<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
			xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
		>

<channel>
	<title>Gigaom Search &#187; hacking</title>
	<atom:link href="http://search.gigaom.com/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>http://search.gigaom.com</link>
	<description></description>
	<lastBuildDate>Wed, 11 Mar 2015 08:42:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>Tempered Networks wants to secure critical infrastructure so hacks don’t lead to sewage spills</title>
		<link>http://gigaom.com/2015/03/03/tempered-networks-wants-to-secure-critical-infrastructure-so-hacks-dont-lead-to-sewage-spills/</link>
		<comments>http://gigaom.com/2015/03/03/tempered-networks-wants-to-secure-critical-infrastructure-so-hacks-dont-lead-to-sewage-spills/#comments</comments>
		<pubDate>Tue, 03 Mar 2015 12:30:33 +0000</pubDate>
		<dc:creator><![CDATA[Jonathan Vanian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Computer network]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[infrastructure]]></category>
		<category><![CDATA[infrastructure networks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security startup]]></category>
		<category><![CDATA[transmission control protocol/internet]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NYSE:BA]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=918302</guid>
		<description><![CDATA[Although the rise of the internet of things means that organizations could gather enormous quantities of data through the billions of connected devices out there today, the big elephant in the&#8230;]]></description>
		<wfw:commentRss>http://gigaom.com/2015/03/03/tempered-networks-wants-to-secure-critical-infrastructure-so-hacks-dont-lead-to-sewage-spills/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Uber discloses data breach that may have affected 50,000 drivers</title>
		<link>http://gigaom.com/2015/02/27/uber-discloses-data-breach-that-may-have-affected-50000-drivers/</link>
		<comments>http://gigaom.com/2015/02/27/uber-discloses-data-breach-that-may-have-affected-50000-drivers/#comments</comments>
		<pubDate>Fri, 27 Feb 2015 22:59:47 +0000</pubDate>
		<dc:creator><![CDATA[Jonathan Vanian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[access protocols]]></category>
		<category><![CDATA[access-management]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=917807</guid>
		<description><![CDATA[Uber suffered a data breach in 2014 that affected 50,000 Uber drivers across the U.S., the ride-sharing startup disclosed in a statement on Friday. The company determined on September 17, 2014&#8230;]]></description>
		<wfw:commentRss>http://gigaom.com/2015/02/27/uber-discloses-data-breach-that-may-have-affected-50000-drivers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Law firms will start sharing security data to prevent attacks</title>
		<link>http://gigaom.com/2015/02/25/law-firms-will-start-sharing-security-data-to-prevent-attacks/</link>
		<comments>http://gigaom.com/2015/02/25/law-firms-will-start-sharing-security-data-to-prevent-attacks/#comments</comments>
		<pubDate>Wed, 25 Feb 2015 20:32:51 +0000</pubDate>
		<dc:creator><![CDATA[Jonathan Vanian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber-security regulation]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Internet privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security data trading]]></category>
		<category><![CDATA[threat detection]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:FB]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:GOOG]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:YHOO]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:FB]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:GOOG]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:YHOO]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NYSE:TWTR]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=917213</guid>
		<description><![CDATA[It’s clear that big banks provide a lot of incentive for hackers to launch cyber attacks, given the amount of sensitive data they hold and the cash they oversee. But banks aren’t&#8230;]]></description>
		<wfw:commentRss>http://gigaom.com/2015/02/25/law-firms-will-start-sharing-security-data-to-prevent-attacks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Lenovo in hot water over Superfish adware, but dismisses security worries (updated)</title>
		<link>http://gigaom.com/2015/02/19/lenovo-in-hot-water-over-superfish-adware-but-dismisses-security-worries/</link>
		<comments>http://gigaom.com/2015/02/19/lenovo-in-hot-water-over-superfish-adware-but-dismisses-security-worries/#comments</comments>
		<pubDate>Thu, 19 Feb 2015 17:42:44 +0000</pubDate>
		<dc:creator><![CDATA[Kif Leswing]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[MITM]]></category>
		<category><![CDATA[sl]]></category>
		<category><![CDATA[superfish]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=915862</guid>
		<description><![CDATA[Reports from security consultants, media, and Lenovo users indicate that there's bloatware pre-installed on recent Lenovo Windows PCs that's a bit more sinister than a set of superfluous ThinkPad tools. It appears&#8230;]]></description>
		<wfw:commentRss>http://gigaom.com/2015/02/19/lenovo-in-hot-water-over-superfish-adware-but-dismisses-security-worries/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Hackers stole up to $1B from banks worldwide, Kaspersky says</title>
		<link>http://gigaom.com/2015/02/16/big-bad-hackers-stole-1b-from-banks-worldwide-kaspersky-says/</link>
		<comments>http://gigaom.com/2015/02/16/big-bad-hackers-stole-1b-from-banks-worldwide-kaspersky-says/#comments</comments>
		<pubDate>Mon, 16 Feb 2015 17:31:12 +0000</pubDate>
		<dc:creator><![CDATA[Barb Darrow]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Chris Doggett]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Interpol]]></category>
		<category><![CDATA[Kaspersky Lab]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=915145</guid>
		<description><![CDATA[A gang of hackers has, over the course of a year or more, stolen up to $1 billion from financial institutions around the world, including some in the U.S., according to a new report&#8230;]]></description>
		<wfw:commentRss>http://gigaom.com/2015/02/16/big-bad-hackers-stole-1b-from-banks-worldwide-kaspersky-says/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>How tech trials force a choice between bad people and bad law</title>
		<link>http://gigaom.com/2015/02/14/how-tech-trials-force-a-choice-between-bad-people-and-bad-law/</link>
		<comments>http://gigaom.com/2015/02/14/how-tech-trials-force-a-choice-between-bad-people-and-bad-law/#comments</comments>
		<pubDate>Sat, 14 Feb 2015 16:00:01 +0000</pubDate>
		<dc:creator><![CDATA[Jeff Roberts]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[CFAA]]></category>
		<category><![CDATA[Dread Pirate Roberts]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[kim dotcom]]></category>
		<category><![CDATA[Silk Road]]></category>
		<category><![CDATA[Weev]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=909526</guid>
		<description><![CDATA[Of course Ross Ulbricht was guilty. Despite his far-fetched claims of mistaken identity, a New York jury confirmed the obvious: that Ulbricht (aka Dread Pirate Roberts) was the criminal mastermind who took on a villain's name, and became&#8230;]]></description>
		<wfw:commentRss>http://gigaom.com/2015/02/14/how-tech-trials-force-a-choice-between-bad-people-and-bad-law/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Obama&#8217;s executive order calls for sharing of security data</title>
		<link>http://gigaom.com/2015/02/13/obamas-executive-order-calls-for-sharing-of-security-data/</link>
		<comments>http://gigaom.com/2015/02/13/obamas-executive-order-calls-for-sharing-of-security-data/#comments</comments>
		<pubDate>Fri, 13 Feb 2015 23:14:19 +0000</pubDate>
		<dc:creator><![CDATA[Jonathan Vanian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber-security regulation]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Internet privacy]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:FB]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:GOOG]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:YHOO]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:FB]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:GOOG]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:YHOO]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NYSE:TWTR]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=915014</guid>
		<description><![CDATA[President Barack Obama signed an executive order on Friday designed to spur businesses and the Federal Government to share with each other information related to cybersecurity, hacking and data breaches for&#8230;]]></description>
		<wfw:commentRss>http://gigaom.com/2015/02/13/obamas-executive-order-calls-for-sharing-of-security-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Facebook launches collaborative threat-detection framework</title>
		<link>http://gigaom.com/2015/02/11/facebook-launches-collaborative-threat-detection-framework/</link>
		<comments>http://gigaom.com/2015/02/11/facebook-launches-collaborative-threat-detection-framework/#comments</comments>
		<pubDate>Wed, 11 Feb 2015 14:00:12 +0000</pubDate>
		<dc:creator><![CDATA[Jonathan Vanian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[graph database technology]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[security]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:FB]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:YHOO]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:FB]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:YHOO]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NYSE:TWTR]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=914073</guid>
		<description><![CDATA[It might be a bit more difficult for hackers to launch coordinated attacks against several different companies at the same time thanks to a new collaborative threat-detection framework by Facebook called&#8230;]]></description>
		<wfw:commentRss>http://gigaom.com/2015/02/11/facebook-launches-collaborative-threat-detection-framework/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>&#8220;Anonymous&#8221; hackers attack European Parliament president&#8217;s site</title>
		<link>https://gigaom.com/2015/02/10/anonymous-hackers-attack-european-parliament-presidents-site/</link>
		<comments>https://gigaom.com/2015/02/10/anonymous-hackers-attack-european-parliament-presidents-site/#comments</comments>
		<pubDate>Tue, 10 Feb 2015 09:38:06 +0000</pubDate>
		<dc:creator><![CDATA[David Meyer]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[anonymous]]></category>
		<category><![CDATA[Austerity]]></category>
		<category><![CDATA[Greece]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Martin Schulz]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=913770</guid>
		<description><![CDATA[The personal website of European Parliament president Martin Schulz was hacked last week, his office has confirmed. On Friday someone posted information on Pastebin indicating that they had retrieved database and&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2015/02/10/anonymous-hackers-attack-european-parliament-presidents-site/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Senator Markey: Our connected cars are insecure and leaking data</title>
		<link>https://gigaom.com/2015/02/09/senator-markey-our-connected-cars-are-insecure-and-leaking-data/</link>
		<comments>https://gigaom.com/2015/02/09/senator-markey-our-connected-cars-are-insecure-and-leaking-data/#comments</comments>
		<pubDate>Mon, 09 Feb 2015 22:40:25 +0000</pubDate>
		<dc:creator><![CDATA[Kevin Fitchard]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[4G cars]]></category>
		<category><![CDATA[car data]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[infotainment]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vehicle cloud]]></category>
		<category><![CDATA[white hats]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:TSLA]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:TSLA]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=913646</guid>
		<description><![CDATA[As our cars gain more means to reach and connect to our smartphones, the cloud and the internet, they’re also creating more pathways to infiltrate our cars’ data and possibly providing&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2015/02/09/senator-markey-our-connected-cars-are-insecure-and-leaking-data/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>