<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Temple MIS | Wayne Wilson | Activity</title>
	<link>https://community.mis.temple.edu/members/wayne-wilson/activity/</link>
	<atom:link href="https://community.mis.temple.edu/members/wayne-wilson/activity/feed/" rel="self" type="application/rss+xml" />
	<description>Activity feed for Wayne Wilson.</description>
	<lastBuildDate>Sun, 05 Apr 2026 21:06:02 -0400</lastBuildDate>
	<generator>https://buddypress.org/?v=</generator>
	<language>en-US</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
	
						<item>
				<guid isPermaLink="false">fc7eb77cec382729b6ae98addb3f3028</guid>
				<title>Wayne Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sp2017/?p=3420</link>
				<pubDate>Wed, 05 Apr 2017 20:41:24 -0400</pubDate>

									<content:encoded><![CDATA[<p>Researchers in Israel have found major security holes in millions of Samsung IoT devices, Televisions, Refrigerators, Washer and Dryers and any other device running Samsung in-house OS called Tizen. Tizen is [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>2</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">3abb77fc062152c2cdab2ffcf6f74e86</guid>
				<title>Wayne Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sp2017/?p=3393</link>
				<pubDate>Tue, 28 Mar 2017 20:02:27 -0400</pubDate>

									<content:encoded><![CDATA[<p>The original cloud service “FTP” is on the radar of many hackers. The FBI sent out an alert to medical and dental entities warning them to secure their FTP servers. Hackers are trying to access protected hea [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>1</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">13afc5e0b509f2b0e0250635d05c0005</guid>
				<title>Wayne Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sp2017/?p=3236</link>
				<pubDate>Tue, 21 Feb 2017 02:59:46 -0500</pubDate>

									<content:encoded><![CDATA[<p>Executive Summary</p>
<p>Power Point</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7866be77a9ebf5031e12bd8dfcb2d0ff</guid>
				<title>Wayne Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sp2017/?p=3164</link>
				<pubDate>Tue, 07 Feb 2017 20:20:03 -0500</pubDate>

									<content:encoded><![CDATA[<p>At least 76 popular iOS apps found to have risks for data interception. At the time of the findings, more than 18,000,000 apps downloaded from Apple’s App Store. Popular apps such as Snapchap and various banking a [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>3</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">08cc8d180f1a8277be5d280502923e8a</guid>
				<title>Wayne Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing</title>
				<link>http://community.mis.temple.edu/mis5212sec001sp2017/?p=3119</link>
				<pubDate>Tue, 31 Jan 2017 02:07:16 -0500</pubDate>

									<content:encoded><![CDATA[<p>In North Whales cybercrimes are out numbering physical crimes for law enforcement. While burglary and shoplifting has seen a decrease, online crimes are on the rise. Primary targets for these online crimes are [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>1</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">a5c828c168cb0d6f39141b5aa97ba0cb</guid>
				<title>Wayne Wilson posted a new activity comment</title>
				<link>https://community.mis.temple.edu/itacs5211fall16/2016/12/10/ransomware-under-development-gives-option-to-pay-or-infect-others/#comment-662</link>
				<pubDate>Mon, 12 Dec 2016 16:18:37 -0500</pubDate>

									<content:encoded><![CDATA[<p>WOW!!!  This is a very conniving and interesting approach to ransomware. The sad part is people will play along in order not to pay the ransom themselves. Ransomware attacks are on the rise and effecting regular everyday people daily.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/josh-zenker/" rel="nofollow ugc">Josh Zenker</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5211fall16" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> Malware researchers recently discovered a particularly dastardly new type of ransomware, still under development. It gives its [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">7ad34b8d9e06f3eba24781acf37e3f99</guid>
				<title>Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/?p=4057</link>
				<pubDate>Wed, 30 Nov 2016 16:28:03 -0500</pubDate>

									<content:encoded><![CDATA[<p>burp-suite-scan Powerpoint</p>
<p>pgw-burpsuite Word document</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">3d2451046193ab94676e0578611efeb2</guid>
				<title>Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/?p=3992</link>
				<pubDate>Fri, 18 Nov 2016 19:46:23 -0500</pubDate>

									<content:encoded><![CDATA[<p> </p>
<p>In an effort to better combat cyber attacks IBM built a simulated version of the entire internet in a data center located in Massachusetts coined the “cyber range”.  The cyber range is manned by former secur [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b70e44d6c3c14224cf1e8da570dccb62</guid>
				<title>Wayne Wilson posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/2016/11/16/this-5-device-can-take-over-a-computer-even-if-its-locked/#comment-600</link>
				<pubDate>Fri, 18 Nov 2016 16:36:40 -0500</pubDate>

									<content:encoded><![CDATA[<p>Very interesting article, Microsoft&#8217;s response to Tech Crunch was “Regardless of operating system, for this to work, physical access to a machine is required. So, the best defense is to avoid leaving laptops and computers unattended and to keep your software up to date.” In other words, you are on your own with this one, good luc&hellip;<span class="activity-read-more" id="activity-read-more-159618"><a href="http://community.mis.temple.edu/itacs5211fall16/2016/11/16/this-5-device-can-take-over-a-computer-even-if-its-locked/#comment-600" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/jason-a-lindsley/" rel="nofollow ugc">Jason A Lindsley</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5211fall16" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> This article explains a pretty nasty device.  It can take over your computer using remote code execution even it is locked. [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">0da2f0d173ae484f1c8dbbcc03aaa742</guid>
				<title>Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/?p=3989</link>
				<pubDate>Thu, 17 Nov 2016 17:12:03 -0500</pubDate>

									<content:encoded><![CDATA[<p>The Internet of Things is changing how we look at securing our home networks, gone are the days of just installing antivirus software on your pc and feeling secure. We now have to look at all the devices connected [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">8a52170942c8f3931e0fd6f5d5a065fd</guid>
				<title>Wayne Wilson posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/2016/11/13/facebook-is-buying-up-stolen-passwords/#comment-593</link>
				<pubDate>Wed, 16 Nov 2016 17:01:07 -0500</pubDate>

									<content:encoded><![CDATA[<p>It’s good to see a company taking a proactive approach to securing their customer&#8217;s online presence. The concept of checking the password hash then comparing the hash against password hashes in their system was an excellent strategy.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/jimmy-jouthe/" rel="nofollow ugc">Jimmy C. Jouthe</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5211fall16" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> Facebook is buying passwords from the online black market and comparing them to the passwords of the users. The list of [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">c1c3a20e413df87b3b2f174562e36f1e</guid>
				<title>Wayne Wilson posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/2016/11/08/chinas-new-cybersecurity-bill-alarms-human-rights-experts/#comment-571</link>
				<pubDate>Wed, 09 Nov 2016 23:19:13 -0500</pubDate>

									<content:encoded><![CDATA[<p>China’s government is trying to control every aspect of internet access, they pretty much want access to all data that citizens can obtain. I’m sure this will effect long term relationships with many companies currently doing business with China.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/ioannis-s-haviaras/" rel="nofollow ugc">Ioannis S. Haviaras</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5211fall16" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> Chinese courts have signed into law an agreement that will make it more difficult for companies to house data on servers [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">0301dcb58c3edcac915dc3cb27075e3e</guid>
				<title>Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/?p=3948</link>
				<pubDate>Wed, 09 Nov 2016 20:39:29 -0500</pubDate>

									<content:encoded><![CDATA[<p> </p>
<p>Here is an example of how incorporating IoT into our everyday lives could have a crippling effect on us. An apartment building in the city of Lappeenranta in Finland, had its heating system hit with a DDOS [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">10042d85a3e805e48e3a9544057c52ce</guid>
				<title>Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/?p=3899</link>
				<pubDate>Tue, 01 Nov 2016 21:19:52 -0400</pubDate>

									<content:encoded><![CDATA[<p>This article is a perfect example of upper management not taking IT security seriously. Even though this article is 2 years old it shows a blatant act on Home Depot&#8217;s part not to address known security issues. [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">46a05fa2c371bb52a35f5dfe665c22fb</guid>
				<title>Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/?p=3817</link>
				<pubDate>Thu, 27 Oct 2016 21:17:51 -0400</pubDate>

									<content:encoded><![CDATA[<p>nessus-vulnerabilitypowerpoint</p>
<p>nessus-vulnerability-word-report</p>
<p> </p>
<p> </p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">a5ff34b9134bd03ff19523c814d87b35</guid>
				<title>Wayne Wilson posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/2016/10/24/temple-student-i-used-target-gift-card-to-get-past-security-in-9-buildings/#comment-512</link>
				<pubDate>Tue, 25 Oct 2016 00:50:20 -0400</pubDate>

									<content:encoded><![CDATA[<p>Good article, its straight to the point and shows why physical security is an important factor when it comes to cyber security. Once someone gains access to a building mischief can began. You’re only as strong as your weakest link. No matter how great your IT infrastructure is, someone gaining access to a secure area can easily take down your n&hellip;<span class="activity-read-more" id="activity-read-more-156935"><a href="http://community.mis.temple.edu/itacs5211fall16/2016/10/24/temple-student-i-used-target-gift-card-to-get-past-security-in-9-buildings/#comment-512" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/brent-easley/" rel="nofollow ugc">Brent Easley</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5211fall16" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> 
 

Since we were on the subject of social engineering of last weeks class.  I thought this was an interesting article d [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">630a4599cad3abc23449af04e9cea212</guid>
				<title>Wayne Wilson posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/2016/10/18/trumps-email-servers/#comment-496</link>
				<pubDate>Wed, 19 Oct 2016 18:23:25 -0400</pubDate>

									<content:encoded><![CDATA[<p>Those who live in a glass house shouldn’t throw stones. You would have thought his IT team would be on point when it comes to IT security after watching what happened to Hillary. In many cases IT is always an afterthought until something goes wrong and this is a perfect example of something waiting to go wrong.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/jimmy-jouthe/" rel="nofollow ugc">Jimmy C. Jouthe</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5211fall16" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> A security researcher recently discovered that the some of the email servers linked to Mr. Trump&#8217;s organization (including [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">3eedce7280cc4cacd8b439b60c531a93</guid>
				<title>Wayne Wilson posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/2016/10/17/encryption-a-backdoor-for-one-is-a-backdoor-for-all/#comment-495</link>
				<pubDate>Wed, 19 Oct 2016 18:15:54 -0400</pubDate>

									<content:encoded><![CDATA[<p>Interesting article regarding backdoors. I believe by introducing a backdoor you also weaken a link in the security chain, which defeats the sole purpose of encrypting data. I had agreed with Apples stance when the government wanted Apple to decrypt the terrorist phone. Once the backdoor is created you are now at risk of someone else exploiting it&hellip;<span class="activity-read-more" id="activity-read-more-156246"><a href="http://community.mis.temple.edu/itacs5211fall16/2016/10/17/encryption-a-backdoor-for-one-is-a-backdoor-for-all/#comment-495" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/loi-van-tran/" rel="nofollow ugc">Loi Van Tran</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5211fall16" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> This article talks about how important encryption is in today&#8217;s internet-driven economy.  Any attempt to circumvent encryption [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">abb5f0ad8c1f2ec8747d1eef0e81b2fd</guid>
				<title>Wayne Wilson posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/2016/10/18/android-banking-trojan-tricks-victims-to-submit-a-selfie-holding-their-id-card/#comment-493</link>
				<pubDate>Wed, 19 Oct 2016 17:43:08 -0400</pubDate>

									<content:encoded><![CDATA[<p>Perfect example of social engineering at its best. Sit back and let the end users feed you all the information you need without a care in the world.</p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/vaibhav-shukla/" rel="nofollow ugc">Vaibhav Shukla</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5211fall16" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> A dangerous banking Trojan, named Acecard,  asks android users to send a selfie holding their ID card.This threat tricks [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">119ba093604726db8883ea128766f93b</guid>
				<title>Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/?p=3629</link>
				<pubDate>Sat, 08 Oct 2016 01:51:01 -0400</pubDate>

									<content:encoded><![CDATA[<p>National researchers in Australia developed a hack proof computer code called microkernel. It is the barest bone of an operating system. By keeping an operating system as simple as possible, the harder it is to [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>3</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">115561d0bf104f9112276fd78ff68c25</guid>
				<title>Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/?p=3418</link>
				<pubDate>Thu, 22 Sep 2016 21:22:37 -0400</pubDate>

									<content:encoded><![CDATA[<p>This news couldn’t have hit yahoo at a worse time, with already falling stock prices and currently in negotiation with Verizon for its purchase. Yahoo’s market value just took another big hit. Yahoo was made awa [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">e96827fcc927c61ee3e2b39abbdaca13</guid>
				<title>Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/?p=3290</link>
				<pubDate>Tue, 13 Sep 2016 02:32:35 -0400</pubDate>

									<content:encoded><![CDATA[<p>With the growing demand for BYOD (Bring Your Own Device) as a possible cost saving measure for many companies, IT networking and security groups have to properly plan for this new IT model. To the untrained eye [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>4</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">475154f5e4329695710176191e470ef5</guid>
				<title>Wayne Wilson posted a new activity comment</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/2016/09/05/to-antivirus-or-not-to-antivirus/#comment-217</link>
				<pubDate>Wed, 07 Sep 2016 01:37:14 -0400</pubDate>

									<content:encoded><![CDATA[<p>Antivirus technology has come a long way over the years, gone are the days of buying multiple products to cover various threats. Here at Temple we use Symantec Endpoint protection. Symantec bundles antivirus, malware, and spyware protection along with Network and zero-day protection in one product. This allows the consumer to have a little piece&hellip;<span class="activity-read-more" id="activity-read-more-148393"><a href="http://community.mis.temple.edu/itacs5211fall16/2016/09/05/to-antivirus-or-not-to-antivirus/#comment-217" rel="nofollow ugc">[Read more]</a></span></p>
				<strong>In reply to</strong> -
				<a href="https://community.mis.temple.edu/members/jon-whitehurst/" rel="nofollow ugc">Jon Whitehurst</a> wrote a new post on the site <a href="http://community.mis.temple.edu/itacs5211fall16" rel="nofollow ugc">ITACS 5211: Introduction to Ethical Hacking</a> During the week 1 lecture Professor Mackey made the comment that and I am hoping I am quoting correct, &#8220;I do not run antivirus [&hellip;]			]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">67532181d55b05393159ec5a9dbd96d5</guid>
				<title>Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking</title>
				<link>http://community.mis.temple.edu/itacs5211fall16/?p=3193</link>
				<pubDate>Sun, 04 Sep 2016 21:40:33 -0400</pubDate>

									<content:encoded><![CDATA[<p>“Hacking Air – Gapped Networks”, this article blew my mind. The level at which these researchers and ethical hackers used to exfiltrate data from pc’s isolated from the internet is unbelievable. They were able to [&hellip;]</p>
]]></content:encoded>
				
									<slash:comments>4</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">fd84ed9205b4fbf91243c8f3aa8c4b6b</guid>
				<title>Wayne Wilson changed their profile picture</title>
				<link>https://community.mis.temple.edu/activity/p/136908/</link>
				<pubDate>Tue, 19 Jan 2016 22:16:00 -0500</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
		
	</channel>
</rss>