<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Temple MIS | Christie L Vazquez | Activity</title>
	<link>https://community.mis.temple.edu/members/christie-l-vazquez/activity/</link>
	<atom:link href="https://community.mis.temple.edu/members/christie-l-vazquez/activity/feed/" rel="self" type="application/rss+xml" />
	<description>Activity feed for Christie L Vazquez.</description>
	<lastBuildDate>Sun, 05 Apr 2026 23:47:46 -0400</lastBuildDate>
	<generator>https://buddypress.org/?v=</generator>
	<language>en-US</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
	
						<item>
				<guid isPermaLink="false">e096262604c63bddd1b8dd7a55ed99f9</guid>
				<title>Christie L Vazquez changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/190339/</link>
				<pubDate>Sun, 19 Aug 2018 19:53:00 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">3265fbfa66f0f82ab232775017b332b1</guid>
				<title>Christie L Vazquez changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/190338/</link>
				<pubDate>Sun, 19 Aug 2018 19:26:29 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">113cecc1ab09a4daff244c2f451896de</guid>
				<title>Christie L Vazquez wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sec701sp2018/?p=3877</link>
				<pubDate>Sun, 06 May 2018 14:43:19 -0400</pubDate>

									<content:encoded><![CDATA[<p>Additional vulnerabilities in Intel&#8217;s chip. Same design flaw as Spectre. As the industry finds more vulnerabilities, chip makers do not know if the patches will cause performance issues.</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">d9d68d81e905b9707de11fe7551e601a</guid>
				<title>Christie L Vazquez wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sec701sp2018/?p=3874</link>
				<pubDate>Sun, 06 May 2018 14:37:26 -0400</pubDate>

									<content:encoded><![CDATA[<p>Microsoft released an out of band emergency patch last week for a vulnerability in its Windows Host Compute Service. The vulnerability allows an attacker to remotely execute code on the victim&#8217;s host machine.</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">c7c64ea38a66805fce57f52d7c7b57dd</guid>
				<title>Christie L Vazquez wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sec701sp2018/?p=3777</link>
				<pubDate>Tue, 03 Apr 2018 23:21:24 -0400</pubDate>

									<content:encoded><![CDATA[<p>Cyber attack against a pipeline company. Although only impacting data transfers, their stock price dropped 2.5% due to the news of the attack.</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">fabb9b3a6dd717cc8007f6211899ac34</guid>
				<title>Christie L Vazquez wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sec701sp2018/?p=3764</link>
				<pubDate>Fri, 23 Mar 2018 15:50:06 -0400</pubDate>

									<content:encoded><![CDATA[<p>A new vulnerability affecting WIN2012, 2016 and 2008, WIN 10, 8 and 7 allows remote attackers to steal sensitive. Not only do you need to be suspicious of giving access to your computer and a of the person’s m [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">51efb9eb6087097292b32a55f29ad1f6</guid>
				<title>Christie L Vazquez wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sec701sp2018/?p=3744</link>
				<pubDate>Sun, 18 Mar 2018 23:05:45 -0400</pubDate>

									<content:encoded><![CDATA[<p>A recent Forbes article mentions 68% of senior IT professions do not think their boards are being briefed on mitigating controls for cyber risks. I was surprised by the percentage. Either companies are not [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>1</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">898d1d894c2fad1b069ca5e267dba5df</guid>
				<title>Christie L Vazquez wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sec701sp2018/?p=3667</link>
				<pubDate>Sat, 24 Feb 2018 16:00:20 -0500</pubDate>

									<content:encoded><![CDATA[<p>This article details an attack on an IoT device. Similar to the kill chain, the attacker follows a recon, development, execution and command and control phase. Reminds the vulnerabilities with IoTs supporting [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">4e8271712e8b473b1bc27b1b63c2cbb3</guid>
				<title>Christie L Vazquez wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sec701sp2018/?p=3662</link>
				<pubDate>Sat, 24 Feb 2018 14:17:31 -0500</pubDate>

									<content:encoded><![CDATA[<p>The article introduces a few best practices, according to Forrester Research, to help reduce the gender gap in the cybersecurity field.</p>
<p>Women represent 15- 20% of the industry. However that includes risk [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">899e3ebf8be2ce9ed2240b42b99a0ad7</guid>
				<title>Christie L Vazquez wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sec701sp2018/?p=3612</link>
				<pubDate>Fri, 09 Feb 2018 17:28:10 -0500</pubDate>

									<content:encoded><![CDATA[<p>Companies in the UK that fail to protect themselves effectively from hackers could be fined up to £17m.</p>
<p>The UK government is cracking down on cyber malpractice. The article states if companies fail to protect [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>1</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b3b2ae6d1eb44500dab04e2093ed6dfa</guid>
				<title>Christie L Vazquez wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/?p=5091</link>
				<pubDate>Tue, 05 Dec 2017 18:23:11 -0500</pubDate>

									<content:encoded><![CDATA[<p>Another NSA tool leaked. Although this one never made it to implementation and it was never fully deployed in the field. It was designed to be a intelligence sharing application. </p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">f312f147e1ab6811721c848af542500d</guid>
				<title>Christie L Vazquez wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/?p=4950</link>
				<pubDate>Mon, 13 Nov 2017 23:24:33 -0500</pubDate>

									<content:encoded><![CDATA[<p>A newly discovered banking Trojan called IcedID looks monitors online activity. It sets up a local proxy and intercepts traffic, sounds like something we learned in class! </p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">c303e0d239f46b70099835a06b92f8c8</guid>
				<title>Christie L Vazquez wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/?p=4896</link>
				<pubDate>Sun, 05 Nov 2017 20:56:03 -0500</pubDate>

									<content:encoded><![CDATA[<p>A good area where AI, and machine learning will help the cyber industry. Information is critical to an IT organization especially during an incident. With unstructured data, data that is not in their SIEMs, it is [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">d5ae786c20ac6f7a8c059e1a4090b5f0</guid>
				<title>Christie L Vazquez wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/?p=4855</link>
				<pubDate>Tue, 31 Oct 2017 14:43:45 -0400</pubDate>

									<content:encoded><![CDATA[<p>Cyber criminals are getting a ROI, re-using phishing kits. Brings up the question, why aren&#8217;t monitoring tools picking these up before they are delivered to a user&#8217;s inbox.</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b4e1afc8c8ccbd4553848106628ce832</guid>
				<title>Christie L Vazquez wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/?p=4786</link>
				<pubDate>Sun, 22 Oct 2017 00:02:43 -0400</pubDate>

									<content:encoded><![CDATA[<p>A new IoT Botnet, compared to Mirai. Called &#8220;IoT_reaper&#8221; was first reported in September.  </p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">652a63aa1980a42abe5c075e9a161a6c</guid>
				<title>Christie L Vazquez wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/?p=4762</link>
				<pubDate>Mon, 16 Oct 2017 22:37:25 -0400</pubDate>

									<content:encoded><![CDATA[<p>Interesting malware, DoubleLocker, can reset your PIN and encrypts your data. Interesting that is does both. </p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">0ce47b15ab723efa1df3928573a0fcd6</guid>
				<title>Christie L Vazquez wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/?p=4697</link>
				<pubDate>Mon, 09 Oct 2017 00:03:29 -0400</pubDate>

									<content:encoded><![CDATA[<p>Malware as a service is becoming more popular, a keystroke capturing and password stealing program is available for purchase. </p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">70b40f759cb61a27fed0313fba4c7f13</guid>
				<title>Christie L Vazquez posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/2017/09/30/behind-the-scenes-cryptocurrency-mining-discovered-on-showtime-sites/#comment-692</link>
				<pubDate>Mon, 02 Oct 2017 13:19:18 -0400</pubDate>

									<content:encoded><![CDATA[<p>Hi Donald, great article!<br />
Recently China, the US and South Korea banned using cryptocurrencies as funds to start a company. It will be interesting to see what regulations follow….</p>
<p>I wonder if the subscribers whose CPU cycles were used will be reimbursed if their resources mined any coins!</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/donald-hoxhaj/" rel="nofollow ugc">Donald Hoxhaj</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5211sec001fall17" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> 
Behind-the-Scenes Cryptocurrency Mining Discovered on Showtime Sites

This article talks about the following: Showtime is a [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">4d51f343fbb93d442fb937300e0db083</guid>
				<title>Christie L Vazquez wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/?p=4656</link>
				<pubDate>Mon, 02 Oct 2017 13:08:08 -0400</pubDate>

									<content:encoded><![CDATA[<p>Interesting article where Apache strikes back against the Equifax breach being caused by a vulnerability in their framework.</p>
<p>They note no one at the @equifax domain has been in contact with them, insinuating [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>2</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">d5e4edc4d8ed1858ca76ba6e4378c524</guid>
				<title>Christie L Vazquez posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/2017/09/24/routex-malware-found-exploiting-netgear-routers/#comment-680</link>
				<pubDate>Mon, 25 Sep 2017 18:59:46 -0400</pubDate>

									<content:encoded><![CDATA[<p>Hi Matt, thanks for posting! Quite a few home model routers listed as impacted by this vulnerability!</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/matthew-roberts/" rel="nofollow ugc">Matt Roberts</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5211sec001fall17" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> 
Recently, a vulnerability was discovered in the remote command and execution function of Netgear routers. Malware known as [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">13ff7c7687815ec0c33f849b6a3165ab</guid>
				<title>Christie L Vazquez wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/?p=4607</link>
				<pubDate>Sun, 24 Sep 2017 18:19:43 -0400</pubDate>

									<content:encoded><![CDATA[<p>I thought this article was timely, considering we are reviewing a company’s footprint. The author states security vulnerabilities come from three places, code quality, complexity and overly trusting data i [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">9f6ff6dd3280408ea4b53c3e88a9fc69</guid>
				<title>Christie L Vazquez posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/2017/09/12/week-3-presentation/#comment-655</link>
				<pubDate>Sun, 17 Sep 2017 21:43:43 -0400</pubDate>

									<content:encoded><![CDATA[<p>@Ian, good catch! And yeah very strange. You would think Vevo would know that..</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/wade-mackey/" rel="nofollow ugc">Wade Mackey</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5211sec001fall17" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> Intro-to-Ethical-Hacking-Week-3			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">c9eb7aa23daa6c7670ef15a0ff2c2c32</guid>
				<title>Christie L Vazquez posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/2017/09/12/week-3-presentation/#comment-653</link>
				<pubDate>Sun, 17 Sep 2017 12:59:08 -0400</pubDate>

									<content:encoded><![CDATA[<p>@Andres, thanks for sharing! I have a hard time following articles on reddit but it is a great source of information. </p>
<p>My article: <a href="http://thehackernews.com/2017/09/vevo-music-video-hacked.html" rel="nofollow ugc">http://thehackernews.com/2017/09/vevo-music-video-hacked.html</a></p>
<p>Hacker group OurMine hacked Vevo and then leaked the data. They call themselves white hackers, which I would disagree. Releasing data is something a&hellip;<span class="activity-read-more" id="activity-read-more-174104"><a href="http://community.mis.temple.edu/mis5211sec001fall17/2017/09/12/week-3-presentation/#comment-653" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/wade-mackey/" rel="nofollow ugc">Wade Mackey</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5211sec001fall17" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> Intro-to-Ethical-Hacking-Week-3			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">b514004fa7b71b56b35a0e4c11be23a7</guid>
				<title>Christie L Vazquez posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/2017/09/06/week-2-presentation/#comment-618</link>
				<pubDate>Sat, 09 Sep 2017 18:22:20 -0400</pubDate>

									<content:encoded><![CDATA[<p>In the News<br />
A term I heard this year at the RSA conference in San Francisco was &#8220;Cyber Malpractice&#8221;. The speaker stated companies that do not put controls in place to prevent cyber attacks are committing cyber malpractice and their customer&#8217;s should hold them accountable if their data is compromised. </p>
<p>A judge ruled this week that did suffer an&hellip;<span class="activity-read-more" id="activity-read-more-173306"><a href="http://community.mis.temple.edu/mis5211sec001fall17/2017/09/06/week-2-presentation/#comment-618" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/wade-mackey/" rel="nofollow ugc">Wade Mackey</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5211sec001fall17" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> Intro to Ethical Hacking Week 2			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">4b9020e4b150af0dbc89496d41556982</guid>
				<title>Christie L Vazquez posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5211sec001fall17/2017/08/31/hacking-article/#comment-614</link>
				<pubDate>Wed, 06 Sep 2017 14:44:25 -0400</pubDate>

									<content:encoded><![CDATA[<p>I do not think this incident was the result of a hack. Instead it was a phishing attack using social engineering to commit fraud. </p>
<p>A hacker explores the differences of how something is designed to work and how it can work. A hack is us using a computer system to gain unauthorized access to a system. </p>
<p>A hacker committed the attack but did not&hellip;<span class="activity-read-more" id="activity-read-more-173020"><a href="http://community.mis.temple.edu/mis5211sec001fall17/2017/08/31/hacking-article/#comment-614" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/wade-mackey/" rel="nofollow ugc">Wade Mackey</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5211sec001fall17" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> Just to kick things off.  Here&#8217;s an article I noted today describing scammers using phishing techniques netted 11 million [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">b16a02e933329e082b21dbb5208006dd</guid>
				<title>Christie L Vazquez posted a new activity comment</title>
				<link>http://community.mis.temple.edu/mis5121beaver2016/2016/02/09/100-second-reflection-week-4/#comment-30</link>
				<pubDate>Sun, 14 Feb 2016 15:55:53 -0500</pubDate>

									<content:encoded><![CDATA[<p>Last week I learned the importance of controls during the order to cash process. From credit checks to segregation of duties when it comes to limiting who can access the price data. It is critical to ensure automated and manual controls are in place as the order to cash process provides many opportunities to commit fraud.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/edward-n-beaver/" rel="nofollow ugc">Edward N Beaver</a> wrote a new post on the site <a href="http://community.mis.temple.edu/mis5121beaver2016" rel="nofollow ugc">ERP Systems  MIS 5121 &#8211; Spring 2016</a> Think for 100 seconds, and summarize the key things that you learned in the class this past week.			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">4090b229241880c420c734e6e54a4796</guid>
				<title>Christie L Vazquez changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/123081/</link>
				<pubDate>Tue, 01 Sep 2015 20:34:13 -0400</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
		
	</channel>
</rss>