<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 24 May 2026 06:01:11 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/information-security/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[bdrive - The benchmark for information security]]></title><description><![CDATA[bdrive The benchmark for information security Screenshots Hunter's comment Our cryptography and technology might be complex, but our user interface is designed to be intuitive and straight-forward. Bdrive]]></description><link>http://direct.ecency.com/steemhunt/@teamhumble/bdrive-the-benchmark-for-information-security</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@teamhumble/bdrive-the-benchmark-for-information-security</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[teamhumble]]></dc:creator><pubDate>Mon, 14 Oct 2019 14:08:09 GMT</pubDate><enclosure url="https://i.ecency.com/p/FUkUE5bzkAZVSYs5DNdTjryubRXHMGFpeHDoWTCpMGFbknEMpkPxb66s9rAHA18J9iwiMQF9dhUQFSvDmEa3ZAx6emoEA79pVmjCFs55tk3n9jjnMszubuomVMWEezF2pE7YCWV3xVKbCdk5ZxfdJrW31NmFABZrevEi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Science and technology micro-summaries for July 17, 2019]]></title><description><![CDATA[Astronaut is a popular profession for kids in China, but kids in America and the UK would rather be Youtubers; FaceApp application claims perpetual right to use your photos; Neuralink wants to embed sensors]]></description><link>http://direct.ecency.com/rsslog/@remlaps-lite/3deeag-science-and-technology-micro-summaries-for-july-17-2019</link><guid isPermaLink="true">http://direct.ecency.com/rsslog/@remlaps-lite/3deeag-science-and-technology-micro-summaries-for-july-17-2019</guid><category><![CDATA[rsslog]]></category><dc:creator><![CDATA[remlaps-lite]]></dc:creator><pubDate>Wed, 17 Jul 2019 17:01:15 GMT</pubDate><enclosure url="https://i.ecency.com/p/X37EMQ9WSwsLaUVnWj5v4rfuehQsoVtukrb5zwdXbo5aA1Ad39Ag3xeAuevFPU9bTUrXDzwbqgyQjf8xLSHjWc4k8yqZP9HFEzimt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[2. 한순간의 실수? - 몸캠피싱! 아직도 당하니? (Porno live cam chat phishing)]]></title><description><![CDATA[안녕하세요! @secure-kor 두번째 글이네요. 인터넷 세상에는 수 많은 범죄기법이 있습니다. 그중에서 범죄자들이 꽤나(?) 짭짤한 수익을 창출해낸 범죄가 있습니다. 새로운것도 아니고 기발한것도 아닌데 꾸준하게 피해자가 생기는 범죄이기도 합니다. 스마트폰에 악성어플 설치를 유도해 현금을 갈취, 협박하는 몸캠피싱 입니다. 몸캠피싱의 타겟은 남성입니다. 청소년부터]]></description><link>http://direct.ecency.com/information-security/@secure-kor/2-porno-live-cam-chat-phishing</link><guid isPermaLink="true">http://direct.ecency.com/information-security/@secure-kor/2-porno-live-cam-chat-phishing</guid><category><![CDATA[information-security]]></category><dc:creator><![CDATA[secure-kor]]></dc:creator><pubDate>Wed, 20 Jun 2018 09:02:27 GMT</pubDate><enclosure url="https://i.ecency.com/p/JvFFVmatwWHRfvmtd53nmEJ94xpKydwmbSC5H5svBACH7ykyw7oDQ41MEtH1bjov59Jt9Y1fPj938Atgk6ATGHQHrGe18j1FHfjbpNa2JBuLqWAEXXbGPtAcaiqBAUEmMC9ethrAXG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[1. SNS 공격1위 “피싱” 스팀잇은 안전할까? - 가짜 페이스북 만들기! (Crate fake facebook login page)]]></title><description><![CDATA[안녕하세요! @secure-kor의 본격적인 첫 글이네요. (어깨에 힘빼고) 가볍게 읽을 수 있는 주제가 뭐가 있을까~? 하다가 정한 오늘의 주제는 바로!! 피싱입니다. 낚시죠 낚시.. 여러분들을 낚... 엥?ㅋ 그거 나는 안 당하는뎅 바보들만 당하는거 아닌감? 그래서! 실제 피싱 사례들을 보고 직접 모의상황을 구성해보겠습니다. 출발~! (그림1)▲합성어]]></description><link>http://direct.ecency.com/information-security/@secure-kor/1-sns-1-crate-fake-facebook-login-page</link><guid isPermaLink="true">http://direct.ecency.com/information-security/@secure-kor/1-sns-1-crate-fake-facebook-login-page</guid><category><![CDATA[information-security]]></category><dc:creator><![CDATA[secure-kor]]></dc:creator><pubDate>Mon, 18 Jun 2018 09:04:42 GMT</pubDate><enclosure url="https://i.ecency.com/p/7b4bio5hobgskW8qdPdvSqcwwJTvbiCMpGmRey1Rtd8H5qwgKuMGW4rbgv5kxLfFFoqRKwsYAwfcwPK3k8NK8wrpns2zJCoaDpz219DDdbLHyr7rmdvyevT89ccMCMfxen5h59QEhnMZGgSP9FiseQYnn1Nn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[0. 시작하는 글]]></title><description><![CDATA[음, 안녕하세요 ✌ steemit 회원가입이 약 2주 만에 승인되었네요. 뭔가 적응도 오래 걸릴 것 같고 스팀잇만에 기능(보팅, 마크다운 같은..)도 익숙해져야겠네요. newbie는 보팅봇도 불러서 인지도를 올려야 한다는데...음...? 방향성은 정보보안 공부를 정리해서 올리는 포스팅이 주가 될 것 같습니다. 에러를 뿜어내는 프로그램도 만들고! 디지털 포렌식]]></description><link>http://direct.ecency.com/kr-join/@secure-kor/0</link><guid isPermaLink="true">http://direct.ecency.com/kr-join/@secure-kor/0</guid><category><![CDATA[kr-join]]></category><dc:creator><![CDATA[secure-kor]]></dc:creator><pubDate>Thu, 14 Jun 2018 08:34:54 GMT</pubDate><enclosure url="https://i.ecency.com/p/6pu4ZRycQdDWezzYuk9QQk5myGwXv66QaMf8cduYe8i2WMB1a3wKmsu4yHhFGK5LHjkPsUNN2Bu7EJrC2VfaiW1WJv5bCccndCnVcojtN8vFcs1GWp8akfQiCgoR6aUb5o4iQn4AeKTugVriibxDVD9NPSXhUYCR13DHz8wbURTJ5g3vpXGnc7W5N4CznGaJh9MZx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[상절티사] 상대적이며 절대적인 Tworld 사전의 보안이야기 "보안 관제 모니터링... 이건 생각지도..."]]></title><description><![CDATA[[상대적이며 절대적인 Tworld 사전] 안녕하세요, 이것 저것 제가 하고 싶은 이야기를 적는 @tworld 입니다. 대문을 만들어주신 sunshineyaya7 작가님 너무 감사 드립니다. 오랜만에 보안 관련된 이야기를 또 쓰게 되었습니다. 회사에서 보안담당자로 업무를 하고 있으면서 침해대응센터 라고 불리는 보안 관제 센터를 운영을 하고 있습니다. 회사 입장에서]]></description><link>http://direct.ecency.com/kr-security/@tworld/5mgjrk-tworld</link><guid isPermaLink="true">http://direct.ecency.com/kr-security/@tworld/5mgjrk-tworld</guid><category><![CDATA[kr-security]]></category><dc:creator><![CDATA[tworld]]></dc:creator><pubDate>Mon, 21 May 2018 06:33:03 GMT</pubDate><enclosure url="https://i.ecency.com/p/cyxkEVqiiLyAJMrzqHfWLT7YbdgoprDQGwdeDRwrHsWXvvWKQqzsuoYT3fGZa9trR26dKLYF9LE3aNfLCHCdbd1xxuiDTC7Dpx9pCjneREJC9vXFFb7ki5vr7umrxnseZjU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[SecurityNews] Welcome to the launch of SecurityNews]]></title><description><![CDATA[Our goal here is to provide you with timely and easy-to-use security advice. After writing security alerts for various clients over the years, we thought it would be a good idea to spread security news,]]></description><link>http://direct.ecency.com/security/@datapipeline/securitynews-welcome-to-the-launch-of-securitynews</link><guid isPermaLink="true">http://direct.ecency.com/security/@datapipeline/securitynews-welcome-to-the-launch-of-securitynews</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[datapipeline]]></dc:creator><pubDate>Sun, 01 Apr 2018 05:02:06 GMT</pubDate></item><item><title><![CDATA[China Defense Weblog]]></title><description><![CDATA[The Reversible Strap Covers are a trendy way to make child's car seat extra comfy. They move beautifully and make an exquisite extension of your expression. Kitchen sinks are usually designed for single-deal]]></description><link>http://direct.ecency.com/weblog/@kukonkoudele/china-defense-weblog</link><guid isPermaLink="true">http://direct.ecency.com/weblog/@kukonkoudele/china-defense-weblog</guid><category><![CDATA[weblog]]></category><dc:creator><![CDATA[kukonkoudele]]></dc:creator><pubDate>Sun, 14 Jan 2018 06:36:57 GMT</pubDate></item><item><title><![CDATA[Learning from Equifax: information security and corporate culture]]></title><description><![CDATA[Before it's a technical problem, information security is a business problem. The recent breach at Equifax makes me wonder about the company's corporate culture. Here are some musings... Introduction [Image]]></description><link>http://direct.ecency.com/business/@remlaps/learning-from-equifax-information-security-and-corporate-culture</link><guid isPermaLink="true">http://direct.ecency.com/business/@remlaps/learning-from-equifax-information-security-and-corporate-culture</guid><category><![CDATA[business]]></category><dc:creator><![CDATA[remlaps]]></dc:creator><pubDate>Sat, 09 Sep 2017 15:15:36 GMT</pubDate><enclosure url="https://i.ecency.com/p/B69zEhWZA8UCqwdsYQmtbFCNS5FxcNKw8wrUTVdcYCun8KEzDnmxEX6EqC278PUA86voyGr7pND2VwFSUc3oMuGk6QXf7XBnwnSXJLwQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How an Elevated US Cyber Command Could Transform the IT Security Industry]]></title><description><![CDATA[On August 18th, 2017 the White House issued a press release indicating US Cyber Command is to be elevated to the status of a Unified Combatant Command. Currently a subsect of US Strategic Command, and]]></description><link>http://direct.ecency.com/military/@cryptobk/how-an-elevated-us-cyber-command-could-transform-the-it-security-industry</link><guid isPermaLink="true">http://direct.ecency.com/military/@cryptobk/how-an-elevated-us-cyber-command-could-transform-the-it-security-industry</guid><category><![CDATA[military]]></category><dc:creator><![CDATA[cryptobk]]></dc:creator><pubDate>Thu, 24 Aug 2017 00:28:15 GMT</pubDate><enclosure url="https://i.ecency.com/p/23KQwnti57stsAqnmSXB7pJSiMYYP3x2q8FpPkBo9m4CMhzC8KBcMK8hLZrr6ByRn4Bw6mDjF8rioEWp4evnfXhk8bWoWbY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[스팀을 시작했습니다.]]></title><description><![CDATA[가상화폐를 통해 처음 접하게된 스팀이 아직도 어떤것인지, 어떻게 돌아가는 것인지 와닿지가 않네요. 가상화폐를 알고난 이후부터 공부해야할것이 엄청 많아졌네요. 백수일때 알았더라면 얼마나 좋았을까 라는 생각이 듭니다. 직장인으로서 버는 돈을 전부 가상화폐에 투자하는 사람이 미래의 승리자가 되었으면 좋겠습니다. 이상입니다. 컨텐츠는 제가 공부한 것을 바탕으로 뽑아볼]]></description><link>http://direct.ecency.com/malware/@supremezero/3plap4</link><guid isPermaLink="true">http://direct.ecency.com/malware/@supremezero/3plap4</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[supremezero]]></dc:creator><pubDate>Mon, 21 Aug 2017 13:33:39 GMT</pubDate></item><item><title><![CDATA[Who Am I???]]></title><description><![CDATA[My passions encompass libertarian, constitutionally conservative philosophies, inventing new and innovative forms of computer hardware and software technologies that aims to strengthen and enhance society]]></description><link>http://direct.ecency.com/libertarian/@chr15par15y/who-am-i</link><guid isPermaLink="true">http://direct.ecency.com/libertarian/@chr15par15y/who-am-i</guid><category><![CDATA[libertarian]]></category><dc:creator><![CDATA[chr15par15y]]></dc:creator><pubDate>Fri, 05 Aug 2016 21:54:27 GMT</pubDate><enclosure url="https://i.ecency.com/p/ChYr1cJZCH5MBb9vmhd4fkC96RNW7jiXpcGGHU4aPqqKiq8uxDeDzDqBMXjvJqFF1X1XMfGx6x2CLFVqueX2Bojuo5oCCfCWjXNJupL5MESLUsECs1WAHSbmzme1Uih4nBgkCLg1hmdPxTeExqfqdojo5PpAGMQhcCPNdimvbKvn5aykY2wMSKB5vbWeKr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Attribution of Cyber Attacks Has Limited Value]]></title><description><![CDATA[Enterprises are the target of cyber attacks all the time. Some are minor while others make headlines. Unfortunately, the more public the incident, the greater the emphasis is placed on identifying the]]></description><link>http://direct.ecency.com/security/@mrosenquist/attribution-of-cyber-attacks-has-limited-value</link><guid isPermaLink="true">http://direct.ecency.com/security/@mrosenquist/attribution-of-cyber-attacks-has-limited-value</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 02 Aug 2016 02:10:12 GMT</pubDate><enclosure url="https://i.ecency.com/p/o1AJ9qDyyJNSg3j52kokyfvD831NZXoQRa4BTRf1ySPfNQUuk?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>