<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Vulnerabilities</title> <atom:link href="https://www.iphere.com/tag/vulnerabilities/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>HP report: 80 percent of app vulnerabilities are really your fault</title><link>https://www.iphere.com/hp-report-80-percent-of-app-vulnerabilities-are-really-your-fault</link> <comments>https://www.iphere.com/hp-report-80-percent-of-app-vulnerabilities-are-really-your-fault#comments</comments> <pubDate>Sat, 12 Apr 2014 02:13:51 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Fault]]></category> <category><![CDATA[Percent]]></category> <category><![CDATA[Really]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Vulnerabilities]]></category> <guid
isPermaLink="false">http://www.iphere.com/hp-report-80-percent-of-app-vulnerabilities-are-really-your-fault</guid> <description><![CDATA[Let&#8217;s be clear: There is no such thing as an invulnerable application. Some have more critical vulnerabilities than others as we discovered this week with the Heartbleed bug, but any application can be exploited given a dedicated attacker. According to the HP 2013 Cyber Risk Report, though, the application itself is not to blame for [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/hp-report-80-percent-of-app-vulnerabilities-are-really-your-fault/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Critical Infrastructure Vulnerabilities Unearthed</title><link>https://www.iphere.com/critical-infrastructure-vulnerabilities-unearthed</link> <comments>https://www.iphere.com/critical-infrastructure-vulnerabilities-unearthed#comments</comments> <pubDate>Thu, 31 Oct 2013 08:18:53 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Infrastructure]]></category> <category><![CDATA[Unearthed]]></category> <category><![CDATA[Vulnerabilities]]></category> <guid
isPermaLink="false">http://www.iphere.com/critical-infrastructure-vulnerabilities-unearthed</guid> <description><![CDATA[Researchers find 25 flaws in products used in power and water systems that attackers could exploit. In a separate study, researchers find vulnerabilities in a widely used vessel tracking system. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/critical-infrastructure-vulnerabilities-unearthed/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Java Vulnerabilities Pervasive In The Enterprise</title><link>https://www.iphere.com/java-vulnerabilities-pervasive-in-the-enterprise</link> <comments>https://www.iphere.com/java-vulnerabilities-pervasive-in-the-enterprise#comments</comments> <pubDate>Sat, 20 Jul 2013 08:13:09 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Enterprise]]></category> <category><![CDATA[Java]]></category> <category><![CDATA[Pervasive]]></category> <category><![CDATA[Vulnerabilities]]></category> <guid
isPermaLink="false">http://www.iphere.com/java-vulnerabilities-pervasive-in-the-enterprise</guid> <description><![CDATA[Bit 9 study shows that most enterprises run outdated, vulnerable versions of Java. Less than 1 percent run the latest version. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/java-vulnerabilities-pervasive-in-the-enterprise/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>IBM X-Force Midyear Report: Vulnerabilities Up, Mobile Exploits Down</title><link>https://www.iphere.com/ibm-x-force-midyear-report-vulnerabilities-up-mobile-exploits-down</link> <comments>https://www.iphere.com/ibm-x-force-midyear-report-vulnerabilities-up-mobile-exploits-down#comments</comments> <pubDate>Thu, 20 Sep 2012 20:13:04 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Down]]></category> <category><![CDATA[Exploits]]></category> <category><![CDATA[Midyear]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Vulnerabilities]]></category> <category><![CDATA[XForce]]></category> <guid
isPermaLink="false">http://www.iphere.com/ibm-x-force-midyear-report-vulnerabilities-up-mobile-exploits-down</guid> <description><![CDATA[There has been an onslaught of newly disclosed vulnerabilities during the first half of 2012, according to a new report from IBM. Mobile vulnerabilities are conspicuously declining, however. Find out why. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/ibm-x-force-midyear-report-vulnerabilities-up-mobile-exploits-down/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Research: New SOHO Router Vulnerabilities May Put Enterprises at Risk</title><link>https://www.iphere.com/research-new-soho-router-vulnerabilities-may-put-enterprises-at-risk</link> <comments>https://www.iphere.com/research-new-soho-router-vulnerabilities-may-put-enterprises-at-risk#comments</comments> <pubDate>Mon, 09 Jul 2012 20:13:16 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Enterprises]]></category> <category><![CDATA[Research]]></category> <category><![CDATA[Risk]]></category> <category><![CDATA[Router]]></category> <category><![CDATA[SOHO]]></category> <category><![CDATA[Vulnerabilities]]></category> <guid
isPermaLink="false">http://www.iphere.com/research-new-soho-router-vulnerabilities-may-put-enterprises-at-risk</guid> <description><![CDATA[A researcher will present findings at Black Hat later this month regarding a new vulnerability in small office, home office wireless routers that gives an attacker root-level access, along with the ability to extract arbitrary files from the router file systems, including plain-text passwords. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/research-new-soho-router-vulnerabilities-may-put-enterprises-at-risk/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>