<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 22 Apr 2026 04:18:35 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/mobilesecurity/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Protect your phone from SIM Hack !]]></title><description><![CDATA[If you access important information using your smartphone then you are at risk ! Especially if you have access to cryptocurrency such as bitcoin, ethereum, litecoin, etc., which can be transferred from]]></description><link>http://direct.ecency.com/cryptocurrency/@cellbones/protect-your-phone-from-sim-hack</link><guid isPermaLink="true">http://direct.ecency.com/cryptocurrency/@cellbones/protect-your-phone-from-sim-hack</guid><category><![CDATA[cryptocurrency]]></category><dc:creator><![CDATA[cellbones]]></dc:creator><pubDate>Fri, 06 Mar 2020 17:16:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kwqSXWA2evTexn6YzPHotJF8R85JZsErvtTWYDDPqbqStfvDANNs9YtRoBKbNDHwMQgnV6DZC3J4asNRvutZvdAjrrxB2EdSUGhhfSo2uaMXWKFUMkSU7J9f4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Security Threats to Consider in 2019 and Beyond]]></title><description><![CDATA["2018: Banking Trojans came out to be the most prominent threat vector for mobile devices, witnessing a growth of 150 percent!" For years, ransomware has been leading the list of threats in both]]></description><link>http://direct.ecency.com/mobilesecurity/@twr/cybersecuritythreatstoconsiderin2019andbeyond-uzqo4xvl4j</link><guid isPermaLink="true">http://direct.ecency.com/mobilesecurity/@twr/cybersecuritythreatstoconsiderin2019andbeyond-uzqo4xvl4j</guid><category><![CDATA[mobilesecurity]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 15 Nov 2019 16:15:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/FxX5caie56yp72JVBmabqxoDo76EPWpwGgxpRNBJvgJNr1WPN4BFYkBo9x1xo4XKpc7afbLpwww3ZpQKtPePTasTenYWAWzsKhjbMBReDWf8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Discovery is the new technology of Mobile Security]]></title><description><![CDATA[Scientists are continuing to research some of the most advanced phone security systems every day. After many experiments, the new technology has been successful. This information technology will come in]]></description><link>http://direct.ecency.com/mobile/@mosharraf/the-discovery-is-the-new-technology-of-mobile-security</link><guid isPermaLink="true">http://direct.ecency.com/mobile/@mosharraf/the-discovery-is-the-new-technology-of-mobile-security</guid><category><![CDATA[mobile]]></category><dc:creator><![CDATA[mosharraf]]></dc:creator><pubDate>Mon, 23 Apr 2018 03:22:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBS5wvERDA3ZF4P2WKQy2VoZZet1QV2Pxetcz16qRY5ntUYJK5HLn7D576EiZoCDmvkDNrNBdW2c2iELT4Cgrtx4U5KxcTARdZ1Rg5SChtU57dUSyqGjBc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hacking Android via Kali Linux - Mobile Security Saturday]]></title><description><![CDATA[Lesson 85 : Hacking Android Via Kali Linux MORE - #infosec]]></description><link>http://direct.ecency.com/android/@israelany/hacking-android-via-kali-linux-mobile-security-saturday</link><guid isPermaLink="true">http://direct.ecency.com/android/@israelany/hacking-android-via-kali-linux-mobile-security-saturday</guid><category><![CDATA[android]]></category><dc:creator><![CDATA[israelany]]></dc:creator><pubDate>Sat, 31 Mar 2018 15:13:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eKAVkouQjtjcC4MvRHcNUpZRs8dH55BhiFQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Mobile Security]]></title><description><![CDATA[ Mobile security, or also mobile device security has become increasingly important in mobile computing. Of particular concern is the security of personal and business information now stored on]]></description><link>http://direct.ecency.com/mobile/@khaledibnax/2wrdzn-mobile-security</link><guid isPermaLink="true">http://direct.ecency.com/mobile/@khaledibnax/2wrdzn-mobile-security</guid><category><![CDATA[mobile]]></category><dc:creator><![CDATA[khaledibnax]]></dc:creator><pubDate>Fri, 17 Nov 2017 11:02:21 GMT</pubDate></item></channel></rss>