<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Southwest Cyberport &#187; malware</title>
	<atom:link href="http://www.swcp.com/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.swcp.com</link>
	<description></description>
	<lastBuildDate>Sat, 16 Mar 2013 20:57:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Is Cyberwar the New Normal?</title>
		<link>http://www.swcp.com/2013/cyberwar-new-normal/</link>
		<comments>http://www.swcp.com/2013/cyberwar-new-normal/#comments</comments>
		<pubDate>Fri, 22 Feb 2013 22:38:42 +0000</pubDate>
		<dc:creator>jnelson</dc:creator>
				<category><![CDATA[How the Net Works]]></category>
		<category><![CDATA[Interesting Items]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CISPA]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cyberwar]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.swcp.com/?p=2066</guid>
		<description><![CDATA[The Internet these days is often compared to the Wild West. It, too, is a wide open frontier with endless possibilities, loose rules, limited government controls and not a few rustlers and bandits lurking along its trails. But unlike other frontiers, the Net seems to steadily becoming more dangerous, not less. And there are now armies on the move. Hackers aren’t just computer whiz kids, online scam artists, or even criminal networks any more. Hacking has become a weapon of war. Stunning accusations in a recent report by Mandiant, a US online security firm, provide insights of just how persistent threats from government hackers working for certain enemy states have grown. The company has been investigating security breaches at hundreds of organizations around the world since 2004. Their tracking of threats has allowed them to identify more than 20 hacking groups within China. The largest of these, which they called APT1, for “Advanced Persistent Threat” has conducted vast hauls of information from hundreds of organizations since 2006. Madiant’s detective work on over 150 corporate victims for over 7 years paid off. They were able to identify APT1 as a unit of the People’s Liberation Army of China with a code designation of Unit 61398, precisely located its facilities in the middle of Shanghai, and even named three key developers. They watched APT1 compromise 141 companies in 20 industries, and studied in detail APT1’s sophisticated methodology – in one case, as &#8230; <a href="http://www.swcp.com/2013/cyberwar-new-normal/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>http://www.swcp.com/2013/cyberwar-new-normal/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>President Issues Cyberwar Warning</title>
		<link>http://www.swcp.com/2012/president-cyberwar-warning/</link>
		<comments>http://www.swcp.com/2012/president-cyberwar-warning/#comments</comments>
		<pubDate>Tue, 24 Jul 2012 22:59:54 +0000</pubDate>
		<dc:creator>jnelson</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Warnings]]></category>
		<category><![CDATA[cyberwar]]></category>
		<category><![CDATA[Flame]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Stuxnet]]></category>
		<category><![CDATA[virus]]></category>

		<guid isPermaLink="false">http://www.swcp.com/?p=1881</guid>
		<description><![CDATA[As if we didn’t have enough to worry about, serious cybersecurity concerns are quietly but steadily growing. And it was the President himself who has sounded the latest alarm. Several days ago, President Obama issued a warning in an op-ed piece for the Wall Street Journal. <a href="http://www.swcp.com/2012/president-cyberwar-warning/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>http://www.swcp.com/2012/president-cyberwar-warning/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Web Security Snapshot Has Some Surprises</title>
		<link>http://www.swcp.com/2012/web-security-surprises/</link>
		<comments>http://www.swcp.com/2012/web-security-surprises/#comments</comments>
		<pubDate>Tue, 22 May 2012 21:29:18 +0000</pubDate>
		<dc:creator>jnelson</dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Warnings]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[botnets]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.swcp.com/?p=1829</guid>
		<description><![CDATA[Symantec, a major Net security company, has published a report on Internet security threats of 2011. It’s an interesting snapshot of trends and statistics that makes sobering reading, along with a few eyebrow-raising surprises. Here are some of its highlights: A dangerous new trend among criminals is using shortened URLs to distribute and disguise spam and phishing attacks. These links are conveniently provided by numerous websites to handily replace lengthy strings in addresses, but where they actually point to may be hard to guess. Users are advised to use preview tools to check them out before clicking. Social media sites, especially Facebook, have been cleverly used to spread links to infected sites by crooks taking advantage of people’s expectations and profiles. People using social networking sites are cautioned to be careful about what personal information they post, and when clicking on URLs in email or posted on social media sites even when they come from friends or trusted sources. Macs are not immune: the first Mac-based botnet occurred in 2009. New threats emerged in 2011, including Mac Defender, a fake antivirus program that installs itself without permission. Symantec claims to have identified 4,989 new computer vulnerabilities in just 2011. However, the number of new problems with popular browsers has decreased slightly, Google Chrome having the most dramatic reduction. The amount of spam is actually decreasing, from over 88% of all email in 2010 down to 68% by the end of &#8230; <a href="http://www.swcp.com/2012/web-security-surprises/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>http://www.swcp.com/2012/web-security-surprises/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Zombie Alert!</title>
		<link>http://www.swcp.com/2011/zombie-alert/</link>
		<comments>http://www.swcp.com/2011/zombie-alert/#comments</comments>
		<pubDate>Sat, 29 Oct 2011 23:23:07 +0000</pubDate>
		<dc:creator>jnelson</dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[botnets]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[rootkit]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Storm bot]]></category>

		<guid isPermaLink="false">http://www.swcp.com/?p=1279</guid>
		<description><![CDATA[With Halloween coming up, the fear and fascination with the walking dead is everywhere. In recent years, the Centers for Disease Control have used zombie alerts to warn of the flu. Highway departments have also zombie mania to get people to try to slow down, though that has drawn a lot of criticism. But they’re all latecomers. Back in 2007, the FBI issued a warning about zombie attacks. Nothing tongue in cheek about this one, either; it was very serious indeed. These weren’t the kind of modern zombie that wants to eat your brains; these zombies were more traditional in that they have become unwitting, helpless slaves of an evil master. Yet these zombies are not undead flesh and blood; they lust after your PC, laptop, tablet, or smartphone to turn them into zombie machines just like the rest to attack other devices. The threat is still quite real, and an infestation can not only quickly destroy your files and render your computer useless to you, but makes it a danger to the entire Internet. Hordes of zombies Zombie programs, also called “bots”, hijack computers through trickery. Infection often occurs when the user is tricked into opening an email attachment with a virus or visits a booby-trapped webpage, though they can also appear in downloaded files. Free screensavers are also a common means of infection, because a screensaver is an executable program. The virus quickly commandeers the computer, to steal &#8230; <a href="http://www.swcp.com/2011/zombie-alert/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>http://www.swcp.com/2011/zombie-alert/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>