<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>LIVE HACKING</title>
	<atom:link href="http://www.livehacking.com/feed/" rel="self" type="application/rss+xml"/>
	<link>http://www.livehacking.com</link>
	<description>Ethical Hacking | Penetration Testing</description>
	<lastBuildDate>Tue, 24 Nov 2015 02:40:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.7.2</generator>
	<item>
		<title>Nmap 7 Released!</title>
		<link>http://www.livehacking.com/2015/11/23/nmap-7-released/</link>
		
		<dc:creator><![CDATA[Live Hacking]]></dc:creator>
		<pubDate>Tue, 24 Nov 2015 02:40:11 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[nmap]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=6042</guid>

					<description><![CDATA[Nmap project released Nmap 7 after three years and half development. The new version of Nmap had more 100 contributors and 3,200 code commits since Nmap 6. The new version has 171 Nmap Scripting Engine (NSE) and supports fully IPv6 from host discovery to port scanning to OS detection. Nmap 7 detailed improvements is available [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Apple fixes security vulnerabilities in Safari, OS X, iOS and Apple TV</title>
		<link>http://www.livehacking.com/2015/04/09/apple-fixes-security-vulnerabilities-in-safari-os-x-ios-and-apple-tv/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Thu, 09 Apr 2015 07:37:20 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Apple TV]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[OS X]]></category>
		<category><![CDATA[Safari]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=6030</guid>

					<description><![CDATA[(LiveHacking.Com) – Apple has released a massive set of security fixes to address vulnerabilities in OS X, iOS, Safari, and Apple TV. The update for OS X is largest of all the patches and addresses 80 unique vulnerabilities. The OS X Yosemite v10.10.3 update is available for OS X Yosemite v10.10 to v10.10.2, while Security Update 2015-004 [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>The OpenSSL project releases new versions of its software to squash 12 security vulnerabilities</title>
		<link>http://www.livehacking.com/2015/03/19/new-versions-openssl-to-squash-12-security-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Thu, 19 Mar 2015 14:56:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[FREAK]]></category>
		<category><![CDATA[Openssl]]></category>
		<category><![CDATA[RSA]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=6025</guid>

					<description><![CDATA[(LiveHacking.Com) – The OpenSSL Project announced on March 16th that it would make a new release of its OpenSSL suite to fix a number security defects. As promised the project published three new versions today, OpenSSL versions 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf. The highest severity defect fixed by these releases is classified as High. Before looking at the defects [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>FREAK vulnerability weakens secure Web sites</title>
		<link>http://www.livehacking.com/2015/03/04/freak/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Wed, 04 Mar 2015 09:24:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[FREAK]]></category>
		<category><![CDATA[RSA]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=6020</guid>

					<description><![CDATA[(LiveHacking.Com) – FREAK (or &#8216;Factoring attack on RSA-EXPORT Keys&#8217;) is a newly disclosed vulnerability that can force browsers into using weaker encryption keys. Once the connection is using weaker keys then the traffic can be cracked relatively quickly. This then exposes all the information that was being sent over the secure connection. The vulnerability stems directly [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>WP-Slimstat vulnerability exposes WordPress websites to SQL injection attacks</title>
		<link>http://www.livehacking.com/2015/02/25/wp-slimstat-vulnerability/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Wed, 25 Feb 2015 11:37:19 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[SQL injection]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=6014</guid>

					<description><![CDATA[(LiveHacking.Com) – A recent security advisory from Sucri has revealed that the popular WordPress plugin WP-Slimstat is vulnerable to SQL injection attacks because of a weak secret key. If exploited fully the bug could allow hackers to use SQL injection attacks to download sensitive information from a susceptible site&#8217;s database, including username, and (hopefully) hashed passwords. According to Sucri [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Google backpedals on its arbitrary vulnerability disclosure policy</title>
		<link>http://www.livehacking.com/2015/02/14/google-backpedals-on-its-arbitrary-vulnerability-disclosure-policy/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Sat, 14 Feb 2015 10:58:46 +0000</pubDate>
				<category><![CDATA[Google]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Zero Day]]></category>
		<category><![CDATA[Zero day exploit]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=6009</guid>

					<description><![CDATA[(LiveHacking.Com) – Google has been under fire in the last few weeks for arbitrarily disclosing zero-day vulnerabilities which give hackers the information they need to attack susceptible systems. When Google makes these disclosures it knows full well that it is risking the security and privacy of potentially millions of people. The positive side of these disclosures [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Cross Site Scripting vulnerability found in IE 11</title>
		<link>http://www.livehacking.com/2015/02/04/cross-site-scripting-vulnerability-found-in-ie-11/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Wed, 04 Feb 2015 09:46:59 +0000</pubDate>
				<category><![CDATA[Intenet Explorer]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Microsoft Internet Explorer]]></category>
		<category><![CDATA[XSS]]></category>
		<category><![CDATA[XSS vulnerability]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=6001</guid>

					<description><![CDATA[(LiveHacking.Com) – A new Cross Site Scripting (XSS) vulnerability has been found in IE 11. According to an email sent by David Leo, a researcher with information security company Deusen, to the Full Disclosure mailing list, the vulnerability can allow an attacker to steal anything from a third party domain, and likewise inject anything into a third party domain. Deusen [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Apple updates iOS, OS X and Apple TV in monster patch release</title>
		<link>http://www.livehacking.com/2015/01/28/apple-updates-ios-os-x-and-apple-tv/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Wed, 28 Jan 2015 12:56:01 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Apple TV]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[OS X]]></category>
		<category><![CDATA[Safari]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5999</guid>

					<description><![CDATA[(LiveHacking.Com) – Following Google’s disclose of a number of zero day vulnerabilities in OS X, Apple has released a huge set of patches that fix a range of Critical security problems on OS X, iOS, Apple TV, and Safari. Starting with OS X, Apple’s patches fix 54 separate CVEs including 11 from Google’s Project Zero. [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Google discloses three more zero-day vulnerabilities, this time for OS X</title>
		<link>http://www.livehacking.com/2015/01/23/google-discloses-three-more-zero-day-vulnerabilities-this-time-for-os-x/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Fri, 23 Jan 2015 07:45:27 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[OS X]]></category>
		<category><![CDATA[Zero Day]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5992</guid>

					<description><![CDATA[(LiveHacking.Com) – Google recently came under some heavy criticism when it disclosed a zero-day vulnerability in Windows just days before Microsoft was scheduled to release a fix. Now the search giant as done it again. But this time Google shows that it is truly non-partisan because the disclosures aren&#8217;t for Windows, but for OS X. [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft to fix Windows vulnerability that Google publicly disclosed last week</title>
		<link>http://www.livehacking.com/2015/01/13/microsoft-to-fix-windows-vulnerability-that-google-publicly-disclosed-last-week/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Tue, 13 Jan 2015 07:43:54 +0000</pubDate>
				<category><![CDATA[Google]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5987</guid>

					<description><![CDATA[(LiveHacking.Com) – Microsoft will be issuing a series of security bulletins today (Patch Tuesday) to address security vulnerabilities in its products. One of these fixes will be for a vulnerability that Google intentionally disclosed to the public last week. Security experts at Google found a bug which could allow an attacker to gain elevated privileges on [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Apple updates OS X’s NTP server to address recently disclosed NTP vulnerabilities</title>
		<link>http://www.livehacking.com/2014/12/23/apple-updates-os-xs-to-address-ntp-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Tue, 23 Dec 2014 08:39:04 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5980</guid>

					<description><![CDATA[(LiveHacking.Com) – Apple has released a patch for OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.1 to update the included NTP server to  fix the recently disclosed  vulnerabilities. The standard, open source Network Time Protocol (NTP) daemon (ntpd) contains multiple vulnerabilities which were publicly disclosed a few days ago. The vulnerabilities not only [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft fixes 24 security vulnerabilities in December’s Patch Tuesday</title>
		<link>http://www.livehacking.com/2014/12/10/microsoft-fixes-24-security-vulnerabilities-in-decembers-patch-tuesday/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Wed, 10 Dec 2014 07:34:11 +0000</pubDate>
				<category><![CDATA[Intenet Explorer]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5975</guid>

					<description><![CDATA[(LiveHacking.Com) – As part of December&#8217;s Patch Tuesday, Microsoft has released seven security updates, three of which Microsoft has rated Critical, while the other four are rated Important in severity. These seven patches to address 24 security vulnerabilities in Microsoft Windows, Internet Explorer (IE), Office and Exchange. The first of the Critical patches is a cumulative [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Sony hack shows that the company kept passwords stored in a folder called “Password”</title>
		<link>http://www.livehacking.com/2014/12/05/sony-hacks-shows-that-the-company-kept-passwords-stored-in-a-folder-called-password/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Fri, 05 Dec 2014 10:48:59 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Sony Pictures Entertainment]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5972</guid>

					<description><![CDATA[(LiveHacking.Com) – Sony Pictures Entertainment has been hacked and it has been hacked hard. Over 40GB of data has been released on the Internet. The trove of data includes scripts and documents about salaries and film budgets. It is being described as &#8220;probably the worst corporate hack in history.&#8221; A group called Guardians of Peace, which may be [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Apple patches security flaws in iOS 8, OS X 10.10 and Apple TV 7</title>
		<link>http://www.livehacking.com/2014/11/18/apple-patches-security-flaws-in-ios-8-os-x-10-10-and-apple-tv-7/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Tue, 18 Nov 2014 07:15:30 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Apple TV]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[OS X]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5967</guid>

					<description><![CDATA[(LiveHacking.Com) – Apple has released new versions of three of its major software products. The new versions of iOS, OS X and Apple TV address multiple security vulnerabilities. iOS 8.1.1, which is available for the iPhone 4s and later; the iPod touch (5th generation) and later; and the iPad 2 and later; addresses nine separate vulnerabilities. Apple [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Email addresses stolen from CurrentC</title>
		<link>http://www.livehacking.com/2014/10/31/email-addresses-stolen-from-currentc/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Fri, 31 Oct 2014 10:07:54 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5963</guid>

					<description><![CDATA[(LiveHacking.Com) – CurrentC has notified its users about a security breach which enabled hackers to steal the email addresses of some of its pilot program participants. According to a statement released by the company, &#8220;many of these email addresses are dummy accounts used for testing purposes only.&#8221; It went on to say that, &#8220;the CurrentC [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Apple release iOS 8.1 and Apple TV 7.0.1 with new security patches</title>
		<link>http://www.livehacking.com/2014/10/21/apple-release-ios-8-1-and-apple-tv-7-0-1-with-new-security-patches/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Tue, 21 Oct 2014 06:46:28 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Apple TV]]></category>
		<category><![CDATA[iOS]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5959</guid>

					<description><![CDATA[(LiveHacking.Com) – Apple has released iOS 8.1, primarily to activate Apple Pay, but also to patch five CVE-listed vulnerabilities including fixes for a Bluetooth flaw and  a fix for the infamous SSL 3.0 POODLE security vulnerability. POODLE (Padding Oracle On Downgraded Legacy Encryption) is the moniker given to a flaw in the SSL 3.0 protocol. SSL 3.0 is [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Alleged Dropbox hack underlines danger of reusing passwords</title>
		<link>http://www.livehacking.com/2014/10/15/alleged-dropbox-hack-underlines-danger-of-reusing-passwords/</link>
					<comments>http://www.livehacking.com/2014/10/15/alleged-dropbox-hack-underlines-danger-of-reusing-passwords/#comments</comments>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Wed, 15 Oct 2014 08:03:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Dropbox]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5953</guid>

					<description><![CDATA[(LiveHacking.Com) – News broke yesterday of an alleged hack on Dropbox that could have potentially leaked the passwords of millions of users. An anonymous hacker posted a few hundred usernames and passwords on Pastebin and claimed that they were for Dropbox accounts. The leaked list is for accounts with email addresses starting with the letter [&#8230;]]]></description>
		
					<wfw:commentRss>http://www.livehacking.com/2014/10/15/alleged-dropbox-hack-underlines-danger-of-reusing-passwords/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Source code for BadUSB vulnerability posted on GitHub</title>
		<link>http://www.livehacking.com/2014/10/07/source-code-for-badusb-vulnerability-posted-on-github/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Tue, 07 Oct 2014 11:10:03 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5950</guid>

					<description><![CDATA[(LiveHacking.Com) – Back in August, security researchers  Karsten Nohl and Jakob Lell demonstrated how a USB device can be reprogrammed and used to infect a computer without the user’s knowledge. Dubbed BadUSB, the pair published their findings during the Black Hat conference, however they did not publish the source code or the reversed engineered firmware needed to perform [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Shellshock: Code injection vulnerability found in Bash</title>
		<link>http://www.livehacking.com/2014/09/26/shellshock-code-injection-vulnerability-found-in-bash/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Fri, 26 Sep 2014 06:54:53 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Red Hat]]></category>
		<category><![CDATA[Red Hat Enterprise Linux]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[OS X]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5943</guid>

					<description><![CDATA[(LiveHacking.Com) – A code injection vulnerability in the Bourne again shell (Bash) has been disclosed on the internet. If exploited then arbitrary commands can be executed, and where Bash is used in relation to a network service, for example in CGI scripts on a web server, then the vulnerability will allow remote code execution. The problem resolves [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Apple releases iOS 8 with 56 security patches</title>
		<link>http://www.livehacking.com/2014/09/18/apple-releases-ios-8-with-56-security-patches/</link>
		
		<dc:creator><![CDATA[Ethical Hacker]]></dc:creator>
		<pubDate>Thu, 18 Sep 2014 07:22:43 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.livehacking.com/?p=5937</guid>

					<description><![CDATA[(LiveHacking.Com) – Along side the release of the iPhone 6 and iPhone 6 Plus Apple has also released a new version of its mobile operating system. iOS 8 includes improvements to Siri and the ability for third parties to add widgets to the notification area. Apple are calling it &#8220;huge for developers,  massive for everyone [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>