<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
			xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
		>

<channel>
	<title>Gigaom Search &#187; Technologies and Products &#187; malware</title>
	<atom:link href="http://search.gigaom.com/technology/malware/feed/" rel="self" type="application/rss+xml" />
	<link>http://search.gigaom.com</link>
	<description></description>
	<lastBuildDate>Wed, 11 Mar 2015 04:34:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>&#8220;Ex-Mossad&#8221; group threatened South Africa cyberattack, leaks show</title>
		<link>http://gigaom.com/2015/02/24/ex-mossad-group-threatened-south-africa-cyberattack-leaks-show/</link>
		<comments>http://gigaom.com/2015/02/24/ex-mossad-group-threatened-south-africa-cyberattack-leaks-show/#comments</comments>
		<pubDate>Wed, 25 Feb 2015 06:46:40 +0000</pubDate>
		<dc:creator><![CDATA[David Meyer]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Flame]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Mossad]]></category>
		<category><![CDATA[Palestinian]]></category>
		<category><![CDATA[south africa]]></category>
		<category><![CDATA[Spy Cables]]></category>
		<category><![CDATA[SSA]]></category>
		<category><![CDATA[Stuxnet]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=917026</guid>
		<description><![CDATA[South Africa was threatened with a serious cyberattack from people claiming to be ex-Mossad hackers, according to documents included in the "spy cables" cache that was recently leaked to Al Jazeera&#8230;]]></description>
		<wfw:commentRss>http://gigaom.com/2015/02/24/ex-mossad-group-threatened-south-africa-cyberattack-leaks-show/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Security incubator with ties to Israeli military forms with $18M</title>
		<link>https://gigaom.com/2015/02/10/security-incubator-with-ties-to-israeli-military-forms-with-18m/</link>
		<comments>https://gigaom.com/2015/02/10/security-incubator-with-ties-to-israeli-military-forms-with-18m/#comments</comments>
		<pubDate>Tue, 10 Feb 2015 13:00:48 +0000</pubDate>
		<dc:creator><![CDATA[Jonathan Vanian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Israel Defense Forces]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Unit 8200]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NYSE:SNE]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=913669</guid>
		<description><![CDATA[A new Israeli-based cyber-security incubator called Team8 plans to announce its launch on Tuesday and is banking that its ties to the Israeli military will give its startups a competitive edge&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2015/02/10/security-incubator-with-ties-to-israeli-military-forms-with-18m/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Malware makers try to cash in with fake YouTube views</title>
		<link>https://gigaom.com/2015/01/26/malware-makers-try-to-cash-in-with-fake-youtube-views/</link>
		<comments>https://gigaom.com/2015/01/26/malware-makers-try-to-cash-in-with-fake-youtube-views/#comments</comments>
		<pubDate>Mon, 26 Jan 2015 19:40:29 +0000</pubDate>
		<dc:creator><![CDATA[Janko Roettgers]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[clickfraud]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=909761</guid>
		<description><![CDATA[Programmers of malware software have found a new way of making their exploits pay: A newly-discovered scam downloads malware to unsuspecting users’ computers and then makes those machines watch YouTube videos&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2015/01/26/malware-makers-try-to-cash-in-with-fake-youtube-views/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Viral communications app Plague &#8220;infects&#8221; 150K in two months</title>
		<link>https://gigaom.com/2015/01/20/plagues-viral-communications-app-infects-150k-in-two-months/</link>
		<comments>https://gigaom.com/2015/01/20/plagues-viral-communications-app-infects-150k-in-two-months/#comments</comments>
		<pubDate>Tue, 20 Jan 2015 20:56:38 +0000</pubDate>
		<dc:creator><![CDATA[Kevin Fitchard]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[infection]]></category>
		<category><![CDATA[Plague]]></category>
		<category><![CDATA[Plague app]]></category>
		<category><![CDATA[Plague the network]]></category>
		<category><![CDATA[social networking]]></category>
		<category><![CDATA[viral networking]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:FB]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:FB]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NYSE:TWTR]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=908026</guid>
		<description><![CDATA[It’s been an interesting two months for new social communications app Plague as it tries to prove its concept of a content sharing network built entirely on viral principles. When we&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2015/01/20/plagues-viral-communications-app-infects-150k-in-two-months/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>FBI: Sony hack was North Korea&#8217;s work</title>
		<link>https://gigaom.com/2014/12/19/fbi-sony-hack-was-north-koreas-work/</link>
		<comments>https://gigaom.com/2014/12/19/fbi-sony-hack-was-north-koreas-work/#comments</comments>
		<pubDate>Fri, 19 Dec 2014 17:06:07 +0000</pubDate>
		<dc:creator><![CDATA[David Meyer]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Guardians Of Peace]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online attacks]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NYSE:SNE]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=901804</guid>
		<description><![CDATA[The U.S. Federal Bureau of Investigation has officially pointed to North Korea as the culprit behind the hacking of Sony Pictures Entertainment -- an incident that was allegedly connected with a&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2014/12/19/fbi-sony-hack-was-north-koreas-work/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Meet Plague: An app plumbing the depths of viral networking</title>
		<link>https://gigaom.com/2014/11/26/meet-plague-an-app-plumbing-the-depths-of-viral-networking/</link>
		<comments>https://gigaom.com/2014/11/26/meet-plague-an-app-plumbing-the-depths-of-viral-networking/#comments</comments>
		<pubDate>Wed, 26 Nov 2014 19:12:04 +0000</pubDate>
		<dc:creator><![CDATA[Kevin Fitchard]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[epidemic]]></category>
		<category><![CDATA[infection]]></category>
		<category><![CDATA[proximity-based]]></category>
		<category><![CDATA[social messaging]]></category>
		<category><![CDATA[social networking]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=896509</guid>
		<description><![CDATA[Plague is weird, it's a bit scary, but it's also an utterly fascinating networking concept. It uses the virus not just as a metaphor but as the underlying model for spreading&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2014/11/26/meet-plague-an-app-plumbing-the-depths-of-viral-networking/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>&#8220;Groundbreaking&#8221; state spyware targeted airlines and energy firms</title>
		<link>https://gigaom.com/2014/11/24/groundbreaking-state-spyware-targeted-airlines-and-energy-firms/</link>
		<comments>https://gigaom.com/2014/11/24/groundbreaking-state-spyware-targeted-airlines-and-energy-firms/#comments</comments>
		<pubDate>Mon, 24 Nov 2014 08:46:04 +0000</pubDate>
		<dc:creator><![CDATA[David Meyer]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Regin]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=891214</guid>
		<description><![CDATA[The malware, known as Regin, is highly sophisticated and must have been the product of a nation state, researchers at Symantec have concluded. It has targeted many kinds of individuals and&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2014/11/24/groundbreaking-state-spyware-targeted-airlines-and-energy-firms/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Detekt tool aims to tell activists if their PCs are being spied on</title>
		<link>https://gigaom.com/2014/11/20/detekt-tool-aims-to-tell-activists-if-their-pcs-are-being-spied-on/</link>
		<comments>https://gigaom.com/2014/11/20/detekt-tool-aims-to-tell-activists-if-their-pcs-are-being-spied-on/#comments</comments>
		<pubDate>Thu, 20 Nov 2014 11:23:24 +0000</pubDate>
		<dc:creator><![CDATA[David Meyer]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[amnesty international]]></category>
		<category><![CDATA[FinFisher]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy international]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=890530</guid>
		<description><![CDATA[The tool, distributed by human rights groups such as Amnesty and the EFF, is supposed to find evidence of spyware packages such as FinFisher, which is used by governments to monitor&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2014/11/20/detekt-tool-aims-to-tell-activists-if-their-pcs-are-being-spied-on/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>WireLurker malware attacks Chinese Apple users, installing bad apps on iOS devices via OS X</title>
		<link>https://gigaom.com/2014/11/06/wirelurker-malware-attacks-chinese-apple-users-installing-bad-apps-on-ios-devices-via-os-x/</link>
		<comments>https://gigaom.com/2014/11/06/wirelurker-malware-attacks-chinese-apple-users-installing-bad-apps-on-ios-devices-via-os-x/#comments</comments>
		<pubDate>Thu, 06 Nov 2014 12:07:29 +0000</pubDate>
		<dc:creator><![CDATA[David Meyer]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[enterprise provisioning]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:AAPL]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:AAPL]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=886777</guid>
		<description><![CDATA[Security researchers at Palo Alto Networks have identified a novel and nasty strain of malware that steals device and user data -- but they reckon its full functionality is yet to&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2014/11/06/wirelurker-malware-attacks-chinese-apple-users-installing-bad-apps-on-ios-devices-via-os-x/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Privacy group files UK complaint over FinFisher surveillance of Bahraini activists</title>
		<link>https://gigaom.com/2014/10/13/privacy-group-files-uk-complaint-over-finfisher-surveillance-of-bahraini-activists/</link>
		<comments>https://gigaom.com/2014/10/13/privacy-group-files-uk-complaint-over-finfisher-surveillance-of-bahraini-activists/#comments</comments>
		<pubDate>Mon, 13 Oct 2014 10:00:10 +0000</pubDate>
		<dc:creator><![CDATA[David Meyer]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Bahrain]]></category>
		<category><![CDATA[FinFisher]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=880356</guid>
		<description><![CDATA[The case involves a notorious piece of spyware, sold by a British firm, that helps spies and police all over the world gain access to their targets' computing devices.]]></description>
		<wfw:commentRss>https://gigaom.com/2014/10/13/privacy-group-files-uk-complaint-over-finfisher-surveillance-of-bahraini-activists/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>