<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; sticky</title>
	<atom:link href="https://securitywandering.com/?feed=rss2&#038;tag=sticky" rel="self" type="application/rss+xml" />
	<link>https://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Flashback creators netted $10,000 per day at its height? &#124; Security &amp; Privacy &#8211; CNET News</title>
		<link>https://securitywandering.com/?p=431</link>
		<comments>https://securitywandering.com/?p=431#comments</comments>
		<pubDate>Tue, 01 May 2012 20:46:44 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=431</guid>
		<description><![CDATA[<p>Over on the post &#8220;Flashback creators netted $10,000 per day at its height? &#124; Security &#38; Privacy &#8211; CNET News&#8221; contains this text: &#8221; CNET News HomeReviews News Download CNET TV How To Marketplace Log In &#124; Join CNET News Security &#38; Privacy Flashback creators netted $10,000 per day at its height? Symantec says, based [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=431">Flashback creators netted $10,000 per day at its height? | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em></em> the post &#8220;<em><a href="http://news.cnet.com/8301-1009_3-57424952-83/flashback-creators-netted-$10000-per-day-at-its-height/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20">Flashback creators netted $10,000 per day at its height? | Security &amp; Privacy &#8211; CNET News</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8221; CNET News</em></p></blockquote>
<p>HomeReviews News Download CNET TV How To Marketplace Log In | Join</p>
<p>CNET News Security &amp; Privacy Flashback creators netted $10,000 per day at its height? Symantec says, based on information it has collected, that the Flashback Trojan creators might have been generating some serious cash from the exploit.</p>
<p>by Don Reisinger May 1, 2012 7:41 AM PDT Apple&#8217;s Flashback Trojan was a major concern for Mac OS X users. But it might have also been a huge revenue opportunity for its creators. According to security firm Symantec, which has been analyzing Flashback, the Trojan known as OSX.Flashback.K included a significant ad-clicking component that the company says, was designed to help the creators generate revenue. &#8216;Flashback specifically targets search queries made on Google and, depending on the search query, may redirect users to another page of the attacker&#8217;s choosing, where they receive revenue from the click,&#8217; Symantec wrote in a blog post. &#8216;Google never receives the intend&#8221;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=431">Flashback creators netted $10,000 per day at its height? | Security &#038; Privacy &#8211; CNET News</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=431</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>testing the post on new software</title>
		<link>https://securitywandering.com/?p=336</link>
		<comments>https://securitywandering.com/?p=336#comments</comments>
		<pubDate>Tue, 01 May 2012 13:36:16 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=336</guid>
		<description><![CDATA[<p>    testing pos</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=336">testing the post on new software</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p> </p>
<p>testing pos</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=336">testing the post on new software</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=336</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Trying out my phone as a posting tool</title>
		<link>https://securitywandering.com/?p=301</link>
		<comments>https://securitywandering.com/?p=301#comments</comments>
		<pubDate>Fri, 11 Nov 2011 19:11:24 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=301</guid>
		<description><![CDATA[<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=301">Trying out my phone as a posting tool</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="display: block; margin-right: auto; margin-left: auto;" src="http://securitywandering.com/wp-content/uploads/2011/11/wpid-1321038667516.jpg" alt="image" /></p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=301">Trying out my phone as a posting tool</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=301</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Must have on a computer</title>
		<link>https://securitywandering.com/?p=227</link>
		<comments>https://securitywandering.com/?p=227#comments</comments>
		<pubDate>Wed, 11 May 2011 20:05:58 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=227</guid>
		<description><![CDATA[<p>&#160; from the top get the following loaded on your computer: Pick one anti-virus from below: esetnode 32 http://www.eset.com/us/download/free-trial AVG http://free.avg.com/us-en/homepage Kaspersky http://usa.kaspersky.com/store/all-products f-secure http://www.f-secure.com/en_US/ Now the question is why I have not listed symantec, mcafee or any CA products&#8230;. the big three tend to be long way behind the curve when it comes to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=227">Must have on a computer</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>from the top get the following loaded on your computer:<a href="http://securitywandering.com/wp-content/uploads/2011/04/DSCN0896.jpg"><img class="alignleft size-thumbnail wp-image-131" title="DSCN0896" src="http://securitywandering.com/wp-content/uploads/2011/04/DSCN0896-150x150.jpg" alt="" width="150" height="150" /></a></p>
<p>Pick one anti-virus from below:<br />
esetnode 32 <a title="eset" href="http://www.eset.com/us/download/free-trial">http://www.eset.com/us/download/free-trial</a><br />
AVG <a title="AVG" href="http://free.avg.com/us-en/homepage">http://free.avg.com/us-en/homepage</a><br />
Kaspersky <a href="http://usa.kaspersky.com/store/all-products">http://usa.kaspersky.com/store/all-products</a><br />
f-secure <a href="http://www.f-secure.com/en_US/">http://www.f-secure.com/en_US/</a><br />
Now the question is why I have not listed symantec, mcafee or any CA products&#8230;. the big three tend to be long way behind the curve when it comes to new bugs and outbreaks&#8230;  They also tend to provide a false sense of protection. after all they do everything in one stop.<br />
The problem with a compromise is that you will never get the best product in any category&#8230;,also the big three tend to be very very heavy in terms os system over head..<br />
sorry that means they make your system run slower or sluggish&#8230;.</p>
<p>And YES I also mean on MAC&#8217;s also&#8230;  my pick on mac is kaspersky<br />
although apples systems tend to be less prone to get bugs&#8230;when they do it is usually because a user has installed something as root&#8230;   sorry I mean the mac displayed a screen box asking you the enter a password you put it in and NOW YOU STILL CAN NOT SEE THE VIDEO OF SOME CELEBRITY doing something naughty&#8230;. But the hacker now owns the system&#8230;.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=227">Must have on a computer</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=227</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Newly emerged banking Trojan challenges ZeuS-SpyEye duopoly • The Register</title>
		<link>https://securitywandering.com/?p=223</link>
		<comments>https://securitywandering.com/?p=223#comments</comments>
		<pubDate>Wed, 11 May 2011 19:30:28 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=223</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;Newly emerged banking Trojan challenges ZeuS-SpyEye duopoly • The Register&#8221; contains this text: The Sunspot Trojan has already been linked to instances of fraudulent losses, according to transaction security firm Trusteer. The Windows-based malware is designed to carry out man-in-the-browser attacks, including web injections, page-grabbing, key-logging and screen shooting (a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=223">Newly emerged banking Trojan challenges ZeuS-SpyEye duopoly • The Register</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/">Newly emerged banking Trojan challenges ZeuS-SpyEye duopoly • The Register</a></em>&#8221; contains this text:</p>
<blockquote><p><em> </em></p>
<p><em>The Sunspot Trojan has already been linked to instances of fraudulent losses, according to transaction security firm Trusteer. The Windows-based malware is designed to carry out man-in-the-browser attacks, including web injections, page-grabbing, key-logging and screen shooting (a feature that captures screenshots of the location of a mouse as a user types his/her password on a virtual keyboard).</p>
<p></em><em> </em></p>
<p><em>&#8220;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=223">Newly emerged banking Trojan challenges ZeuS-SpyEye duopoly • The Register</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=223</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Gamers Data Pwned in Massive PlayStation Network Data Breach</title>
		<link>https://securitywandering.com/?p=193</link>
		<comments>https://securitywandering.com/?p=193#comments</comments>
		<pubDate>Sat, 30 Apr 2011 03:48:50 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=193</guid>
		<description><![CDATA[<p>  Over on About Internet / Network Security the post &#8220;Gamers&#8217; Data Pwned in Massive PlayStation Network Data Breach&#8221; contains this text: &#8220;I haven&#8217;t been able to access any online content lately on my PS3 and now I know why.   Sony released an official statement on their blog yesterday informing gamers that there&#8230;&#8221;  </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=193">Gamers Data Pwned in Massive PlayStation Network Data Breach</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a href="http://netsecurity.about.com/">About Internet / Network Security</a></em> the post &#8220;<em><a href="http://netsecurity.about.com/b/2011/04/27/gamers-data-pwned-in-massive-playstation-network-data-breach.htm">Gamers&#8217; Data Pwned in Massive PlayStation Network Data Breach</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;I haven&#8217;t been able to access any online content lately on my PS3 and now I know why.</p>
<p> </p>
<p></em></p>
<p><em>Sony released an official statement on their blog yesterday informing gamers that there&#8230;&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=193">Gamers Data Pwned in Massive PlayStation Network Data Breach</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=193</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Enterprise Security Today &#124; EC2 Outage Takes Out Multiple Sites, Including Foursquare</title>
		<link>https://securitywandering.com/?p=184</link>
		<comments>https://securitywandering.com/?p=184#comments</comments>
		<pubDate>Fri, 22 Apr 2011 13:12:44 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=184</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;Enterprise Security Today &#124; EC2 Outage Takes Out Multiple Sites, Including Foursquare&#8221; contains this text: &#8220;EC2 Outage Takes Out Multiple Sites, Including Foursquare By Barry Levine April 21, 2011 1:54PM Foursquare and other web sites were affected by problems at Amazon&#8217;s Elastic Compute Cloud data center. Amazon said additional capacity [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=184">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.enterprise-security-today.com/story.xhtml?story_id=78253">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;EC2 Outage Takes Out Multiple Sites, Including Foursquare By Barry Levine April 21, 2011 1:54PM</em></p>
<p><em> </em></p>
<p><em>Foursquare and other web sites were affected by problems at Amazon&#8217;s Elastic Compute Cloud data center. Amazon said additional capacity was added to support EC2&#8217;s &#8216;affected availability zone&#8217; in Virginia. The outage is likely to add to the debate about reliability and security when using a vendor data center like Amazon&#8217;s EC2.   Related Topics 	Foursquare 	Amazon 	EC2 	Outage 	Data Center 	Security Latest News 	EC2 Outage Takes Out Multiple Sites 	National Lab Needs Cybersecurity 	Your iPhone Knows Where You Were 	U.S. CIO Sets Ambitious Cloud Goals 	Windows 8: What&#8217;s in Store for OS?</p>
<p></em><em> </em><em> </em></p>
<p><em>Amazon&#8217;s cloud -based platform suffered outages Thursday. The company said the problems involved latency and other errors, and it brought down the web sites of Foursquare, Quora, HootSuite, Reddit and other companies. The problems hit the part of Amazon Elastic Compute Cloud (EC2) that supports start-ups. In a statement, Amazon said it is &#8216;now seeing significantly reduced failures and latency,&#8217; and it continues to recover. It added that additional capacity has been brought online to support &#8216;the affected availability zone.'&#8221;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=184">Enterprise Security Today | EC2 Outage Takes Out Multiple Sites, Including Foursquare</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=184</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hackers get &#8216;more violent&#8217; against security firms &gt; Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security &gt; Network Access &gt; Access Control &gt; News &gt; SC Magazine Australia/NZ</title>
		<link>https://securitywandering.com/?p=77</link>
		<comments>https://securitywandering.com/?p=77#comments</comments>
		<pubDate>Thu, 14 Apr 2011 12:38:31 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[sticky]]></category>

		<guid isPermaLink="false">https://securitywandering.wordpress.com/?p=77</guid>
		<description><![CDATA[<p>Over on the post &#8220;Hackers get &#8216;more violent&#8217; against security firms &#62; Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security &#62; Network Access &#62; Access Control &#62; News &#62; SC Magazine Australia/NZ&#8221; contains this text: &#8220;Hackers get &#8216;more violent&#8217; against security firms RELATED ARTICLES RSA breach leaves customers waiting for answers WordPress.com servers [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=77">Hackers get &#8216;more violent&#8217; against security firms > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.securecomputing.net.au/News/254442,hackers-get-8216more-violent-against-security-firms.aspx">Hackers get &#8216;more violent&#8217; against security firms &gt; Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security &gt; Network Access &gt; Access Control &gt; News &gt; SC Magazine Australia/NZ</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Hackers get &#8216;more violent&#8217; against security firms</em></p>
<p><em>RELATED ARTICLES<br />
RSA breach leaves customers waiting for answers<br />
WordPress.com servers hacked to steal source code<br />
Barracuda admits mistake after hack<br />
Perth firms phreaked by VoIP hackers<br />
Hackers disclose SQL injection of Barracuda website<br />
Anonymous DDoS hobbles Sony<br />
Targeted attacks pick up where Stuxnet left off<br />
By Tom Brewster<br />
Apr 14, 2011 10:05 AM<br />
Tags: Hacker | APT | Mikko | Hypponen | SQL<br />
Security firms are getting hit by more attacks.<br />
Security firms are being targeted by more violent attacks than ever before, one of the industry’s top experts has warned.</em></p>
<p><em>Mikko Hypponen, chief research officer at F-Secure, said security providers had to deal with some ‘pretty aggressive attacks’ in recent months.</em></p>
<p><em> </em><em></em><em></em><em>‘We are seeing more of them now than before and they are more violent attacks,’ Hypponen said today.&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="https://securitywandering.com/?p=77">Hackers get &#8216;more violent&#8217; against security firms > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ</a> appeared first on <a rel="nofollow" href="https://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://securitywandering.com/?feed=rss2&#038;p=77</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
