<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security | Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</title>
	<atom:link href="https://www.selikoff.net/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.selikoff.net</link>
	<description>Java/J2EE Software Development and Technology Discussion Blog</description>
	<lastBuildDate>Fri, 15 Aug 2025 18:36:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">4595340</site>	<item>
		<title>[kcdc 2025] Passkeys: The end of Passwords and the Future of Authentication</title>
		<link>https://www.selikoff.net/2025/08/15/kcdc-2025-passkeys-the-end-of-passwords-and-the-future-of-autehentication/</link>
					<comments>https://www.selikoff.net/2025/08/15/kcdc-2025-passkeys-the-end-of-passwords-and-the-future-of-autehentication/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne Boyarsky]]></dc:creator>
		<pubDate>Fri, 15 Aug 2025 18:02:23 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Kcdc]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.selikoff.net/?p=18084</guid>

					<description><![CDATA[<p>Speaker: Mateusz Zajac For more see the&#160;table of contents General Problems with passwords Passwords vs Passkeys 2FA Passkey Amazon login example Phishing prevention iOS Code Cross Device Sign in Challenge Good references Informal Q&#38;A My take Great comparison and great &#8230; <a href="https://www.selikoff.net/2025/08/15/kcdc-2025-passkeys-the-end-of-passwords-and-the-future-of-autehentication/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
The post <a href="https://www.selikoff.net/2025/08/15/kcdc-2025-passkeys-the-end-of-passwords-and-the-future-of-autehentication/">[kcdc 2025] Passkeys: The end of Passwords and the Future of Authentication</a> first appeared on <a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>.<hr style="border-top: black solid 1px" /><a href="https://www.selikoff.net/2025/08/15/kcdc-2025-passkeys-the-end-of-passwords-and-the-future-of-autehentication/">[kcdc 2025] Passkeys: The end of Passwords and the Future of Authentication</a> was first posted on August 15, 2025 at 2:02 pm.<br />&copy;2019 &quot;<a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>&quot;. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at <!--email_off-->scott@selikoff.net<!--/email_off--><br />]]></description>
		
					<wfw:commentRss>https://www.selikoff.net/2025/08/15/kcdc-2025-passkeys-the-end-of-passwords-and-the-future-of-autehentication/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18084</post-id>	</item>
		<item>
		<title>[kcdc 2025] AI Vulnerabilities in 2025 &#8211; Some of the darker sides of AI</title>
		<link>https://www.selikoff.net/2025/08/14/kcdc-2025-ai-vulnerabilities-in-2025-some-of-the-darker-sides-of-ai/</link>
					<comments>https://www.selikoff.net/2025/08/14/kcdc-2025-ai-vulnerabilities-in-2025-some-of-the-darker-sides-of-ai/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne Boyarsky]]></dc:creator>
		<pubDate>Thu, 14 Aug 2025 19:29:04 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[ai]]></category>
		<category><![CDATA[Kcdc]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.selikoff.net/?p=18032</guid>

					<description><![CDATA[<p>Speaker: Andreas Erben For more see the&#160;table of contents From the news What drives model behavior? Other links My take After the first example, there was a bunch of content on how LLMs work. I tuned out a little during &#8230; <a href="https://www.selikoff.net/2025/08/14/kcdc-2025-ai-vulnerabilities-in-2025-some-of-the-darker-sides-of-ai/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
The post <a href="https://www.selikoff.net/2025/08/14/kcdc-2025-ai-vulnerabilities-in-2025-some-of-the-darker-sides-of-ai/">[kcdc 2025] AI Vulnerabilities in 2025 – Some of the darker sides of AI</a> first appeared on <a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>.<hr style="border-top: black solid 1px" /><a href="https://www.selikoff.net/2025/08/14/kcdc-2025-ai-vulnerabilities-in-2025-some-of-the-darker-sides-of-ai/">[kcdc 2025] AI Vulnerabilities in 2025 &#8211; Some of the darker sides of AI</a> was first posted on August 14, 2025 at 3:29 pm.<br />&copy;2019 &quot;<a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>&quot;. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at <!--email_off-->scott@selikoff.net<!--/email_off--><br />]]></description>
		
					<wfw:commentRss>https://www.selikoff.net/2025/08/14/kcdc-2025-ai-vulnerabilities-in-2025-some-of-the-darker-sides-of-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18032</post-id>	</item>
		<item>
		<title>[devnexus 2024] breaking ai: live coding and hacking apps wih generative ai</title>
		<link>https://www.selikoff.net/2024/04/11/devnexus-2024-breaking-ai-live-coding-and-hacking-apps-wih-generative-ai/</link>
					<comments>https://www.selikoff.net/2024/04/11/devnexus-2024-breaking-ai-live-coding-and-hacking-apps-wih-generative-ai/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne Boyarsky]]></dc:creator>
		<pubDate>Thu, 11 Apr 2024 14:01:30 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[ai]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.selikoff.net/?p=17184</guid>

					<description><![CDATA[<p>Speaker: Micah Silverman For more, see the 2024 DevNexus Blog Table of Contents Changes/Trends Common use in Dev Stats Using AI well Problems AI and Code Sample Conference App Basic example JPA SQL injection example Example What can do Future My &#8230; <a href="https://www.selikoff.net/2024/04/11/devnexus-2024-breaking-ai-live-coding-and-hacking-apps-wih-generative-ai/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
The post <a href="https://www.selikoff.net/2024/04/11/devnexus-2024-breaking-ai-live-coding-and-hacking-apps-wih-generative-ai/">[devnexus 2024] breaking ai: live coding and hacking apps wih generative ai</a> first appeared on <a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>.<hr style="border-top: black solid 1px" /><a href="https://www.selikoff.net/2024/04/11/devnexus-2024-breaking-ai-live-coding-and-hacking-apps-wih-generative-ai/">[devnexus 2024] breaking ai: live coding and hacking apps wih generative ai</a> was first posted on April 11, 2024 at 10:01 am.<br />&copy;2019 &quot;<a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>&quot;. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at <!--email_off-->scott@selikoff.net<!--/email_off--><br />]]></description>
		
					<wfw:commentRss>https://www.selikoff.net/2024/04/11/devnexus-2024-breaking-ai-live-coding-and-hacking-apps-wih-generative-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17184</post-id>	</item>
		<item>
		<title>[devnexus 2024] More tales from the Dark Side: How AI is the bad guys new friend[devnexus 2024] dark tales ai</title>
		<link>https://www.selikoff.net/2024/04/10/devnexus-2024-more-tales-from-the-dark-side-how-ai-is-the-bad-guys-new-frienddevnexus-2024-dark-tales-ai/</link>
					<comments>https://www.selikoff.net/2024/04/10/devnexus-2024-more-tales-from-the-dark-side-how-ai-is-the-bad-guys-new-frienddevnexus-2024-dark-tales-ai/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne Boyarsky]]></dc:creator>
		<pubDate>Wed, 10 Apr 2024 18:46:08 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[ai]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.selikoff.net/?p=17137</guid>

					<description><![CDATA[<p>Speaker: Stevel Poole @spoole167 For more, see the 2024 DevNexus Blog Table of Contents General Wifi Charger Hotel rooms Phishing Adding AI Bad things can do Why now Other problems How Protect My take Demos were great. Security has changed a &#8230; <a href="https://www.selikoff.net/2024/04/10/devnexus-2024-more-tales-from-the-dark-side-how-ai-is-the-bad-guys-new-frienddevnexus-2024-dark-tales-ai/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
The post <a href="https://www.selikoff.net/2024/04/10/devnexus-2024-more-tales-from-the-dark-side-how-ai-is-the-bad-guys-new-frienddevnexus-2024-dark-tales-ai/">[devnexus 2024] More tales from the Dark Side: How AI is the bad guys new friend[devnexus 2024] dark tales ai</a> first appeared on <a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>.<hr style="border-top: black solid 1px" /><a href="https://www.selikoff.net/2024/04/10/devnexus-2024-more-tales-from-the-dark-side-how-ai-is-the-bad-guys-new-frienddevnexus-2024-dark-tales-ai/">[devnexus 2024] More tales from the Dark Side: How AI is the bad guys new friend[devnexus 2024] dark tales ai</a> was first posted on April 10, 2024 at 2:46 pm.<br />&copy;2019 &quot;<a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>&quot;. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at <!--email_off-->scott@selikoff.net<!--/email_off--><br />]]></description>
		
					<wfw:commentRss>https://www.selikoff.net/2024/04/10/devnexus-2024-more-tales-from-the-dark-side-how-ai-is-the-bad-guys-new-frienddevnexus-2024-dark-tales-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17137</post-id>	</item>
		<item>
		<title>[2023 kcdc] cve 101: the unfolding of a zero day attack</title>
		<link>https://www.selikoff.net/2023/06/23/2023-kcdc-cve-101-the-unfolding-of-a-zero-day-attack/</link>
					<comments>https://www.selikoff.net/2023/06/23/2023-kcdc-cve-101-the-unfolding-of-a-zero-day-attack/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne Boyarsky]]></dc:creator>
		<pubDate>Fri, 23 Jun 2023 16:05:32 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[cve]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.selikoff.net/?p=16810</guid>

					<description><![CDATA[<p>Speaker: Theresa Mammarella Twitter: @t_mammarella For more, see the&#160;table of contents. Notes Terminology CVEs How to talk about Zero day vulnerability Examples Security Practices for Developers Attack types Trust? My take Good talk. Covered concepts and good real life examples. &#8230; <a href="https://www.selikoff.net/2023/06/23/2023-kcdc-cve-101-the-unfolding-of-a-zero-day-attack/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
The post <a href="https://www.selikoff.net/2023/06/23/2023-kcdc-cve-101-the-unfolding-of-a-zero-day-attack/">[2023 kcdc] cve 101: the unfolding of a zero day attack</a> first appeared on <a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>.<hr style="border-top: black solid 1px" /><a href="https://www.selikoff.net/2023/06/23/2023-kcdc-cve-101-the-unfolding-of-a-zero-day-attack/">[2023 kcdc] cve 101: the unfolding of a zero day attack</a> was first posted on June 23, 2023 at 12:05 pm.<br />&copy;2019 &quot;<a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>&quot;. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at <!--email_off-->scott@selikoff.net<!--/email_off--><br />]]></description>
		
					<wfw:commentRss>https://www.selikoff.net/2023/06/23/2023-kcdc-cve-101-the-unfolding-of-a-zero-day-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16810</post-id>	</item>
		<item>
		<title>[2022 javaone] deserializaion exploits &#8211; why should i care?</title>
		<link>https://www.selikoff.net/2022/10/19/2022-javaoe-deserializaion-exploits-why-should-i-care/</link>
					<comments>https://www.selikoff.net/2022/10/19/2022-javaoe-deserializaion-exploits-why-should-i-care/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne Boyarsky]]></dc:creator>
		<pubDate>Wed, 19 Oct 2022 17:15:53 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[deserialization]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.selikoff.net/?p=16335</guid>

					<description><![CDATA[<p>Speaker: Brian Vermeer For more see the table of contents Star Trek Everything in Star Trek could be real. And some tech surpassed Teleportation would be awesome Already have, but for data Serialization Turn object into data stream. Send to another &#8230; <a href="https://www.selikoff.net/2022/10/19/2022-javaoe-deserializaion-exploits-why-should-i-care/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
The post <a href="https://www.selikoff.net/2022/10/19/2022-javaoe-deserializaion-exploits-why-should-i-care/">[2022 javaone] deserializaion exploits – why should i care?</a> first appeared on <a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>.<hr style="border-top: black solid 1px" /><a href="https://www.selikoff.net/2022/10/19/2022-javaoe-deserializaion-exploits-why-should-i-care/">[2022 javaone] deserializaion exploits &#8211; why should i care?</a> was first posted on October 19, 2022 at 1:15 pm.<br />&copy;2019 &quot;<a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>&quot;. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at <!--email_off-->scott@selikoff.net<!--/email_off--><br />]]></description>
		
					<wfw:commentRss>https://www.selikoff.net/2022/10/19/2022-javaoe-deserializaion-exploits-why-should-i-care/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16335</post-id>	</item>
		<item>
		<title>[2022 javaone] Secure Coding Guidelines for Java SE</title>
		<link>https://www.selikoff.net/2022/10/18/2022-javaone-secure-coding-guidelines-for-java-se/</link>
					<comments>https://www.selikoff.net/2022/10/18/2022-javaone-secure-coding-guidelines-for-java-se/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne Boyarsky]]></dc:creator>
		<pubDate>Wed, 19 Oct 2022 00:12:44 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.selikoff.net/?p=16297</guid>

					<description><![CDATA[<p>Speaker: Chris Ries For more see the table of contents Vulnerabilities and Secure Coding &#8220;A flaw or weakness &#8230; that could be exploited to violated the system&#8217;s security policy&#8221; RFC 4949 Cost &#8211; remediation, immediate response (mitigation, detection, incident response, intermediate &#8230; <a href="https://www.selikoff.net/2022/10/18/2022-javaone-secure-coding-guidelines-for-java-se/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
The post <a href="https://www.selikoff.net/2022/10/18/2022-javaone-secure-coding-guidelines-for-java-se/">[2022 javaone] Secure Coding Guidelines for Java SE</a> first appeared on <a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>.<hr style="border-top: black solid 1px" /><a href="https://www.selikoff.net/2022/10/18/2022-javaone-secure-coding-guidelines-for-java-se/">[2022 javaone] Secure Coding Guidelines for Java SE</a> was first posted on October 18, 2022 at 8:12 pm.<br />&copy;2019 &quot;<a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>&quot;. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at <!--email_off-->scott@selikoff.net<!--/email_off--><br />]]></description>
		
					<wfw:commentRss>https://www.selikoff.net/2022/10/18/2022-javaone-secure-coding-guidelines-for-java-se/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16297</post-id>	</item>
		<item>
		<title>[2022 javaone] halloween tv &#8211; or why it might really be watching you back</title>
		<link>https://www.selikoff.net/2022/10/18/2022-javaone-halloween-tv-or-wy-it-might-really-be-watching-you-back/</link>
					<comments>https://www.selikoff.net/2022/10/18/2022-javaone-halloween-tv-or-wy-it-might-really-be-watching-you-back/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne Boyarsky]]></dc:creator>
		<pubDate>Tue, 18 Oct 2022 19:18:44 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.selikoff.net/?p=16273</guid>

					<description><![CDATA[<p>Speaker: Steve Poole For more see the table of contents Doing Java 27 years True story. Happened to multiple people Company in the middle of nowhere Smart tv with an ethernet port Discover new wifi SSID Look everywhere for the router, &#8230; <a href="https://www.selikoff.net/2022/10/18/2022-javaone-halloween-tv-or-wy-it-might-really-be-watching-you-back/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
The post <a href="https://www.selikoff.net/2022/10/18/2022-javaone-halloween-tv-or-wy-it-might-really-be-watching-you-back/">[2022 javaone] halloween tv – or why it might really be watching you back</a> first appeared on <a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>.<hr style="border-top: black solid 1px" /><a href="https://www.selikoff.net/2022/10/18/2022-javaone-halloween-tv-or-wy-it-might-really-be-watching-you-back/">[2022 javaone] halloween tv &#8211; or why it might really be watching you back</a> was first posted on October 18, 2022 at 3:18 pm.<br />&copy;2019 &quot;<a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>&quot;. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at <!--email_off-->scott@selikoff.net<!--/email_off--><br />]]></description>
		
					<wfw:commentRss>https://www.selikoff.net/2022/10/18/2022-javaone-halloween-tv-or-wy-it-might-really-be-watching-you-back/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16273</post-id>	</item>
		<item>
		<title>[kcdc 2022] insider threat : what is social engineering</title>
		<link>https://www.selikoff.net/2022/08/10/kcdc-2022-insider-threat-what-is-social-engineering/</link>
					<comments>https://www.selikoff.net/2022/08/10/kcdc-2022-insider-threat-what-is-social-engineering/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne Boyarsky]]></dc:creator>
		<pubDate>Wed, 10 Aug 2022 13:01:01 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Kcdc]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.selikoff.net/?p=16130</guid>

					<description><![CDATA[<p>Speaker: Crux Conception @cruxconceptoin (pen name) For more, see the table of contents On walking in He asked what talk was in the room and teased people about giving too much info Also commented there is too much info (wifi password) &#8230; <a href="https://www.selikoff.net/2022/08/10/kcdc-2022-insider-threat-what-is-social-engineering/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
The post <a href="https://www.selikoff.net/2022/08/10/kcdc-2022-insider-threat-what-is-social-engineering/">[kcdc 2022] insider threat : what is social engineering</a> first appeared on <a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>.<hr style="border-top: black solid 1px" /><a href="https://www.selikoff.net/2022/08/10/kcdc-2022-insider-threat-what-is-social-engineering/">[kcdc 2022] insider threat : what is social engineering</a> was first posted on August 10, 2022 at 9:01 am.<br />&copy;2019 &quot;<a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>&quot;. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at <!--email_off-->scott@selikoff.net<!--/email_off--><br />]]></description>
		
					<wfw:commentRss>https://www.selikoff.net/2022/08/10/kcdc-2022-insider-threat-what-is-social-engineering/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16130</post-id>	</item>
		<item>
		<title>[devnexus 2022] java and ransomware</title>
		<link>https://www.selikoff.net/2022/04/14/devnexus-2022-java-and-ransomware/</link>
					<comments>https://www.selikoff.net/2022/04/14/devnexus-2022-java-and-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne Boyarsky]]></dc:creator>
		<pubDate>Thu, 14 Apr 2022 15:31:28 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[devnexus]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.selikoff.net/?p=15741</guid>

					<description><![CDATA[<p>Speaker: Steve Poole Twitter: @spoole167 Link to table of contents ——————— Ransomware crimes robbery blackmail extortion revege murder &#8211; ex: hospital attacks Symptoms files gone files corrupt unexpected files on system &#8211; obvious so believe it is real prevent logging on &#8230; <a href="https://www.selikoff.net/2022/04/14/devnexus-2022-java-and-ransomware/">Continue reading <span class="meta-nav">&#8594;</span></a></p>
The post <a href="https://www.selikoff.net/2022/04/14/devnexus-2022-java-and-ransomware/">[devnexus 2022] java and ransomware</a> first appeared on <a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>.<hr style="border-top: black solid 1px" /><a href="https://www.selikoff.net/2022/04/14/devnexus-2022-java-and-ransomware/">[devnexus 2022] java and ransomware</a> was first posted on April 14, 2022 at 11:31 am.<br />&copy;2019 &quot;<a href="https://www.selikoff.net">Down Home Country Coding With Scott Selikoff and Jeanne Boyarsky</a>&quot;. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at <!--email_off-->scott@selikoff.net<!--/email_off--><br />]]></description>
		
					<wfw:commentRss>https://www.selikoff.net/2022/04/14/devnexus-2022-java-and-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15741</post-id>	</item>
	</channel>
</rss>
