<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Security trends for 2014</title>
	<atom:link href="http://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 19:28:52 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: technology blogs</title>
		<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/comment-page-68/#comment-1588049</link>
		<dc:creator><![CDATA[technology blogs]]></dc:creator>
		<pubDate>Sat, 14 Apr 2018 01:40:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24223#comment-1588049</guid>
		<description><![CDATA[That doesn&#039;t mean there aren&#039;t downsides, though. I think 
you havce a really good viewpoint however and I like the angle you came from 
on this.]]></description>
		<content:encoded><![CDATA[<p>That doesn&#8217;t mean there aren&#8217;t downsides, though. I think<br />
you havce a really good viewpoint however and I like the angle you came from<br />
on this.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Maude</title>
		<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/comment-page-68/#comment-1492653</link>
		<dc:creator><![CDATA[Maude]]></dc:creator>
		<pubDate>Wed, 01 Jun 2016 02:18:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24223#comment-1492653</guid>
		<description><![CDATA[Its so frustrating to see the amount of professionals 
and SEO gurus who don&#039;t know anything
Added to Digg, someone will like it]]></description>
		<content:encoded><![CDATA[<p>Its so frustrating to see the amount of professionals<br />
and SEO gurus who don&#8217;t know anything<br />
Added to Digg, someone will like it</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: rfid card case wallet</title>
		<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/comment-page-68/#comment-1389930</link>
		<dc:creator><![CDATA[rfid card case wallet]]></dc:creator>
		<pubDate>Wed, 13 May 2015 11:43:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24223#comment-1389930</guid>
		<description><![CDATA[I initially had the Aluma Wallet nevertheless filled it to complete and broke it which i 
discovered these together with what a great price. The primary 
purpose I did not provide five stars is really simply because the Aluma wallet holds somewhat bigger card 
then these handbags. Something wider an ordinary bank card will not easily fit into 
this wallet. Which I involve some cards that are only a little wider an ordinary bank card.]]></description>
		<content:encoded><![CDATA[<p>I initially had the Aluma Wallet nevertheless filled it to complete and broke it which i<br />
discovered these together with what a great price. The primary<br />
purpose I did not provide five stars is really simply because the Aluma wallet holds somewhat bigger card<br />
then these handbags. Something wider an ordinary bank card will not easily fit into<br />
this wallet. Which I involve some cards that are only a little wider an ordinary bank card.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/comment-page-68/#comment-1324291</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 02 Jan 2015 06:38:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24223#comment-1324291</guid>
		<description><![CDATA[Jeff Grubb / VentureBeat:
Sony to give PlayStation Network members 10% off one transaction in PlayStation Store to make up for outage; qualifying PSN Plus subscribers get five days extra

http://venturebeat.com/2015/01/01/heres-how-sony-is-going-to-make-up-for-the-psn-outage/]]></description>
		<content:encoded><![CDATA[<p>Jeff Grubb / VentureBeat:<br />
Sony to give PlayStation Network members 10% off one transaction in PlayStation Store to make up for outage; qualifying PSN Plus subscribers get five days extra</p>
<p><a href="http://venturebeat.com/2015/01/01/heres-how-sony-is-going-to-make-up-for-the-psn-outage/" rel="nofollow">http://venturebeat.com/2015/01/01/heres-how-sony-is-going-to-make-up-for-the-psn-outage/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/comment-page-68/#comment-1324286</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 02 Jan 2015 06:33:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24223#comment-1324286</guid>
		<description><![CDATA[Jon Southurst / CoinDesk:
Japanese police suspect 99% of bitcoins missing from Mt. Gox are due to internal system manipulation, not hack

Missing Mt Gox Bitcoins Likely an Inside Job, Say Japanese Police
http://www.coindesk.com/missing-mt-gox-bitcoins-inside-job-japanese-police/]]></description>
		<content:encoded><![CDATA[<p>Jon Southurst / CoinDesk:<br />
Japanese police suspect 99% of bitcoins missing from Mt. Gox are due to internal system manipulation, not hack</p>
<p>Missing Mt Gox Bitcoins Likely an Inside Job, Say Japanese Police<br />
<a href="http://www.coindesk.com/missing-mt-gox-bitcoins-inside-job-japanese-police/" rel="nofollow">http://www.coindesk.com/missing-mt-gox-bitcoins-inside-job-japanese-police/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/comment-page-68/#comment-1324067</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jan 2015 15:44:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24223#comment-1324067</guid>
		<description><![CDATA[U.K. police allegedly arrest Lizard Squad hacker
http://www.dailydot.com/crime/lizard-squad-vinnie-omari-arrested/

A member of the hacker group that claimed responsibility for the Christmas Day shutdown of Sony and Microsoft’s gaming networks has been arrested.

Vinnie Omari, a 22-year-old member of the group Lizard Squad, was arrested on Monday after British law enforcement agents from the South East Regional Organized Crime Unit raided his home. Omari confirmed the raid with the Daily Dot, and provided a photo of the search warrant he received.

“They took everything,” Omari told the Daily Dot in an email. “Xbox one, phones, laptops, computer USBs, etc.”

A press release from the Thames Valley Police confirms that a 22-year-old man was arrested Monday &quot;on suspicion of fraud by false representation and Computer Misuse Act offense.&quot; 

Lizard Squad took credit for the Dec. 25 distributed denial-of-service (DDoS) attacks against the PlayStation Network and Xbox Live.]]></description>
		<content:encoded><![CDATA[<p>U.K. police allegedly arrest Lizard Squad hacker<br />
<a href="http://www.dailydot.com/crime/lizard-squad-vinnie-omari-arrested/" rel="nofollow">http://www.dailydot.com/crime/lizard-squad-vinnie-omari-arrested/</a></p>
<p>A member of the hacker group that claimed responsibility for the Christmas Day shutdown of Sony and Microsoft’s gaming networks has been arrested.</p>
<p>Vinnie Omari, a 22-year-old member of the group Lizard Squad, was arrested on Monday after British law enforcement agents from the South East Regional Organized Crime Unit raided his home. Omari confirmed the raid with the Daily Dot, and provided a photo of the search warrant he received.</p>
<p>“They took everything,” Omari told the Daily Dot in an email. “Xbox one, phones, laptops, computer USBs, etc.”</p>
<p>A press release from the Thames Valley Police confirms that a 22-year-old man was arrested Monday &#8220;on suspicion of fraud by false representation and Computer Misuse Act offense.&#8221; </p>
<p>Lizard Squad took credit for the Dec. 25 distributed denial-of-service (DDoS) attacks against the PlayStation Network and Xbox Live.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/comment-page-68/#comment-1323598</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Dec 2014 15:15:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24223#comment-1323598</guid>
		<description><![CDATA[Moreover, because of the way that antivirus programs are sandboxed on a phone or tablet, it&#039;s exceedingly difficult to do anything about them.
Read more at http://hothardware.com/reviews/security-research-at-the-hague-the-mobile-malware-threat?page=2#dQAIOTr9SLF7HtiH.99]]></description>
		<content:encoded><![CDATA[<p>Moreover, because of the way that antivirus programs are sandboxed on a phone or tablet, it&#8217;s exceedingly difficult to do anything about them.<br />
Read more at <a href="http://hothardware.com/reviews/security-research-at-the-hague-the-mobile-malware-threat?page=2#dQAIOTr9SLF7HtiH.99" rel="nofollow">http://hothardware.com/reviews/security-research-at-the-hague-the-mobile-malware-threat?page=2#dQAIOTr9SLF7HtiH.99</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/comment-page-68/#comment-1323596</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Dec 2014 15:11:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24223#comment-1323596</guid>
		<description><![CDATA[Sony insider -- not North Korea -- likely involved in hack, experts say
December 30, 2014
http://www.latimes.com/entertainment/envelope/cotown/la-et-ct-sony-hack-inside-job-not-north-korea-20141231-story.html



Federal authorities insist that the North Korean government is behind the cyberattack on Sony Pictures Entertainment.

Cybersecurity experts? Many are not convinced.

From the time the hack became public Nov. 24, many of these experts have voiced their suspicions that a disgruntled Sony Pictures insider was involved.

Respected voices in the online security and anti-hacking community say the evidence presented publicly by the FBI is not enough to draw firm conclusions.

They argue that the connections between the Sony hack and the North Korean government amount to circumstantial evidence. Further, they say the level of the breach indicates an intimate knowledge of Sony&#039;s computer systems that could have come from someone on the inside.

&quot;We can&#039;t find any indication that North Korea either ordered, masterminded or funded this attack,&quot; Kurt Stammberger, a senior vice president at Norse, said in an interview with The Times. 

President Obama this month said North Korea was behind the Sony attack and pledged a &quot;proportional&quot; response. North Korea&#039;s Internet suffered outages in the days following the announcement. The U.S. hasn&#039;t taken responsibility for the outages, but North Korea has blamed Obama.

But analysts said attribution in cyberattacks is difficult, and hackers are skilled in obfuscation and misdirection to avoid getting caught. Also, software-wiping technology used by the so-called Guardians of Peace group against Sony is widely available to hackers and can be easily purchased. Many were surprised that the FBI made its announcement so quickly.

&quot;You don&#039;t want to jump to conclusions in a cyberattack,&quot; said Rob Sloan, head of cybercontent and data at Dow Jones. &quot;Attributing attacks is really a non-scientific art.&quot;

Even skeptics who doubt the attack was state-sponsored said the FBI may have more convincing evidence that it has chosen to keep secret.]]></description>
		<content:encoded><![CDATA[<p>Sony insider &#8212; not North Korea &#8212; likely involved in hack, experts say<br />
December 30, 2014<br />
<a href="http://www.latimes.com/entertainment/envelope/cotown/la-et-ct-sony-hack-inside-job-not-north-korea-20141231-story.html" rel="nofollow">http://www.latimes.com/entertainment/envelope/cotown/la-et-ct-sony-hack-inside-job-not-north-korea-20141231-story.html</a></p>
<p>Federal authorities insist that the North Korean government is behind the cyberattack on Sony Pictures Entertainment.</p>
<p>Cybersecurity experts? Many are not convinced.</p>
<p>From the time the hack became public Nov. 24, many of these experts have voiced their suspicions that a disgruntled Sony Pictures insider was involved.</p>
<p>Respected voices in the online security and anti-hacking community say the evidence presented publicly by the FBI is not enough to draw firm conclusions.</p>
<p>They argue that the connections between the Sony hack and the North Korean government amount to circumstantial evidence. Further, they say the level of the breach indicates an intimate knowledge of Sony&#8217;s computer systems that could have come from someone on the inside.</p>
<p>&#8220;We can&#8217;t find any indication that North Korea either ordered, masterminded or funded this attack,&#8221; Kurt Stammberger, a senior vice president at Norse, said in an interview with The Times. </p>
<p>President Obama this month said North Korea was behind the Sony attack and pledged a &#8220;proportional&#8221; response. North Korea&#8217;s Internet suffered outages in the days following the announcement. The U.S. hasn&#8217;t taken responsibility for the outages, but North Korea has blamed Obama.</p>
<p>But analysts said attribution in cyberattacks is difficult, and hackers are skilled in obfuscation and misdirection to avoid getting caught. Also, software-wiping technology used by the so-called Guardians of Peace group against Sony is widely available to hackers and can be easily purchased. Many were surprised that the FBI made its announcement so quickly.</p>
<p>&#8220;You don&#8217;t want to jump to conclusions in a cyberattack,&#8221; said Rob Sloan, head of cybercontent and data at Dow Jones. &#8220;Attributing attacks is really a non-scientific art.&#8221;</p>
<p>Even skeptics who doubt the attack was state-sponsored said the FBI may have more convincing evidence that it has chosen to keep secret.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/comment-page-68/#comment-1323576</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Dec 2014 13:55:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24223#comment-1323576</guid>
		<description><![CDATA[William Turton / The Daily Dot: 	
Hacker group Lizard Squad launches DDoS service with prices ranging from $6 to $500, says recent PSN and Xbox Live attacks were marketing scheme  —  L
http://www.dailydot.com/crime/lizard-squad-lizard-stresser-ddos-service-psn-xbox-live-sony-microsoft/]]></description>
		<content:encoded><![CDATA[<p>William Turton / The Daily Dot:<br />
Hacker group Lizard Squad launches DDoS service with prices ranging from $6 to $500, says recent PSN and Xbox Live attacks were marketing scheme  —  L<br />
<a href="http://www.dailydot.com/crime/lizard-squad-lizard-stresser-ddos-service-psn-xbox-live-sony-microsoft/" rel="nofollow">http://www.dailydot.com/crime/lizard-squad-lizard-stresser-ddos-service-psn-xbox-live-sony-microsoft/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/02/security-trends-for-2014/comment-page-68/#comment-1323575</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Dec 2014 13:54:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24223#comment-1323575</guid>
		<description><![CDATA[Bloomberg: 	  
FBI investigating whether US financial institutions enlisted hackers to disable Iranian servers used to attack bank websites 

FBI Investigating Whether Companies Are Engaged in Revenge Hacking 
http://www.bloomberg.com/news/2014-12-30/fbi-probes-if-banks-hacked-back-as-firms-mull-offensives.html

The hacked are itching to hack back.

So say a dozen security specialists and former law-enforcement officials, who described an intensifying and largely unspoken sense of unease inside many companies after the recent breach of Sony Corp. (6758)’s networks. 

U.S. officials have shown little appetite to intervene as banks, retailers, casinos, power companies and manufacturers have been targeted by foreign-based hackers. Private-sector companies doing business in the U.S. have few clear options for striking back on their own. 

That has led a growing number of companies to push the limits of existing law to consider ways to break into hackers’ networks to retrieve stolen data or even knock computers offline to stop attacks, the cybersecurity professionals said in interviews. Some companies are enlisting cybersecurity firms, many with military or government security ties, to walk them through options for disrupting hacker operations or peering into foreign networks to find out what intellectual property hackers may have stolen.]]></description>
		<content:encoded><![CDATA[<p>Bloomberg:<br />
FBI investigating whether US financial institutions enlisted hackers to disable Iranian servers used to attack bank websites </p>
<p>FBI Investigating Whether Companies Are Engaged in Revenge Hacking<br />
<a href="http://www.bloomberg.com/news/2014-12-30/fbi-probes-if-banks-hacked-back-as-firms-mull-offensives.html" rel="nofollow">http://www.bloomberg.com/news/2014-12-30/fbi-probes-if-banks-hacked-back-as-firms-mull-offensives.html</a></p>
<p>The hacked are itching to hack back.</p>
<p>So say a dozen security specialists and former law-enforcement officials, who described an intensifying and largely unspoken sense of unease inside many companies after the recent breach of Sony Corp. (6758)’s networks. </p>
<p>U.S. officials have shown little appetite to intervene as banks, retailers, casinos, power companies and manufacturers have been targeted by foreign-based hackers. Private-sector companies doing business in the U.S. have few clear options for striking back on their own. </p>
<p>That has led a growing number of companies to push the limits of existing law to consider ways to break into hackers’ networks to retrieve stolen data or even knock computers offline to stop attacks, the cybersecurity professionals said in interviews. Some companies are enlisting cybersecurity firms, many with military or government security ties, to walk them through options for disrupting hacker operations or peering into foreign networks to find out what intellectual property hackers may have stolen.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
