<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Hackers</title> <atom:link href="https://www.iphere.com/tag/hackers/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Lookout study: hackers target mobile attacks by region</title><link>https://www.iphere.com/lookout-study-hackers-target-mobile-attacks-by-region</link> <comments>https://www.iphere.com/lookout-study-hackers-target-mobile-attacks-by-region#comments</comments> <pubDate>Sat, 22 Feb 2014 02:17:25 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Attacks]]></category> <category><![CDATA[Hackers]]></category> <category><![CDATA[Lookout]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[region]]></category> <category><![CDATA[Study]]></category> <category><![CDATA[Target]]></category> <guid
isPermaLink="false">http://www.iphere.com/lookout-study-hackers-target-mobile-attacks-by-region</guid> <description><![CDATA[Mobile devices are prime targets for for cyber criminals, and a report by mobile security company Lookout reveals some surprising data about how they plot their attacks. Lookout collected data from more than 50 million users between January and December of 2013. It analyzed the information and broke it down by region and type of attack to get [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/lookout-study-hackers-target-mobile-attacks-by-region/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Microsoft India Store a Victim of Poor Data Security, Not Hackers</title><link>https://www.iphere.com/microsoft-india-store-a-victim-of-poor-data-security-not-hackers</link> <comments>https://www.iphere.com/microsoft-india-store-a-victim-of-poor-data-security-not-hackers#comments</comments> <pubDate>Mon, 20 Feb 2012 20:15:58 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Hackers]]></category> <category><![CDATA[India]]></category> <category><![CDATA[Microsoft]]></category> <category><![CDATA[Poor]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Store]]></category> <category><![CDATA[Victim]]></category> <guid
isPermaLink="false">http://www.iphere.com/microsoft-india-store-a-victim-of-poor-data-security-not-hackers</guid> <description><![CDATA[The online Microsoft Store in India was hacked – allegedly by a group of Chinese hackers. The big story, though, isn’t that the site was hacked, or that customer data was compromised and exposed by the attackers, but that the Microsoft Store was storing the data in clear text and didn’t take basic steps to [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/microsoft-india-store-a-victim-of-poor-data-security-not-hackers/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>