<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Compromise</title> <atom:link href="https://www.iphere.com/tag/compromise/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Attackers use domino effect to compromise your accounts</title><link>https://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts</link> <comments>https://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts#comments</comments> <pubDate>Thu, 31 Jul 2014 02:17:06 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Accounts]]></category> <category><![CDATA[Attackers]]></category> <category><![CDATA[Compromise]]></category> <category><![CDATA[domino]]></category> <category><![CDATA[Effect]]></category> <guid
isPermaLink="false">http://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts</guid> <description><![CDATA[Data breach after data breach has illustrated just how weak and ineffective passwords can be for protecting accounts and sensitive information. Many sites and services have implemented secondary security protocols and two-factor authentication, but users frequently use information and email accounts that can be easily compromised—giving attackers a simple way to access your information. One [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Security: Living In A State Of Compromise</title><link>https://www.iphere.com/security-living-in-a-state-of-compromise</link> <comments>https://www.iphere.com/security-living-in-a-state-of-compromise#comments</comments> <pubDate>Tue, 20 Sep 2011 02:14:44 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Compromise]]></category> <category><![CDATA[Living]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[State]]></category> <guid
isPermaLink="false">http://www.iphere.com/security-living-in-a-state-of-compromise</guid> <description><![CDATA[The bad guys appear to be winning &#8211; or at least sharing information on vulnerabilities and attack methodologies &#8211; faster and more readily than the good guys, and the regulatory environment is lagging reality, says RSA&#8217;s Chief Security Officer Eddie Schwartz. &#8220;What is out there in the public (regarding attacks) is the tip of the [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/security-living-in-a-state-of-compromise/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>