<?xml version="1.0"?>
<News hasArchived="false" page="28" pageCount="29" pageSize="10" timestamp="Sat, 25 Apr 2026 01:22:09 -0400" url="https://my3.my.umbc.edu/groups/itsecurity/posts.xml?page=28">
<NewsItem contentIssues="false" id="85144" important="false" status="posted" url="https://my3.my.umbc.edu/groups/itsecurity/posts/85144">
<Title>Payment Fraud Linked to Terrorism and Trafficking</Title>
<Tagline>Retrieved from InfoSecurity - By: Phil Muncaster</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.infosecurity-magazine.com/news/payment-fraud-linked-to-terrorism-1/" rel="nofollow external" class="bo">https://www.infosecurity-magazine.com/news/payment-fraud-linked-to-terrorism-1/</a></div>
]]>
</Body>
<Summary>https://www.infosecurity-magazine.com/news/payment-fraud-linked-to-terrorism-1/</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/85144/guest@my.umbc.edu/118517656c5c6b5915be446cb877dfb9/api/pixel</TrackingUrl>
<Tag>it</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 27 Jun 2019 08:43:58 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="85123" important="false" status="posted" url="https://my3.my.umbc.edu/groups/itsecurity/posts/85123">
<Title>Dramatic Increase in Abuse of File Sharing Services</Title>
<Tagline>Retrieved from Info Security - By: Phil Muncaster</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.infosecurity-magazine.com/news/dramatic-increase">https://www.infosecurity-magazine.com/news/dramatic-increase</a></div>
]]>
</Body>
<Summary>https://www.infosecurity-magazine.com/news/dramatic-increase</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/85123/guest@my.umbc.edu/b27c6b7290631b6949aea2bb50f592ff/api/pixel</TrackingUrl>
<Tag>it</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 26 Jun 2019 08:29:33 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="85122" important="false" status="posted" url="https://my3.my.umbc.edu/groups/itsecurity/posts/85122">
<Title>Google creates educational tools to help kids spot fake news</Title>
<Tagline>Retrieved from naked Security by Sophos - By: Danny Bradbury</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://nakedsecurity.sophos.com/2019/06/26/google-launches-educational-tools-to-help-kids-spot-fake-news/" rel="nofollow external" class="bo">https://nakedsecurity.sophos.com/2019/06/26/google-launches-educational-tools-to-help-kids-spot-fake-news/</a></div>
]]>
</Body>
<Summary>https://nakedsecurity.sophos.com/2019/06/26/google-launches-educational-tools-to-help-kids-spot-fake-news/</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/85122/guest@my.umbc.edu/22fa19ed7956d02976899c8880bf744c/api/pixel</TrackingUrl>
<Tag>it</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 26 Jun 2019 08:26:57 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="85105" important="false" status="posted" url="https://my3.my.umbc.edu/groups/itsecurity/posts/85105">
<Title>Hackers Breach NASA, Steal Mars Mission Data</Title>
<Tagline>Retrieved from welivesecurity - By: Tom&#225;&#353; Folt&#253;n</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.welivesecurity.com/2019/06/24/nasa-breach-mars-raspberry-pi/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+eset%2Fblog+%28ESET+Blog%3A+We+Live+Security%29" rel="nofollow external" class="bo">https://www.welivesecurity.com/2019/06/24/nasa-breach-mars-raspberry-pi/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+eset%2Fblog+%28ESET+Blog%3A+We+Live+Security%29</a></div>
]]>
</Body>
<Summary>https://www.welivesecurity.com/2019/06/24/nasa-breach-mars-raspberry-pi/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+eset%2Fblog+%28ESET+Blog%3A+We+Live+Security%29</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/85105/guest@my.umbc.edu/a55ac3315250fd409514537b5f425c01/api/pixel</TrackingUrl>
<Tag>it</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 25 Jun 2019 08:27:19 -0400</PostedAt>
<EditAt>Tue, 25 Jun 2019 08:28:19 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="85104" important="false" status="posted" url="https://my3.my.umbc.edu/groups/itsecurity/posts/85104">
<Title>Presidential Text Alerts Are Open to Spoofing Attacks</Title>
<Tagline>Retrieved from Naked Security - By: John E Dunn</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://nakedsecurity.sophos.com/2019/06/25/presidential-text-alerts-are-open-to-spoofing-attacks-warn-researchers/" rel="nofollow external" class="bo">https://nakedsecurity.sophos.com/2019/06/25/presidential-text-alerts-are-open-to-spoofing-attacks-warn-researchers/</a></div>
]]>
</Body>
<Summary>https://nakedsecurity.sophos.com/2019/06/25/presidential-text-alerts-are-open-to-spoofing-attacks-warn-researchers/</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/85104/guest@my.umbc.edu/cc6b5455c62309d0415bada0b1bcea31/api/pixel</TrackingUrl>
<Tag>it</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 25 Jun 2019 08:22:50 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="85092" important="false" status="posted" url="https://my3.my.umbc.edu/groups/itsecurity/posts/85092">
<Title>Mac Malware Delivered via Firefox Exploits Analyzed</Title>
<Tagline>Eduard Kovacs</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.securityweek.com/mac-malware-delivered-firefox-exploits-analyzed?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29" rel="nofollow external" class="bo">https://www.securityweek.com/mac-malware-delivered-firefox-exploits-analyzed?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29</a></div>
]]>
</Body>
<Summary>https://www.securityweek.com/mac-malware-delivered-firefox-exploits-analyzed?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/85092/guest@my.umbc.edu/2b79cac09608090d2dd6632e027c91a0/api/pixel</TrackingUrl>
<Tag>it</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Jun 2019 09:03:52 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="85091" important="false" status="posted" url="https://my3.my.umbc.edu/groups/itsecurity/posts/85091">
<Title>WeTransfer incident: File Transfer Emails Sent Incorrectly</Title>
<Tagline>Retrieved from Security Affairs - By: Pierluigi Paganini</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://securityaffairs.co/wordpress/87515/breaking-news/wetransfer-incident.html" rel="nofollow external" class="bo">https://securityaffairs.co/wordpress/87515/breaking-news/wetransfer-incident.html</a></div>
]]>
</Body>
<Summary>https://securityaffairs.co/wordpress/87515/breaking-news/wetransfer-incident.html</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/85091/guest@my.umbc.edu/e30688c0a50699b08245226ce1750c53/api/pixel</TrackingUrl>
<Tag>it</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Jun 2019 09:02:22 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="85090" important="false" status="posted" url="https://my3.my.umbc.edu/groups/itsecurity/posts/85090">
<Title>Mobile Apps Riddled With High-Risk Vulnerabilities</Title>
<Tagline>Retrieved from Naked Security - By: Danny Bradbury</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://nakedsecurity.sophos.com/2019/06/24/mobile-apps-riddled-with-high-risk-vulnerabilities-warns-report/" rel="nofollow external" class="bo">https://nakedsecurity.sophos.com/2019/06/24/mobile-apps-riddled-with-high-risk-vulnerabilities-warns-report/</a></div>
]]>
</Body>
<Summary>https://nakedsecurity.sophos.com/2019/06/24/mobile-apps-riddled-with-high-risk-vulnerabilities-warns-report/</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/85090/guest@my.umbc.edu/24d894a7f45fc95aef46098c120ad3d7/api/pixel</TrackingUrl>
<Tag>it</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Jun 2019 09:00:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="85089" important="false" status="posted" url="https://my3.my.umbc.edu/groups/itsecurity/posts/85089">
<Title>Ex-Senate Aide Sentenced to 4 Years in Prison for Data Leak</Title>
<Tagline>Retrieved from Security Week - By: Associated Press</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.securityweek.com/ex-senate-aide-sentenced-4-years-prison-data-leak?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29" rel="nofollow external" class="bo">https://www.securityweek.com/ex-senate-aide-sentenced-4-years-prison-data-leak?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29</a></div>
]]>
</Body>
<Summary>https://www.securityweek.com/ex-senate-aide-sentenced-4-years-prison-data-leak?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/85089/guest@my.umbc.edu/5d88c03a4d26fbba375363e95f889563/api/pixel</TrackingUrl>
<Tag>it</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Jun 2019 08:37:06 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="85079" important="false" status="posted" url="https://my3.my.umbc.edu/groups/itsecurity/posts/85079">
<Title>How to Log Into Windows With Your Face or Fingerprint</Title>
<Tagline>Retrieved from PCMag - By: Whitson Gordon</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.pcmag.com/feature/368510/how-to-log-into-windows-with-your-face-or-fingerprint" rel="nofollow external" class="bo">https://www.pcmag.com/feature/368510/how-to-log-into-windows-with-your-face-or-fingerprint</a></div>
]]>
</Body>
<Summary>https://www.pcmag.com/feature/368510/how-to-log-into-windows-with-your-face-or-fingerprint</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/85079/guest@my.umbc.edu/4a3d791b0eeeaa7fd17d311ede0e28ab/api/pixel</TrackingUrl>
<Tag>it</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="original">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 21 Jun 2019 10:51:28 -0400</PostedAt>
<EditAt>Fri, 21 Jun 2019 10:56:43 -0400</EditAt>
</NewsItem>

</News>
