<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Life &#187; hacking</title>
	<atom:link href="https://www.informationlife.net/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.informationlife.net</link>
	<description>The latest Information Lifecycle Management (ILM) updates</description>
	<lastBuildDate>Wed, 30 Mar 2016 11:17:49 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.17</generator>
	<item>
		<title>How hackers can steal your credit card info</title>
		<link>https://www.informationlife.net/how-hackers-can-steal-credit-card-info/</link>
		<comments>https://www.informationlife.net/how-hackers-can-steal-credit-card-info/#comments</comments>
		<pubDate>Mon, 23 Dec 2013 08:48:48 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4853</guid>
		<description><![CDATA[<p>The holiday season means shopping at several retailers for many people, but how safe are you when you swipe your card? More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-hackers-can-steal-credit-card-info/">How hackers can steal your credit card info</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The holiday season means shopping at several retailers for many people, but how safe are you when you swipe your card? <a href="http://fox44.com/news/how-hackers-can-steal-your-credit-card-info">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-hackers-can-steal-credit-card-info/">How hackers can steal your credit card info</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/how-hackers-can-steal-credit-card-info/feed/</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
		<item>
		<title>Security of data is consumers&#8217; biggest fear</title>
		<link>https://www.informationlife.net/security-data-consumers-biggest-fear/</link>
		<comments>https://www.informationlife.net/security-data-consumers-biggest-fear/#comments</comments>
		<pubDate>Mon, 18 Nov 2013 10:22:30 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data theft]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4779</guid>
		<description><![CDATA[<p>In the week when Ireland experienced its biggest ever data hacking breach, a new survey obtained by the Irish Independent reveals that security concerns dwarf all others for consumers. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/security-data-consumers-biggest-fear/">Security of data is consumers&#8217; biggest fear</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>In the week when Ireland experienced its biggest ever data hacking breach, a new survey obtained by the Irish Independent reveals that security concerns dwarf all others for consumers. <a href="http://www.independent.ie/irish-news/security-of-data-is-consumers-biggest-fear-29759556.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/security-data-consumers-biggest-fear/">Security of data is consumers&#8217; biggest fear</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/security-data-consumers-biggest-fear/feed/</wfw:commentRss>
		<slash:comments>8</slash:comments>
		</item>
		<item>
		<title>Enterprise security: 10 tips to overcome hacker attacks</title>
		<link>https://www.informationlife.net/enterprise-security-10-tips-overcome-hacker-attacks/</link>
		<comments>https://www.informationlife.net/enterprise-security-10-tips-overcome-hacker-attacks/#comments</comments>
		<pubDate>Fri, 08 Nov 2013 11:55:13 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4750</guid>
		<description><![CDATA[<p>As hackers continue to invent and use new methods of stealing data, here are some tips and considerations that can help over a hacking attack. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/enterprise-security-10-tips-overcome-hacker-attacks/">Enterprise security: 10 tips to overcome hacker attacks</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>As hackers continue to invent and use new methods of stealing data, here are some tips and considerations that can help over a hacking attack. <a href="http://www.ciol.com/ciol/features/200343/enterprise-security-tips-hacker-attacks">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/enterprise-security-10-tips-overcome-hacker-attacks/">Enterprise security: 10 tips to overcome hacker attacks</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/enterprise-security-10-tips-overcome-hacker-attacks/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>How the word &#8216;hacker&#8217; got corrupted</title>
		<link>https://www.informationlife.net/how-word-hacker-got-corrupted/</link>
		<comments>https://www.informationlife.net/how-word-hacker-got-corrupted/#comments</comments>
		<pubDate>Tue, 09 Jul 2013 09:43:26 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4323</guid>
		<description><![CDATA[<p>What is generally called &#8220;hacking&#8221; today was originally called &#8220;cracking&#8221; in technical circles &#8211; as in cracking a safe. Hacking, in its original meaning, has nothing to do with malicious behavior. The term &#8220;hacker&#8221; seems to have originally developed decades ago at the Massachusetts Institute of Technology in the United States, a fabled source of...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-word-hacker-got-corrupted/">How the word &#8216;hacker&#8217; got corrupted</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>What is generally called &#8220;hacking&#8221; today was originally called &#8220;cracking&#8221; in technical circles &#8211; as in cracking a safe. Hacking, in its original meaning, has nothing to do with malicious behavior.</p>
<p>The term &#8220;hacker&#8221; seems to have originally developed decades ago at the Massachusetts Institute of Technology in the United States, a fabled source of geek wisdom and wizardry. There a hacker was a fairly general term for any kind of enthusiastic amateur expert. A computer hacker was someone who really knew computers, loved computers, and threw their time wholeheartedly into exploring them and their possibilities. <a href="http://www.smh.com.au/it-pro/security-it/how-the-word-hacker-got-corrupted-20130709-hv0rt.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-word-hacker-got-corrupted/">How the word &#8216;hacker&#8217; got corrupted</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/how-word-hacker-got-corrupted/feed/</wfw:commentRss>
		<slash:comments>14</slash:comments>
		</item>
		<item>
		<title>Edward Snowden: how the spy story of the age leaked out</title>
		<link>https://www.informationlife.net/edward-snowden-spy-story-age-leaked/</link>
		<comments>https://www.informationlife.net/edward-snowden-spy-story-age-leaked/#comments</comments>
		<pubDate>Wed, 19 Jun 2013 23:32:53 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4147</guid>
		<description><![CDATA[<p>When Ed arrived in Hong Kong, he was carrying four computers that enabled him to gain access to US govt’s most highly-classified secrets. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/edward-snowden-spy-story-age-leaked/">Edward Snowden: how the spy story of the age leaked out</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>When Ed arrived in Hong Kong, he was carrying four computers that enabled him to gain access to US govt’s most highly-classified secrets. <a href="http://www.guardian.co.uk/world/2013/jun/11/edward-snowden-nsa-whistleblower-profile">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/edward-snowden-spy-story-age-leaked/">Edward Snowden: how the spy story of the age leaked out</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/edward-snowden-spy-story-age-leaked/feed/</wfw:commentRss>
		<slash:comments>69</slash:comments>
		</item>
		<item>
		<title>Password can stop a mobile hack attack</title>
		<link>https://www.informationlife.net/password-can-stop-mobile-hack-attack/</link>
		<comments>https://www.informationlife.net/password-can-stop-mobile-hack-attack/#comments</comments>
		<pubDate>Tue, 28 May 2013 13:25:07 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4006</guid>
		<description><![CDATA[<p>Putting a password on your smartphone is a simple step to reduce personal information or identity being stolen by cyber criminals. According to Symantec&#8217;s latest cyber-crime report, there was a 42 per cent increase in targeted cyber attacks in 2012, with manufacturing and finance, insurance and real estate being the top two industries attacked by...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/password-can-stop-mobile-hack-attack/">Password can stop a mobile hack attack</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2013/05/Password-can-stop-a-mobile-hack-attack2.jpg"><img class="alignleft size-thumbnail wp-image-4013"  src="http://www.informationlife.net/wp-content/uploads/2013/05/Password-can-stop-a-mobile-hack-attack2-150x150.jpg" alt="" width="150" height="150" /></a>Putting a password on your smartphone is a simple step to reduce personal information or identity being stolen by cyber criminals.</p>
<p>According to Symantec&#8217;s latest cyber-crime report, there was a 42 per cent increase in targeted cyber attacks in 2012, with manufacturing and finance, insurance and real estate being the top two industries attacked by cyber criminals.</p>
<p>According to experts, the easiest way to protect personal information was to have a password. Smartphone thefts were becoming more prevalent and a password made it more difficult for thieves to access personal information. <a href="http://www.bayofplentytimes.co.nz/news/password-can-stop-mobile-hack-attack/1884742/">More&gt;&gt;</a></p>
<p><em>Image courtesy of Stuart Miles at <a href="http://www.freedigitalphotos.net/" target="_blank">FreeDigitalPhotos.net</a></em></p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/password-can-stop-mobile-hack-attack/">Password can stop a mobile hack attack</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/password-can-stop-mobile-hack-attack/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>The wide world of hacking in China</title>
		<link>https://www.informationlife.net/the-wide-world-hacking-china/</link>
		<comments>https://www.informationlife.net/the-wide-world-hacking-china/#comments</comments>
		<pubDate>Fri, 24 May 2013 10:15:39 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=3992</guid>
		<description><![CDATA[<p>The Chinese have been known to be experts at hacking for quite some time. But what might surprise some is that it&#8217;s epidemic across the country in all levels of society. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/the-wide-world-hacking-china/">The wide world of hacking in China</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The Chinese have been known to be experts at hacking for quite some time. But what might surprise some is that it&#8217;s epidemic across the country in all levels of society. <a href="http://news.cnet.com/8301-1009_3-57585877-83/the-wide-world-of-hacking-in-china/">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/the-wide-world-hacking-china/">The wide world of hacking in China</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/the-wide-world-hacking-china/feed/</wfw:commentRss>
		<slash:comments>10</slash:comments>
		</item>
		<item>
		<title>Chinese hackers pick up where they left off with more US attacks</title>
		<link>https://www.informationlife.net/chinese-hackers-pick-left-us-attacks/</link>
		<comments>https://www.informationlife.net/chinese-hackers-pick-left-us-attacks/#comments</comments>
		<pubDate>Tue, 21 May 2013 09:15:00 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=3989</guid>
		<description><![CDATA[<p>Just three months after alleged state-sponsored Chinese hackers ceased activity, their work has been reignited anew in the US. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/chinese-hackers-pick-left-us-attacks/">Chinese hackers pick up where they left off with more US attacks</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Just three months after alleged state-sponsored Chinese hackers ceased activity, their work has been reignited anew in the US. <a href="http://www.wired.co.uk/news/archive/2013-05/20/china-resumes-hacking">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/chinese-hackers-pick-left-us-attacks/">Chinese hackers pick up where they left off with more US attacks</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/chinese-hackers-pick-left-us-attacks/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>Top 10 Hacking Countries</title>
		<link>https://www.informationlife.net/top-10-hacking-countries/</link>
		<comments>https://www.informationlife.net/top-10-hacking-countries/#comments</comments>
		<pubDate>Wed, 24 Apr 2013 10:22:41 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=3780</guid>
		<description><![CDATA[<p>When it comes to computer-attack traffic, China deserves the bulk of the blame, but not all of it. Ten countries including China accounted for three-quarters of the world&#8217;s cyber-assault traffic during the last quarter of 2012, according to Akamai Technologies, which helps companies speed the delivery of online content. While detecting the source of an...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-10-hacking-countries/">Top 10 Hacking Countries</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2013/04/Top-10-Hacking-Countries.jpg"><img class="size-thumbnail wp-image-3781  alignleft"  src="http://www.informationlife.net/wp-content/uploads/2013/04/Top-10-Hacking-Countries-150x150.jpg" alt="Top 10 Hacking Countries" width="150" height="150" /></a></p>
<p>When it comes to computer-attack traffic, China deserves the bulk of the blame, but not all of it.</p>
<p>Ten countries including China accounted for three-quarters of the world&#8217;s cyber-assault traffic during the last quarter of 2012, according to Akamai Technologies, which helps companies speed the delivery of online content.</p>
<p>While detecting the source of an attack can be difficult &#8212; cyber criminals can launch online assaults from infected computers around the world &#8212; knowing the country of origin can provide an important clue in ultimately determining the identity of a hacker.</p>
<p>Take a look at which countries made the top 10 list. <a href="http://www.bloomberg.com/slideshow/2013-04-23/top-ten-hacking-countries.html#slide2">More&gt;&gt;</a></p>
<p><em>Image courtesy of Idea go at <a href="http://www.freedigitalphotos.net/" target="_blank">FreeDigitalPhotos.net</a></em></p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-10-hacking-countries/">Top 10 Hacking Countries</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/top-10-hacking-countries/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
	</channel>
</rss>
