<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; good practices</title>
	<atom:link href="https://securitywandering.com/?cat=9&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>what happens when airlines merge&#8230;or why no ones cares once they get your cash</title>
		<link>https://securitywandering.com/?p=266</link>
		<comments>https://securitywandering.com/?p=266#comments</comments>
		<pubDate>Thu, 07 Jul 2011 13:05:53 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[Staying off the grid]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=266</guid>
		<description><![CDATA[<p>So the story goes something like this. bout airplane tickest a while ago&#8230;..great priceDay before try to get 2 seats together  online at check in&#8230;. That did not happen, normal not a big deal.but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>So the story goes something like this.</p>
<p>bout airplane tickest a while ago&#8230;..great price<br />Day before try to get 2 seats together  online at check in&#8230;.</p>
<p>That did not happen, normal not a big deal.<br />but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife.</p>
<p>Security at the airport was a breeze for everyone including the wife in her ankle boot contraption.<br />security made sure that the kid did not go wondering off well mom got scanned.<br />I get to deal with the 10 little gray bins and getting them thru the xray thing<br />as odd as it sounds it was like they wanted to help&#8230;.got to love that.</p>
<p>Get to the gate wait for the gate folks to get there.<br />Now the gate folks had always been very helpful  for me</p>
<p>So I know they could easily fix the seating issue for me&#8230;..</p>
<p>WRONG<br />&#8220;the flight is full figure it out yourself when you get on the plane&#8221; <br />The message from the gate folks</p>
<p>it was like they were more concerned about themselves then helping me an mine.<br />no even an earl boarding invite&#8230;.wife in a walking boot for her ankle injure and 7 year old boy&#8230;.</p>
<p>so we wait and yet more self involved airline folks come and go.</p>
<p>they open the plane for boarding&#8230;</p>
<p>final yet another group of airline folks&#8230;<br />about half way thu boarding we get invited to board after the wife hobbles around in the waiting line.</p>
<p>I new face from airline&#8230;.who had just helped a 13 year old traveling alone&#8230; was the yes please go bored voice of reason</p>
<p>we go down the empty gate ramp took like 5 minutes down hill walking slow&#8230;.<br />get on the plane and there are people sitting in all of our seats&#8230;.<br />kid starts crying&#8230; have i mentioned yet that the wife &#8220;does not like to fly &#8220;motion sickens&#8221;&#8221;</p>
<p>get the tickets from the wife&#8230;<br />kick an old couple out of my seat and the 13 year old seat&#8230;.<br />then the 13 year old says I&#8217;ll change with you..</p>
<p>So the the wife and the kids get 2 seats together&#8230;..finally<br />the 13 year old stranger gets a window seat beind me&#8230;</p>
<p>Oh yeah forgot to mention the flight crew losing it because we had stopped anyone from boarding  the plane.<br />that kind of happens on the small jets  when you are in row 3 waiting for some folks to move out of your seats&#8230;.</p>
<p>longer story short..</p>
<p>flight was great 20 minutes early kind of great.</p>
<p>moral of the story you should always call the airplane phone support folks to fix seating issues and wait on hold for an hour to talk to <br />SAM &#8220;shrewas&#8221;  who think that the yankees are a florida baseball team&#8230;&#8230;</p>
<p> </p>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=266</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The top 10 passcodes you should never use on your iPhone &#124; Naked Security</title>
		<link>https://securitywandering.com/?p=260</link>
		<comments>https://securitywandering.com/?p=260#comments</comments>
		<pubDate>Tue, 14 Jun 2011 12:17:45 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Sec for Dumies]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=260</guid>
		<description><![CDATA[<p>  Over on the post &#8220;The top 10 passcodes you should never use on your iPhone &#124; Naked Security&#8221; contains this text: by Graham Cluley on June 14, 2011 &#124; Comments (5) FILED UNDER: Privacy, Apple, Mobile, Data loss, Featured Are you one of the many people who is using a dangerously easy-to-guess passcode on [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=260">The top 10 passcodes you should never use on your iPhone | Naked Security</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://nakedsecurity.sophos.com/2011/06/14/the-top-10-passcodes-you-should-never-use-on-your-iphone/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29">The top 10 passcodes you should never use on your iPhone | Naked Security</a></em>&#8221; contains this text:</p>
<blockquote><p><em></p>
<p>by Graham Cluley on June 14, 2011	 | Comments (5) FILED UNDER: Privacy, Apple, Mobile, Data loss, Featured Are you one of the many people who is using a dangerously easy-to-guess passcode on your iPhone?</p>
<p>Maybe you should do something about it &#8211; sooner rather than later.</p>
<p>The warning comes after new research suggested that 15% of all iPhone owners use one of just ten passwords on their lock screen:</p>
<p></em></p>
<p><em>Apple iPhone app developer Daniel Amitay published the interesting research, &#8220;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=260">The top 10 passcodes you should never use on your iPhone | Naked Security</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=260</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Enterprise Security Today &#124; EC2 Outage Takes Out Multiple Sites, Including Foursquare</title>
		<link>https://securitywandering.com/?p=184</link>
		<comments>https://securitywandering.com/?p=184#comments</comments>
		<pubDate>Fri, 22 Apr 2011 13:12:44 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=184</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;Enterprise Security Today &#124; EC2 Outage Takes Out Multiple Sites, Including Foursquare&#8221; contains this text: &#8220;EC2 Outage Takes Out Multiple Sites, Including Foursquare By Barry Levine April 21, 2011 1:54PM Foursquare and other web sites were affected by problems at Amazon&#8217;s Elastic Compute Cloud data center. Amazon said additional capacity [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=184">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.enterprise-security-today.com/story.xhtml?story_id=78253">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;EC2 Outage Takes Out Multiple Sites, Including Foursquare By Barry Levine April 21, 2011 1:54PM</em></p>
<p><em> </em></p>
<p><em>Foursquare and other web sites were affected by problems at Amazon&#8217;s Elastic Compute Cloud data center. Amazon said additional capacity was added to support EC2&#8217;s &#8216;affected availability zone&#8217; in Virginia. The outage is likely to add to the debate about reliability and security when using a vendor data center like Amazon&#8217;s EC2.   Related Topics 	Foursquare 	Amazon 	EC2 	Outage 	Data Center 	Security Latest News 	EC2 Outage Takes Out Multiple Sites 	National Lab Needs Cybersecurity 	Your iPhone Knows Where You Were 	U.S. CIO Sets Ambitious Cloud Goals 	Windows 8: What&#8217;s in Store for OS?</p>
<p></em><em> </em><em> </em></p>
<p><em>Amazon&#8217;s cloud -based platform suffered outages Thursday. The company said the problems involved latency and other errors, and it brought down the web sites of Foursquare, Quora, HootSuite, Reddit and other companies. The problems hit the part of Amazon Elastic Compute Cloud (EC2) that supports start-ups. In a statement, Amazon said it is &#8216;now seeing significantly reduced failures and latency,&#8217; and it continues to recover. It added that additional capacity has been brought online to support &#8216;the affected availability zone.'&#8221;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=184">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=184</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Facebook’s two-factor authentication announcement raises questions &#124; Naked Security</title>
		<link>https://securitywandering.com/?p=178</link>
		<comments>https://securitywandering.com/?p=178#comments</comments>
		<pubDate>Thu, 21 Apr 2011 14:12:19 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[good practices]]></category>
		<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=178</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Facebook’s two-factor authentication announcement raises questions &#124; Naked Security&#8221; contains this text: &#8220;cebook&#8217;s two-factor authentication announcement raises questions Hi there! If you&#8217;re new here, you might want to subscribe to the RSS feed for updates. X   by Graham Cluley on April 21, 2011 &#124; Comments (8) FILED UNDER: Data [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=178">Facebook’s two-factor authentication announcement raises questions | Naked Security</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://nakedsecurity.sophos.com/2011/04/21/facebook-two-factor-authentication-announcement-raises-questions/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29">Facebook’s two-factor authentication announcement raises questions | Naked Security</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;cebook&#8217;s two-factor authentication announcement raises questions Hi there! If you&#8217;re new here, you might want to subscribe to the RSS feed for updates. X</p>
<p> </p>
<p>by Graham Cluley on April 21, 2011	 | Comments (8) FILED UNDER: Data loss, Featured, Mobile, Social networks Amid mounting criticism of Facebook&#8217;s attitude to its users&#8217; privacy and safety, the social network has announced that it is introducing a two-factor authentication system in an attempt to prevent unauthorised logins to accounts.</p>
<p></em></p>
<p><em>The idea is that if you log into your Facebook account from a computer or mobile device that Facebook doesn&#8217;t recognise as one that you have used before to access the website, then you&#8217;ll have to enter a code to confirm you are who you say you are.&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=178">Facebook’s two-factor authentication announcement raises questions | Naked Security</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=178</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Barracuda hack shows importance of defence-in-depth &gt; Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security &gt; Network Access &gt; Access Control &gt; News &gt; SC Magazine Australia/NZ</title>
		<link>https://securitywandering.com/?p=120</link>
		<comments>https://securitywandering.com/?p=120#comments</comments>
		<pubDate>Fri, 15 Apr 2011 12:04:45 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Hack and Hackers]]></category>

		<guid isPermaLink="false">https://securitywandering.wordpress.com/?p=120</guid>
		<description><![CDATA[<p>Over on the post &#8220;Barracuda hack shows importance of defence-in-depth &#62; Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security &#62; Network Access &#62; Access Control &#62; News &#62; SC Magazine Australia/NZ&#8221; contains this text: &#8220;Barracuda hack shows importance of defence-in-depth By Angela Moscaritolo Apr 15, 2011 9:53 AM Tags: Barracuda &#124; pwnage &#124; [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=120">Barracuda hack shows importance of defence-in-depth > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://www.securecomputing.net.au/News/254601,barracuda-hack-shows-importance-of-defenceindepth.aspx">Barracuda hack shows importance of defence-in-depth &gt; Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security &gt; Network Access &gt; Access Control &gt; News &gt; SC Magazine Australia/NZ</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Barracuda hack shows importance of defence-in-depth</p>
<p>By Angela Moscaritolo<br />
Apr 15, 2011 9:53 AM<br />
Tags: Barracuda | pwnage | web | application | firewall | WAF | SQL | RSA | Comodo | HBGary | PHP<br />
Everyone is vulnerable.<br />
The database break-in at Barracuda Networks highlights that no one is immune to attack, but the email and web security vendor also may have overlooked some basic security tenets that made it more attractive to hackers, said its executives and industry experts.</p>
<p>The attack against Barracuda occurred on Saturday night when the company&#8217;s web application firewall was offline for maintenance.&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=120">Barracuda hack shows importance of defence-in-depth > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=120</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Research Center &#8211; Network World</title>
		<link>https://securitywandering.com/?p=62</link>
		<comments>https://securitywandering.com/?p=62#comments</comments>
		<pubDate>Wed, 13 Apr 2011 18:47:23 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[good practices]]></category>
		<category><![CDATA[legal]]></category>

		<guid isPermaLink="false">https://securitywandering.wordpress.com/?p=62</guid>
		<description><![CDATA[<p>Over on the post &#8220;Security Research Center &#8211; Network World&#8221; contains this text: &#8220;Jack Hembrough, CEO of VaporStream, continues his discussion of controlling e-mail distribution which he started in the last column. Everything that follows is Mr. Hembrough’s own work with minor edits. * * * Have you ever responded to an e-mail, &#8216;Give me [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=62">Security Research Center &#8211; Network World</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://www.networkworld.com/topics/security.html">Security Research Center &#8211; Network World</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Jack Hembrough, CEO of VaporStream, continues his discussion of controlling e-mail distribution which he started in the last column. Everything that follows is Mr. Hembrough’s own work with minor edits.<br />
* * *<br />
Have you ever responded to an e-mail, &#8216;Give me a call and let&#8217;s discuss&#8217; because you were uncomfortable putting private information in the reply? Lawyers are no longer the primary professionals who are circumspect about what they put in electronic messages. There is a growing sense that pressing &#8216;send&#8217; for an electronic message is tantamount to publishing the content. The potential for disclosure and the lack of privacy in electronic communication is becoming sand in the gears of progress. The lack of privacy, or the fear of public disclosure, is driving business people away from traditional written electronic messaging, despite the proliferation of mobile devices, and &#8216;Give me a call and let&#8217;s discuss that&#8217; is a phrase returning &#8220;</em></p></blockquote>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=62">Security Research Center &#8211; Network World</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=62</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
