<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Security&#8217;s</title> <atom:link href="https://www.iphere.com/tag/securitys/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Hack My Google Glass: Security&#8217;s Next Big Worry?</title><link>https://www.iphere.com/hack-my-google-glass-securitys-next-big-worry</link> <comments>https://www.iphere.com/hack-my-google-glass-securitys-next-big-worry#comments</comments> <pubDate>Wed, 28 Aug 2013 14:16:03 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Glass]]></category> <category><![CDATA[Google]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[Next]]></category> <category><![CDATA[Security's]]></category> <category><![CDATA[Worry]]></category> <guid
isPermaLink="false">http://www.iphere.com/hack-my-google-glass-securitys-next-big-worry</guid> <description><![CDATA[Are wearable computing devices the new big security threat? That&#8217;s one question lingering after Lookout Security last month detailed an insidious hack attack against Google Glass: Just by getting Glass to &#8220;see&#8221; a malicious QR code, an attacker could force a connection to a malicious Wi-Fi or Bluetooth connection, then eavesdrop on all communications. Admittedly, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/hack-my-google-glass-securitys-next-big-worry/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Facebook breach highlights data security&#8217;s &#8220;weakest link&#8221; syndrome</title><link>https://www.iphere.com/facebook-breach-highlights-data-securitys-weakest-link-syndrome</link> <comments>https://www.iphere.com/facebook-breach-highlights-data-securitys-weakest-link-syndrome#comments</comments> <pubDate>Wed, 26 Jun 2013 20:13:00 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Breach]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Facebook]]></category> <category><![CDATA[Highlights]]></category> <category><![CDATA[link]]></category> <category><![CDATA[Security's]]></category> <category><![CDATA[syndrome]]></category> <category><![CDATA[weakest]]></category> <guid
isPermaLink="false">http://www.iphere.com/facebook-breach-highlights-data-securitys-weakest-link-syndrome</guid> <description><![CDATA[Facebook recently disclosed that a system glitch resulted in the exposure of sensitive personal data from as many as six million users. The impact from this particular breach seems relatively inconsequential, but it’s a sign of a larger problem when it comes to protecting personal data on the Web. Let’s start with a little about [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/facebook-breach-highlights-data-securitys-weakest-link-syndrome/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Easing Some Of Virtual Security&#8217;s Complexities</title><link>https://www.iphere.com/easing-some-of-virtual-securitys-complexities</link> <comments>https://www.iphere.com/easing-some-of-virtual-securitys-complexities#comments</comments> <pubDate>Mon, 06 Feb 2012 20:14:05 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Complexities]]></category> <category><![CDATA[Easing]]></category> <category><![CDATA[Security's]]></category> <category><![CDATA[Some]]></category> <category><![CDATA[Virtual]]></category> <guid
isPermaLink="false">http://www.iphere.com/easing-some-of-virtual-securitys-complexities</guid> <description><![CDATA[While virtualization and cloud computing pretty much dominate the IT world, security and compliance with IT standards are neither trivial concerns, nor going away anytime soon. But in some ways, security is easier to accomplish in virtual systems than in physical Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/easing-some-of-virtual-securitys-complexities/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Co3 Tackles One Of Security&#8217;s Hidden Costs</title><link>https://www.iphere.com/co3-tackles-one-of-securitys-hidden-costs</link> <comments>https://www.iphere.com/co3-tackles-one-of-securitys-hidden-costs#comments</comments> <pubDate>Sat, 17 Sep 2011 14:15:15 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Costs]]></category> <category><![CDATA[Hidden]]></category> <category><![CDATA[Security's]]></category> <category><![CDATA[Tackles]]></category> <guid
isPermaLink="false">http://www.iphere.com/co3-tackles-one-of-securitys-hidden-costs</guid> <description><![CDATA[Billions are being spent annually on protecting information, but Co3 Systems is offering a unique solution for what to do after a data breach occurs. The Cambridge, Mass., software-as-a-service (SaaS) startup is announcing an automated, repeatable way to prepare for data loss events, assess their potential impact, and generate and manage incident response plans more [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/co3-tackles-one-of-securitys-hidden-costs/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>