<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 27 Apr 2026 18:33:23 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/cybercriminal/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[New Android Malware SpyAgent Taking Screenshots Of User’s Devices]]></title><description><![CDATA[SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from screenshots stored on infected devices. By stealthily capturing screenshots, the malware]]></description><link>http://direct.ecency.com/hive-167922/@vsemmetall/new-android-malware-spyagent-taking</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@vsemmetall/new-android-malware-spyagent-taking</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[vsemmetall]]></dc:creator><pubDate>Wed, 20 Nov 2024 02:26:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/6VvuHGsoU2QCK6yq1XKF2xrUpxynFs9SFNnn3DQjxyfrhbUdq3QZ4iEoUyTCnpTLjbr1GunPwLxpY7m6YeW8WrhaueszDtoxZMNE5WMhcmd6ccG4vsFCdjqv5sHfS6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Expensive Lesson of Oversharing Crypto Wins]]></title><description><![CDATA[Source As the bull run looks sure to have started, memories of past experiences that taught me some valuable lessons keep coming into mind. When I first started to invest in crypto three years ago with]]></description><link>http://direct.ecency.com/hive-167922/@fexonice/the-expensive-lesson-of-oversharing-crypto-wins</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@fexonice/the-expensive-lesson-of-oversharing-crypto-wins</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[fexonice]]></dc:creator><pubDate>Wed, 28 Feb 2024 07:04:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/82kPqomaPXmNsjpEo1MWkrS8vWaajT1kXnirYU3XDkTx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Apple, Meta  and Discord should use Bitcoin's blockchain technology / Apple, Meta  y Discord deberían usar la tecnología blockchain de Bitcoin]]></title><description><![CDATA[Apple and Meta, two of the biggest tech companies, have been taken in by a group of cybercriminals posing as government officials. The attack in which Apple and Meta allegedly provided personal information]]></description><link>http://direct.ecency.com/hacker/@ozbitcoin2021/apple-and-meta-and-discord</link><guid isPermaLink="true">http://direct.ecency.com/hacker/@ozbitcoin2021/apple-and-meta-and-discord</guid><category><![CDATA[hacker]]></category><dc:creator><![CDATA[ozbitcoin2021]]></dc:creator><pubDate>Fri, 01 Apr 2022 21:53:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/7258xSVeJbKmTr9Z4jhbPhjS9pMWA2mTwBMDbXqkE7v4bmjxTQJfMfypRUgyLhtFSeUmr5HD2jthzJrBm2uGius3JLqqj5jUZAh7mZ4pLvRsXRbofnQZevBMuMLnmUnPxAGmohZDH9gKQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybercriminals targetting BTC Wallets]]></title><description><![CDATA[Image Source It's really bad how things got into in the crypto world where many got hacked as cyber criminality is very prone. How much the securities have been developed from the network level and hardening]]></description><link>http://direct.ecency.com/hive-167922/@mindblast.leo/cybercriminals-targetting-btc-wallets</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@mindblast.leo/cybercriminals-targetting-btc-wallets</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[mindblast.leo]]></dc:creator><pubDate>Sat, 18 Jul 2020 02:17:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/D5zH9SyxCKdAD9rYwjD1VQUnWyycM2YyeHpMi8eafHBb6RPHWuJjaYKCY8Lhio1WJrMvBXcNknfoZdeCkYkoS1NtTgrDmYXGxHDejeqB5uvdC1fVXN2EnMynDfAxwwGDzSh6DC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[SIM-swapping bitcoin hacker jailed for 10 years]]></title><description><![CDATA[A 21-year old student from Boston has been sentenced to ten years in jail for hacking SIM-cards and stealing $7.5 million worth of bitcoin and other cryptocurrencies. This was announced by the prosecutor]]></description><link>http://direct.ecency.com/bitcoin/@nederob/sim-swappingbitcoinhackerjailedfor10years-w2h7qvukj4</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@nederob/sim-swappingbitcoinhackerjailedfor10years-w2h7qvukj4</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[nederob]]></dc:creator><pubDate>Wed, 24 Apr 2019 07:47:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQiBEm1Js6S74KnSkRypDuJ8VeD4b8wFe7PZv7HM1hUona3g2sCeLHu3FdoRexHSjoRNTnUJieym1yrP8cYLZ9MFC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[DEA Agent: Speculators Are Using Bitcoin More Than Criminals]]></title><description><![CDATA[Criminals were behind roughly 90 percent of all bitcoin transactions five years ago – a figure that has now declined to 10 percent. That's according to Lilita Infante, a special agent from the U.S. Drug]]></description><link>http://direct.ecency.com/bitcoin/@syeservices/deaagentspeculatorsareusingbitcoinmorethancriminals-kjn6x0gv7j</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@syeservices/deaagentspeculatorsareusingbitcoinmorethancriminals-kjn6x0gv7j</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[syeservices]]></dc:creator><pubDate>Wed, 08 Aug 2018 06:07:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stzzfxEVzqRXfo8UMLF7SXw7bo91G8pCt5vjQFkQj2ETuzKBiE7UbQaa4nXDZQKXaZEuYXQYLeendfeTnB2Zc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[PowerGhost targets enterprise networks all over the world]]></title><description><![CDATA[#Kaspersky Lab researchers have identified a new crypto money miner named #PowerGhost. This new miner is targeting #corporate #networks in many regions, especially in #Latin #America. PowerGhost was the]]></description><link>http://direct.ecency.com/powerghost/@afl.cloud/powerghost-targets-enterprise-networks-all-over-the-world</link><guid isPermaLink="true">http://direct.ecency.com/powerghost/@afl.cloud/powerghost-targets-enterprise-networks-all-over-the-world</guid><category><![CDATA[powerghost]]></category><dc:creator><![CDATA[afl.cloud]]></dc:creator><pubDate>Fri, 27 Jul 2018 02:29:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/9vWp6aU4y8kwSZ9Gw15LFL3aMdhmgmBBFMpDJregpdP329hPWXq3aS8ffZq5aD4E9aJiX1xqBPNS6DNpUMA4jF9VY5SJUEtaCZRtx6BKALQdbPGhTzVDXWJQEU1WuBZtbz89cyNuUmiizLyr6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Not Ransomware but Cyptojacking is the latest buzzword for Cybercriminals]]></title><description><![CDATA[Ransomware seems to have taken a back seat and not it’s Crypto jacking the latest arsenal for cybercriminals, and it has increased drastically over the year. It looks like the priorities of the cybercriminals]]></description><link>http://direct.ecency.com/cryptojacking/@desson5607/not-ransomware-but-cyptojacking-is-the-latest-buzzword-for-cybercriminals</link><guid isPermaLink="true">http://direct.ecency.com/cryptojacking/@desson5607/not-ransomware-but-cyptojacking-is-the-latest-buzzword-for-cybercriminals</guid><category><![CDATA[cryptojacking]]></category><dc:creator><![CDATA[desson5607]]></dc:creator><pubDate>Thu, 19 Jul 2018 04:50:45 GMT</pubDate></item><item><title><![CDATA[CyberCriminal Are Moving To Cryptojacking From Ransomware]]></title><description><![CDATA[The Report was Published By Kaspersky Lab that is Global Security Company and they said that Cybercriminals are just moving to Crypto Mining Malware from Ransomeware Attacks. In that report they said that]]></description><link>http://direct.ecency.com/mgsc/@crypto.update/cybercriminal-are-moving-to-cryptojacking-from-ransomware</link><guid isPermaLink="true">http://direct.ecency.com/mgsc/@crypto.update/cybercriminal-are-moving-to-cryptojacking-from-ransomware</guid><category><![CDATA[mgsc]]></category><dc:creator><![CDATA[crypto.update]]></dc:creator><pubDate>Sat, 30 Jun 2018 19:27:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kwqSXWA2evTexn6YzPHotJF8R85JZsErvtTWXv3jnpu5iKnpdioaoGiBjy5ngUWgiNgbsFG8MuzTAbj21gHzkFUYSSXiYueVPvNDxW3jEFUt2vgos7sxzDxwY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Black Hat Hacker ( Kevin Mitnick )]]></title><description><![CDATA[Kevin Devid Mitnick ( Born August 6, 1963 ) is an American computer security consultant, author, and hacker, best known for his high profile 1995 arrest and later five years in prison for various computer]]></description><link>http://direct.ecency.com/busy/@edu-4-everyone/black-hat-hacker-kevin-mitnick</link><guid isPermaLink="true">http://direct.ecency.com/busy/@edu-4-everyone/black-hat-hacker-kevin-mitnick</guid><category><![CDATA[busy]]></category><dc:creator><![CDATA[edu-4-everyone]]></dc:creator><pubDate>Tue, 06 Mar 2018 04:16:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPYxNXHvnjHUzFfrnWcYYKJRymcy4Sxazsc2m2JzKioewx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Black Hat Hacker ( Ardian Lamo )]]></title><description><![CDATA[Ardian Lamo ( Born February 20, 1981 ) is a first generation Colombian-American Threat Analyst and Hacker. He first gained attention when he managed to hack into the systems of many High-Profile Companies]]></description><link>http://direct.ecency.com/busy/@edu-4-everyone/black-hat-hacker-ardian-lamo</link><guid isPermaLink="true">http://direct.ecency.com/busy/@edu-4-everyone/black-hat-hacker-ardian-lamo</guid><category><![CDATA[busy]]></category><dc:creator><![CDATA[edu-4-everyone]]></dc:creator><pubDate>Sun, 04 Mar 2018 09:39:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPYxLmhaR99BHVC547ZAfgXXcuswnqzTYJK3evKBbGQEwG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Black Hat Hacker ( Kevin 'Dark Dante' Poulsen )]]></title><description><![CDATA[Kevin Lee Poulsen ( Born November 30, 1965 ) is an American former Black Hat Hacker and a current editor at Wired. On June 1, 1990, he took over of all of the telephones lines for Los Angeles radio station]]></description><link>http://direct.ecency.com/busy/@edu-4-everyone/black-hat-hacker-kevin-dark-dante-poulsen</link><guid isPermaLink="true">http://direct.ecency.com/busy/@edu-4-everyone/black-hat-hacker-kevin-dark-dante-poulsen</guid><category><![CDATA[busy]]></category><dc:creator><![CDATA[edu-4-everyone]]></dc:creator><pubDate>Fri, 02 Mar 2018 08:17:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPGLH9njYpyzfQqdwaaTJy2YtdGTxdEMFXCr8tub5nUpWr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Black Hat Hacker ( Jonathan Joseph James )]]></title><description><![CDATA[Jonathan Joseph James ( December 12, 1983 - May 18, 2008 ) Jonathan Joseph James was an American Hacker who was the first juvenile incarcerated for cybercrime in the United States. The South Florida Native]]></description><link>http://direct.ecency.com/busy/@edu-4-everyone/black-hat-hacker-jonathan-joseph-james</link><guid isPermaLink="true">http://direct.ecency.com/busy/@edu-4-everyone/black-hat-hacker-jonathan-joseph-james</guid><category><![CDATA[busy]]></category><dc:creator><![CDATA[edu-4-everyone]]></dc:creator><pubDate>Thu, 01 Mar 2018 05:34:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPGLGGgwnV9kUmU3VKbGWmDvdPiobMSkimVEFmZ49wXAwQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Want a safer home? Technology today helps you]]></title><description><![CDATA[Of course it's a bit early to say goodbye to armoured doors and windows, but it certainly seems easier to protect our home today and also cheaper. We must therefore thank domotics, the science that studies]]></description><link>http://direct.ecency.com/technology/@pamelashaw/want-a-safer-home-technology-today-helps-you</link><guid isPermaLink="true">http://direct.ecency.com/technology/@pamelashaw/want-a-safer-home-technology-today-helps-you</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[pamelashaw]]></dc:creator><pubDate>Sat, 24 Feb 2018 18:29:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/2HeX3Zi2vTf1hsWPSEiibsUoNEhARdVYbBxrHoAPZ2RizmuPj1oxW95rTKj7RscTjLsHg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Russian hacker cracked the database of Rosobrnadzor]]></title><description><![CDATA[The hacker received the data of 14 million graduates of Russian universities by hacking the portal of Rosobrnadzor. The corresponding data appeared on the resource "Habrahabr". As the hacker]]></description><link>http://direct.ecency.com/russianhacker/@ivarskreldanton/2018-1-31t00-44-32</link><guid isPermaLink="true">http://direct.ecency.com/russianhacker/@ivarskreldanton/2018-1-31t00-44-32</guid><category><![CDATA[russianhacker]]></category><dc:creator><![CDATA[ivarskreldanton]]></dc:creator><pubDate>Tue, 30 Jan 2018 22:44:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/8hHVpauQQYxf1TfhnLExsmkqP1nY9twBGiwhHtmFfg7KHorEV6usopyRkhk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[You arrive at a cafe, you connect to the wifi and mine Bitcoins with your device ... CoffeeMiner]]></title><description><![CDATA[ The criptodivisas are fashionable, that is something undoubted and undisputed, this boom that we have in our days with cryptocurrency, mining and speculation is a bright sign for many cyber criminals.]]></description><link>http://direct.ecency.com/blockchain/@rebe.torres12/you-arrive-at-a-cafe-you-connect-to-the-wifi-and-mine-bitcoins-with-your-device-coffeeminer</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@rebe.torres12/you-arrive-at-a-cafe-you-connect-to-the-wifi-and-mine-bitcoins-with-your-device-coffeeminer</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[rebe.torres12]]></dc:creator><pubDate>Thu, 18 Jan 2018 15:45:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4iYtFdzVNy1kt3F2tvRShXkTnWxjMpLT7qYm7ZbnMUQnExSgfxFCY9eFE6bac2GaQaBvkgdkNYpExfJgRteJN3GkPquhhtk4b6mv3VALX7wSU7uYSHiCnuw7nojgXG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Attacks on Bitcoin: Is your wallet at risk?]]></title><description><![CDATA[It was only a matter of time before malware was found targeting Bitcoin and other crypto currencies. Now Kaspersky has found a Trojan that clears the wallets. Kaspersky Lab's experts have discovered]]></description><link>http://direct.ecency.com/bitcoin/@thetanvirhasan/attacks-on-bitcoin-is-your-wallet-at-risk</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@thetanvirhasan/attacks-on-bitcoin-is-your-wallet-at-risk</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[thetanvirhasan]]></dc:creator><pubDate>Sun, 05 Nov 2017 17:16:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/DVAkPJXe6RxXH3M8PrCXJKue4zR3WzubCkkuq6srayrQRvJFYEU2c5GCZsVjMxuJQVqmxLn6viWSz2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Scammer makes CAD $11 million off Canadian university in phishing hack]]></title><description><![CDATA[The education sector is one of the most targeted by cybercriminals, partly because it often overlooks compliance with government regulations on security and data protection. Unlike other industries, education]]></description><link>http://direct.ecency.com/fraud/@ciriaco/scammer-makes-cad-usd11-million-off-canadian-university-in-phishing-hack</link><guid isPermaLink="true">http://direct.ecency.com/fraud/@ciriaco/scammer-makes-cad-usd11-million-off-canadian-university-in-phishing-hack</guid><category><![CDATA[fraud]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Mon, 04 Sep 2017 15:03:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLyAJMrzqHfWLT7YbdgoprDQGwdeDRwr91QY19ETjBLYsjyFpCyCj2AWR17UpW8pgBKoaKxgSnMgwXnWu6VKbGVzZFhLU5TFZVWYmZiw263rvuNdcPB75zDTLZC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ZIP Bombs Can Help Protect Websites from Ggetting Hacked]]></title><description><![CDATA[ Webmasters can use so-called ZIP bombs to crash a hacker’s vulnerability and port scanner and prevent him from gaining access to their website.The term “ZIP bomb” refers to nested ZIP archives that]]></description><link>http://direct.ecency.com/zip/@rigidcomp/zip-bombs-can-help-protect-websites-from-ggetting-hacked</link><guid isPermaLink="true">http://direct.ecency.com/zip/@rigidcomp/zip-bombs-can-help-protect-websites-from-ggetting-hacked</guid><category><![CDATA[zip]]></category><dc:creator><![CDATA[rigidcomp]]></dc:creator><pubDate>Mon, 10 Jul 2017 18:08:00 GMT</pubDate></item></channel></rss>