<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Exploits</title> <atom:link href="https://www.iphere.com/tag/exploits/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Report: Half of all exploits target Java</title><link>https://www.iphere.com/report-half-of-all-exploits-target-java</link> <comments>https://www.iphere.com/report-half-of-all-exploits-target-java#comments</comments> <pubDate>Thu, 06 Mar 2014 02:16:25 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Exploits]]></category> <category><![CDATA[Half]]></category> <category><![CDATA[Java]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Target]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-half-of-all-exploits-target-java</guid> <description><![CDATA[Once upon a time, Microsoft was the favorite target of malware developers. As Microsoft improved the defenses in its software, though, cybercrooks moved on to easier pickings. Adobe was a prime target for a while, but Adobe followed Microsoft’s lead and made its software more secure as well. According to data from the 2014 IBM [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-half-of-all-exploits-target-java/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>IBM X-Force Midyear Report: Vulnerabilities Up, Mobile Exploits Down</title><link>https://www.iphere.com/ibm-x-force-midyear-report-vulnerabilities-up-mobile-exploits-down</link> <comments>https://www.iphere.com/ibm-x-force-midyear-report-vulnerabilities-up-mobile-exploits-down#comments</comments> <pubDate>Thu, 20 Sep 2012 20:13:04 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Down]]></category> <category><![CDATA[Exploits]]></category> <category><![CDATA[Midyear]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Vulnerabilities]]></category> <category><![CDATA[XForce]]></category> <guid
isPermaLink="false">http://www.iphere.com/ibm-x-force-midyear-report-vulnerabilities-up-mobile-exploits-down</guid> <description><![CDATA[There has been an onslaught of newly disclosed vulnerabilities during the first half of 2012, according to a new report from IBM. Mobile vulnerabilities are conspicuously declining, however. Find out why. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/ibm-x-force-midyear-report-vulnerabilities-up-mobile-exploits-down/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Core Impact Adds Mobile Device Exploits, Widens Metasploit Integration</title><link>https://www.iphere.com/core-impact-adds-mobile-device-exploits-widens-metasploit-integration</link> <comments>https://www.iphere.com/core-impact-adds-mobile-device-exploits-widens-metasploit-integration#comments</comments> <pubDate>Sat, 06 Aug 2011 14:13:35 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Adds]]></category> <category><![CDATA[Core]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[Exploits]]></category> <category><![CDATA[Impact]]></category> <category><![CDATA[Integration]]></category> <category><![CDATA[Metasploit]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Widens]]></category> <guid
isPermaLink="false">http://www.iphere.com/core-impact-adds-mobile-device-exploits-widens-metasploit-integration</guid> <description><![CDATA[Core Security has introduced mobile device testing and measurement in the latest version of its Core IMPACT penetration testing software. Version 12 also improves Core&#8217; integration with the popular open source Metasploit Framework pen-testing tool. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/core-impact-adds-mobile-device-exploits-widens-metasploit-integration/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>