<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet Security Archives - Spire Express - Web Services</title>
	<atom:link href="https://www.spireexpress.com/category/blog/web-services/internet-security/feed" rel="self" type="application/rss+xml" />
	<link>https://www.spireexpress.com/category/blog/web-services/internet-security</link>
	<description></description>
	<lastBuildDate>Tue, 17 Dec 2019 15:51:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Oauth vulnerability</title>
		<link>https://www.spireexpress.com/blog/web-services/internet-security/oauth-vulnerability</link>
		
		<dc:creator><![CDATA[Mike Conant]]></dc:creator>
		<pubDate>Tue, 17 Dec 2019 15:51:06 +0000</pubDate>
				<category><![CDATA[blog]]></category>
		<category><![CDATA[Internet Security]]></category>
		<guid isPermaLink="false">https://www.spireexpress.com/?p=5607</guid>

					<description><![CDATA[<p>If you&#8217;re serious about security, you&#8217;re probably by now using Oauth to login to your email (or other accounts) instead of login/password pair. In face, Gsuite just announced that they&#8217;re deprecating login/password authentication. Here&#8217;s some disturbing news, however. It appears that there are some bad actors that have figured out a way to get around [&#8230;]</p>
<p>The post <a href="https://www.spireexpress.com/blog/web-services/internet-security/oauth-vulnerability">Oauth vulnerability</a> appeared first on <a href="https://www.spireexpress.com">Spire Express - Web Services</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Social Engineering Red Flags</title>
		<link>https://www.spireexpress.com/blog/web-services/internet-security/social-engineering-red-flags</link>
		
		<dc:creator><![CDATA[Mike Conant]]></dc:creator>
		<pubDate>Tue, 29 Jan 2019 16:03:55 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Social Media Strategy]]></category>
		<guid isPermaLink="false">https://www.spireexpress.com/?p=3757</guid>

					<description><![CDATA[<p>KnowB4 put out this cheat sheet on what to watch out for in emails/social media.</p>
<p>The post <a href="https://www.spireexpress.com/blog/web-services/internet-security/social-engineering-red-flags">Social Engineering Red Flags</a> appeared first on <a href="https://www.spireexpress.com">Spire Express - Web Services</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>WordPress Security</title>
		<link>https://www.spireexpress.com/blog/web-services/internet-security/wordpress-security</link>
		
		<dc:creator><![CDATA[Mike Conant]]></dc:creator>
		<pubDate>Thu, 05 Oct 2017 12:24:53 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<guid isPermaLink="false">https://www.spireexpress.com/?p=3663</guid>

					<description><![CDATA[<p>Mark Maunder, CEO of wordfence, shares a formula for wordpress security. Lots of good ideas in here; this is a blueprint for success. 10 touchpoints.</p>
<p>The post <a href="https://www.spireexpress.com/blog/web-services/internet-security/wordpress-security">WordPress Security</a> appeared first on <a href="https://www.spireexpress.com">Spire Express - Web Services</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>How to stay safe with WordPress Plugins</title>
		<link>https://www.spireexpress.com/blog/web-services/internet-security/stay-safe-wordpress-plugins</link>
		
		<dc:creator><![CDATA[Mike Conant]]></dc:creator>
		<pubDate>Wed, 20 Sep 2017 17:14:06 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<guid isPermaLink="false">https://www.spireexpress.com/?p=3660</guid>

					<description><![CDATA[<p>Wordfence has recently done some pretty awesome investigation into some bad actors in the wordpress plugin arena. Bottom line of all this: watch out for plugins that aren&#8217;t updated, especially if they are pulled from the wordpress repository.  As the author suggests, things are only going to get worse, and since wordpress now powers the [&#8230;]</p>
<p>The post <a href="https://www.spireexpress.com/blog/web-services/internet-security/stay-safe-wordpress-plugins">How to stay safe with WordPress Plugins</a> appeared first on <a href="https://www.spireexpress.com">Spire Express - Web Services</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
