<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ITsecurity.be</title>
	<atom:link href="http://www.itsecurity.be/feed" rel="self" type="application/rss+xml" />
	<link>http://www.itsecurity.be</link>
	<description>Information Security News on a human scale</description>
	<lastBuildDate>Mon, 02 Jan 2012 09:19:11 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.2.1</generator>
		<item>
		<title>Goodbye &#8230; this website is for sale</title>
		<link>http://www.itsecurity.be/goodbye-this-website-is-for-sale</link>
		<comments>http://www.itsecurity.be/goodbye-this-website-is-for-sale#comments</comments>
		<pubDate>Mon, 02 Jan 2012 08:23:20 +0000</pubDate>
		<dc:creator>Danny Bisaerts</dc:creator>
				<category><![CDATA[DynamicGallery]]></category>
		<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4903</guid>
		<description><![CDATA[It&#8217;s hard to say goodbye &#8230; With some sadness we took te decision to no longer update this website. We started it as a way to inform people about IT Security related topics, and in our first year (2011) this site had 120.000 visitors, that&#8217;s about 10.000 a month Not bad for a 2-man effort. [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/goodbye-this-website-is-for-sale/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Stanford lawyers say that legal initiatives might cripple DNS in the future</title>
		<link>http://www.itsecurity.be/stanford-lawyers-say-that-legal-initiatives-might-cripple-dns-in-the-future</link>
		<comments>http://www.itsecurity.be/stanford-lawyers-say-that-legal-initiatives-might-cripple-dns-in-the-future#comments</comments>
		<pubDate>Wed, 21 Dec 2011 08:19:12 +0000</pubDate>
		<dc:creator>Danny Bisaerts</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[USA]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4899</guid>
		<description><![CDATA[Legal experts are warning that the proposed PROTECT IP and the Stop Online Piracy Act (SOPA) legislation, currently working their way through Congress, will damage the world&#8217;s DNS system, cripple attempts to get better online security and violate free speech rights in the US constitution. In an essay published in the Stanford Law Review professors [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/stanford-lawyers-say-that-legal-initiatives-might-cripple-dns-in-the-future/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Iran takes measures to safeguard websites</title>
		<link>http://www.itsecurity.be/iran-takes-measures-to-safeguard-websites</link>
		<comments>http://www.itsecurity.be/iran-takes-measures-to-safeguard-websites#comments</comments>
		<pubDate>Wed, 21 Dec 2011 08:04:36 +0000</pubDate>
		<dc:creator>Danny Bisaerts</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Iran]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4896</guid>
		<description><![CDATA[Iran has moved most of its government websites from foreign-based hosting companies to new computer facilities inside the country, to protect them against cyber attacks, a senior official said on Tuesday. The new security arrangements were announced a year after a Iran said a powerful computer virus known as Stuxnet attacked computers at its Bushehr [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/iran-takes-measures-to-safeguard-websites/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Windows 8 will offer picture password signon</title>
		<link>http://www.itsecurity.be/windows-8-will-offer-picture-password-signon</link>
		<comments>http://www.itsecurity.be/windows-8-will-offer-picture-password-signon#comments</comments>
		<pubDate>Tue, 20 Dec 2011 08:52:09 +0000</pubDate>
		<dc:creator>Danny Bisaerts</dc:creator>
				<category><![CDATA[DynamicGallery]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Picture Login]]></category>
		<category><![CDATA[Windows 8]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4892</guid>
		<description><![CDATA[The experience of signing in to your PC with touch has traditionally been a cumbersome one. In a world with increasingly strict password requirements—with numbers, symbols, and capitalization—it can take upwards of 30 seconds to enter a long, complex password on a touch keyboard. We have a strong belief that your experience with Windows 8 [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/windows-8-will-offer-picture-password-signon/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Twitter followers of Lady Gaga tricked by iPad scam</title>
		<link>http://www.itsecurity.be/twitter-followers-of-lady-gaga-tricked-by-ipad-scam</link>
		<comments>http://www.itsecurity.be/twitter-followers-of-lady-gaga-tricked-by-ipad-scam#comments</comments>
		<pubDate>Tue, 20 Dec 2011 08:44:11 +0000</pubDate>
		<dc:creator>Danny Bisaerts</dc:creator>
				<category><![CDATA[DynamicGallery]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[Lady GaGa]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[twitter]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4888</guid>
		<description><![CDATA[When Lady Gaga speaks, her millions of die-hard &#8220;little monsters&#8221; listen. So when a message appeared on the pop icon&#8217;s official Facebook page this morning offering the chance to receive a free iPad, hordes of &#8220;lucky&#8221; fans swarmed to the scam. The enticing, but malicious, message told Gaga&#8217;s more than 45 million Facebook fans that [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/twitter-followers-of-lady-gaga-tricked-by-ipad-scam/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Actively exploited flaws plugged by Adobe</title>
		<link>http://www.itsecurity.be/actively-exploited-flaws-plugged-by-adobe</link>
		<comments>http://www.itsecurity.be/actively-exploited-flaws-plugged-by-adobe#comments</comments>
		<pubDate>Mon, 19 Dec 2011 08:18:21 +0000</pubDate>
		<dc:creator>Guido</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[adobe]]></category>
		<category><![CDATA[flaws]]></category>
		<category><![CDATA[plugged]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4883</guid>
		<description><![CDATA[Adobe has released updates for its Reader and Acrobat applications that fix two vulnerabilities that attackers were exploiting to seize control of Windows-based machines. Version 9.4.7 of the programs fix two memory-corruption bugs that Adobe says are “being actively exploited in limited, targeted attacks in the wild” against machines running Windows. The same bugs are [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/actively-exploited-flaws-plugged-by-adobe/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>East European Visa breach results in 17000 suspended credit cards</title>
		<link>http://www.itsecurity.be/east-european-visa-breach-results-in-17000-suspended-credit-cards</link>
		<comments>http://www.itsecurity.be/east-european-visa-breach-results-in-17000-suspended-credit-cards#comments</comments>
		<pubDate>Mon, 19 Dec 2011 08:14:28 +0000</pubDate>
		<dc:creator>Guido</dc:creator>
				<category><![CDATA[DynamicGallery]]></category>
		<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4879</guid>
		<description><![CDATA[Our friends from Sophos Labs are reporting that Visa is investigating a potential security breach that may have compromised payment cards of Eastern Europeans. Although Visa hasn&#8217;t disclosed which countries were hit, the Romanian state-owned CEC Bank has blocked and reissued 17,000 cards on suspicion that they had been compromised. Visa Europe issued a statement [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/east-european-visa-breach-results-in-17000-suspended-credit-cards/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Young employees don&#8217;t care about IT security says Cisco</title>
		<link>http://www.itsecurity.be/young-employees-dont-care-about-it-security-says-cisco</link>
		<comments>http://www.itsecurity.be/young-employees-dont-care-about-it-security-says-cisco#comments</comments>
		<pubDate>Mon, 19 Dec 2011 08:00:43 +0000</pubDate>
		<dc:creator>Guido</dc:creator>
				<category><![CDATA[DynamicGallery]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[Cisco]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4874</guid>
		<description><![CDATA[Cisco researchers uncovered a startling lack of concern about security and privacy along with a willingness to break IT policy in a survey of college students and young professionals. Younger employees tend to have lax attitudes about computer security and are more likely to ignore IT policies, according to a recent Cisco report. &#160; About [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/young-employees-dont-care-about-it-security-says-cisco/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Classified files found on WikiLeaks linked to Bradley Manning</title>
		<link>http://www.itsecurity.be/classified-files-found-on-wikileaks-linked-to-bradley-manning</link>
		<comments>http://www.itsecurity.be/classified-files-found-on-wikileaks-linked-to-bradley-manning#comments</comments>
		<pubDate>Mon, 19 Dec 2011 07:56:02 +0000</pubDate>
		<dc:creator>Guido</dc:creator>
				<category><![CDATA[DynamicGallery]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Bradley Manning]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[WikiLeaks]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4871</guid>
		<description><![CDATA[Classified files downloaded to the computer of Army intelligence analyst Bradley Manning matched those that later showed up on WikiLeaks, an investigator testified on Sunday, the first time the government has linked Manning to the whistleblowing website. &#160; Special Agent David Shaver, a computer crimes investigator with the military, said an analysis of Manning&#8217;s two [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/classified-files-found-on-wikileaks-linked-to-bradley-manning/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CIA lost stealth drone captured true GPS navigation spoofing ?</title>
		<link>http://www.itsecurity.be/cia-lost-stealth-drone-captured-true-gps-navigation-spoofing</link>
		<comments>http://www.itsecurity.be/cia-lost-stealth-drone-captured-true-gps-navigation-spoofing#comments</comments>
		<pubDate>Fri, 16 Dec 2011 12:43:37 +0000</pubDate>
		<dc:creator>Guido</dc:creator>
				<category><![CDATA[DynamicGallery]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[captured]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[drone]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[spoofing]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4868</guid>
		<description><![CDATA[Iran guided the CIA&#8217;s &#8220;lost&#8221; stealth drone to an intact landing inside hostile territory by exploiting a navigational weakness long-known to the US military, according to an Iranian engineer now working on the captured drone&#8217;s systems inside Iran. Iranian electronic warfare specialists were able to cut off communications links of the American bat-wing RQ-170 Sentinel, [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/cia-lost-stealth-drone-captured-true-gps-navigation-spoofing/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Apple&#8217;s iCloud and iTunes store have &#8220;Fatal internal errors&#8221;</title>
		<link>http://www.itsecurity.be/apples-icloud-and-itunes-store-have-fatal-internal-errors</link>
		<comments>http://www.itsecurity.be/apples-icloud-and-itunes-store-have-fatal-internal-errors#comments</comments>
		<pubDate>Fri, 16 Dec 2011 12:33:20 +0000</pubDate>
		<dc:creator>Guido</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[apple]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4865</guid>
		<description><![CDATA[Apple fanbois have been shut out of their iTunes store and iCloud accounts since last night as their login details fail to work as expected. Attempts to access the services are thwarted with either a &#8216;fatal internal error occurred&#8217; message being shown or the software simply saying that the password hasn&#8217;t been recognised. One Reg [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/apples-icloud-and-itunes-store-have-fatal-internal-errors/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Beijing government tightens controls on blogs</title>
		<link>http://www.itsecurity.be/beijing-government-tightens-controls-on-blogs</link>
		<comments>http://www.itsecurity.be/beijing-government-tightens-controls-on-blogs#comments</comments>
		<pubDate>Fri, 16 Dec 2011 12:29:10 +0000</pubDate>
		<dc:creator>Guido</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[censor]]></category>
		<category><![CDATA[china]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4862</guid>
		<description><![CDATA[The Beijing city government said on Friday it would tighten control over popular microblogs that have vexed authorities with their rapid dissemination of news, giving users three months to register with their real names or face legal consequences. China has repeatedly criticized microblogs for irresponsibly spreading what it calls unfounded rumors and vulgarities and has [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/beijing-government-tightens-controls-on-blogs/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>UK computer science student hits 9th place in US digital forensics challenge</title>
		<link>http://www.itsecurity.be/uk-computer-science-student-hits-9th-place-in-us-digital-forensics-challenge</link>
		<comments>http://www.itsecurity.be/uk-computer-science-student-hits-9th-place-in-us-digital-forensics-challenge#comments</comments>
		<pubDate>Fri, 16 Dec 2011 12:22:09 +0000</pubDate>
		<dc:creator>Guido</dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4858</guid>
		<description><![CDATA[A computer science student from Lancaster University has become the UK winner of the digital forensics challenge, a global competition designed and hosted by the US Department of Defense. Christopher Richardson (AKA Ikarus) came first in the UK and ninth internationally among 1,791 competitors from 52 countries. The challenge was designed to test the ability [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/uk-computer-science-student-hits-9th-place-in-us-digital-forensics-challenge/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Russian cyberchief says the internet must have &#8220;reasonable regulation&#8221;</title>
		<link>http://www.itsecurity.be/russian-cyberchief-says-the-internet-must-have-reasonable-regulation</link>
		<comments>http://www.itsecurity.be/russian-cyberchief-says-the-internet-must-have-reasonable-regulation#comments</comments>
		<pubDate>Thu, 15 Dec 2011 08:26:52 +0000</pubDate>
		<dc:creator>Danny Bisaerts</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[censor]]></category>
		<category><![CDATA[russia]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4852</guid>
		<description><![CDATA[The Internet must be subject to &#8220;reasonable regulation,&#8221; the head of Russia&#8217;s Security Council said in remarks published on Wednesday, a fresh sign of Kremlin concern about the use of social networks to promote anti-government protests. Opposition groups and ordinary Russians used Facebook and the Russian site VKontakte to organize protests last week over a [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/russian-cyberchief-says-the-internet-must-have-reasonable-regulation/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Globalsign releases security incident report on Comodo hacks</title>
		<link>http://www.itsecurity.be/globalsign-releases-security-incident-report-on-comodo-hacks</link>
		<comments>http://www.itsecurity.be/globalsign-releases-security-incident-report-on-comodo-hacks#comments</comments>
		<pubDate>Thu, 15 Dec 2011 08:21:44 +0000</pubDate>
		<dc:creator>Danny Bisaerts</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[comodo]]></category>
		<category><![CDATA[GlobalSign]]></category>

		<guid isPermaLink="false">http://www.itsecurity.be/?p=4850</guid>
		<description><![CDATA[In relationship to the security incident that the self-titled attacker &#8220;Comodohacker&#8221; caused to security providers, in particular Certificate Authorities, Globalsign didn&#8217;t find any evidence of : Rogue Certificates issued. Customer data exposed. Compromised GlobalSign Root Certificate keys and associated Hardware Security Modules (HSM). Compromised GlobalSign Certificate Authority (CA) infrastructure. Compromised GlobalSign Issuing Authorities and associated [...]]]></description>
		<wfw:commentRss>http://www.itsecurity.be/globalsign-releases-security-incident-report-on-comodo-hacks/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
