<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Attackers</title> <atom:link href="https://www.iphere.com/tag/attackers/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Attackers use domino effect to compromise your accounts</title><link>https://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts</link> <comments>https://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts#comments</comments> <pubDate>Thu, 31 Jul 2014 02:17:06 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Accounts]]></category> <category><![CDATA[Attackers]]></category> <category><![CDATA[Compromise]]></category> <category><![CDATA[domino]]></category> <category><![CDATA[Effect]]></category> <guid
isPermaLink="false">http://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts</guid> <description><![CDATA[Data breach after data breach has illustrated just how weak and ineffective passwords can be for protecting accounts and sensitive information. Many sites and services have implemented secondary security protocols and two-factor authentication, but users frequently use information and email accounts that can be easily compromised—giving attackers a simple way to access your information. One [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Report: Attackers have their sights set on the cloud</title><link>https://www.iphere.com/report-attackers-have-their-sights-set-on-the-cloud</link> <comments>https://www.iphere.com/report-attackers-have-their-sights-set-on-the-cloud#comments</comments> <pubDate>Thu, 24 Apr 2014 08:13:57 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Attackers]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[sights]]></category> <category><![CDATA[Their]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-attackers-have-their-sights-set-on-the-cloud</guid> <description><![CDATA[If you want to catch trout, you have to fish where the trout swim. That same logic applies for cyber criminals—they will focus their efforts wherever there is a fair chance of finding targets to prey on. This is underscored by a new report from Alert Logic that reveals a dramatic rise in cloud-based attacks [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-attackers-have-their-sights-set-on-the-cloud/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Attackers Hold Upper Hand Despite Increased Security Spending</title><link>https://www.iphere.com/attackers-hold-upper-hand-despite-increased-security-spending</link> <comments>https://www.iphere.com/attackers-hold-upper-hand-despite-increased-security-spending#comments</comments> <pubDate>Fri, 05 Apr 2013 08:15:30 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Attackers]]></category> <category><![CDATA[Despite]]></category> <category><![CDATA[Hand]]></category> <category><![CDATA[Hold]]></category> <category><![CDATA[Increased]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Spending]]></category> <category><![CDATA[Upper]]></category> <guid
isPermaLink="false">http://www.iphere.com/attackers-hold-upper-hand-despite-increased-security-spending</guid> <description><![CDATA[From advanced malware to spear phishing that spoofs business communication, companies are being pounded by attacks, according to a new report. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/attackers-hold-upper-hand-despite-increased-security-spending/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>More Data On Attackers, But Attribution Still Dodgy</title><link>https://www.iphere.com/more-data-on-attackers-but-attribution-still-dodgy</link> <comments>https://www.iphere.com/more-data-on-attackers-but-attribution-still-dodgy#comments</comments> <pubDate>Sat, 09 Feb 2013 14:12:46 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Attackers]]></category> <category><![CDATA[Attribution]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Dodgy]]></category> <category><![CDATA[More]]></category> <category><![CDATA[Still]]></category> <guid
isPermaLink="false">http://www.iphere.com/more-data-on-attackers-but-attribution-still-dodgy</guid> <description><![CDATA[Following the compromise of The New York Times&#8217; network, Mandiant&#8211;the company that responded to the incident and conducted the forensics analysis&#8211;collected enough evidence to identify the attacker. Yet, &#8220;identify&#8221; is a loaded word in the field of digital forensics and the name that the company had for the perpetrators came down to an internal designation: [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/more-data-on-attackers-but-attribution-still-dodgy/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>