<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[Bill Mullins&#039; Weblog - Tech Thoughts]]></provider_name><provider_url><![CDATA[https://billmullins.wordpress.com]]></provider_url><author_name><![CDATA[Bill Mullins]]></author_name><author_url><![CDATA[https://billmullins.wordpress.com/author/billmullins/]]></author_url><title><![CDATA[Tech Thoughts Daily Security Alerts &#8211; March 23,&nbsp;2009]]></title><type><![CDATA[link]]></type><html><![CDATA[<p><a href="http://blogs.techrepublic.com.com/security/?p=1130&amp;tag=nl.e101" target="_blank"><strong>Code for ultimate rootkit to be released</strong></a> &#8211; Security researchers Joanna Rutkowska and Rafal Wojtczuk just published a research paper describing a new SMM rootkit that installs via a CPU caching vulnerability. This could be the “perfect storm” of rootkits.</p>
<p><a href="http://www.f-secure.com/weblog/archives/00001630.html" target="_blank"><strong>Comcast High Speed Internet Scam</strong></a> &#8211; A quick note on a new spam run that&#8217;s going on.</p>
<p><strong><a href="http://news.cnet.com/8301-1009_3-10200104-83.html?tag=mncol;title" target="_blank">Report: Rogue antivirus software pays off for scammers</a></strong> &#8211; Online scammers are making a lucrative business out of redirecting visitors from legitimate Web sites to sites that try install rogue antivirus software.</p>
<p><a href="http://news.cnet.com/8301-1009_3-10199652-83.html?tag=mncol;title" target="_blank"><strong>Safari hole exploited in seconds at security conference</strong></a> &#8211; The security expert who won $10,000 hacking a MacBook Air in less than two minutes last year won $5,000 on Wednesday by exploiting a hole in Safari in 10 seconds or so.</p>
<p><a href="http://www.itsecurity.com/features/lowdown-zeroday-attacks-102708/" target="_blank"><strong>The Lowdown on Zero-Day Attacks</strong></a> &#8211; A.N. Ananth, CEO of Prism Microsystems, answers questions from IT Security.</p>
]]></html></oembed>