<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Report</title> <atom:link href="https://www.iphere.com/tag/report/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Report: Many Windows automatic updates are thwarted by user inaction</title><link>https://www.iphere.com/report-many-windows-automatic-updates-are-thwarted-by-user-inaction</link> <comments>https://www.iphere.com/report-many-windows-automatic-updates-are-thwarted-by-user-inaction#comments</comments> <pubDate>Wed, 29 Oct 2014 08:12:42 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Automatic]]></category> <category><![CDATA[inaction]]></category> <category><![CDATA[Many]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[thwarted]]></category> <category><![CDATA[Updates]]></category> <category><![CDATA[user]]></category> <category><![CDATA[Windows]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-many-windows-automatic-updates-are-thwarted-by-user-inaction</guid> <description><![CDATA[You can&#8217;t have good security unless you keep your operating system and applications current, with all of the latest patches and updates. Microsoft makes it easy for Windows users with its automatic updates, and yet a new report finds that many PCs with automatic updates enabled are nevertheless not actually up to date. The OPSWAT [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-many-windows-automatic-updates-are-thwarted-by-user-inaction/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Report: Huge spike in mobile malware targets Android, especially mobile payments</title><link>https://www.iphere.com/report-huge-spike-in-mobile-malware-targets-android-especially-mobile-payments</link> <comments>https://www.iphere.com/report-huge-spike-in-mobile-malware-targets-android-especially-mobile-payments#comments</comments> <pubDate>Tue, 07 Oct 2014 14:13:12 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Android]]></category> <category><![CDATA[especially]]></category> <category><![CDATA[Huge]]></category> <category><![CDATA[Malware]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[payments]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Spike]]></category> <category><![CDATA[Targets]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-huge-spike-in-mobile-malware-targets-android-especially-mobile-payments</guid> <description><![CDATA[Two very predictable traits drive cybercriminals: First, they tend to focus on targets with the highest odds of success. Second, they prefer attacks that generate profit. A new joint report from Kaspersky Lab and INTERPOL underscores how these two factors contribute to concerning trends in mobile threats.  The Mobile Cyber Threats report analyzes mobile malware [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-huge-spike-in-mobile-malware-targets-android-especially-mobile-payments/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Report: Businesses at risk from unreported mobile device theft</title><link>https://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft</link> <comments>https://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft#comments</comments> <pubDate>Thu, 04 Sep 2014 14:13:30 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Businesses]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[from]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Risk]]></category> <category><![CDATA[Theft]]></category> <category><![CDATA[unreported]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft</guid> <description><![CDATA[Part of a company embracing mobile devices is ensuring tools are in place to remotely wipe sensitive data from a smartphone or tablet if it is lost or stolen. A new study from Kaspersky Lab identifies an obvious and concerning fact, though—those tools offer little value if the missing device isn’t reported. Kaspersky Lab surveyed [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Report: Consumers concerned about online threats but do little to protect themselves</title><link>https://www.iphere.com/report-consumers-concerned-about-online-threats-but-do-little-to-protect-themselves</link> <comments>https://www.iphere.com/report-consumers-concerned-about-online-threats-but-do-little-to-protect-themselves#comments</comments> <pubDate>Mon, 25 Aug 2014 20:13:02 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[About]]></category> <category><![CDATA[concerned]]></category> <category><![CDATA[Consumers]]></category> <category><![CDATA[Little]]></category> <category><![CDATA[Online]]></category> <category><![CDATA[Protect]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[themselves]]></category> <category><![CDATA[Threats]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-consumers-concerned-about-online-threats-but-do-little-to-protect-themselves</guid> <description><![CDATA[Remember banking before the Internet? You received printed bank statements in the mail and had to manually reconcile the information with the written register in your checkbook. I don’t miss it, but I also recognize the convenience of accessing my financial data through a bank website comes with some serious security considerations. According to a new [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-consumers-concerned-about-online-threats-but-do-little-to-protect-themselves/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Report: Android gaining on iOS in enterprise</title><link>https://www.iphere.com/report-android-gaining-on-ios-in-enterprise</link> <comments>https://www.iphere.com/report-android-gaining-on-ios-in-enterprise#comments</comments> <pubDate>Thu, 14 Aug 2014 02:14:14 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Android]]></category> <category><![CDATA[Enterprise]]></category> <category><![CDATA[Gaining]]></category> <category><![CDATA[Report]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-android-gaining-on-ios-in-enterprise</guid> <description><![CDATA[Most businesses have embraced mobile technologies, but many are still on the low end of the mobile maturity curve. Good Technology has published its second-quarter Mobility Index Report, and it reveals some interesting trends regarding the mobile platforms and apps businesses are deploying. Good Technology aggregated data from customers around the world and monitored app and [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-android-gaining-on-ios-in-enterprise/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Brandpost: Report: Phishing scams increasingly using mobile apps to bait victims</title><link>https://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims</link> <comments>https://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims#comments</comments> <pubDate>Wed, 07 May 2014 20:17:57 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Apps]]></category> <category><![CDATA[bait]]></category> <category><![CDATA[Brandpost]]></category> <category><![CDATA[increasingly]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Phishing]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[scams]]></category> <category><![CDATA[Using]]></category> <category><![CDATA[victims]]></category> <guid
isPermaLink="false">http://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims</guid> <description><![CDATA[When it comes down to it, spam and phishing scams rely primarily on exploiting trust. If the attacker can find a way to make the message appear to be from a known source, the odds that a user will take the bait are much higher. This has led to malware infections that access your contacts [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Report: Attackers have their sights set on the cloud</title><link>https://www.iphere.com/report-attackers-have-their-sights-set-on-the-cloud</link> <comments>https://www.iphere.com/report-attackers-have-their-sights-set-on-the-cloud#comments</comments> <pubDate>Thu, 24 Apr 2014 08:13:57 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Attackers]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[sights]]></category> <category><![CDATA[Their]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-attackers-have-their-sights-set-on-the-cloud</guid> <description><![CDATA[If you want to catch trout, you have to fish where the trout swim. That same logic applies for cyber criminals—they will focus their efforts wherever there is a fair chance of finding targets to prey on. This is underscored by a new report from Alert Logic that reveals a dramatic rise in cloud-based attacks [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-attackers-have-their-sights-set-on-the-cloud/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>HP report: 80 percent of app vulnerabilities are really your fault</title><link>https://www.iphere.com/hp-report-80-percent-of-app-vulnerabilities-are-really-your-fault</link> <comments>https://www.iphere.com/hp-report-80-percent-of-app-vulnerabilities-are-really-your-fault#comments</comments> <pubDate>Sat, 12 Apr 2014 02:13:51 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Fault]]></category> <category><![CDATA[Percent]]></category> <category><![CDATA[Really]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Vulnerabilities]]></category> <guid
isPermaLink="false">http://www.iphere.com/hp-report-80-percent-of-app-vulnerabilities-are-really-your-fault</guid> <description><![CDATA[Let&#8217;s be clear: There is no such thing as an invulnerable application. Some have more critical vulnerabilities than others as we discovered this week with the Heartbleed bug, but any application can be exploited given a dedicated attacker. According to the HP 2013 Cyber Risk Report, though, the application itself is not to blame for [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/hp-report-80-percent-of-app-vulnerabilities-are-really-your-fault/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Network Operators Prefer Open Source SDN: Report</title><link>https://www.iphere.com/network-operators-prefer-open-source-sdn-report</link> <comments>https://www.iphere.com/network-operators-prefer-open-source-sdn-report#comments</comments> <pubDate>Wed, 19 Mar 2014 20:13:42 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Open]]></category> <category><![CDATA[Operators]]></category> <category><![CDATA[Prefer]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Source]]></category> <guid
isPermaLink="false">http://www.iphere.com/network-operators-prefer-open-source-sdn-report</guid> <description><![CDATA[No surprise that OpenDaylight-sponsored study shows strong interest in open source software-defined networking. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/network-operators-prefer-open-source-sdn-report/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Report: Average of 82,000 new malware threats per day in 2013</title><link>https://www.iphere.com/report-average-of-82000-new-malware-threats-per-day-in-2013</link> <comments>https://www.iphere.com/report-average-of-82000-new-malware-threats-per-day-in-2013#comments</comments> <pubDate>Wed, 19 Mar 2014 08:13:09 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[2013]]></category> <category><![CDATA[82000]]></category> <category><![CDATA[Average]]></category> <category><![CDATA[Malware]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Threats]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-average-of-82000-new-malware-threats-per-day-in-2013</guid> <description><![CDATA[Malware has been around for more than 40 years,  but according to a report from Panda Security 20 percent of all of the malware that&#8217;s ever existed was created in 2013. That’s the equivalent of 30 million new malware threats in one year, or about 82,000 per day. Given that context, you should probably consider yourself lucky your [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-average-of-82000-new-malware-threats-per-day-in-2013/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>