<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spyware Techie &#187; Emails</title>
	<atom:link href="https://spyware-techie.com/tag/emails/feed" rel="self" type="application/rss+xml" />
	<link>https://spyware-techie.com</link>
	<description>A techie’s take on Spyware.</description>
	<lastBuildDate>Mon, 28 Dec 2020 09:27:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5</generator>
		<item>
		<title>Jbifrost Is Back Phishing Emails Spread A Version Of Adwind Rat</title>
		<link>https://spyware-techie.com/jbifrost-is-back-phishing-emails-spread-a-version-of-adwind-rat</link>
		<comments>https://spyware-techie.com/jbifrost-is-back-phishing-emails-spread-a-version-of-adwind-rat#comments</comments>
		<pubDate>Mon, 09 Apr 2018 06:59:33 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Adwind Rat]]></category>
		<category><![CDATA[Emails]]></category>
		<category><![CDATA[Jbifrost]]></category>
		<category><![CDATA[Spread]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=211121</guid>
		<description><![CDATA[Over the last few months we have seen several cases of Remote Access Trojan (RAT) infections, and here we would like to cover at least two cases that stood out for us. The first case is about the Adwind RAT &#8230; <a href="https://spyware-techie.com/jbifrost-is-back-phishing-emails-spread-a-version-of-adwind-rat">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/jbifrost-is-back-phishing-emails-spread-a-version-of-adwind-rat/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>1.7 Million Imgur Passwords and Emails Stolen by Cyber Attackers in 2014</title>
		<link>https://spyware-techie.com/1-7-million-imgur-passwords-and-emails-stolen-by-cyber-attackers-in-2014</link>
		<comments>https://spyware-techie.com/1-7-million-imgur-passwords-and-emails-stolen-by-cyber-attackers-in-2014#comments</comments>
		<pubDate>Fri, 01 Dec 2017 09:54:35 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Cyber Attackers]]></category>
		<category><![CDATA[Emails]]></category>
		<category><![CDATA[Passwords]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=197301</guid>
		<description><![CDATA[Imgur proudly states that the images available on imgur.com are the most viral. Unfortunately, it appears that the company should be focusing less on striking slogans and more on the protection of its users. On 23rd of November, Troy Hunt, &#8230; <a href="https://spyware-techie.com/1-7-million-imgur-passwords-and-emails-stolen-by-cyber-attackers-in-2014">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/1-7-million-imgur-passwords-and-emails-stolen-by-cyber-attackers-in-2014/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Locky Developers Sent Out 23 Million Emails Containing Lukitus Ransomware Variant In Just 24 Hours</title>
		<link>https://spyware-techie.com/locky-developers-sent-out-23-million-emails-containing-lukitus-ransomware-variant-in-just-24-hours</link>
		<comments>https://spyware-techie.com/locky-developers-sent-out-23-million-emails-containing-lukitus-ransomware-variant-in-just-24-hours#comments</comments>
		<pubDate>Tue, 26 Sep 2017 10:08:45 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Emails]]></category>
		<category><![CDATA[Locky]]></category>
		<category><![CDATA[Lukitus Ransomware]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=189471</guid>
		<description><![CDATA[Locky Ransomware Resurges Again Using 23 Million Corrupted Emails Locky Ransomware is one of those infections that continue to resurface periodically. Once the developer of this malicious threat realizes that the used distribution methods stop working – and that might &#8230; <a href="https://spyware-techie.com/locky-developers-sent-out-23-million-emails-containing-lukitus-ransomware-variant-in-just-24-hours">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/locky-developers-sent-out-23-million-emails-containing-lukitus-ransomware-variant-in-just-24-hours/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
