<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~d/styles/atom10full.xsl"?><?xml-stylesheet type="text/css" media="screen" href="http://feeds.feedburner.com/~d/styles/itemcontent.css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:gr="http://www.google.com/schemas/reader/atom/" xmlns:idx="urn:atom-extension:indexing" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0" idx:index="no" gr:dir="ltr"><!--
Content-type: Preventing XSRF in IE.

--><generator uri="http://www.google.com/reader">Google Reader</generator><id>tag:google.com,2005:reader/user/15261006718642648182/label/Cisco</id><title>"Cisco" via Ehsan in Google Reader</title><gr:continuation>CJz8sL_wh7AC</gr:continuation><author><name>Ehsan</name></author><updated>2012-05-19T11:34:01Z</updated><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="self" type="application/atom+xml" href="http://feeds.feedburner.com/ciscoinmicrogoogle" /><feedburner:info uri="ciscoinmicrogoogle" /><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="hub" href="http://pubsubhubbub.appspot.com/" /><feedburner:emailServiceId>ciscoinmicrogoogle</feedburner:emailServiceId><feedburner:feedburnerHostname>http://feedburner.google.com</feedburner:feedburnerHostname><entry gr:crawl-timestamp-msec="1337427241340"><id gr:original-id="http://www.networkworld.com/news/2012/051812-cyber-warfare-in-sights-at-259455.html?source=nww_rss">tag:google.com,2005:reader/item/cc94c1504c4671fd</id><title type="html">Cyber warfare in sights at government training conference</title><published>2012-05-18T10:29:41Z</published><updated>2012-05-18T10:29:41Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/ij9uXASD9u8/051812-cyber-warfare-in-sights-at-259455.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">The prospect of cyberwar means the U.S. needs to &amp;#39;rethink every aspect of defense,&amp;#39; says one summit presenter&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/ij9uXASD9u8" height="1" width="1"/&gt;</summary><author><name>Taylor Armerding</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051812-cyber-warfare-in-sights-at-259455.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337427241340"><id gr:original-id="http://www.networkworld.com/news/2012/051812-social-networking-security-in-the-259454.html?source=nww_rss">tag:google.com,2005:reader/item/d9d6fa5b9cba2d7e</id><title type="html">Social Networking Security in the Workplace</title><published>2012-05-18T10:12:34Z</published><updated>2012-05-18T10:12:34Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/N6putCDYfDw/051812-social-networking-security-in-the-259454.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">At any given moment today, on-the-clock employees are updating their social media status, reading feeds and networking on business media sites. Moments can stretch to minutes: A recent study by the Ponemon Institute found that 60 percent of social media users spend at least 30 minutes a day on these sites while at work.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/N6putCDYfDw" height="1" width="1"/&gt;</summary><author><name>Gary Loveland</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051812-social-networking-security-in-the-259454.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337427241339"><id gr:original-id="http://www.networkworld.com/news/2012/051812-twitter-jumps-on-do-not-259449.html?source=nww_rss">tag:google.com,2005:reader/item/8ea7cfe9ebf87bd8</id><title type="html">Twitter jumps on Do Not Track bandwagon</title><published>2012-05-18T08:01:24Z</published><updated>2012-05-18T08:01:24Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/pmIOEA8O-r0/051812-twitter-jumps-on-do-not-259449.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">Twitter has announced support for &amp;quot;Do Not Track,&amp;quot; immediately implementing it to halt online tracking of users who trigger a setting in their browsers.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/pmIOEA8O-r0" height="1" width="1"/&gt;</summary><author><name>Computerworld Staff</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051812-twitter-jumps-on-do-not-259449.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337427241339"><id gr:original-id="http://www.networkworld.com/news/2012/051812-flashback-mac-trojan-earned-14000-259441.html?source=nww_rss">tag:google.com,2005:reader/item/ddd6c0d478d34aa3</id><title type="html">Flashback Mac Trojan earned $14,000 from ad clicks, Symantec</title><published>2012-05-18T06:10:00Z</published><updated>2012-05-18T06:10:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/bodLQeDkz-o/051812-flashback-mac-trojan-earned-14000-259441.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">Symantec originally thought that at its peek the Flashback Trojan was generating around $10,000 a day by hijacking ad clicks. Now, new research suggests the developers may only have earned $14,000 during the time that the malware was active.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/bodLQeDkz-o" height="1" width="1"/&gt;</summary><author><name>Karen Haslam</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051812-flashback-mac-trojan-earned-14000-259441.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337427241339"><id gr:original-id="http://www.networkworld.com/news/2012/051812-anonymous-hater-claims-responsibility-for-259435.html?source=nww_rss">tag:google.com,2005:reader/item/7db6ea415fe8522d</id><title type="html">Anonymous hater claims responsibility for Pirate Bay DDoS attack</title><published>2012-05-18T05:55:00Z</published><updated>2012-05-18T05:55:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/wBUynf7eBUk/051812-anonymous-hater-claims-responsibility-for-259435.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">A hacker who claims to hate both Anonymous and notorious file-sharing website The Pirate Bay has claimed responsibility for the DDoS attack that the bittorent website has been suffering for the last 24 hours.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/wBUynf7eBUk" height="1" width="1"/&gt;</summary><author><name>Mary-ann Russon</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051812-anonymous-hater-claims-responsibility-for-259435.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337427241339"><id gr:original-id="http://www.networkworld.com/news/2012/051812-windows-8-security-what39s-259436.html?source=nww_rss">tag:google.com,2005:reader/item/9ab7be6ce1dfa13b</id><title type="html">Windows 8 Security: What&amp;#39;s New</title><published>2012-05-18T05:48:00Z</published><updated>2012-05-18T05:48:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/4PNcF3rKcUI/051812-windows-8-security-what39s-259436.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">When Windows 8 comes out later this year, the new Start screen and Metro-style apps will likely be the first changes you&amp;#39;ll notice, but those aren&amp;#39;t the only things that are new. Microsoft is also making some serious security enhancements to help keep your system safer and to improve Windows&amp;#39; ability to combat viruses and malware. It just may be the biggest improvement to Windows security yet.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/4PNcF3rKcUI" height="1" width="1"/&gt;</summary><author><name>Eric Geier</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051812-windows-8-security-what39s-259436.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337427241338"><id gr:original-id="http://www.networkworld.com/newsletters/techexec/2012/051812bestpractices.html?source=nww_rss">tag:google.com,2005:reader/item/754fe0f191405ad7</id><title type="html">New approaches to combat &amp;#39;sources of evil&amp;#39; and other security issues</title><published>2012-05-18T05:04:08Z</published><updated>2012-05-18T05:04:08Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/hUyEz9rXVPE/051812bestpractices.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">Eric Cole of the SANS Institute says threats to our networks have changed but the way we approach security hasn't changed. As a result, companies have spent heavily on security technologies but they are still getting compromised. He suggests some new approaches.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/hUyEz9rXVPE" height="1" width="1"/&gt;</summary><author><name>Linda Musthaler</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/newsletters/techexec/2012/051812bestpractices.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337427241338"><id gr:original-id="http://www.networkworld.com/news/2012/051812-android-in-enterprises-39severely-limited39-259434.html?source=nww_rss">tag:google.com,2005:reader/item/3a14d3c1bb9b14cc</id><title type="html">Android in enterprises &amp;#39;severely limited&amp;#39; by weak management support from Google</title><published>2012-05-18T16:25:00Z</published><updated>2012-05-18T16:25:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/nSFlOVYopOI/051812-android-in-enterprises-39severely-limited39-259434.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">Adoption of Android tablets and smartphones in large businesses has been &amp;quot;severely limited&amp;quot; because of the complexities of managing the various Android models and versions, market research firm Gartner said in an evaluation of 20 mobile device management software vendors.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/nSFlOVYopOI" height="1" width="1"/&gt;</summary><author><name>Matt Hamblen</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051812-android-in-enterprises-39severely-limited39-259434.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337363719324"><id gr:original-id="http://www.networkworld.com/news/2012/051812-will-voluntary-cyber-threat-sharing-259423.html?source=nww_rss">tag:google.com,2005:reader/item/f2ab816a6e1d282b</id><title type="html">Will voluntary cyber threat sharing plan cast doubt over CISPA?</title><published>2012-05-17T12:29:00Z</published><updated>2012-05-17T12:29:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/3-KoH6prokU/051812-will-voluntary-cyber-threat-sharing-259423.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">The question of whether CISPA is really necessary might arise in the wake of a Department of Defense announcement last week that as many as 1,000 defense contractors -- and possibly thousands more -- may voluntarily join an expanded program of sharing classified information on cyber threats with the federal government.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/3-KoH6prokU" height="1" width="1"/&gt;</summary><author><name>Taylor Armerding</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051812-will-voluntary-cyber-threat-sharing-259423.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337363719323"><id gr:original-id="http://www.networkworld.com/news/2012/051712-anonymous-takes-aim-at-indian-259425.html?source=nww_rss">tag:google.com,2005:reader/item/ae07a74e2b2af99e</id><title type="html">Anonymous Takes Aim at Indian Government</title><published>2012-05-17T10:07:00Z</published><updated>2012-05-17T10:07:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/osS8FoxAhuM/051712-anonymous-takes-aim-at-indian-259425.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">In retaliation against Internet Service Providers (ISPs) blocking some video-sharing and torrent websites like The Pirate Bay under Indian court orders, Anonymous, the &amp;quot;hacktivist&amp;quot; organization, today took down the websites of the ruling Congress Party and the Supreme Court of India. Anonymous, which in the past has been credited with taking down the websites of the MPAA, RIAA, the FBI, the US Department of Justice and child pornographers, took down these sites in what is understood to be DDoS (Distributed Denial of Service) attacks.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/osS8FoxAhuM" height="1" width="1"/&gt;</summary><author><name>Nikhil Pradhan</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051712-anonymous-takes-aim-at-indian-259425.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337363719323"><id gr:original-id="http://www.networkworld.com/news/2012/051712-mac-based-flashback-click-fraud-campaign-259417.html?source=nww_rss">tag:google.com,2005:reader/item/fd10968ddf391d2c</id><title type="html">Mac-based Flashback click fraud campaign was a bust</title><published>2012-05-17T08:25:00Z</published><updated>2012-05-17T08:25:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/6ydJQgXem9A/051712-mac-based-flashback-click-fraud-campaign-259417.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">The hackers in charge of the Flashback botnet managed to generate $14,000 from their click fraud campaign, but have not been paid, Symantec said today.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/6ydJQgXem9A" height="1" width="1"/&gt;</summary><author><name>Gregg Keizer</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051712-mac-based-flashback-click-fraud-campaign-259417.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337363719323"><id gr:original-id="http://www.networkworld.com/news/2012/051712-cyber-spies-exploiting-java-flash-259416.html?source=nww_rss">tag:google.com,2005:reader/item/9b1053d0c68ea3fb</id><title type="html">Cyber spies exploiting Java, Flash flaws</title><published>2012-05-17T07:34:00Z</published><updated>2012-05-17T07:34:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/6YYG-OGw7JU/051712-cyber-spies-exploiting-java-flash-259416.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">Such activity is often paid for, or sanctioned by, government agencies&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/6YYG-OGw7JU" height="1" width="1"/&gt;</summary><author><name>Antone Gonsalves</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051712-cyber-spies-exploiting-java-flash-259416.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337361459964"><id gr:original-id="http://www.networkworld.com/news/2012/051812-cisco-wireless-259429.html?source=nww_rss">tag:google.com,2005:reader/item/b9e50d6406b4be29</id><title type="html">Cisco&amp;#39;s wireless unit shifts emphasis to &amp;quot;mobility&amp;quot;</title><published>2012-05-18T13:55:28Z</published><updated>2012-05-18T13:55:28Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/dUQFKKambKQ/051812-cisco-wireless-259429.html" type="text/html" /><summary xml:base="http://www.networkworld.com/news/financial/cisco.html" type="html">Cisco's Wireless Networking Business Unit doesn't actually talk so much about wireless networking these days. Increasingly, its message aimed at IT groups is about the broader concept of "mobility."&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/dUQFKKambKQ" height="1" width="1"/&gt;</summary><author><name>John Cox</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/cisco.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/cisco.xml</id><title type="html">Cisco news from Network World</title><link rel="alternate" href="http://www.networkworld.com/news/financial/cisco.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051812-cisco-wireless-259429.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337345055735"><id gr:original-id="http://www.networkworld.com/news/2012/051712-us-firms-over-reliant-on-firewalls-259405.html?source=nww_rss">tag:google.com,2005:reader/item/b00b5a23e4e41af3</id><title type="html">US firms over-reliant on firewalls to defend against DDoS attacks</title><published>2012-05-17T07:54:00Z</published><updated>2012-05-17T07:54:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/F6UKy0HSH5A/051712-us-firms-over-reliant-on-firewalls-259405.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">More than half of US businesses still rely on conventional firewalls or intrusion prevention systems to shield themselves from the scourge of DDoS attacks, a survey by services firm Neustar has found.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/F6UKy0HSH5A" height="1" width="1"/&gt;</summary><author><name>John E Dunn</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051712-us-firms-over-reliant-on-firewalls-259405.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337345055735"><id gr:original-id="http://www.networkworld.com/news/2012/051712-android-malware-using-real-apps-259400.html?source=nww_rss">tag:google.com,2005:reader/item/4f1f145092424cd9</id><title type="html">Android malware using real apps as disguise &amp;#39;wrappers&amp;#39;</title><published>2012-05-17T07:39:00Z</published><updated>2012-05-17T07:39:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/12fXy_YysNg/051712-android-malware-using-real-apps-259400.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">Mobile malware stepped up an order of magnitude in volume and sophistication during 2011 and this trend has continued in the first quarter of 2012, according to F-Secure's latest quarterly report.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/12fXy_YysNg" height="1" width="1"/&gt;</summary><author><name>John E Dunn</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051712-android-malware-using-real-apps-259400.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337345055735"><id gr:original-id="http://www.networkworld.com/news/2012/051712-social-media-medical-259394.html?source=nww_rss">tag:google.com,2005:reader/item/2dc7fa6ffae461d8</id><title type="html">Doctors warned not to use social media with patients</title><published>2012-05-17T06:47:14Z</published><updated>2012-05-17T06:47:14Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/jI_hFVkUDCM/051712-social-media-medical-259394.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">Doctors are being cautioned by hospitals they work with to avoid interacting with patients on social media, and that they reject any overtures by patients to interact on the likes of Facebook and Twitter.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/jI_hFVkUDCM" height="1" width="1"/&gt;</summary><author><name>Ellen Messmer</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051712-social-media-medical-259394.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337345055735"><id gr:original-id="http://www.networkworld.com/news/2012/051712-uk-man-jailed-for-facebook-259389.html?source=nww_rss">tag:google.com,2005:reader/item/2fa3c8c6e5e32709</id><title type="html">UK man jailed for Facebook hack</title><published>2012-05-17T05:15:00Z</published><updated>2012-05-17T05:15:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/Ph-othDPE-8/051712-uk-man-jailed-for-facebook-259389.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">A man from West Sussex has been sent to jail for 12 months after hacking into a private Facebook account.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/Ph-othDPE-8" height="1" width="1"/&gt;</summary><author><name>Anh Nguyen</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051712-uk-man-jailed-for-facebook-259389.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337345055734"><id gr:original-id="http://www.networkworld.com/news/2012/051712-paging-mr-phelps-this-ssd-259391.html?source=nww_rss">tag:google.com,2005:reader/item/abd47f84eb2fa1d7</id><title type="html">Paging Mr. Phelps: This SSD will self-destruct....</title><published>2012-05-17T16:32:00Z</published><updated>2012-05-17T16:32:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/KNny25Cw3gM/051712-paging-mr-phelps-this-ssd-259391.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">SSD maker RunCore&amp;#39;s InVincible SSD can wipe your data using one of two methods: overwriting the entire disk with meaningless code or frying it with voltage.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/KNny25Cw3gM" height="1" width="1"/&gt;</summary><author><name>Lucas Mearian</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051712-paging-mr-phelps-this-ssd-259391.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337276855240"><id gr:original-id="http://www.networkworld.com/news/2012/051712-social-media-security-259387.html?source=nww_rss">tag:google.com,2005:reader/item/cd6be3211ed6615d</id><title type="html">Social media a boon for businesses, but creates security quagmire</title><published>2012-05-17T16:22:32Z</published><updated>2012-05-17T16:22:32Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/h0h70IpjdGg/051712-social-media-security-259387.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">Social media -- Facebook, Twitter, LinkedIn, Google+ and so forth -- has become a way of life for companies and their employees to interact with the public, but beating back the fraudsters that try to prey on customers, not to mention keeping employees from spilling sensitive data, is becoming a full-time job for many.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/h0h70IpjdGg" height="1" width="1"/&gt;</summary><author><name>Ellen Messmer</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051712-social-media-security-259387.html?source=nww_rss</feedburner:origLink></entry><entry gr:crawl-timestamp-msec="1337276855240"><id gr:original-id="http://www.networkworld.com/news/2012/051712-android-hackers-honing-skills-in-259381.html?source=nww_rss">tag:google.com,2005:reader/item/704dd16344a996ff</id><title type="html">Android hackers honing skills in Russia</title><published>2012-05-17T12:30:00Z</published><updated>2012-05-17T12:30:00Z</updated><link rel="alternate" href="http://feedproxy.google.com/~r/ciscoinmicrogoogle/~3/TtoNXbC__0c/051712-android-hackers-honing-skills-in-259381.html" type="text/html" /><summary xml:base="http://www.networkworld.com/topics/security.html" type="html">The malware business growing around Google Android -- now the leading smartphone operating system -- is still in its infancy. Today, many of the apps built to steal money from Android users originate from Russia and China, so criminal gangs there have become cyber-trailblazers.&lt;img src="http://feeds.feedburner.com/~r/ciscoinmicrogoogle/~4/TtoNXbC__0c" height="1" width="1"/&gt;</summary><author><name>Antone Gonsalves</name></author><source gr:stream-id="feed/http://www.networkworld.com/rss/security.xml"><id>tag:google.com,2005:reader/feed/http://www.networkworld.com/rss/security.xml</id><title type="html">Network World on Security</title><link rel="alternate" href="http://www.networkworld.com/topics/security.html" type="text/html" /></source><feedburner:origLink>http://www.networkworld.com/news/2012/051712-android-hackers-honing-skills-in-259381.html?source=nww_rss</feedburner:origLink></entry></feed>
