<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Effect</title> <atom:link href="https://www.iphere.com/tag/effect/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Attackers use domino effect to compromise your accounts</title><link>https://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts</link> <comments>https://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts#comments</comments> <pubDate>Thu, 31 Jul 2014 02:17:06 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Accounts]]></category> <category><![CDATA[Attackers]]></category> <category><![CDATA[Compromise]]></category> <category><![CDATA[domino]]></category> <category><![CDATA[Effect]]></category> <guid
isPermaLink="false">http://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts</guid> <description><![CDATA[Data breach after data breach has illustrated just how weak and ineffective passwords can be for protecting accounts and sensitive information. Many sites and services have implemented secondary security protocols and two-factor authentication, but users frequently use information and email accounts that can be easily compromised—giving attackers a simple way to access your information. One [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/attackers-use-domino-effect-to-compromise-your-accounts/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Shadow Networks An Unintended IPv6 Side Effect</title><link>https://www.iphere.com/shadow-networks-an-unintended-ipv6-side-effect</link> <comments>https://www.iphere.com/shadow-networks-an-unintended-ipv6-side-effect#comments</comments> <pubDate>Sat, 07 Apr 2012 08:14:25 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Effect]]></category> <category><![CDATA[IPv6]]></category> <category><![CDATA[Networks]]></category> <category><![CDATA[Shadow]]></category> <category><![CDATA[Side]]></category> <category><![CDATA[Unintended]]></category> <guid
isPermaLink="false">http://www.iphere.com/shadow-networks-an-unintended-ipv6-side-effect</guid> <description><![CDATA[As adoption of the IPv6 Internet protocol continues to gain traction, some network security monitoring businesses and industry analysts are starting to see a troubling phenomenon that they call &#8216;shadow networks&#8217;. On a shadow network, data flows through new IPv6-enabled connections and onto the existing IPv4 network, but the IPv4 security in place is unable [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/shadow-networks-an-unintended-ipv6-side-effect/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>