<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Weaknesses</title> <atom:link href="https://www.iphere.com/tag/weaknesses/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Black Hat Will Once Again Show Our Security Weaknesses</title><link>https://www.iphere.com/black-hat-will-once-again-show-our-security-weaknesses</link> <comments>https://www.iphere.com/black-hat-will-once-again-show-our-security-weaknesses#comments</comments> <pubDate>Tue, 02 Aug 2011 02:13:52 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Again]]></category> <category><![CDATA[Black]]></category> <category><![CDATA[Once]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Show]]></category> <category><![CDATA[Weaknesses]]></category> <guid
isPermaLink="false">http://www.iphere.com/black-hat-will-once-again-show-our-security-weaknesses</guid> <description><![CDATA[The most important thing about Black Hat is the reality check it provides on just how insecure everything really is, from computers to networks to mobile devices to industrial and other systems that are now increasingly connected and exposed. And this week&#8217;s Black Hat will be no exception, as several scheduled demos will display just [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/black-hat-will-once-again-show-our-security-weaknesses/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>EAPeak Tests Wireless Networks For Authentication Weaknesses</title><link>https://www.iphere.com/eapeak-tests-wireless-networks-for-authentication-weaknesses</link> <comments>https://www.iphere.com/eapeak-tests-wireless-networks-for-authentication-weaknesses#comments</comments> <pubDate>Fri, 10 Jun 2011 02:14:26 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[EAPeak]]></category> <category><![CDATA[Networks]]></category> <category><![CDATA[Tests]]></category> <category><![CDATA[Weaknesses]]></category> <category><![CDATA[Wireless]]></category> <guid
isPermaLink="false">http://www.iphere.com/eapeak-tests-wireless-networks-for-authentication-weaknesses</guid> <description><![CDATA[A free new tool from security vendor SecureState may make it possible for wireless network administrators and security consultants to verify how strong their wireless authentication is, and whether it is possible for attackers to easily penetrate their network. EAPeak is a simple Python toolkit that will monitor access attempts to a wireless network and [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/eapeak-tests-wireless-networks-for-authentication-weaknesses/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>