<?xml version="1.0" encoding="iso-8859-1" ?> 
<rss version="2.0"> 
<channel>
<title>SecurityFocus News</title>
<link>http://www.securityfocus.com</link>
<description>
SecurityFocus is the most comprehensive and trusted source of security
information on the Internet. We are a vendor-neutral site that provides
objective, timely and comprehensive security information to all members of
the security community, from end users, security hobbyists and network
administrators to security consultants, IT Managers, CIOs and CSOs.
</description>
<language>en-us</language>
<copyright>Copyright @ 1999-2006 SecurityFocus</copyright>
<pubDate></pubDate>
<lastBuildDate></lastBuildDate>
<category>SecurityFocus</category> 
<image> 
<title>SecurityFocus</title> 
<url>http://www.securityfocus.com/rss/SFLogo_v1.gif</url> 
<link>http://www.securityfocus.com</link> 
</image>





<item>
<title>News: Change in Focus</title>
<link>http://www.securityfocus.com/news/11582?ref=rss</link>

<description>Change in Focus</description>

<pubDate>2010-03-10</pubDate>
</item>




<item>
<title>News: Twitter attacker had proper credentials</title>
<link>http://www.securityfocus.com/news/11569?ref=rss</link>

<description>Twitter attacker had proper credentials</description>

<pubDate>2009-12-18</pubDate>
</item>




<item>
<title>News: PhotoDNA scans images for child abuse</title>
<link>http://www.securityfocus.com/news/11570?ref=rss</link>

<description><![CDATA[ PhotoDNA scans images for child abuse<br/><br/>
&gt;&gt; Advertisement &lt;&lt;<br/>

Can you answer the ERP quiz?<br/>
These 10 questions determine if your
Enterprise RP rollout gets an A+.<br/>
<a href="http://www.findtechinfo.com/as/acs?pl=781&ca=909">http://www.findtechinfo.com/as/acs?pl=781&ca=909</a>

]]></description>

<pubDate>2009-12-18</pubDate>
</item>




<item>
<title>News: Conficker data highlights infected networks</title>
<link>http://www.securityfocus.com/news/11568?ref=rss</link>

<description>Conficker data highlights infected networks</description>

<pubDate>2009-12-16</pubDate>
</item>






<item>
<title>Brief: Google offers bounty on browser bugs</title>
<link>http://www.securityfocus.com/brief/1067?ref=rss</link>

<description>Google offers bounty on browser bugs</description>

<pubDate>2010-02-02</pubDate>
</item>




<item>
<title>Brief: Cyberattacks from U.S. &quot;greatest concern&quot;</title>
<link>http://www.securityfocus.com/brief/1066?ref=rss</link>

<description><![CDATA[ Cyberattacks from U.S. &quot;greatest concern&quot;<br/><br/>
&gt;&gt; Advertisement &lt;&lt;<br/>

Can you answer the ERP quiz?<br/>
These 10 questions determine if your
Enterprise RP rollout gets an A+.<br/>
<a href="http://www.findtechinfo.com/as/acs?pl=781&ca=909">http://www.findtechinfo.com/as/acs?pl=781&ca=909</a>

]]></description>

<pubDate>2010-01-28</pubDate>
</item>




<item>
<title>Brief: Microsoft patches as fraudsters target IE flaw</title>
<link>http://www.securityfocus.com/brief/1065?ref=rss</link>

<description>Microsoft patches as fraudsters target IE flaw</description>

<pubDate>2010-01-21</pubDate>
</item>




<item>
<title>Brief: Attack on IE 0-day refined by researchers</title>
<link>http://www.securityfocus.com/brief/1064?ref=rss</link>

<description>Attack on IE 0-day refined by researchers</description>

<pubDate>2010-01-18</pubDate>
</item>






<item>
<title>News: Monster botnet held 800,000 people's details</title>
<link>http://www.securityfocus.com/news/11580?ref=rss</link>

<description><![CDATA[ Monster botnet held 800,000 people's details<br/><br/>
&gt;&gt; Advertisement &lt;&lt;<br/>

Can you answer the ERP quiz?<br/>
These 10 questions determine if your
Enterprise RP rollout gets an A+.<br/>
<a href="http://www.findtechinfo.com/as/acs?pl=781&ca=909">http://www.findtechinfo.com/as/acs?pl=781&ca=909</a>

]]></description>

<pubDate>2010-03-04</pubDate>
</item>




<item>
<title>News: Google: 'no timetable' on China talks</title>
<link>http://www.securityfocus.com/news/11581?ref=rss</link>

<description>Google: 'no timetable' on China talks</description>

<pubDate>2010-03-04</pubDate>
</item>




<item>
<title>News: Latvian hacker tweets hard on banking whistle</title>
<link>http://www.securityfocus.com/news/11577?ref=rss</link>

<description>Latvian hacker tweets hard on banking whistle</description>

<pubDate>2010-02-26</pubDate>
</item>




<item>
<title>News: MS uses court order to take out Waledac botnet</title>
<link>http://www.securityfocus.com/news/11578?ref=rss</link>

<description><![CDATA[ MS uses court order to take out Waledac botnet<br/><br/>
&gt;&gt; Advertisement &lt;&lt;<br/>

Can you answer the ERP quiz?<br/>
These 10 questions determine if your
Enterprise RP rollout gets an A+.<br/>
<a href="http://www.findtechinfo.com/as/acs?pl=781&ca=909">http://www.findtechinfo.com/as/acs?pl=781&ca=909</a>

]]></description>

<pubDate>2010-02-25</pubDate>
</item>








<item>
<title>Infocus: Enterprise Intrusion Analysis, Part One</title>
<link>http://www.securityfocus.com/infocus/1904?ref=rss</link>

<description>Enterprise Intrusion Analysis, Part One</description>

<pubDate></pubDate>
</item>




<item>
<title>Infocus: Responding to a Brute Force SSH Attack</title>
<link>http://www.securityfocus.com/infocus/1903?ref=rss</link>

<description>Responding to a Brute Force SSH Attack</description>

<pubDate></pubDate>
</item>




<item>
<title>Infocus: Data Recovery on Linux and &lt;i&gt;ext3&lt;/i&gt;</title>
<link>http://www.securityfocus.com/infocus/1902?ref=rss</link>

<description><![CDATA[ Data Recovery on Linux and &lt;i&gt;ext3&lt;/i&gt;<br/><br/>
&gt;&gt; Advertisement &lt;&lt;<br/>

Can you answer the ERP quiz?<br/>
These 10 questions determine if your
Enterprise RP rollout gets an A+.<br/>
<a href="http://www.findtechinfo.com/as/acs?pl=781&ca=909">http://www.findtechinfo.com/as/acs?pl=781&ca=909</a>

]]></description>

<pubDate></pubDate>
</item>




<item>
<title>Infocus: WiMax: Just Another Security Challenge?</title>
<link>http://www.securityfocus.com/infocus/1901?ref=rss</link>

<description>WiMax: Just Another Security Challenge?</description>

<pubDate></pubDate>
</item>






<item>
<title>Gunter Ollmann: Time to Squish SQL Injection</title>
<link>http://www.securityfocus.com/columnists/505?ref=rss</link>

<description>Time to Squish SQL Injection</description>

<pubDate></pubDate>
</item>




<item>
<title>Mark Rasch: Lazy Workers May Be Deemed Hackers</title>
<link>http://www.securityfocus.com/columnists/504?ref=rss</link>

<description><![CDATA[ Lazy Workers May Be Deemed Hackers<br/><br/>
&gt;&gt; Advertisement &lt;&lt;<br/>

Can you answer the ERP quiz?<br/>
These 10 questions determine if your
Enterprise RP rollout gets an A+.<br/>
<a href="http://www.findtechinfo.com/as/acs?pl=781&ca=909">http://www.findtechinfo.com/as/acs?pl=781&ca=909</a>

]]></description>

<pubDate></pubDate>
</item>




<item>
<title>Adam O'Donnell: The Scale of Security</title>
<link>http://www.securityfocus.com/columnists/503?ref=rss</link>

<description>The Scale of Security</description>

<pubDate></pubDate>
</item>




<item>
<title>Mark Rasch: Hacker-Tool Law Still Does Little</title>
<link>http://www.securityfocus.com/columnists/502?ref=rss</link>

<description>Hacker-Tool Law Still Does Little</description>

<pubDate></pubDate>
</item>














<item>
<title>More rss feeds from SecurityFocus</title>
<link>http://www.securityfocus.com/rss/index.shtml</link>
<description>News, Infocus, Columns, Vulnerabilities, Bugtraq ...</description>
</item>
</channel> 
</rss> 


