<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-03-31T21:29:00+00:00</dc:date>

	
	<item>
		<title> Google as DNS, Wikileaks as PoC (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20101205_google_as_dns_wikileaks_as_poc</guid>
		<link>https://circleid.com/posts20101205_google_as_dns_wikileaks_as_poc</link>
		<description><![CDATA[Wikileaks is still accessible -- via Google. Does that change anything? For many Internet users IP addresses as well as domain names are completely transparent. Further, Google (and other search engines) and often the first stop when these users wants to find a service, or a web site. Thus, many of us discussed over the years the eventual viability of Google (... and other search engines) as "DNS" (note the "'s). Now, don't jump at my throat quite yet... <a href="https://circleid.com/posts20101205_google_as_dns_wikileaks_as_poc">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Email Portability Approved by Knesset Committee (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20100222_email_portability_approved_by_knesset_committee</guid>
		<link>https://circleid.com/posts20100222_email_portability_approved_by_knesset_committee</link>
		<description><![CDATA[The email portability bill has just been approved by the Knesset's committee for legislation, sending it on its way for the full legislation process of the Israeli parliament. While many users own a free email account, many in Israel still make use of their ISP's email service. According to this proposed bill, when a client transfers to a different ISP the email address will optionally be his to take along, "just like" mobile providers do today with phone numbers. <a href="https://circleid.com/posts20100222_email_portability_approved_by_knesset_committee">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Chuck Norris Botnet and Broadband Routers (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20100222_chuck_norris_botnet_and_broadband_routers</guid>
		<link>https://circleid.com/posts20100222_chuck_norris_botnet_and_broadband_routers</link>
		<description><![CDATA[Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news... The spread of insecure broadband modems (DSL and Cable) is extremely wide-spread, with numerous ISPs, large and small, whose entire (read significant portions of) broadband population is vulnerable. <a href="https://circleid.com/posts20100222_chuck_norris_botnet_and_broadband_routers">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Corporate Espionage in the News: Hilton and the Oil Industry (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postscorporate_espionage_in_the_news_hilton_and_oil_industry</guid>
		<link>https://circleid.com/postscorporate_espionage_in_the_news_hilton_and_oil_industry</link>
		<description><![CDATA[Is anyone calling espionage by means of computers cyber-espionage yet? I hope not. At least they shouldn't call it cyber war. Two news stories of computerized espionage reached me today. The first, regarding the Oil industry, was sent by Marc Sachs to a SCADA security mailing list we both read. The second, about the hotel industry, was sent by Deb Geisler to science fiction convention runners (SMOFS) mailing list we both read. <a href="https://circleid.com/postscorporate_espionage_in_the_news_hilton_and_oil_industry">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Perhaps It's Time to Regulate Microsoft as Critical Infrastructure? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsperhaps_its_time_to_regulate_microsoft_as_critical_infrastructure</guid>
		<link>https://circleid.com/postsperhaps_its_time_to_regulate_microsoft_as_critical_infrastructure</link>
		<description><![CDATA[My main argument is about the policy of handling vulnerabilities for 6 months without patching (such as the Google attacks 0day apparently was) and the policy of waiting a whole month before patching this very same vulnerability when it first became an in-the-wild 0day exploit (it has now been patched, ahead of schedule). Microsoft is the main proponent of responsible disclosure, and has shown it is a responsible vendor... I simply call on it to stay responsible and amend its faulty and dangerous policies. <a href="https://circleid.com/postsperhaps_its_time_to_regulate_microsoft_as_critical_infrastructure">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Large Hadron Collider, Nessus, and the InterWebz (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postslarge_hadron_collider_nessus_and_the_interwebz</guid>
		<link>https://circleid.com/postslarge_hadron_collider_nessus_and_the_interwebz</link>
		<description><![CDATA[CERN put the Large Hadron Collider through some rigorous tests, and apparently at first some of the Siemens manufactured SCADA systems failed. While they are apparently better now, and I am happy to see how serious CERN is about security, this does beg the question... WAIT! You mean it's connected to the Internet? I suddenly don't feel so safe. <a href="https://circleid.com/postslarge_hadron_collider_nessus_and_the_interwebz">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> China Hacks Google, Etc. (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20100115_china_hacks_google_etc</guid>
		<link>https://circleid.com/posts20100115_china_hacks_google_etc</link>
		<description><![CDATA[Many news sources are reporting on how Google and other corporations were hacked by China. The reports, depending on vendor, blame either PDF files via email as the original perpetrator, or lay most of the blame on an Internet Explorer 0day. <a href="https://circleid.com/posts20100115_china_hacks_google_etc">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Air Travel Security: Practical Industry Suggestions From Us (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsair_travel_security_practical_industry_suggestions_from_us</guid>
		<link>https://circleid.com/postsair_travel_security_practical_industry_suggestions_from_us</link>
		<description><![CDATA[I am just a security guy, as are many others who will read this. Perhaps it is time us "simple" security guys got together and wrote some recommendations for air travel security? Get out your voice out there as an organized professional group which can in turn lobby for our professional recommendations... Here are mine, just to get the ball rolling... <a href="https://circleid.com/postsair_travel_security_practical_industry_suggestions_from_us">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Spymaster Sees Israel As World Cyberwar Leader (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsspymaster_sees_israel_as_world_cyberwar_leader</guid>
		<link>https://circleid.com/postsspymaster_sees_israel_as_world_cyberwar_leader</link>
		<description><![CDATA[HaAretz, an Israeli newspaper, quotes Major-General Yaldin as saying: "Fighting in the cyber dimension is as significant as the introduction of fighting in the aerial dimension in the early 20th century." (my translation) If this statement is to be believed, Israel is active in cyberspace. And yet, why would Israel admit that, regardless of if it really happens? One option is... <a href="https://circleid.com/postsspymaster_sees_israel_as_world_cyberwar_leader">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Was the ClimateGate Hacker Justified? Join the Debate! (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postswas_the_climategate_hacker_justified_join_the_debate</guid>
		<link>https://circleid.com/postswas_the_climategate_hacker_justified_join_the_debate</link>
		<description><![CDATA[A few days ago a story broke where someone hacked into a global warming research institute and stole all emails from the past 10 years, proving a conspiracy. In the vast amount of emails stolen, some emails were also found with clear-cut lies, showing how some scientists conspired to deceive in scientific research about data that did not fit their agenda of proving global warming. I am opening the subject for debate... <a href="https://circleid.com/postswas_the_climategate_hacker_justified_join_the_debate">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Announcement: Critical Internet Infrastructure WG is Now Open to Public Participation (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20091118_critical_internet_infrastructure_wg_open_to_public_participation</guid>
		<link>https://circleid.com/posts20091118_critical_internet_infrastructure_wg_open_to_public_participation</link>
		<description><![CDATA[ISOTF Critical Internet Infrastructure WG is now open to public participation. The group holds top experts on internet technology, critical infrastructure, and internet governance, from around the globe. Together, we discuss definitions, problems, challenges and solutions in securing and assuring the reliability of the global internet infrastructure, which is critical infrastructure for a growing number of nations, corporations and indeed, individuals -- world wide. <a href="https://circleid.com/posts20091118_critical_internet_infrastructure_wg_open_to_public_participation">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> China: Is It Our Cyber Defense Red Herring? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20091112_china_is_it_our_cyber_defense_red_herring</guid>
		<link>https://circleid.com/posts20091112_china_is_it_our_cyber_defense_red_herring</link>
		<description><![CDATA[There are thousands of articles perpetuating the claim that China is out to get us on the Internet. And yet, all these discussions are begging the question, is it China attacking? Also, are they even the "usual suspects"? 
While I can point to real facts of China making active use of information warfare, cyber warfare, or whatever else you choose to call it (such as the release of 0 days being patched by Microsoft and originally reported by the Taiwanese government, search Microsoft's site), I can also point to Germany (intelligence Trojan horse), the US (The Farewell Dossier) and other countries such as North Korea (without much detail, so questioned)... <a href="https://circleid.com/posts20091112_china_is_it_our_cyber_defense_red_herring">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Security Psychology (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postssecurity_human_psychology</guid>
		<link>https://circleid.com/postssecurity_human_psychology</link>
		<description><![CDATA[I just came across a post telling of the <em>Security and Human Behavior</em> workshop. As some of you may be aware, I've been researching this subject for about two years now, and I am very excited that a conference has now happened! It means I did not waste the last two years of my life after all! <a href="https://circleid.com/postssecurity_human_psychology">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Phishing Registrar Accounts: eNom is First Target (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20081029_phishing_registrar_accounts_enom</guid>
		<link>https://circleid.com/posts20081029_phishing_registrar_accounts_enom</link>
		<description><![CDATA[Criminals are now looking to use established domain names, via phishing targeted at domain registrars. This is possibly related to ICANN finally moving to stop the black hat registrars of the world. According to the first report on the matter sent yesterday to Registrar Operations (reg-ops) mailing list, the attacks seem to be run by gang of child pornography spammers. <a href="https://circleid.com/posts20081029_phishing_registrar_accounts_enom">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> ICANN Sends Termination Notice to Registrar (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20081029_icann_termination_notice_registrar</guid>
		<link>https://circleid.com/posts20081029_icann_termination_notice_registrar</link>
		<description><![CDATA[ICANN has sent EstDomains a termination notice: "BBe advised that the Internet Corporation for Assigned Names and Numbers (ICANN) Registrar Accreditation Agreement (RAA) for EstDomains, Inc. (customer No. 919, IANA No. 943) is terminated..." <a href="https://circleid.com/posts20081029_icann_termination_notice_registrar">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>