<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; FBI</title>
	<atom:link href="http://www.vrworld.com/tag/fbi/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 07:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>Security Researcher Claims iOS Devices Have a Backdoor</title>
		<link>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/</link>
		<comments>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/#comments</comments>
		<pubDate>Wed, 23 Jul 2014 19:29:35 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[com.apple.mobile.pcapd]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Firmware]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Jonathan Zdziarski]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Secure]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36690</guid>
		<description><![CDATA[<p>A security researcher is claiming to have found a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What&#8217;s ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/">Security Researcher Claims iOS Devices Have a Backdoor</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="960" height="960" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/AppleLogo1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Apple Logo iMessage iWatch Backdoor" /></p><p>A <a href="http://www.zdziarski.com/blog/?p=3441" target="_blank">security researcher is claiming to have found</a> a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What&#8217;s more interesting is that Apple has, in a very non-Apple manner, responded to his claims by <a href="https://support.apple.com/kb/HT6331?viewlocale=en_US&amp;locale=en_US" target="_blank">posting a support page about it</a>. He claims that these are confirmations of the backdoors that he found in iOS and that Apple claims to use them for diagnostic and enterprise purposes. These backdoors can only be accessed by Apple (or anyone that has access to Apple&#8217;s services) so they&#8217;re mostly secure backdoors, but they are backdoors nonetheless. Most consumers are completely and wholly unaware that alternative pathways into their devices exist and can be exploited by ANYONE (in this case Apple) other than themselves. This is also why remote bricking and other &#8216;security&#8217; features being pushed through legislatures are also a problem, but at least we&#8217;re aware of their existence unlike these services on iOS.</p>
<p>The services in question, om.apple.mobile.pcapd, com.apple.mobile.file_relay, com.apple.mobile.house_arrest among others have been addressed in <a href="https://support.apple.com/kb/HT6331?viewlocale=en_US&amp;locale=en_US" target="_blank">Apple&#8217;s knowledge base article</a>. Apple does not directly address <a href="https://twitter.com/JZdziarski" target="_blank">Jonathan Zdziarski&#8217;</a>s claims but instead tries to illuminate their use of these services and what they&#8217;re supposed to be used for. Apple claims that some of these services are used for diagnostic purposes internally as well as for iTunes and Apple Care support. However, the fact that these supposed backdoor services exist without users&#8217; or developers&#8217; knowledge is a bit worrisome.</p>
<p>The real truth here is that no matter what happens, or is really happening, customers should be aware of how intrusive some of these services are or can be. Sure, some of them are limited in scope in terms of what they can access, but even so, Apple should notify customers when they use such services or sign up for the operating system that there are services running on their devices that give Apple access to their device. Backdoor systems are not a joke and some of them are open invitations to hackers to try to hack into a backdoor and use it for their own purposes. Backdoors are inherently insecure and consumers should be made aware of them, malicious or not.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/">Security Researcher Claims iOS Devices Have a Backdoor</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Which Americans The NSA Spies On</title>
		<link>http://www.vrworld.com/2014/07/09/americans-nsa-spies/</link>
		<comments>http://www.vrworld.com/2014/07/09/americans-nsa-spies/#comments</comments>
		<pubDate>Wed, 09 Jul 2014 14:42:57 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Agha Saeed]]></category>
		<category><![CDATA[Asim Ghafoor]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Faisal Gill]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FISA]]></category>
		<category><![CDATA[FISA Recap]]></category>
		<category><![CDATA[FISC]]></category>
		<category><![CDATA[Glenn Greenwald]]></category>
		<category><![CDATA[Hooshang Amirahmadi]]></category>
		<category><![CDATA[Nihad Awad]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[The Intercept]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36393</guid>
		<description><![CDATA[<p>The Intercept is reporting that the NSA is unsurprisingly spying on countless American citizens without there being any reasonable justification for doing so. This is ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/09/americans-nsa-spies/">Which Americans The NSA Spies On</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="650" height="637" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/NSA-Logo1.jpeg" class="attachment-post-thumbnail wp-post-image" alt="NSA Logo" /></p><p>The Intercept <a href="https://firstlook.org/theintercept/article/2014/07/09/under-surveillance/" target="_blank">is reporting</a> that the NSA is unsurprisingly spying on countless American citizens without there being any reasonable justification for doing so. This is being reported based on the documents that Edward Snowden gave Glenn Greenwald including a &#8220;FISA recap&#8221; spreadsheet that details thousands of email addresses being monitored. Out of those email accounts being monitored, 202 addresses were marked as US persons, while 1,782 were marked as non-US persons and 5,501 were marked as unknown or simply left blank. The Intercept identified five Americans on the list from their email addresses and helped build the story that we&#8217;re reporting on today.</p>
<p>The NSA is monitoring the emails (and likely more) of multiple Muslim-Americans even though they have never had any ties to any terrorist groups or anti-American sentiment. There was, however, one lawyer involved in the spying on Americans who represented clients in terrorism cases, but that is <em>merely</em> a breach of due process. A breach where the NSA could pass on confidential information to the prosecution and help create a case where there is none. Obviously, such lawyers would probably suspect that they&#8217;re already being watched, but not by the NSA. Even so, he is one of five Americans basically put on a &#8216;watch list&#8217; for who they are and what they do, not a justification for being spied on as an American.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/NSASpying1.jpg" rel="lightbox-0"><img class="aligncenter size-full wp-image-36400" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/NSASpying1.jpg" alt="NSASpying" width="1968" height="560" /></a></p>
<p>The five Americans that are being spied on were discovered in Edward Snowden&#8217;s leaked NSA documents. These five men, that are Americans, Faisal Gill, Asim Ghafoor, Hooshang Amirahmadi, Agha Saeed and Nihad Awad are all obviously people that could easily be considered Muslim Americans. But the fact is that with the exception of Asim Ghafoor, none of these men have ANY remote ties with terrorists in any way, shape, or form. In fact, Asim Ghafoor only does because its part of his job as a lawyer to represent them, which is still an American thing to do in order to ensure due process.</p>
<p>&nbsp;</p>
<div id="attachment_36399" style="width: 2560px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/FISA-Recap1.jpg" rel="lightbox-1"><img class="size-full wp-image-36399" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/FISA-Recap1.jpg" alt="FISA Recap" width="2550" height="1083" /></a><p class="wp-caption-text">FISA Recap Spreadsheet</p></div>
<p>These men&#8217;s email addresses were found in a FISA recap spreadsheet which basically broke down who was and wasn&#8217;t being spied on and whether or not their account owners were American, non-American or unknown. Unfortunately for all of us Americans, it doesn&#8217;t really seem to make much of a difference whether or not people are American if the NSA really wants to spy on them. Because the truth is that the FISA courts are basically granting the NSA any and all permissions that they need to &#8216;do their job&#8217;. In the 35 years that the FISA court (FISC) has been in existence, the court has approved 35,434 government requests for surveillance, while rejecting only 12. Giving you merely a small idea of how strictly these requests are really being &#8216;judged&#8217;.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/HooshangAmirahmadi1.jpg" rel="lightbox-2"><img class="aligncenter size-full wp-image-36394" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/HooshangAmirahmadi1.jpg" alt="HooshangAmirahmadi" width="2583" height="518" /></a></p>
<p>What&#8217;s worse is that some of these men have grown up and served their country, like Faisal Gill, who has served in the military and worked for the White House under President George W. Bush. In fact, he was a staunch supporter of the Republican party and their ideals. He also did lots of work under the Department of Homeland security and after he was done working there, the NSA spied on him, while George W. Bush was still president. In fact, after he left the Department of Homeland security, where he had very high level security clearance, the spying on him began.</p>
<p>&nbsp;</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/FaisalGill1.jpg" rel="lightbox-3"><img class="aligncenter size-full wp-image-36398" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/FaisalGill1.jpg" alt="FaisalGill" width="2593" height="436" /></a></p>
<p>The Intercept interviewed some of these men to talk about the spying and their experiences, and there are some really powerful words being said, especially towards the end.</p>
<p>The problem with all of this is that our government, The NSA, the FBI and the FISA courts that enable them are really toeing a very dangerous line. If it is okay to spy on American citizens with basically no supporting evidence (as it appears that these men were) then what prevents the NSA, CIA, FBI and other government agencies from monitoring everything we do, waiting until we trip up?</p>
<p>Just because these men are Muslim-Americans should not mean that they are suddenly dangerous to Americans and our freedom. In fact, singling them out because of what religion they are might be one of the most grave transgressions the NSA has committed so far. We already know that the NSA is spying on people that use Tor, so who&#8217;s next? Tor Users, American Muslims&#8230; Communists? Chinese-American Immigrants? Mexican-Americans? Where does it end?</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/09/americans-nsa-spies/">Which Americans The NSA Spies On</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/09/americans-nsa-spies/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>NZ Police Can&#039;t Share Kim Dotcom&#039;s Encryption Keys with FBI</title>
		<link>http://www.vrworld.com/2014/07/03/nz-police-cant-share-kim-dotcoms-encryption-keys-fbi/</link>
		<comments>http://www.vrworld.com/2014/07/03/nz-police-cant-share-kim-dotcoms-encryption-keys-fbi/#comments</comments>
		<pubDate>Thu, 03 Jul 2014 20:06:23 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Audio/Video]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[drives]]></category>
		<category><![CDATA[encrypted]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[encryption keys]]></category>
		<category><![CDATA[Extradite]]></category>
		<category><![CDATA[Extradition]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hard drive]]></category>
		<category><![CDATA[Hearing]]></category>
		<category><![CDATA[keys]]></category>
		<category><![CDATA[Kim Dotcom]]></category>
		<category><![CDATA[Mega]]></category>
		<category><![CDATA[Megaupload]]></category>
		<category><![CDATA[MPAA]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[RIAA]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[US Authorities]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36355</guid>
		<description><![CDATA[<p>During the raid on Kim Dotcom&#8217;s property, the NZ Police took countless computers and hard drives from his residence and offices, many of which were ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/03/nz-police-cant-share-kim-dotcoms-encryption-keys-fbi/">NZ Police Can&#039;t Share Kim Dotcom&#039;s Encryption Keys with FBI</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1276" height="696" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/KimDotcom1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Kim Dotcom" /></p><p>During the raid on Kim Dotcom&#8217;s property, the NZ Police took countless computers and hard drives from his residence and offices, many of which were fully encrypted. However, there was a lot of data on those drives that the NZ Police had no right in sharing with the FBI or any US authorities. In fact, they had already shared copies of the drives&#8217; encrypted data to the FBI, which by now has probably cracked the encryption without Kim Dotcom&#8217;s keys. Kim&#8217;s lawyers have been wrangling with the policy negotiating whether or not he would provide the encryption keys to them and under what circumstances.</p>
<p>According to a recent ruling, a judge has ruled that the NZ Police cannot provide the FBI with any of the keys that Kim Dotcom may provide them with in order to access the data on the hard drives. The problem is that all of these assets were effectively seized from Kim Dotcom&#8217;s residence and offices without any real evidence of wrong-doing and they still haven&#8217;t really provided much of a case against him. Kim Dotcom is still technically under house arrest but he hasn&#8217;t really been found guilty of any official charges because the Crown Prosecution has failed on many counts trying to include evidence that would later be thrown out. Realistically, most of what the New Zealand authorities have done to Kim Dotcom has been mostly unfounded and based upon murky charges levied by US authorities, which technically have no jurisdiction over New Zealand. Furthermore, they are still trying to have him extradited to the US where they would try to get him to stand trial, but the possibility that he will be extradited is hopefully low considering all of the mistakes the New Zealand authorities have made.</p>
<p>The justice that ruled against the NZ authorities sharing Dotcom&#8217;s keys with the FBI and other agencies ruled this partially because they had already provided the US authorities with harddrives and copies of data that they weren&#8217;t supposed to give them to begin with. This once again shows the New Zealand authorities&#8217; incompetence as well as the likelihood of how unfounded the US authorities&#8217; case was when they had initiated the raid on Dotcom&#8217;s property and Megaupload.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/03/nz-police-cant-share-kim-dotcoms-encryption-keys-fbi/">NZ Police Can&#039;t Share Kim Dotcom&#039;s Encryption Keys with FBI</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/03/nz-police-cant-share-kim-dotcoms-encryption-keys-fbi/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>The Whitehouse Says They Have Right to Withhold a Security Vulnerability</title>
		<link>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/</link>
		<comments>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/#comments</comments>
		<pubDate>Thu, 01 May 2014 18:49:57 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Whitehouse]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34849</guid>
		<description><![CDATA[<p>On Monday, as a follow up to the awareness around the Heartbleed bug and all of the rumors that circulated around it, The Whitehouse posted ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">The Whitehouse Says They Have Right to Withhold a Security Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="2000" height="1361" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/WhiteHouse_Logo1.png" class="attachment-post-thumbnail wp-post-image" alt="Whitehouse Logo" /></p><p>On Monday, as a follow up to the awareness around <a title="The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years" href="http://www.brightsideofnews.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">the Heartbleed bug</a> and all of the rumors that circulated around it, <a href="http://www.whitehouse.gov/blog/2014/04/28/heartbleed-understanding-when-we-disclose-cyber-vulnerabilities" target="_blank">The Whitehouse posted a blog</a> clarifying their stance on how they approach vulnerabilities such as Heartbleed. In fact, the NSA categorically denied any knowledge of the<a href="https://twitter.com/NSA_PAO/status/454720059156754434" target="_blank"> Heartbleed bug officially on Twitter</a>, even though they have been known to lie to Congress and the American people without hesitation, so their honesty is a little more than at question.</p>
<p>So, what exactly are they going to disclose and when? Well, there&#8217;s a nifty little check list that the Whitehouse has provided us with so that we know when an agency should withhold information from the public and when it should make it public.</p>
<blockquote>
<p class="p1">We have also established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure. This interagency process helps ensure that all of the pros and cons are properly considered and weighed. While there are no hard and fast rules, here are a few things I want to know when an agency proposes temporarily withholding knowledge of a vulnerability:</p>
</blockquote>
<ul>
<li class="p2">
<blockquote><p>How much is the vulnerable system used in the core internet infrastructure, in other critical infrastructure systems, in the U.S. economy, and/or in national security systems?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Does the vulnerability, if left unpatched, impose significant risk?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How much harm could an adversary nation or criminal group do with knowledge of this vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How likely is it that we would know if someone else was exploiting it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How badly do we need the intelligence we think we can get from exploiting the vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Are there other ways we can get it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Could we utilize the vulnerability for a short period of time before we disclose it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How likely is it that someone else will discover the vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Can the vulnerability be patched or otherwise mitigated?</p></blockquote>
</li>
</ul>
<p>&nbsp;</p>
<p>So, basically, The Whitehouse and the administration of Obama are basically saying that if a vulnerability doesn&#8217;t really affect us too much, but can gain us lots of valuable intelligence we should keep our mouths shut. What is interesting about this supposed &#8220;rigorous&#8221; process for vulnerability disclosure is that there is no time limit set for how long they are allowed to wait until they disclose a vulnerability. There is no limitation on how long they can leave a vulnerability open if it passes all of these checks that they&#8217;ve established. They mention utilizing the vulnerability for a short period of time, but that doesn&#8217;t actually mean anything because a short period of time could be a day, a week, a month, or a year.</p>
<p>With the Heartbleed bug and the public disclosure around it, there were a lot of companies scrambling to patch the bug and some attacks that utilized it immediately after its disclosure. However, if left unpatched, Heartbleed could have disasterous implications and would give any government with knowledge of it almost unlimited access across the web. As a result, many people simply don&#8217;t believe that The Whitehouse and the NSA were unaware of such a bug, especially since the NSA had quietly exploited countless other bugs continually without any concern.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">The Whitehouse Says They Have Right to Withhold a Security Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 16:14:52 by W3 Total Cache -->