<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spyware Techie &#187; malware</title>
	<atom:link href="https://spyware-techie.com/tag/malware/feed" rel="self" type="application/rss+xml" />
	<link>https://spyware-techie.com</link>
	<description>A techie’s take on Spyware.</description>
	<lastBuildDate>Mon, 28 Dec 2020 09:27:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5</generator>
		<item>
		<title>TeleGrab: Malware that can Hijack Your Private Telegram Session</title>
		<link>https://spyware-techie.com/telegrab-malware-that-can-hijack-your-private-telegram-session</link>
		<comments>https://spyware-techie.com/telegrab-malware-that-can-hijack-your-private-telegram-session#comments</comments>
		<pubDate>Thu, 24 May 2018 08:03:37 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[hijack]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[TeleGrab]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=213721</guid>
		<description><![CDATA[A new type of malicious software dubbed TeleGrab has been discovered recently by researchers at Cisco Talos. No, it does not target ordinary users’ computers and personal data on them. Instead, it targets a cloud-based instant messaging service called Telegram. &#8230; <a href="https://spyware-techie.com/telegrab-malware-that-can-hijack-your-private-telegram-session">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/telegrab-malware-that-can-hijack-your-private-telegram-session/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Beware of Nigelthorn Malware: It Can Steal Your Facebook Credentials in No Time</title>
		<link>https://spyware-techie.com/beware-of-nigelthorn-malware-it-can-steal-your-facebook-credentials-in-no-time</link>
		<comments>https://spyware-techie.com/beware-of-nigelthorn-malware-it-can-steal-your-facebook-credentials-in-no-time#comments</comments>
		<pubDate>Wed, 16 May 2018 08:34:52 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Nigelthorn]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=213461</guid>
		<description><![CDATA[Facebook users have always been one of the major cyber criminals’ targets, so it is not surprising that new Facebook malware campaigns are launched from time to time. The newest malicious campaign was detected on the 3rd of May, 2018 &#8230; <a href="https://spyware-techie.com/beware-of-nigelthorn-malware-it-can-steal-your-facebook-credentials-in-no-time">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/beware-of-nigelthorn-malware-it-can-steal-your-facebook-credentials-in-no-time/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Have You Downloaded the Minecraft Skin? You might be Infected with Malware!</title>
		<link>https://spyware-techie.com/have-you-downloaded-the-minecraft-skin-you-might-be-infected-with-malware</link>
		<comments>https://spyware-techie.com/have-you-downloaded-the-minecraft-skin-you-might-be-infected-with-malware#comments</comments>
		<pubDate>Mon, 23 Apr 2018 09:08:26 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[infected]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Minecraft Skin]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=212301</guid>
		<description><![CDATA[Minecraft, a sandbox video game, remains one of the most popular games in the world with 74 million players around the globe, so it is not surprising that cyber criminals have developed malware and uploaded it to the game’s official &#8230; <a href="https://spyware-techie.com/have-you-downloaded-the-minecraft-skin-you-might-be-infected-with-malware">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/have-you-downloaded-the-minecraft-skin-you-might-be-infected-with-malware/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Triton: Sophisticated Malware Targeting Industrial Safety Systems</title>
		<link>https://spyware-techie.com/triton-sophisticated-malware-targeting-industrial-safety-systems</link>
		<comments>https://spyware-techie.com/triton-sophisticated-malware-targeting-industrial-safety-systems#comments</comments>
		<pubDate>Wed, 10 Jan 2018 17:44:32 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Safety]]></category>
		<category><![CDATA[Sophisticated]]></category>
		<category><![CDATA[Systems]]></category>
		<category><![CDATA[Triton]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=200971</guid>
		<description><![CDATA[Cybersecurity researchers report that malware dubbed Triton, which is, technically, an attack framework, was used in the attack against industrial safety technology used in oil, gas, nuclear, water, energy, etc. plants for the first time even though it has been &#8230; <a href="https://spyware-techie.com/triton-sophisticated-malware-targeting-industrial-safety-systems">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/triton-sophisticated-malware-targeting-industrial-safety-systems/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Latest Malware Predictions for 2018</title>
		<link>https://spyware-techie.com/the-latest-malware-predictions-for-2018</link>
		<comments>https://spyware-techie.com/the-latest-malware-predictions-for-2018#comments</comments>
		<pubDate>Fri, 05 Jan 2018 10:20:39 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[2018]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Predictions]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=200281</guid>
		<description><![CDATA[No one can see into the future, but predictions can be made. Whether or not these predictions come to reality we will know at the end of this year, but, for now, it is important to assess the threats that &#8230; <a href="https://spyware-techie.com/the-latest-malware-predictions-for-2018">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/the-latest-malware-predictions-for-2018/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How To Protect Android From Malware</title>
		<link>https://spyware-techie.com/how-to-protect-android-from-malware</link>
		<comments>https://spyware-techie.com/how-to-protect-android-from-malware#comments</comments>
		<pubDate>Thu, 14 Dec 2017 07:52:10 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Protect]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=198571</guid>
		<description><![CDATA[Popularity, arguably, is a good thing, but it also comes with certain disadvantages. Take mobile devices that run on Android, for example. The number of such devices (be it smartphones or tablets) has been continuously on the rise. According to &#8230; <a href="https://spyware-techie.com/how-to-protect-android-from-malware">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/how-to-protect-android-from-malware/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Mac malware Proton spreads through fake Symantec blog mirroring original posts</title>
		<link>https://spyware-techie.com/mac-malware-proton-spreads-through-fake-symantec-blog-mirroring-original-posts</link>
		<comments>https://spyware-techie.com/mac-malware-proton-spreads-through-fake-symantec-blog-mirroring-original-posts#comments</comments>
		<pubDate>Fri, 01 Dec 2017 07:53:54 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Proton]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=197121</guid>
		<description><![CDATA[On November 21, 2017, Symantec published a blog post warning computer users about a fake website mimicking Symantec's blog and its posts to spread a new strain of the OSX.Proton malware. The infection spread through the mirroring blog targets Mac &#8230; <a href="https://spyware-techie.com/mac-malware-proton-spreads-through-fake-symantec-blog-mirroring-original-posts">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/mac-malware-proton-spreads-through-fake-symantec-blog-mirroring-original-posts/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Sockbot Spread via 8 Apps on the Google Play Store</title>
		<link>https://spyware-techie.com/sockbot-malware-turns-android-devices-into-botnet</link>
		<comments>https://spyware-techie.com/sockbot-malware-turns-android-devices-into-botnet#comments</comments>
		<pubDate>Wed, 25 Oct 2017 08:37:12 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Sockbot]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=192761</guid>
		<description><![CDATA[Do you use an Android device? If you do, are you cautious? Unfortunately, many Android users are pretty careless when it comes to the installation of new apps. Google Play Store comes pre-installed with every Android OS, and, generally, it &#8230; <a href="https://spyware-techie.com/sockbot-malware-turns-android-devices-into-botnet">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/sockbot-malware-turns-android-devices-into-botnet/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>USB Malware</title>
		<link>https://spyware-techie.com/usb-malware</link>
		<comments>https://spyware-techie.com/usb-malware#comments</comments>
		<pubDate>Wed, 01 Aug 2012 11:35:42 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[USB]]></category>
		<category><![CDATA[USB Malware]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=18651</guid>
		<description><![CDATA[Ever since removable devices became highly popular within the computer users’ community, cyber criminals have implemented this highly useful implementation for malignant intentions. Malware spread via removables reached the peak in 2008, when, according to elsevier.nl, 25% of worms were &#8230; <a href="https://spyware-techie.com/usb-malware">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/usb-malware/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New addition to computer threat recipe on the loose</title>
		<link>https://spyware-techie.com/new-addition-to-computer-threat-recipe-on-the-loose</link>
		<comments>https://spyware-techie.com/new-addition-to-computer-threat-recipe-on-the-loose#comments</comments>
		<pubDate>Wed, 09 Feb 2011 13:26:58 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Taco]]></category>
		<category><![CDATA[threat]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/new-addition-to-computer-threat-recipe-on-the-loose/</guid>
		<description><![CDATA[These days many websites support Java applications, making them an integral part of a site. Due to the general prevalence of Java applications they are also a popular vehicle for computer malware. There is a new threat going around called &#8230; <a href="https://spyware-techie.com/new-addition-to-computer-threat-recipe-on-the-loose">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/new-addition-to-computer-threat-recipe-on-the-loose/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
