<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 4 Web Security Threats to Look Out For</title>
	<atom:link href="http://www.gfi.com/blog/4-web-security-threats-to-look-out-for/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/4-web-security-threats-to-look-out-for/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=4-web-security-threats-to-look-out-for</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Greg Rasyahani</title>
		<link>http://www.gfi.com/blog/4-web-security-threats-to-look-out-for/comment-page-1/#comment-31032</link>
		<dc:creator>Greg Rasyahani</dc:creator>
		<pubDate>Tue, 03 Jan 2012 08:20:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=7725#comment-31032</guid>
		<description><![CDATA[Not just the typical news headlines but also news regarding Hollywood celebrities, politicians, and sports stars - especially the ones involving sex scandals and nude photos. Hackers and spammers are exploiting the popularity of these media by deceiving users to click a certain link (either to view the full video, download the whole file, or stream some movie clips). 

Spammers have done this a million times before. The most famous ones involved sex scandals with Hollywood celebrities such as on the cases of Paris Hilton and Kim Kardashan.]]></description>
		<content:encoded><![CDATA[<p>Not just the typical news headlines but also news regarding Hollywood celebrities, politicians, and sports stars &#8211; especially the ones involving sex scandals and nude photos. Hackers and spammers are exploiting the popularity of these media by deceiving users to click a certain link (either to view the full video, download the whole file, or stream some movie clips). </p>
<p>Spammers have done this a million times before. The most famous ones involved sex scandals with Hollywood celebrities such as on the cases of Paris Hilton and Kim Kardashan.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Christina Goggi</title>
		<link>http://www.gfi.com/blog/4-web-security-threats-to-look-out-for/comment-page-1/#comment-30981</link>
		<dc:creator>Christina Goggi</dc:creator>
		<pubDate>Mon, 26 Dec 2011 11:40:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=7725#comment-30981</guid>
		<description><![CDATA[The preview functionality is the same (or very similar to) as a normal click. If the page is poisoned, the malware could infect anyway. This is why we recommend that you implement web security software at the server level. This would ensure that the software actually prevents that page from being accessed, and thus prevents any potential infection.]]></description>
		<content:encoded><![CDATA[<p>The preview functionality is the same (or very similar to) as a normal click. If the page is poisoned, the malware could infect anyway. This is why we recommend that you implement web security software at the server level. This would ensure that the software actually prevents that page from being accessed, and thus prevents any potential infection.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Yancy Reyes</title>
		<link>http://www.gfi.com/blog/4-web-security-threats-to-look-out-for/comment-page-1/#comment-30973</link>
		<dc:creator>Yancy Reyes</dc:creator>
		<pubDate>Sun, 25 Dec 2011 03:26:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=7725#comment-30973</guid>
		<description><![CDATA[This is where we can integrate the features of both an updated browser and secure search engine - just like what Google and Firefox are doing for several years now.

These two Internet giants have a long standing cooperation before - with web security, anti-hacking, anti-spamming, anti-malware, and the likes. Even with Chrome&#039;s introduction to the browser war, Google still did not abandon Firefox.]]></description>
		<content:encoded><![CDATA[<p>This is where we can integrate the features of both an updated browser and secure search engine &#8211; just like what Google and Firefox are doing for several years now.</p>
<p>These two Internet giants have a long standing cooperation before &#8211; with web security, anti-hacking, anti-spamming, anti-malware, and the likes. Even with Chrome&#8217;s introduction to the browser war, Google still did not abandon Firefox.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sarah Meyers</title>
		<link>http://www.gfi.com/blog/4-web-security-threats-to-look-out-for/comment-page-1/#comment-30951</link>
		<dc:creator>Sarah Meyers</dc:creator>
		<pubDate>Fri, 23 Dec 2011 02:59:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=7725#comment-30951</guid>
		<description><![CDATA[That&#039;s why it&#039;s also VERY VERY important to update your browser&#039;s plugins. And, instal only plugins that are from reliable authors. Stay away from those with bad and negative reviews. 

In Firefox, all plugins that are available on their download page have comment sections. From here, you can see several user-generated ratings and comments about the plugin. This should serve as your gauge whether or not to install an app to your browser.

Outdated and unsupported browser plugins are also a big NO NO.]]></description>
		<content:encoded><![CDATA[<p>That&#8217;s why it&#8217;s also VERY VERY important to update your browser&#8217;s plugins. And, instal only plugins that are from reliable authors. Stay away from those with bad and negative reviews. </p>
<p>In Firefox, all plugins that are available on their download page have comment sections. From here, you can see several user-generated ratings and comments about the plugin. This should serve as your gauge whether or not to install an app to your browser.</p>
<p>Outdated and unsupported browser plugins are also a big NO NO.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: James Meyer</title>
		<link>http://www.gfi.com/blog/4-web-security-threats-to-look-out-for/comment-page-1/#comment-30939</link>
		<dc:creator>James Meyer</dc:creator>
		<pubDate>Wed, 21 Dec 2011 20:30:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=7725#comment-30939</guid>
		<description><![CDATA[Search engine poisoning can be particularly nasty. I like to recommend that people use the search engine&#039;s preview feature to tell if the site looks like it was legitimately crafted or just built off a template to house a bunch of ads. Is this behaviour actually safe, though?]]></description>
		<content:encoded><![CDATA[<p>Search engine poisoning can be particularly nasty. I like to recommend that people use the search engine&#8217;s preview feature to tell if the site looks like it was legitimately crafted or just built off a template to house a bunch of ads. Is this behaviour actually safe, though?</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:53:33 by W3 Total Cache --