<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 16:49:06 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/websecurity/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Confidence Isn’t Security: What My Hive Hijack Taught Me]]></title><description><![CDATA[I’ve been on the blockchain since October 23, 2016. And honestly? My time on the legacy chain and on Hive has been a whole roller coaster. Messy. Brilliant. Exhausting. Weirdly life-changing. I’ve learned]]></description><link>http://direct.ecency.com/hive/@artemisnorth.com/confidence-isnt-security-what-my-hive-hijack-taught-me</link><guid isPermaLink="true">http://direct.ecency.com/hive/@artemisnorth.com/confidence-isnt-security-what-my-hive-hijack-taught-me</guid><category><![CDATA[hive]]></category><dc:creator><![CDATA[artemisnorth.com]]></dc:creator><pubDate>Fri, 19 Dec 2025 14:22:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/4bEjbgCbFMvAGbwxD9CJfJUznpDy21P1gb5kciUwoKrnYbGbNVgJCYqdcaqK8bftoH9FdncVaLzZxtWogG1AkShW8fzUe2GxVV1soRT2tAiggtsjGvPWEJhPUBazLFiUCsVaBEQbaf1Knyy6M9HbTUuyeEaTJtP6iWZ8mdQA6QNUECPMPU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Me hackearon mi cuenta de Hive… 😭😭😭 [esp/eng]]]></title><description><![CDATA[Saludos amigos! 😔 Esta Publicación la hago para contar lo que me ha sucedido el día de hoy y de alguna forma alertarlos a todos para que estén pendientes de sus cuentas de Hive y otras plataformas que]]></description><link>http://direct.ecency.com/hive-125125/@marlynmont/me-hackearon-mi-cuenta-de-hive-esp-eng</link><guid isPermaLink="true">http://direct.ecency.com/hive-125125/@marlynmont/me-hackearon-mi-cuenta-de-hive-esp-eng</guid><category><![CDATA[hive-125125]]></category><dc:creator><![CDATA[marlynmont]]></dc:creator><pubDate>Wed, 16 Jul 2025 05:05:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjW4PvRk9nXC1RsHWxNoWjhqsdMpcQg26j8xqWjRzjSLQ7UFMM9G7PM16Ug2NfoqFeQNQLGfwH4QgnJqtmK25bT7JEJ2SamEsyNbtYaeyv4iA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Plesk Hosting Security Features You Should Be Using]]></title><description><![CDATA[Plesk is a popular web hosting control panel that offers simplicity, flexibility, and a range of powerful tools. But when it comes to web hosting, security is non-negotiable. Whether you're managing client]]></description><link>http://direct.ecency.com/pleskhosting/@hostingseekers/plesk-hosting-security-features-you</link><guid isPermaLink="true">http://direct.ecency.com/pleskhosting/@hostingseekers/plesk-hosting-security-features-you</guid><category><![CDATA[pleskhosting]]></category><dc:creator><![CDATA[hostingseekers]]></dc:creator><pubDate>Wed, 09 Jul 2025 06:52:36 GMT</pubDate></item><item><title><![CDATA[via threatpost.com: Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone]]></title><description><![CDATA[Author: Tara Seals Fallout from giants at the top is one of the largest drivers of cyber-impacts on everyday people and companies. Big businesses are constantly under attack, and that affects everyone]]></description><link>http://direct.ecency.com/breach/@doifeellucky/via-threatpost-com-understanding-the-ripple-effect-large-enterprise-data-breaches-threaten-everyone</link><guid isPermaLink="true">http://direct.ecency.com/breach/@doifeellucky/via-threatpost-com-understanding-the-ripple-effect-large-enterprise-data-breaches-threaten-everyone</guid><category><![CDATA[breach]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Sat, 09 Nov 2019 21:44:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsLaUVnWj5v4rfuehQsoVtukrb5zwdXbo5aA1Ad39Ag3xeAuev33LExpRqyBByfthe5BCvyYsGn4rq4K22b1jbroybyp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[via threatpost.com: A Deepfake Deep Dive into the Murky World of Digital Imitation]]></title><description><![CDATA[Author: Lindsey O'Donnell Deepfake technology is becoming easier to create – and that’s opening the door for a new wave of malicious threats, from revenge porn to social-media misinformation. About a year]]></description><link>http://direct.ecency.com/deepfakes/@doifeellucky/via-threatpost-com-a-deepfake-deep-dive-into-the-murky-world-of-digital-imitation</link><guid isPermaLink="true">http://direct.ecency.com/deepfakes/@doifeellucky/via-threatpost-com-a-deepfake-deep-dive-into-the-murky-world-of-digital-imitation</guid><category><![CDATA[deepfakes]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Wed, 16 Oct 2019 11:22:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsLaUVnWj5v4rfuehQsoVtukrb5zwdXbo5aA1Ad39Ag3xeAuev33LExpRqyBByfthe5D5VhgLguePrise7S5RQNC2ikn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[OIO: A SOLUTION TO THE INTERNET BY PRIORITIZING USERS’ PRIVACY WITH A MORE SECURE, NON-TRACKABLE, NO-MALWARE AND AD-FREE EXPERIENCE ON THE WORLD WIDE WEB]]></title><description><![CDATA[INTRODUCTION Everyday devices that are IP-enabled can communicate over the Internet and can transmit what may be very confidential and important data. In fact, according to data from Cisco, there are now]]></description><link>http://direct.ecency.com/ico/@hiboat/oio-a-solution-to-the-internet-by-prioritizing-users-privacy-with-a-more-secure-non-trackable-no-malware-and-ad-free-experience</link><guid isPermaLink="true">http://direct.ecency.com/ico/@hiboat/oio-a-solution-to-the-internet-by-prioritizing-users-privacy-with-a-more-secure-non-trackable-no-malware-and-ad-free-experience</guid><category><![CDATA[ico]]></category><dc:creator><![CDATA[hiboat]]></dc:creator><pubDate>Mon, 23 Jul 2018 16:07:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonWToSX8tGXNY8jeXKSedJ2aRhGRj6HDecqrf33eb7iesC5KznHyHgQMecFdy3UzQwrWF9gHcumCzV9cdFXEt9UjDyDJM6vVfPKfZUKjgQe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Tips for securing a web project.]]></title><description><![CDATA[Most web applications are fast installed and ready to use. But how do I protect the installation so that it is protected from possible attackers? Unfortunately, very few ask this question and are usually]]></description><link>http://direct.ecency.com/utopian-io/@xtophercruzeu/tips-for-securing-a-web-project</link><guid isPermaLink="true">http://direct.ecency.com/utopian-io/@xtophercruzeu/tips-for-securing-a-web-project</guid><category><![CDATA[utopian-io]]></category><dc:creator><![CDATA[xtophercruzeu]]></dc:creator><pubDate>Fri, 09 Feb 2018 19:57:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPGGGXfh3U68syjwMvaH3CcpTVmAegpKyqxwkDYHV1MFnW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Free content filtering for your home network]]></title><description><![CDATA[Ever wondered, on how to block those unwanted websites at home for kids security, similar to your enterprise/office network, you can now and be the network administrator for your home network. Norton]]></description><link>http://direct.ecency.com/antivirus/@ahdrapiza/free-content-filtering-for-your-home-network</link><guid isPermaLink="true">http://direct.ecency.com/antivirus/@ahdrapiza/free-content-filtering-for-your-home-network</guid><category><![CDATA[antivirus]]></category><dc:creator><![CDATA[ahdrapiza]]></dc:creator><pubDate>Fri, 12 Jan 2018 12:39:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZuUxcEj2Eh6fgmpBzUYnHsKcraorHrbnqkzkGUJSG6vGgX5CSLMtTsTMFcnM7isC6RW7jczJp6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Web Security]]></title><description><![CDATA[Web application security, is a branch of Information Security that deals specifically with security of websites, web applications and web services. At a high level, Web application security draws on the]]></description><link>http://direct.ecency.com/websecurity/@prashantsingh/web-security</link><guid isPermaLink="true">http://direct.ecency.com/websecurity/@prashantsingh/web-security</guid><category><![CDATA[websecurity]]></category><dc:creator><![CDATA[prashantsingh]]></dc:creator><pubDate>Wed, 02 Aug 2017 13:18:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLyAJMrzqHfWLT7YbdgoprDQGwdeDRwrHn5R6x8a4MULyxawhueLEt25TjDfUKNqxTZbaM6P3jmB4hFc6bLQXhkpmWvjrxur77sbBsyiSevCBwGhJ7YzqyZry2e?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Malware Signatures to ClamAV]]></title><description><![CDATA[Malware Signatures from malware expert help improve the detection rate of malware from PHP files. Our malware signatures are generated for real life PHP malware from live Web Hosting Servers and now you]]></description><link>http://direct.ecency.com/malware/@michaelbiggs/malware-signatures-to-clamav</link><guid isPermaLink="true">http://direct.ecency.com/malware/@michaelbiggs/malware-signatures-to-clamav</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[michaelbiggs]]></dc:creator><pubDate>Thu, 13 Jul 2017 19:11:30 GMT</pubDate></item></channel></rss>