<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Hack</title> <atom:link href="https://www.iphere.com/tag/hack/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>eBay hack could result in social engineering schemes</title><link>https://www.iphere.com/ebay-hack-could-result-in-social-engineering-schemes</link> <comments>https://www.iphere.com/ebay-hack-could-result-in-social-engineering-schemes#comments</comments> <pubDate>Thu, 22 May 2014 02:17:20 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Could]]></category> <category><![CDATA[eBay]]></category> <category><![CDATA[Engineering]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[result]]></category> <category><![CDATA[schemes]]></category> <category><![CDATA[Social]]></category> <guid
isPermaLink="false">http://www.iphere.com/ebay-hack-could-result-in-social-engineering-schemes</guid> <description><![CDATA[You’ve probably heard by now that eBay is the latest victim of a massive data breach. The popular site has asked users to reset their passwords as a precautionary measure, but the data that matters most is already compromised, and there is nothing you can do to “reset” it. Details are still sketchy—sort of standard [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/ebay-hack-could-result-in-social-engineering-schemes/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Yahoo Mail hack teaches a valuable lesson</title><link>https://www.iphere.com/yahoo-mail-hack-teaches-a-valuable-lesson</link> <comments>https://www.iphere.com/yahoo-mail-hack-teaches-a-valuable-lesson#comments</comments> <pubDate>Sat, 01 Feb 2014 08:17:02 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[Lesson]]></category> <category><![CDATA[Mail]]></category> <category><![CDATA[teaches]]></category> <category><![CDATA[valuable]]></category> <category><![CDATA[Yahoo]]></category> <guid
isPermaLink="false">http://www.iphere.com/yahoo-mail-hack-teaches-a-valuable-lesson</guid> <description><![CDATA[Yahoo Mail was hacked. Details are sketchy in terms of just how many Yahoo Mail accounts have been compromised. Yahoo suggests that the attackers most likely gained access to the data through a third-party database outside of Yahoo control. Regardless of how the compromise occurred, there is a lesson to be learned here…again. Hacks happen, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/yahoo-mail-hack-teaches-a-valuable-lesson/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Apple Fingerprint Hack: A Great Reminder</title><link>https://www.iphere.com/apple-fingerprint-hack-a-great-reminder</link> <comments>https://www.iphere.com/apple-fingerprint-hack-a-great-reminder#comments</comments> <pubDate>Mon, 30 Sep 2013 08:16:45 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Apple]]></category> <category><![CDATA[fingerprint]]></category> <category><![CDATA[Great]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[Reminder]]></category> <guid
isPermaLink="false">http://www.iphere.com/apple-fingerprint-hack-a-great-reminder</guid> <description><![CDATA[Of course it was just a matter of time before Apple&#8217;s fingerprint reader was hacked. It&#8217;s just impressive that the Chaos Computer Club did it quite so quickly. And it&#8217;s a great reminder that using fingerprints as an authentication mechanism is simply a bad idea, especially in the enterprise. In the words of the club&#8217;s [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/apple-fingerprint-hack-a-great-reminder/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Hack of iPhone 5s fingerprint authentication is irrelevant</title><link>https://www.iphere.com/hack-of-iphone-5s-fingerprint-authentication-is-irrelevant</link> <comments>https://www.iphere.com/hack-of-iphone-5s-fingerprint-authentication-is-irrelevant#comments</comments> <pubDate>Tue, 24 Sep 2013 20:14:26 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[fingerprint]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[iPhone]]></category> <category><![CDATA[irrelevant]]></category> <guid
isPermaLink="false">http://www.iphere.com/hack-of-iphone-5s-fingerprint-authentication-is-irrelevant</guid> <description><![CDATA[The iPhone 5s officially launched last Friday, but already a group of hackers has successfully cracked the fingerprint authentication. In spite of the hype surrounding this news, though, the hack of Touch ID idoesn’t change the fact that the fingerprint sensor on the iPhone 5s is the best thing that’s happened to iPhone security so [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/hack-of-iphone-5s-fingerprint-authentication-is-irrelevant/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Lessons Learned From N.Y. Times Hack Attack</title><link>https://www.iphere.com/lessons-learned-from-n-y-times-hack-attack</link> <comments>https://www.iphere.com/lessons-learned-from-n-y-times-hack-attack#comments</comments> <pubDate>Fri, 30 Aug 2013 14:13:19 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Attack]]></category> <category><![CDATA[from]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[Learned]]></category> <category><![CDATA[Lessons]]></category> <category><![CDATA[N.Y.]]></category> <category><![CDATA[Times]]></category> <guid
isPermaLink="false">http://www.iphere.com/lessons-learned-from-n-y-times-hack-attack</guid> <description><![CDATA[What might The New York Times &#8212; and to a lesser extent, Twitter &#8212; have done differently to prevent Tuesday&#8217;s hack attack that disrupted access to their sites? The disruptions began after the Syrian Electronic Army (SEA), a group of hackers that back Syrian President Bashar al-Assad in the country&#8217;s civil war, hacked into the [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/lessons-learned-from-n-y-times-hack-attack/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Hack of New York Times holds a lesson for all businesses</title><link>https://www.iphere.com/hack-of-new-york-times-holds-a-lesson-for-all-businesses</link> <comments>https://www.iphere.com/hack-of-new-york-times-holds-a-lesson-for-all-businesses#comments</comments> <pubDate>Thu, 29 Aug 2013 08:13:09 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Businesses]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[Holds]]></category> <category><![CDATA[Lesson]]></category> <category><![CDATA[Times]]></category> <category><![CDATA[York]]></category> <guid
isPermaLink="false">http://www.iphere.com/hack-of-new-york-times-holds-a-lesson-for-all-businesses</guid> <description><![CDATA[The New York Times, Twitter, and other major sites were knocked offline yesterday in an attack by the Syrian Electronic Army (SEA). While there is certainly a political motivation to the hacks, there is an underlying lesson that all businesses should learn. Apparently, the latest attack was the result of sites being redirected at the [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/hack-of-new-york-times-holds-a-lesson-for-all-businesses/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Hack My Google Glass: Security&#8217;s Next Big Worry?</title><link>https://www.iphere.com/hack-my-google-glass-securitys-next-big-worry</link> <comments>https://www.iphere.com/hack-my-google-glass-securitys-next-big-worry#comments</comments> <pubDate>Wed, 28 Aug 2013 14:16:03 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Glass]]></category> <category><![CDATA[Google]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[Next]]></category> <category><![CDATA[Security's]]></category> <category><![CDATA[Worry]]></category> <guid
isPermaLink="false">http://www.iphere.com/hack-my-google-glass-securitys-next-big-worry</guid> <description><![CDATA[Are wearable computing devices the new big security threat? That&#8217;s one question lingering after Lookout Security last month detailed an insidious hack attack against Google Glass: Just by getting Glass to &#8220;see&#8221; a malicious QR code, an attacker could force a connection to a malicious Wi-Fi or Bluetooth connection, then eavesdrop on all communications. Admittedly, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/hack-my-google-glass-securitys-next-big-worry/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>China To America: You Hack Us, Too</title><link>https://www.iphere.com/china-to-america-you-hack-us-too</link> <comments>https://www.iphere.com/china-to-america-you-hack-us-too#comments</comments> <pubDate>Sat, 08 Jun 2013 08:14:37 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[America]]></category> <category><![CDATA[China]]></category> <category><![CDATA[Hack]]></category> <guid
isPermaLink="false">http://www.iphere.com/china-to-america-you-hack-us-too</guid> <description><![CDATA[Numerous online attacks against China have been traced back to U.S. servers. But unlike authorities in the United States, the Chinese government chooses to not point the finger, according to the head of the country&#8217;s computer emergency response team. &#8220;We have mountains of data, if we wanted to accuse the U.S., but it&#8217;s not helpful [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/china-to-america-you-hack-us-too/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Evernote hack shows that passwords aren&#8217;t good enough</title><link>https://www.iphere.com/evernote-hack-shows-that-passwords-arent-good-enough</link> <comments>https://www.iphere.com/evernote-hack-shows-that-passwords-arent-good-enough#comments</comments> <pubDate>Sun, 10 Mar 2013 02:14:16 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Aren't]]></category> <category><![CDATA[Enough]]></category> <category><![CDATA[Evernote]]></category> <category><![CDATA[Good]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[passwords]]></category> <category><![CDATA[Shows]]></category> <guid
isPermaLink="false">http://www.iphere.com/evernote-hack-shows-that-passwords-arent-good-enough</guid> <description><![CDATA[Evernote revealed over the weekend that it was the victim of a data breach, emailing users and posting a notice on its Web site that attackers had gained access to usernames, email addresses, and encrypted passwords associated with Evernote accounts. As a precaution, Evernote forced all 50 million users to reset their passwords. That&#8217;s a good [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/evernote-hack-shows-that-passwords-arent-good-enough/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Certificate Authority Hack Points To Bigger Problems</title><link>https://www.iphere.com/certificate-authority-hack-points-to-bigger-problems</link> <comments>https://www.iphere.com/certificate-authority-hack-points-to-bigger-problems#comments</comments> <pubDate>Wed, 07 Sep 2011 14:17:53 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Authority]]></category> <category><![CDATA[Bigger]]></category> <category><![CDATA[Certificate]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[Points]]></category> <category><![CDATA[Problems]]></category> <guid
isPermaLink="false">http://www.iphere.com/certificate-authority-hack-points-to-bigger-problems</guid> <description><![CDATA[What with hurricanes, earthquakes and Kardashian weddings dominating recent media coverage, you may have missed the news about a recent security breach that clearly displayed a serious weakness in one of the core security mechanisms of the Internet. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/certificate-authority-hack-points-to-bigger-problems/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>