<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 14:07:30 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/cyber-criminals/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Cyber Criminals Are Using YouTube To Install Cryptojacking Malware]]></title><description><![CDATA[Slovakian software security firm Eset has uncovered that cyber criminals behind the Stantinko botnet have been distributing a Monero (XMR) cryptocurrency mining module via Youtube.On Nov. 26, the major]]></description><link>http://direct.ecency.com/dlike/@crypto.genius/cyber-criminals-are-using-youtube-to-install-cryptojacking-malware</link><guid isPermaLink="true">http://direct.ecency.com/dlike/@crypto.genius/cyber-criminals-are-using-youtube-to-install-cryptojacking-malware</guid><category><![CDATA[dlike]]></category><dc:creator><![CDATA[crypto.genius]]></dc:creator><pubDate>Wed, 27 Nov 2019 02:22:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/Mn7gs6fABveisGGZ2KMrqBgbYAZ3syoGbqzkCf6JJpaRaCR9ZHSyPHmcbU2LxkqdvsAoV3G8uBHcan93Kn5BJtdBD3Qd2pU1xCWQoz889mc6EHvv6pmaUGgvDPjUdBwu3ppb79sTNjMJZVGfhAJx3mxqFPbpB2AUQbMXyGMtvhhTLNFW5RiPhAqDDLufTWtPoPY91J1S4dt55s45RdoEjBBwG6GNUaYN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Do not use the names as a password]]></title><description><![CDATA[Many people use some simple names as an online account password. It has the advantage of remembering those passwords. Experts have warned, it is easy to guess- using a name or number as a password is]]></description><link>http://direct.ecency.com/technology/@uzzal360/do-not-use-the-names-as-a-password</link><guid isPermaLink="true">http://direct.ecency.com/technology/@uzzal360/do-not-use-the-names-as-a-password</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[uzzal360]]></dc:creator><pubDate>Wed, 05 Sep 2018 10:00:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruv8X2R8t7XDv5HGXyHWCCu4rKmbB5pmEzjYSgqDQmeYKMgVURxktZ5Nww7qAPseW3FzhDNqMXug7ebhZDSkt97idjUzi3RixsPkxjdNv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Crimes of the Internet.]]></title><description><![CDATA[          Since the beginning of time crime and criminals have always been an issue to the public. Criminals tend to change over time as the world changes]]></description><link>http://direct.ecency.com/crime/@timmothydisalvo/crimes-of-the-internet</link><guid isPermaLink="true">http://direct.ecency.com/crime/@timmothydisalvo/crimes-of-the-internet</guid><category><![CDATA[crime]]></category><dc:creator><![CDATA[timmothydisalvo]]></dc:creator><pubDate>Mon, 23 Oct 2017 07:45:48 GMT</pubDate></item></channel></rss>