<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 20 Apr 2026 21:26:03 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/securitythreats/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[via nakedsecurity.sophos.com: Hacked devices can be turned into acoustic weapons]]></title><description><![CDATA[by Lisa Vaas It’s bad enough that our devices can listen to us, whether it’s to use ultrasound to track us (even if we’re on an anonymous network) or whether it’s voice assistants picking up on our private]]></description><link>http://direct.ecency.com/malware/@doifeellucky/via-nakedsecurity-sophos-com-hacked-devices-can-be-turned-into-acoustic-weapons</link><guid isPermaLink="true">http://direct.ecency.com/malware/@doifeellucky/via-nakedsecurity-sophos-com-hacked-devices-can-be-turned-into-acoustic-weapons</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Wed, 14 Aug 2019 15:48:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsLaUVnWj5v4rfuehQsoVtukrb5zwdXbo5aA1Ad39Ag3xeAuev33LExpRqyBByfthe5CaWKLKEV6edqcSCRg3LM82bDG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Security Threats]]></title><description><![CDATA[DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A]]></description><link>http://direct.ecency.com/internetthreats/@jonsmith/security-threats</link><guid isPermaLink="true">http://direct.ecency.com/internetthreats/@jonsmith/security-threats</guid><category><![CDATA[internetthreats]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Wed, 01 Mar 2017 21:27:18 GMT</pubDate></item></channel></rss>