took like 5 minutes down hill walking slow&#8230;.<br />get on the plane and there are people sitting in all of our seats&#8230;.<br />kid starts crying&#8230; have i mentioned yet that the wife &#8220;does not like to fly &#8220;motion sickens&#8221;&#8221;</p>
<p>get the tickets from the wife&#8230;<br />kick an old couple out of my seat and the 13 year old seat&#8230;.<br />then the 13 year old says I&#8217;ll change with you..</p>
<p>So the the wife and the kids get 2 seats together&#8230;..finally<br />the 13 year old stranger gets a window seat beind me&#8230;</p>
<p>Oh yeah forgot to mention the flight crew losing it because we had stopped anyone from boarding  the plane.<br />that kind of happens on the small jets  when you are in row 3 waiting for some folks to move out of your seats&#8230;.</p>
<p>longer story short..</p>
<p>flight was great 20 minutes early kind of great.</p>
<p>moral of the story you should always call the airplane phone support folks to fix seating issues and wait on hold for an hour to talk to <br />SAM &#8220;shrewas&#8221;  who think that the yankees are a florida baseball team&#8230;&#8230;</p>
<p> </p>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=266</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Microsoft plugs 34 holes; Adobe fixes Flash Player bug &#124; InSecurity Complex &#8211; CNET News</title>
		<link>https://securitywandering.com/?p=262</link>
		<comments>https://securitywandering.com/?p=262#comments</comments>
		<pubDate>Wed, 15 Jun 2011 13:54:40 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>
		<category><![CDATA[Sec for Dumies]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=262</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Microsoft plugs 34 holes; Adobe fixes Flash Player bug &#124; InSecurity Complex &#8211; CNET News&#8221; contains this text: &#8220;Microsoft plugs 34 holes; Adobe fixes Flash Player bug by Elinor Mills Share 18 comments Microsoft released 16 security bulletins today fixing 34 holes, including critical holes in Windows, SMB Client and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=262">Microsoft plugs 34 holes; Adobe fixes Flash Player bug | InSecurity Complex &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://news.cnet.com/8301-27080_3-20071172-245/microsoft-plugs-34-holes-adobe-fixes-flash-player-bug/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">Microsoft plugs 34 holes; Adobe fixes Flash Player bug | InSecurity Complex &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Microsoft plugs 34 holes; Adobe fixes Flash Player bug by Elinor Mills</em><em></p>
<p style="display: inline !important;"><span style="font-style: normal;"><em>Share 18 comments Microsoft released 16 security bulletins today fixing 34 holes, including critical holes in Windows, SMB Client and Internet Explorer, while Adobe Systems fixed a hole in Flash Player that was reportedly being targeted in attacks. Adobe&#8217;s quarterly security bulletins include critical updates for Flash Player, Shockwave Player, and Adobe Reader and Acrobat. Meanwhile, Adobe said it will now offer users the opportunity to turn automatic update on by default. Nine of Microsoft&#8217;s bulletins are rated &#8216;critical&#8217; and the remainder are rated &#8216;important. There are four &#8216;critical-level&#8217; updates that Microsoft said in a blog post should be addressed first. They are: MS11-042, which fixes vulnerabilities in the distributed file system that affects all versions of Windows. MS11-043, which closes a hole in SMB Client on Windows. MS11-050, which is a cumulative bulletin resolving 11 bugs in Internet Explorer. MS11-052, which fixes a vulnerability in the Microsoft implementation of Vector Markup Language and affects Windows and Internet Explorer 6, 7 and 8.&#8221;</em></span></p>
<p></em></p></blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=262">Microsoft plugs 34 holes; Adobe fixes Flash Player bug | InSecurity Complex &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=262</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The top 10 passcodes you should never use on your iPhone &#124; Naked Security</title>
		<link>https://securitywandering.com/?p=260</link>
		<comments>https://securitywandering.com/?p=260#comments</comments>
		<pubDate>Tue, 14 Jun 2011 12:17:45 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Sec for Dumies]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=260</guid>
		<description><![CDATA[<p>  Over on the post &#8220;The top 10 passcodes you should never use on your iPhone &#124; Naked Security&#8221; contains this text: by Graham Cluley on June 14, 2011 &#124; Comments (5) FILED UNDER: Privacy, Apple, Mobile, Data loss, Featured Are you one of the many people who is using a dangerously easy-to-guess passcode on [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=260">The top 10 passcodes you should never use on your iPhone | Naked Security</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://nakedsecurity.sophos.com/2011/06/14/the-top-10-passcodes-you-should-never-use-on-your-iphone/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29">The top 10 passcodes you should never use on your iPhone | Naked Security</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p>by Graham Cluley on June 14, 2011	 | Comments (5) FILED UNDER: Privacy, Apple, Mobile, Data loss, Featured Are you one of the many people who is using a dangerously easy-to-guess passcode on your iPhone?</p>
<p>Maybe you should do something about it &#8211; sooner rather than later.</p>
<p>The warning comes after new research suggested that 15% of all iPhone owners use one of just ten passwords on their lock screen:</p>
<p></em></p>
<p><em>Apple iPhone app developer Daniel Amitay published the interesting research, &#8220;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=260">The top 10 passcodes you should never use on your iPhone | Naked Security</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=260</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Facebook spam prevention scam spreading like wildfire • The Register</title>
		<link>https://securitywandering.com/?p=239</link>
		<comments>https://securitywandering.com/?p=239#comments</comments>
		<pubDate>Thu, 12 May 2011 11:46:03 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=239</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Facebook spam prevention scam spreading like wildfire • The Register&#8221; contains this text: Facebook spam prevention scam spreading like wildfire Alert Print Post comment Retweet Facebook Social media worm d&#8217;jour By John Leyden • Get more from this author Posted in Spam, 12th May 2011 10:22 GMT Free whitepaper – BitDefender [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=239">Facebook spam prevention scam spreading like wildfire • The Register</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.theregister.co.uk/2011/05/12/facebook_spam_prevention_scam/">Facebook spam prevention scam spreading like wildfire • The Register</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p>Facebook spam prevention scam spreading like wildfire Alert Print Post comment Retweet Facebook Social media worm d&#8217;jour By John Leyden • Get more from this author</p>
<p>Posted in Spam, 12th May 2011 10:22 GMT Free whitepaper – BitDefender Business Solutions v3.5 The growing prevalence of junk messages on Facebook is been used to bait a new scam doing the rounds on the social network.</p>
<p>Prospective marks in receipt of the fraudulent messages are invited to &#8216;verify&#8217; their account in order to &#8216;prevent spam&#8217;. Recipients who respond to the message by clicking on a link end up sharing it on their wall as well as spreading highly obfuscated JavaScript.</p>
<p></em></p>
<p><em>&#8216;With all the unexpected Sharing going on, this message has spread like wild-fire,&#8217; warns net security firm Sophos. &#8216;Instead of preventing spam, this par&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=239">Facebook spam prevention scam spreading like wildfire • The Register</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=239</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Lab Matters &#8211; At the Halfway Mark: Malware Predictions in 2011 &#8211; Securelist</title>
		<link>https://securitywandering.com/?p=237</link>
		<comments>https://securitywandering.com/?p=237#comments</comments>
		<pubDate>Thu, 12 May 2011 11:36:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=237</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Lab Matters &#8211; At the Halfway Mark: Malware Predictions in 2011 &#8211; Securelist&#8221; contains this text In this newest edition of Lab Matters, Director of Kaspersky Lab&#8217;s Global Research and Analysis Team Costin Raiu offers some predictions about what we will see in the second half of 2011. Raiu&#8217;s predictions [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=237">Lab Matters &#8211; At the Halfway Mark: Malware Predictions in 2011 &#8211; Securelist</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.securelist.com/en/blog/472/Lab_Matters_At_the_Halfway_Mark_Malware_Predictions_in_2011">Lab Matters &#8211; At the Halfway Mark: Malware Predictions in 2011 &#8211; Securelist</a></em>&#8221; contains this text<em> </em></p>
<blockquote><p><em></p>
<p><span style="font-style: normal;"><em></p>
<p style="display: inline !important;">In this newest edition of Lab Matters, Director of Kaspersky Lab&#8217;s Global Research and Analysis Team Costin Raiu offers some predictions about what we will see in the second half of 2011. Raiu&#8217;s predictions include a surge in malicious activity on mobile device app stores.</p>
<p></em></span></p>
<p> </p>
<p></em></p></blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=237">Lab Matters &#8211; At the Halfway Mark: Malware Predictions in 2011 &#8211; Securelist</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=237</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Must have on a computer</title>
		<link>https://securitywandering.com/?p=227</link>
		<comments>https://securitywandering.com/?p=227#comments</comments>
		<pubDate>Wed, 11 May 2011 20:05:58 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=227</guid>
		<description><![CDATA[<p>&#160; from the top get the following loaded on your computer: Pick one anti-virus from below: esetnode 32 http://www.eset.com/us/download/free-trial AVG http://free.avg.com/us-en/homepage Kaspersky http://usa.kaspersky.com/store/all-products f-secure http://www.f-secure.com/en_US/ Now the question is why I have not listed symantec, mcafee or any CA products&#8230;. the big three tend to be long way behind the curve when it comes to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=227">Must have on a computer</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>from the top get the following loaded on your computer:<a href="http://securitywandering.com/wp-content/uploads/2011/04/DSCN0896.jpg"><img class="alignleft size-thumbnail wp-image-131" title="DSCN0896" src="http://securitywandering.com/wp-content/uploads/2011/04/DSCN0896-150x150.jpg" alt="" width="150" height="150" /></a></p>
<p>Pick one anti-virus from below:<br />
esetnode 32 <a title="eset" href="http://www.eset.com/us/download/free-trial">http://www.eset.com/us/download/free-trial</a><br />
AVG <a title="AVG" href="http://free.avg.com/us-en/homepage">http://free.avg.com/us-en/homepage</a><br />
Kaspersky <a href="http://usa.kaspersky.com/store/all-products">http://usa.kaspersky.com/store/all-products</a><br />
f-secure <a href="http://www.f-secure.com/en_US/">http://www.f-secure.com/en_US/</a><br />
Now the question is why I have not listed symantec, mcafee or any CA products&#8230;. the big three tend to be long way behind the curve when it comes to new bugs and outbreaks&#8230;  They also tend to provide a false sense of protection. after all they do everything in one stop.<br />
The problem with a compromise is that you will never get the best product in any category&#8230;,also the big three tend to be very very heavy in terms os system over head..<br />
sorry that means they make your system run slower or sluggish&#8230;.</p>
<p>And YES I also mean on MAC&#8217;s also&#8230;  my pick on mac is kaspersky<br />
although apples systems tend to be less prone to get bugs&#8230;when they do it is usually because a user has installed something as root&#8230;   sorry I mean the mac displayed a screen box asking you the enter a password you put it in and NOW YOU STILL CAN NOT SEE THE VIDEO OF SOME CELEBRITY doing something naughty&#8230;. But the hacker now owns the system&#8230;.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=227">Must have on a computer</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=227</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
