<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 14:28:12 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@ultratech/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Malware RIPPER, probably used while robbing banks in Taiwan and Thailand.]]></title><description><![CDATA[Researchers at FireEye discovered malware, which, according to them, involved in recent robberies of ATMs in Thailand and Taiwan. Malware called RIPPER, because the source code has been detected ATMRIPPER]]></description><link>http://direct.ecency.com/news/@ultratech/malware-ripper-probably-used-while-robbing-banks-in-taiwan-and-thailand</link><guid isPermaLink="true">http://direct.ecency.com/news/@ultratech/malware-ripper-probably-used-while-robbing-banks-in-taiwan-and-thailand</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Tue, 30 Aug 2016 13:01:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQiBUghLnJkKHGiKAw1fD7MNdp19rPD9bRNYJjdYgEjHAbFHNn2WdaPazq3uExT4BQ9iZuxZ42vxwsvEsQ8yAvByx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Trojan.mutabaha.1 bypasses UAC and sets fake Chrome.]]></title><description><![CDATA[The specialists of " Doctor Web " warns about the discovery of the Trojan.Mutabaha.1. Malware does not just attack the user's browser, but sets on the infected computer 's own assembly Chrome]]></description><link>http://direct.ecency.com/techreview/@ultratech/trojan-mutabaha-1-bypasses-uac-and-sets-fake-chrome</link><guid isPermaLink="true">http://direct.ecency.com/techreview/@ultratech/trojan-mutabaha-1-bypasses-uac-and-sets-fake-chrome</guid><category><![CDATA[techreview]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Tue, 30 Aug 2016 12:18:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/hgjbks2vRxvpXos1EEbKD9FJKpVVZu32GNGM3j3rNZDyqqxbqtDHxi8R1XV2pjZUeWh6EJyXTWLquA8nED1ZS5akZL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The researchers used a MITM-attack against operators encryptor ALMA]]></title><description><![CDATA[Company experts presented PhishLabs free tool to decrypt the files affected by the attack malware Alma. Hack malware researchers were able, having carried out man-in-the-middle attack , which helped to]]></description><link>http://direct.ecency.com/news/@ultratech/the-researchers-used-a-mitm-attack-against-operators-encryptor-alma</link><guid isPermaLink="true">http://direct.ecency.com/news/@ultratech/the-researchers-used-a-mitm-attack-against-operators-encryptor-alma</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Sun, 28 Aug 2016 03:47:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBrYnyqi1QzTNbQ7U4cm6CfvaprjV2bav9EHtb6Qnm3FrtXiyKYiSrTjZmsJdBWQySbuvWVJzWoEJJXk7W6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Bitmain Technologies announced the start of sales Antminer R4.]]></title><description><![CDATA[Manufacturer of equipment for mining Bitmain Technologies has announced the start of sales Antminer R4 - the newest model miner, which is convinced of the company, "mining will return back to the]]></description><link>http://direct.ecency.com/bitcoin/@ultratech/bitmain-technologies-announced-the-start-of-sales-antminer-r4</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@ultratech/bitmain-technologies-announced-the-start-of-sales-antminer-r4</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Sun, 28 Aug 2016 00:58:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/FxX5caie56ynkr5R4DK4oxJTkjdD6JwP6nwTmnhUN1S47GPgMAcRmZX5wyT1AcqgaxTi9ciaEtfT8YUjFJGzPtZQph9ayu42hiCFDC6kKsTU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Whatsapp going to share with facebook phone users]]></title><description><![CDATA[Facebook acquired WhatsApp messenger is a little more than two years ago for $ 19 billion. Then the head of the company, Jan Koum, promised that "nothing will change", referring to the privacy]]></description><link>http://direct.ecency.com/whatsapp/@ultratech/whatsapp-going-to-share-with-facebook-phone-users</link><guid isPermaLink="true">http://direct.ecency.com/whatsapp/@ultratech/whatsapp-going-to-share-with-facebook-phone-users</guid><category><![CDATA[whatsapp]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Sun, 28 Aug 2016 00:38:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/eAyTuXc4toTdDqXTgHXwFYLtMHW3xmBodZTj2LEWTk6u6vt8oexq1sdDajmjJZmVohJQeLiRcxN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The trigger for the mind? 25-year-old boy was taken out of the coma, focusing ultrasound on a small area in the center of the brain.]]></title><description><![CDATA[A group of scientists from the University of California in Los Angeles has published a report on the first case in the history of medicine, patient withdrawal from the coma non-invasive methods. The patient]]></description><link>http://direct.ecency.com/brain/@ultratech/the-trigger-for-the-mind-25-year-old-boy-was-taken-out-of-the-coma-focusing-ultrasound-on-a-small-area-in-the-center-of-the</link><guid isPermaLink="true">http://direct.ecency.com/brain/@ultratech/the-trigger-for-the-mind-25-year-old-boy-was-taken-out-of-the-coma-focusing-ultrasound-on-a-small-area-in-the-center-of-the</guid><category><![CDATA[brain]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Sat, 27 Aug 2016 23:56:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/FxX5caie56yoL2D7uWc9m9TA5wp3Shtx4nVRHRq6PzEmdaesDNjdYktcVbr6dPg2dnamGSoocHwfgXoEssRUz7FKbnruCf5wKCVaZF4uQeut?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The highest point of the Russian Federation Mount Elbrus (5642 m). Downhill skiing from 3850 m. Height difference 1,5 km]]></title><description><![CDATA[length of descent - 7000 m, gradient descent altitude - 1500 m (3850-2350), maximum speed - 115 km / h, average speed - 69 km / h.]]></description><link>http://direct.ecency.com/sports/@ultratech/the-highest-point-of-the-russian-federation-mount-elbrus-5642-m-downhill-skiing-from-3850-m-height-difference-1-5-km</link><guid isPermaLink="true">http://direct.ecency.com/sports/@ultratech/the-highest-point-of-the-russian-federation-mount-elbrus-5642-m-downhill-skiing-from-3850-m-height-difference-1-5-km</guid><category><![CDATA[sports]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Fri, 26 Aug 2016 17:51:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e9ZaYq7gftUSAi8CE9dFTqUtcx89bETkWdt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Семён Слепаков: Обращение к народу + текст песни]]></title><description><![CDATA[Здравствуйте все российские люди я ваш премьер Чтобы жили вы лучше мы приняли ряд эффективных мер Круглосуточно не смыкая глаз мы работали занимались мы вашими нуждами и заботами И я рад сообщить вам итоги]]></description><link>http://direct.ecency.com/ru/@ultratech/semyon-slepakov-obrashenie-k-narodu-tekst-pesni</link><guid isPermaLink="true">http://direct.ecency.com/ru/@ultratech/semyon-slepakov-obrashenie-k-narodu-tekst-pesni</guid><category><![CDATA[ru]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Fri, 26 Aug 2016 15:53:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e8eu7E6R7EdbbHrxXzrwGwMjEn4Me8b9nmU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Detected botnet of android-devices controlled via twitter]]></title><description><![CDATA[Researchers at ESET have reported finding the world's first botnet of Android-devices, which is controlled by means of Twitter accounts. For botnet is malware Twitoor, download other malicious applications]]></description><link>http://direct.ecency.com/android/@ultratech/detected-botnet-of-android-devices-controlled-via-twitter</link><guid isPermaLink="true">http://direct.ecency.com/android/@ultratech/detected-botnet-of-android-devices-controlled-via-twitter</guid><category><![CDATA[android]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Fri, 26 Aug 2016 14:41:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/eAyTuXc4toTdDqXTgHXwFYLtMHW3xmBodZTj2LEWTk6u6vt8oexq1sdDajmjN4KKMTRkDPcmTwt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hackers stole $ 346000 Thai Bank, caused the shutdown of 3300 ATMs in country]]></title><description><![CDATA[In early June 2016 Taiwan was a strange robbery. Unknown perpetrators attacked ATMs in several cities of the country and anonymous way to get them to give all available cash. Total attackers managed to]]></description><link>http://direct.ecency.com/money/@ultratech/hackers-stole-usd-346000-thai-bank-caused-the-shutdown-of-3300-atms-in-country</link><guid isPermaLink="true">http://direct.ecency.com/money/@ultratech/hackers-stole-usd-346000-thai-bank-caused-the-shutdown-of-3300-atms-in-country</guid><category><![CDATA[money]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Fri, 26 Aug 2016 14:04:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdpyDX6dw7ZqzEWcJ3y54tY44VUzADywbyX5aqcZVy3Z1mryd5PBAjKHmfdjTU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Found to be commercially spyware Pegasus, uses three 0-DAY bugs to crack iOS.]]></title><description><![CDATA[Citizen Lab and the company Lookout Security experts have reported an unprecedented case, and finding unique commercial spyware aimed at iOS. The hardest spyware called Pegasus, developed by the Israeli]]></description><link>http://direct.ecency.com/ios/@ultratech/found-to-be-commercially-spyware-pegasus-uses-three-0-day-bugs-to-crack-ios</link><guid isPermaLink="true">http://direct.ecency.com/ios/@ultratech/found-to-be-commercially-spyware-pegasus-uses-three-0-day-bugs-to-crack-ios</guid><category><![CDATA[ios]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Fri, 26 Aug 2016 13:24:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57su9azdE2aENiqsguPobTXJ2YGK4dG8AhQ1fP8ug46sqvMwW2bNTciFdxb8GeEs3KVsXBKwVUfvkRoK7V17Tu8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Attack Sweet32 allows you to retrieve data to and from https and openvpn]]></title><description><![CDATA[Researchers from the French State Institute for Informatics and Automation Research (INRIA) have published a detailed report on new bugs , work-related 64 -bit cipher Triple DES (3DES) and Blowfish. Operation]]></description><link>http://direct.ecency.com/itsecurity/@ultratech/attack-sweet32-allows-you-to-retrieve-data-to-and-from-https-and-openvpn</link><guid isPermaLink="true">http://direct.ecency.com/itsecurity/@ultratech/attack-sweet32-allows-you-to-retrieve-data-to-and-from-https-and-openvpn</guid><category><![CDATA[itsecurity]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Fri, 26 Aug 2016 12:38:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72k4UwDAU3myqZtHGnmTEYRWcbDAoGqbAQnovKcDiE2a7s22U1HyuwZk9LqqySsDxnhzchyDpSx2Mt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[WordFence found botnet of WordPress-site created by one person]]></title><description><![CDATA[The company's specialists WordFence discovered a botnet consisting of WordPress- site and managed by IRC. To attack the attacker used the script for 25 000 lines of code , and after a successful attack]]></description><link>http://direct.ecency.com/hack/@ultratech/wordfence-found-botnet-of-wordpress-site-created-by-one-person</link><guid isPermaLink="true">http://direct.ecency.com/hack/@ultratech/wordfence-found-botnet-of-wordpress-site-created-by-one-person</guid><category><![CDATA[hack]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Fri, 26 Aug 2016 11:55:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/3q52Dkr5nBe4WsfBSkPyYTBLmeXqE582gpNGxUstd33F2yAphSvZQvrSrXunS3CLZtxV2WHLuHjBU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Thinking about Big Data]]></title><description><![CDATA[Thinking about Big Data big data, data mining, sql Big Data is Big News, a Big Deal, and Big Business, but what is it, really? What does Big Data even mean? To those in the thick of it, Big Data is obvious]]></description><link>http://direct.ecency.com/bigdata/@ultratech/thinking-about-big-data</link><guid isPermaLink="true">http://direct.ecency.com/bigdata/@ultratech/thinking-about-big-data</guid><category><![CDATA[bigdata]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Fri, 26 Aug 2016 10:18:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVeteBBDFx7aLdEpdhQzJ4z9S3w6BGqPFPgsZkmQiyxv52q84NHYXvRpYmrKJ6QxL1TsS3JCaenUrfAtBExwJ47VSJ9Tiod1ys41SR4?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>