<?xml version="1.0" encoding="utf-8" ?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>qumbler: qumbles tagged attack</title><link>http://qumbler.com</link><description>qumbler: a tumblelog</description><generator>qumbler</generator><image><title>qumbler: qumbles tagged attack</title><url>http://qumbler.com/images/qumbler.png</url><link>http://qumbler.com</link><width>120</width><height>30</height></image><item>
<guid isPermaLink="true">http://qumbler.com/post/30048</guid>
<title>printableArticle&#x2e;jhtml&#x3f;articleID&#x3d;177100115</title>
<link>http://www.informationweek.com/shared/printableArticle.jhtml?articleID=177100115</link>
<dc:creator>vito</dc:creator>
<category>attack</category>
<category>awesome</category>
<category>breakin</category>
<category>espionage</category>
<category>security</category>
<category>social_engineering</category>
<description><![CDATA[
<p><a href="http://www.informationweek.com/shared/printableArticle.jhtml?articleID=177100115" title="http://www.informationweek.com/shared/printableArticle.jhtml?articleID=177100115"><img src="http://qumbler.com/thumbs/img323030372f303232332f3134333935362f7468756d622e6a7067" title="printableArticle&#x2e;jhtml&#x3f;articleID&#x3d;177100115" alt="printableArticle&#x2e;jhtml&#x3f;articleID&#x3d;177100115" align="left" /></a><br/>
Tags: <a href="http://qumbler.com/tag/attack" title="URLs tagged attack">attack</a> <a href="http://qumbler.com/tag/awesome" title="URLs tagged awesome">awesome</a> <a href="http://qumbler.com/tag/breakin" title="URLs tagged breakin">breakin</a> <a href="http://qumbler.com/tag/espionage" title="URLs tagged espionage">espionage</a> <a href="http://qumbler.com/tag/security" title="URLs tagged security">security</a> <a href="http://qumbler.com/tag/social_engineering" title="URLs tagged social_engineering">social_engineering</a></p>

]]></description>
<pubDate>Fri, 23 Feb 2007 14:39:56 -0600</pubDate>
</item>
<item>
<guid isPermaLink="true">http://qumbler.com/post/29648</guid>
<title>&#xbb; Microsoft confirms Vista Speech Recognition remote execution flaw &#x7c; George Ou &#x7c; ZDNet&#x2e;c</title>
<link>http://blogs.zdnet.com/Ou/?p=418</link>
<dc:creator>vito</dc:creator>
<category>ATTRIBUTION_Microsoft_spokesperson</category>
<category>attack</category>
<category>exploit</category>
<category>hack</category>
<category>speech_recognition</category>
<category>vista</category>
<category>vulnerability</category>
<description><![CDATA[
<p><a href="http://blogs.zdnet.com/Ou/?p=418" title="http://blogs.zdnet.com/Ou/?p=418"><img src="http://qumbler.com/thumbs/img323030372f303230312f3131343935362f7468756d622e6a7067" title="&#xbb; Microsoft confirms Vista Speech Recognition remote execution flaw &#x7c; George Ou &#x7c; ZDNet&#x2e;c" alt="&#xbb; Microsoft confirms Vista Speech Recognition remote execution flaw &#x7c; George Ou &#x7c; ZDNet&#x2e;c" align="left" /></a><br/>
Tags: <a href="http://qumbler.com/tag/attack" title="URLs tagged attack">attack</a> <a href="http://qumbler.com/tag/exploit" title="URLs tagged exploit">exploit</a> <a href="http://qumbler.com/tag/hack" title="URLs tagged hack">hack</a> <a href="http://qumbler.com/tag/speech_recognition" title="URLs tagged speech_recognition">speech_recognition</a> <a href="http://qumbler.com/tag/vista" title="URLs tagged vista">vista</a> <a href="http://qumbler.com/tag/vulnerability" title="URLs tagged vulnerability">vulnerability</a></p>
<p>&ldquo;In order for an attack to be successful, the user would have to have a microphone and speakers connected to their system.&rdquo; &mdash; Microsoft spokesperson</p>
]]></description>
<pubDate>Thu, 01 Feb 2007 11:49:56 -0600</pubDate>
</item>
<atom:link href="http://qumbler.com/rss" rel="self" type="application/rss+xml" /></channel></rss>