<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.securitynewspaper.com/snnews_pl/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='May 17, 2026 6:39 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.securitynewspaper.com/2015/08/26/ashley-madison-puts-377000-bounty-on-hackers-heads/</loc>
		<lastmod>2015-08-27T07:14:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/26/high-heeled-hacker-builds-pen-test-kit-into-her-skyscraper-shoes/</loc>
		<lastmod>2022-05-31T18:13:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/27/patched-ins0mnia-vulnerability-keeps-malicious-ios-apps-hidden/</loc>
		<lastmod>2015-08-27T06:44:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/27/malware-menaces-poison-ads-as-google-yahoo-look-away/</loc>
		<lastmod>2015-08-27T07:59:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/27/concerns-new-tor-weakness-is-being-exploited-prompt-dark-market-shutdown/</loc>
		<lastmod>2015-08-27T08:55:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/27/dolphin-and-mercury-android-browsers-have-major-vulnerabilities/</loc>
		<lastmod>2015-08-27T11:22:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/27/autoit-used-in-targeted-attacks-to-move-rats/</loc>
		<lastmod>2015-08-27T12:30:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/28/bittorrent-kills-bug-that-turns-networks-into-a-website-slaying-weapon/</loc>
		<lastmod>2015-08-28T05:40:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/28/zero-day-angler-kit-exploits-help-drive-up-malvertising-by-325/</loc>
		<lastmod>2015-08-28T07:18:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/28/huddersfield-teen-among-six-arrested-over-cyber-attack-by-notorious-hacking-group/</loc>
		<lastmod>2015-08-28T10:29:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/28/how-a-crook-could-have-taken-over-your-facebook-pages/</loc>
		<lastmod>2015-08-28T11:59:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/28/former-intern-at-security-firm-admits-to-creating-and-selling-dendroid-malware/</loc>
		<lastmod>2015-08-28T13:08:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/31/lizardstresser-six-people-arrested-in-connection-with-lizard-squads-ddos-attack-tool/</loc>
		<lastmod>2015-08-31T05:35:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/31/ruskie-ics-hacker-drops-nine-holes-in-popular-siemens-power-plant-kit/</loc>
		<lastmod>2015-08-31T07:14:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/31/google-onhub-review-googles-smart-home-trojan-horse-is-a-200-leap-of-faith/</loc>
		<lastmod>2015-08-31T09:39:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/31/russian-speaking-hackers-breach-97-websites-many-of-them-dating-ones/</loc>
		<lastmod>2015-08-31T11:32:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/08/31/hackers-linked-to-russian-government-impersonate-eff-website-to-spread-malware/</loc>
		<lastmod>2015-08-31T12:37:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/01/malware-infecting-jailbroken-iphones-stole-225000-apple-account-logins/</loc>
		<lastmod>2015-09-01T05:25:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/01/corebot-malware-steals-credentials-for-now/</loc>
		<lastmod>2015-09-01T06:47:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/01/orx-locker-the-new-darknet-ransomware-as-a-service-platform/</loc>
		<lastmod>2015-09-01T08:47:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/01/shifu-masterful-new-banking-trojan-is-attacking-14-japanese-banks/</loc>
		<lastmod>2015-09-01T09:15:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/01/lizard-squad-cyber-attackers-disrupt-national-crime-agency-website/</loc>
		<lastmod>2015-09-01T12:16:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/01/microsoft-slips-user-tracking-tools-into-windows-7-8-amidst-windows-10-privacy-storm/</loc>
		<lastmod>2015-09-01T13:22:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/02/hidden-password-stealing-malware-lurking-in-your-gpu-card-intel-security-thinks-not/</loc>
		<lastmod>2015-09-02T05:35:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/02/upnp-trouble-puts-devices-behind-firewall-at-risk/</loc>
		<lastmod>2015-09-02T06:44:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/02/paypal-xss-vulnerability-found-fixed-before-being-exploited/</loc>
		<lastmod>2015-09-02T08:40:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/02/millions-hit-by-personal-data-hack-still-have-not-been-told/</loc>
		<lastmod>2015-09-02T10:15:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/02/create-your-own-ransomware-open-source-ransomware-malware/</loc>
		<lastmod>2015-09-02T11:53:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/03/9-baby-monitors-wide-open-to-hacks-that-expose-users-most-private-moments/</loc>
		<lastmod>2015-09-03T05:30:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/03/netflix-sleepy-puppy-awakens-xss-vulnerabilities-in-secondary-applications/</loc>
		<lastmod>2015-09-03T07:09:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/03/risk-assessment-security-hacktivism-android-ransomware-uses-xmpp-chat-to-call-home-claims-its-from-nsa/</loc>
		<lastmod>2015-09-03T09:33:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/03/attackers-can-steal-passwords-from-the-mac-keychain-via-email-or-sms/</loc>
		<lastmod>2015-09-03T10:03:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/03/sony-pictures-reaches-settlement-with-ex-employees-over-hacking/</loc>
		<lastmod>2015-09-03T11:35:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/04/new-versions-of-carbanak-banking-malware-seen-hitting-targets-in-u-s-and-europe/</loc>
		<lastmod>2015-09-04T05:23:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/04/new-android-ransomware-communicates-over-xmpp/</loc>
		<lastmod>2015-09-04T06:26:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/04/chrysler-catches-flak-for-patching-hack-via-mailed-usb/</loc>
		<lastmod>2015-09-04T07:30:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/04/more-adult-themed-android-ransomware/</loc>
		<lastmod>2015-09-04T08:22:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/04/match-com-suspends-uk-advertising-after-malware-warning/</loc>
		<lastmod>2015-09-04T10:05:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/04/24-chinese-android-smartphones-models-come-with-pre-installed-malware/</loc>
		<lastmod>2015-09-04T13:10:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/05/attacker-compromised-mozilla-bug-system-stole-private-vulnerability-data/</loc>
		<lastmod>2015-09-05T05:06:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/05/detecting-an-asymmetric-curve25519-backdoor-in-rsa-key-generation-algorithms/</loc>
		<lastmod>2015-09-05T05:56:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/05/attackers-bundle-an-old-version-of-teamviewer-to-exploit-vulnerability/</loc>
		<lastmod>2015-09-05T06:47:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/05/chrome-becomes-a-bit-less-of-a-memory-hog-with-version-45/</loc>
		<lastmod>2015-09-05T07:45:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/05/unsw-is-drunk-facebook-page-gets-hacked-on-universitys-open-day/</loc>
		<lastmod>2015-09-05T08:47:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/07/outdated-wordpress-sites-used-to-deliver-teslacrypt-ransomware/</loc>
		<lastmod>2015-09-07T05:28:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/07/coder-pleads-guilty-to-writing-gozi-banking-trojan/</loc>
		<lastmod>2015-09-07T06:55:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/07/zero-day-vulnerabilities-reportedly-found-in-kaspersky-and-fireeye-security-products/</loc>
		<lastmod>2015-09-07T10:19:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/07/self-driving-cars-are-hackable/</loc>
		<lastmod>2015-09-07T12:15:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/07/ashley-madison-hack-latest-reminder-stupid-passwords-are-stupid/</loc>
		<lastmod>2015-09-07T13:15:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/08/time-to-patch-your-firmware-backdoor-discovered-in-seagate-nas-drives/</loc>
		<lastmod>2015-09-08T05:23:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/08/reverse-engineering-ios-apps-hacking-on-lyft/</loc>
		<lastmod>2015-09-08T07:14:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/08/3l33t-haxxors-dont-need-no-botnet-they-just-pinch-passwords/</loc>
		<lastmod>2015-09-08T08:13:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/08/hundreds-million-legit-websites-could-serve-ransomware-because-of-script-injection-compromise/</loc>
		<lastmod>2015-09-08T10:13:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/08/relax-windows-10-doesnt-have-a-malicious-keylogger/</loc>
		<lastmod>2015-09-08T12:00:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/08/whatsapp-maliciouscard-vulnerabilities-allowed-attackers-to-compromise-hundreds-of-millions-of-whatsapp-users/</loc>
		<lastmod>2015-09-08T16:26:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/09/cyberespionage-group-caught-borrowing-banking-malware-code/</loc>
		<lastmod>2015-09-09T05:28:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/09/microsoft-patches-graphics-component-flaw-under-attack/</loc>
		<lastmod>2015-09-09T07:09:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/09/ios-8-4-1-kernel-vulnerabilities-in-applehdqgasgaugecontrol/</loc>
		<lastmod>2015-09-09T08:51:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/09/android-malware-secretly-subscribes-victims-to-premium-sms-services/</loc>
		<lastmod>2015-09-09T10:33:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/09/police-develop-mac-sniffing-software-to-track-stolen-devices/</loc>
		<lastmod>2015-09-09T13:24:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/10/turla-apt-group-abusing-satellite-internet-links/</loc>
		<lastmod>2015-09-10T05:20:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/10/dd4bc-hacker-group-blackmails-companies-for-bitcoin-using-ddos-attacks/</loc>
		<lastmod>2015-09-10T06:23:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/10/android-stagefright-exploit-code-released-to-public/</loc>
		<lastmod>2015-09-10T08:54:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/10/once-seen-as-bulletproof-11-million-ashley-madison-passwords-already-cracked/</loc>
		<lastmod>2015-09-10T10:51:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/10/musical-chairs-campaign-found-deploying-new-gh0st-rat-variant/</loc>
		<lastmod>2015-09-10T13:15:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/11/new-android-ransomware-locks-out-victims-by-changing-lock-screen-pin/</loc>
		<lastmod>2015-09-11T05:21:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/11/excellus-healthcare-hack-puts-10m-americans-at-risk-of-identity-theft/</loc>
		<lastmod>2015-09-11T07:27:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/11/3d-printer-blueprints-for-tsa-luggage-unlocking-master-keys-leak-online/</loc>
		<lastmod>2015-09-11T08:30:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/11/us-department-of-energy-hacked-159-times-in-4-years/</loc>
		<lastmod>2015-09-11T09:14:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/11/extracting-hashes-plaintext-passwords-from-windows-10/</loc>
		<lastmod>2015-09-11T10:17:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/12/corebot-malware-evolves-overnight-into-virulent-banking-trojan/</loc>
		<lastmod>2015-09-12T05:42:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/12/researchers-outline-vulnerabilities-in-yahoo-paypal-magento-apps/</loc>
		<lastmod>2015-09-12T06:58:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/12/website-hackers-hijack-google-webmaster-tools-to-prolong-infections/</loc>
		<lastmod>2015-09-12T07:44:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/12/first-library-to-support-anonymous-internet-browsing-effort-stops-after-dhs-e-mail/</loc>
		<lastmod>2015-09-12T08:24:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/12/ios-9-jailbreak-yes-apples-latest-version-of-ios-has-already-been-cracked/</loc>
		<lastmod>2015-09-12T09:40:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/14/north-korea-installs-backdoor-in-south-koreas-favorite-word-processor/</loc>
		<lastmod>2015-09-14T05:41:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/14/yokogawa-patches-widespread-scada-vulnerability/</loc>
		<lastmod>2015-09-14T07:27:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/14/how-did-jihadists-hack-into-top-uk-ministerial-emails-if-no-security-breach-took-place/</loc>
		<lastmod>2015-09-14T08:52:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/14/xcode-hack-confirms-2gb-ram-on-iphone-6s-4gb-on-ipad-pro/</loc>
		<lastmod>2015-09-14T09:25:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/15/hackers-could-use-atm-malware-to-steal-debit-credit-cards/</loc>
		<lastmod>2015-09-15T05:21:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/15/chipsec-module-that-exploits-uefi-boot-script-table-vulnerability/</loc>
		<lastmod>2015-09-15T06:28:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/15/tracking-a-bluetooth-skimmer-gang-in-mexico/</loc>
		<lastmod>2015-09-15T09:04:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/15/intel-announces-the-automotive-security-review-board-asrb-to-take-on-car-hackers/</loc>
		<lastmod>2015-09-15T10:22:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/15/invizbox-go-aims-to-make-mobile-privacy-painless-over-any-wi-fi/</loc>
		<lastmod>2015-09-15T11:28:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/16/corebot-adds-new-capabilities-transitions-to-banking-trojan/</loc>
		<lastmod>2015-09-16T05:13:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/16/cisco-routers-in-at-least-4-countries-infected-by-highly-stealthy-backdoor/</loc>
		<lastmod>2015-09-16T06:53:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/16/wordpress-patches-serious-shortcodes-core-engine-vulnerability/</loc>
		<lastmod>2015-09-16T07:54:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/16/facebook-sees-a-dislike-button-in-your-future/</loc>
		<lastmod>2015-09-16T09:38:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/16/androids-5-x-lock-screen-may-be-bypassed-by-attackers/</loc>
		<lastmod>2015-09-16T11:11:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/17/apple-mitigates-but-doesnt-fully-fix-critical-ios-airdrop-vulnerability/</loc>
		<lastmod>2015-09-17T05:48:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/17/microsoft-patches-xss-vulnerability-in-sharepoint-2013/</loc>
		<lastmod>2015-09-17T07:29:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/17/seven-years-of-malware-linked-to-russian-state-backed-cyberespionage/</loc>
		<lastmod>2015-09-17T09:55:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/17/nine-major-banks-working-on-bitcoin-like-block-chain-tech-for-market-trading/</loc>
		<lastmod>2015-09-17T11:52:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/17/spam-campaign-continuing-to-serve-up-malicious-js-files/</loc>
		<lastmod>2015-09-17T13:17:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/18/active-malware-campaign-uses-thousands-of-wordpress-sites-to-infect-visitors/</loc>
		<lastmod>2015-09-18T05:28:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/18/dutch-police-arrest-alleged-coinvault-ransomware-authors/</loc>
		<lastmod>2015-09-18T06:45:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/18/3d-printed-tsa-travel-sentry-keys-really-do-open-tsa-locks/</loc>
		<lastmod>2015-09-18T09:53:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/18/remove-libraries-network-homegroup-and-other-links-from-file-explorer/</loc>
		<lastmod>2015-09-18T11:19:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/18/russian-hacker-who-stole-160-million-credit-card-details-gets-sentenced-for-30-years-in-prison/</loc>
		<lastmod>2015-09-18T12:58:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/19/d-link-accidentally-leaks-private-code-signing-keys/</loc>
		<lastmod>2015-09-19T05:28:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/19/new-pos-trojan-can-download-other-malware-launch-ddos-attacks/</loc>
		<lastmod>2015-09-19T06:17:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/19/hack-brief-malware-sneaks-into-the-chinese-ios-app-store/</loc>
		<lastmod>2015-09-19T07:10:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/19/att-employees-installed-malware-on-their-pcs-to-aid-phone-unlocking-service/</loc>
		<lastmod>2015-09-19T08:29:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/19/hackers-hold-silicon-valleys-hometown-newspapers-hostage/</loc>
		<lastmod>2015-09-19T09:46:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/21/anonymous-philippines-hacks-telecom-commission-site-against-slow-internet-speed/</loc>
		<lastmod>2015-09-21T05:36:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/21/how-malware-finally-infected-apple-ios-apps-xcodeghost/</loc>
		<lastmod>2015-09-21T08:40:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/21/us-air-force-creates-an-airplane-for-hacking-enemy-military-networks/</loc>
		<lastmod>2015-09-21T10:13:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/21/linux-mangaka-mou-arrives-for-anime-and-manga-fans-based-on-ubuntu-14-04-lts/</loc>
		<lastmod>2015-09-21T12:01:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/21/bitcoinist-weekly-news-re-hash-bitpay-hack-california-bitcoin-bill-dies/</loc>
		<lastmod>2015-09-21T13:04:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/22/android-malware-steals-money-from-your-bank-account-hides-sms-transaction-alerts/</loc>
		<lastmod>2015-09-22T05:35:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/22/top-qld-sex-shop-cops-cryptowall-lock-cops-flop-as-state-biz-popped/</loc>
		<lastmod>2015-09-22T06:49:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/22/adobe-patches-23-critical-vulnerabilities-in-flash-player/</loc>
		<lastmod>2015-09-22T09:00:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/22/soon-you-may-not-be-able-to-delete-whatsapp-messages-for-90-days/</loc>
		<lastmod>2015-09-22T10:15:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/22/exploit-broker-offers-1-million-for-reliable-ios-9-exploit/</loc>
		<lastmod>2015-09-22T12:56:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/23/model-assesses-readiness-to-accept-outside-vulnerability-reports/</loc>
		<lastmod>2015-09-23T05:07:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/23/android-trojan-drops-in-despite-googles-bouncer/</loc>
		<lastmod>2015-09-23T07:20:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/23/apple-hack-exposes-flaws-in-building-apps-in-china/</loc>
		<lastmod>2015-09-23T08:44:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/23/new-adware-facilitates-the-distribution-of-trojans-for-mac-users/</loc>
		<lastmod>2015-09-23T10:46:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/23/%e2%80%8bapple-tells-devs-to-validate-xcode-after-app-store-malware-breach/</loc>
		<lastmod>2015-09-23T12:27:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/23/western-digital-my-cloud-devices-can-be-hacked-by-local-or-remote-attackers/</loc>
		<lastmod>2015-09-23T13:20:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/24/security-wares-like-kaspersky-av-can-make-you-more-vulnerable-to-attacks/</loc>
		<lastmod>2015-09-24T05:13:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/24/fingerprints-of-over-5-6-million-americans-stolen-during-the-opm-hack/</loc>
		<lastmod>2015-09-24T07:10:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/24/an-introduction-to-hardware-hacking-the-ripe-atlas-probe/</loc>
		<lastmod>2015-09-24T08:25:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/24/chinese-promotion-company-hijacks-android-devices-around-the-world/</loc>
		<lastmod>2015-09-24T10:05:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/24/hey-scandos-missed-that-parcel-heres-some-ransomware-instead/</loc>
		<lastmod>2015-09-24T13:15:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/25/ripsec-goes-to-hollywood-how-the-icloud-celeb-hack-happened/</loc>
		<lastmod>2015-09-25T05:19:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/25/cisco-patches-denial-of-service-bypass-vulnerabilities-in-ios/</loc>
		<lastmod>2015-09-25T06:59:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/25/lenovo-laptops-and-computers-come-with-pre-installed-spyware/</loc>
		<lastmod>2015-09-25T08:55:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/25/new-malware-infects-atms-dispenses-cash-on-command/</loc>
		<lastmod>2015-09-25T09:52:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/25/kovter-malware-now-lives-solely-in-the-windows-registry/</loc>
		<lastmod>2015-09-25T10:56:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/25/porn-sites-hit-by-malware-hidden-in-adverts/</loc>
		<lastmod>2015-09-25T13:28:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/26/how-hackers-can-access-iphone-contacts-and-photos-without-a-password/</loc>
		<lastmod>2015-09-26T05:15:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/26/new-attacks-recall-old-problems-with-browser-cookies/</loc>
		<lastmod>2015-09-26T06:07:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/26/yahoo-launches-gryffin-a-web-security-scanning-platform/</loc>
		<lastmod>2015-09-26T07:46:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/26/over-2000-wordpress-sites-are-infecting-users-with-spyware/</loc>
		<lastmod>2015-09-26T08:49:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/26/hackers-restore-playstation-tv-compatibility-that-was-blocked-by-sony/</loc>
		<lastmod>2015-09-26T10:16:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/26/whatsapp-hack-that-allows-user-to-steal-conversation/</loc>
		<lastmod>2015-09-26T11:01:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/28/rephone-lets-you-hack-a-cellular-radio-into-anything/</loc>
		<lastmod>2015-09-28T05:10:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/28/intelligent-system-to-check-malware-hidden-in-shortened-twitter-urls/</loc>
		<lastmod>2015-09-28T06:29:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/28/veracrypt-1-15-fixes-two-recently-reported-truecrypt-vulnerabilities/</loc>
		<lastmod>2015-09-28T08:13:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/28/advanced-microsoft-enhanced-mitigation-experience-toolkit-emet-tips/</loc>
		<lastmod>2015-09-28T11:40:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/28/new-ddos-attack-uses-smartphone-browsers-to-flood-site-with-4-5bn-requests/</loc>
		<lastmod>2015-09-28T13:08:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/29/trojan-found-pre-installed-on-some-android-devices/</loc>
		<lastmod>2015-09-29T05:18:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/29/storing-secret-crypto-keys-in-the-amazon-cloud-new-attack-can-steal-them/</loc>
		<lastmod>2015-09-29T07:26:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/29/hack-attacks-strike-top-porn-sites/</loc>
		<lastmod>2015-09-29T09:08:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/29/vba-malware-makes-a-comeback-inside-booby-trapped-word-documents/</loc>
		<lastmod>2015-09-29T10:15:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/29/pirate-bay-co-founder-gottfrid-svartholm-warg-aka-anakata-exits-prison/</loc>
		<lastmod>2015-09-29T12:38:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/30/edward-snowden-joins-twitter-and-follows-nsa/</loc>
		<lastmod>2015-09-30T05:05:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/30/dyreza-trojan-targeting-it-supply-chain-credentials/</loc>
		<lastmod>2015-09-30T06:08:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/30/latest-version-of-winrar-plagued-by-dangerous-security-bug/</loc>
		<lastmod>2015-09-30T07:39:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/30/sap-patches-12-sql-injection-xss-vulnerabilities-in-hana/</loc>
		<lastmod>2015-09-30T09:38:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/30/xor-ddos-attack-tool-being-used-to-launch-over-20-daily-attacks/</loc>
		<lastmod>2015-09-30T12:03:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/09/30/microsoft-exchange-server-fixed-against-information-disclosure-bug/</loc>
		<lastmod>2015-09-30T13:10:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/01/apple-gatekeeper-bypass-opens-door-for-malicious-code/</loc>
		<lastmod>2015-10-01T05:11:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/01/cyber-criminals-throw-molotov-cocktails-at-dr-web-antivirus-headquarters-after-being-exposed/</loc>
		<lastmod>2015-10-01T07:08:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/01/fbi-we-unmasked-and-collared-child-porn-creep-on-tor-with-spy-tool/</loc>
		<lastmod>2015-10-01T09:14:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/01/russian-hackers-tried-to-infiltrate-hillary-clintons-home-server/</loc>
		<lastmod>2015-10-01T10:35:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/01/car-hacking-tool-turns-repair-shops-into-malware-brothels/</loc>
		<lastmod>2015-10-01T11:53:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/01/stagefright-2-0-vulnerabilities-affect-1-billion-android-devices/</loc>
		<lastmod>2015-10-01T12:59:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/02/ford-toyota-nissan-microsoft-shamed-as-piracy-sponsors/</loc>
		<lastmod>2015-10-02T08:59:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/02/meet-sanmay-ved-the-indian-who-owned-google-com-for-a-minute/</loc>
		<lastmod>2015-10-02T09:05:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/02/apple-swiftly-closes-hole-in-ios-9-lock-screen/</loc>
		<lastmod>2015-10-02T09:14:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/02/15-million-t-mobile-customers-affected-in-experian-hack/</loc>
		<lastmod>2015-10-02T09:56:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/03/wordpress-jetpack-plugin-patched-against-stored-xss-vulnerability/</loc>
		<lastmod>2015-10-03T05:32:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/03/samsung-decides-not-to-patch-kernel-vulnerabilities-in-some-s4-smartphones/</loc>
		<lastmod>2015-10-03T06:52:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/03/patreon-was-warned-of-serious-website-flaw-5-days-before-it-was-hacked/</loc>
		<lastmod>2015-10-03T08:07:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/03/android-malware-disguises-as-paypal-app/</loc>
		<lastmod>2015-10-03T09:08:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/03/dangerous-resurgent-banking-malware-hits-uk/</loc>
		<lastmod>2015-10-03T10:38:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/05/how-to-intercept-satellite-communications-easily/</loc>
		<lastmod>2015-10-05T02:39:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/05/how-to-intercept-and-do-hacking-attacks-over-satellite-communications/</loc>
		<lastmod>2015-10-05T04:12:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/05/vws-neat-hack-exposes-danger-of-corporate-software/</loc>
		<lastmod>2015-10-05T06:24:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/05/yispectre-the-first-ios-malware-that-attacks-non-jailbroken-devices/</loc>
		<lastmod>2015-10-05T08:42:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/05/how-to-hack-and-decrypt-whatsapp-database-on-rooted-devices/</loc>
		<lastmod>2015-10-05T10:37:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/05/hacking-wireless-printers-with-phones-on-drones/</loc>
		<lastmod>2015-10-05T12:33:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/05/a-vigilante-hacker-is-changing-10000-wi-fi-passwords/</loc>
		<lastmod>2015-10-05T13:25:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/06/meet-greendispenser-a-new-breed-of-atm-malware/</loc>
		<lastmod>2015-10-06T05:50:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/06/new-outlook-mailserver-attack-steals-massive-number-of-passwords/</loc>
		<lastmod>2015-10-06T07:09:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/06/google-pushes-stagefright-2-0-patches-to-nexus-devices/</loc>
		<lastmod>2015-10-06T09:54:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/06/donald-trumps-hotel-chain-reveals-hack-may-have-stolen-credit-card-data/</loc>
		<lastmod>2015-10-06T11:18:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/06/how-i-could-hack-internet-bank-accounts-of-danish-largest-bank-in-a-few-minutes/</loc>
		<lastmod>2015-10-06T13:06:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/07/cisco-shuts-down-million-dollar-ransomware-operation/</loc>
		<lastmod>2015-10-07T05:15:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/07/remote-code-exec-hijack-hole-found-in-huawei-4g-usb-modems/</loc>
		<lastmod>2015-10-07T06:15:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/07/iphone-malware-is-hitting-china-lets-not-be-next/</loc>
		<lastmod>2015-10-07T08:59:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/07/hdroot-bootkit-impersonates-microsofts-net-command/</loc>
		<lastmod>2015-10-07T10:44:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/07/creators-of-the-benevolent-linux-wifatch-malware-reveal-themselves/</loc>
		<lastmod>2015-10-07T12:53:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/08/zero-day-exploit-found-in-avast-antivirus/</loc>
		<lastmod>2015-10-08T05:20:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/08/new-moker-rat-bypasses-detection/</loc>
		<lastmod>2015-10-08T06:47:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/08/kemoge-android-adware-campaign-can-lead-to-device-takeover/</loc>
		<lastmod>2015-10-08T09:14:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/08/you-can-now-back-up-whatsapp-messages-photos-and-videos-to-google-drive/</loc>
		<lastmod>2015-10-08T10:14:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/08/bitcoin-transactions-were-under-attack-for-a-week-prankster-reveals-himself/</loc>
		<lastmod>2015-10-08T12:02:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/08/sha1-algorithm-securing-e-commerce-and-software-could-break-by-years-end/</loc>
		<lastmod>2015-10-08T13:28:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/08/chinese-hackers-breached-looppay-whose-tech-is-central-to-samsung-pay/</loc>
		<lastmod>2015-10-08T13:50:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/09/backdoor-infecting-cisco-vpns-steals-customers-network-passwords/</loc>
		<lastmod>2015-10-09T04:49:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/09/webcam-hacker-spied-on-sex-acts-with-blackshades-malware/</loc>
		<lastmod>2015-10-09T12:31:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/09/disclosed-netgear-router-vulnerability-under-attack/</loc>
		<lastmod>2015-10-09T08:34:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/09/wordpress-xml-rpc-service-used-to-amplify-brute-force-attacks/</loc>
		<lastmod>2015-10-09T12:25:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/09/2015-nobel-peace-prize-is-between-snowden-pope-and-merkel/</loc>
		<lastmod>2015-10-09T13:33:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/10/european-aviation-agency-warns-of-aircraft-hacking/</loc>
		<lastmod>2015-10-10T04:44:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/10/matthew-keys-hacking-conviction-may-not-survive-an-appeal/</loc>
		<lastmod>2015-10-10T06:05:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/10/security-researcher-disappointed-with-how-an-xss-bug-was-fixed-in-drupal-8/</loc>
		<lastmod>2015-10-10T08:15:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/10/abusing-windows-management-instrumentation-wmi-to-build-a-persistent-asynchronous-and-fileless-backdoor/</loc>
		<lastmod>2015-10-10T10:11:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/10/in-a-first-chinese-hackers-are-arrested-at-the-behest-of-the-u-s-government/</loc>
		<lastmod>2015-10-10T11:04:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/12/boffins-easy-remote-hijack-hack-pops-scores-of-router-locks/</loc>
		<lastmod>2015-10-12T04:47:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/12/zeus-trojan-and-mwi-exploit-kit-used-against-israeli-public-sector/</loc>
		<lastmod>2015-10-12T05:49:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/12/kaspersky-antivirus-fixes-bug-that-allowed-attackers-to-block-windows-update-and-others-services/</loc>
		<lastmod>2015-10-12T08:24:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/12/variants-now-spawning-off-new-android-sms-malware/</loc>
		<lastmod>2015-10-12T12:08:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/12/us-ports-cyber-attacks-can-cause-the-release-of-dangerous-chemicals/</loc>
		<lastmod>2015-10-12T13:12:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/13/cops-dont-need-a-crypto-backdoor-to-get-into-your-iphone/</loc>
		<lastmod>2015-10-13T05:13:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/13/malware-attack-targets-americas-thrift-stores/</loc>
		<lastmod>2015-10-13T06:44:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/13/hackers-can-steal-your-brain-waves/</loc>
		<lastmod>2015-10-13T08:46:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/13/usb-killer-version-2-0-is-here-to-burn-and-destroy-your-computer/</loc>
		<lastmod>2015-10-13T11:00:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/13/ghost-push-malware-can-root-devices-and-install-unwanted-apps-here-is-the-fix/</loc>
		<lastmod>2015-10-13T13:39:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/14/new-zero-day-exploit-hits-fully-patched-adobe-flash/</loc>
		<lastmod>2015-10-14T05:02:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/14/jackpot-new-hacking-group-steals-150000-credit-cards-from-casino/</loc>
		<lastmod>2015-10-14T06:11:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/14/researcher-messes-up-wi-fi-with-an-rpi-and-bargain-buy-radio-stick/</loc>
		<lastmod>2015-10-14T08:10:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/14/the-vawtrak-trojan-reemerges-tougher-and-sneakier/</loc>
		<lastmod>2015-10-14T09:49:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/14/this-guy-creates-a-real-life-mjolnir-using-electromagnets-and-a-fingerprint-scanner-awesome/</loc>
		<lastmod>2015-10-14T10:49:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/14/magento-database-tool-magmi-has-a-zero-day-vulnerability/</loc>
		<lastmod>2015-10-14T12:51:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/15/hackers-use-radio-waves-to-trick-ios-and-android-into-responding-to-voice-commands/</loc>
		<lastmod>2015-10-15T11:26:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/15/hackers-being-hunted-after-stealing-30-7m-via-malware/</loc>
		<lastmod>2015-10-15T06:40:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/15/how-to-scan-whole-internet-3-7-billion-ip-addresses-in-few-minutes/</loc>
		<lastmod>2015-10-15T07:28:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/15/ios-9-untethered-jailbreak-released-for-iphone-ipad-and-ipod-touch/</loc>
		<lastmod>2015-10-15T09:57:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/15/prices-of-stolen-data-on-the-dark-web/</loc>
		<lastmod>2015-10-15T10:58:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/15/video-explainer-how-criminals-can-easily-hack-your-chip-pin-card/</loc>
		<lastmod>2015-10-15T11:47:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/15/dronedefender-is-an-anti-drone-death-ray-that-can-shoot-uavs-out-of-the-sky-with-radio-waves/</loc>
		<lastmod>2015-10-15T13:01:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/16/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/</loc>
		<lastmod>2015-10-16T05:24:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/16/brolux-trojan-targeting-japanese-online-bankers/</loc>
		<lastmod>2015-10-16T08:49:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/16/wordpress-fixes-critical-stored-xss-error-in-akismet/</loc>
		<lastmod>2015-10-16T08:48:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/16/how-to-prevent-hsts-tracking-in-firefox/</loc>
		<lastmod>2015-10-16T11:22:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/16/ultradns-server-problem-pulls-down-websites-including-netflix-for-90-minutes/</loc>
		<lastmod>2015-10-16T12:23:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/17/microsoft-is-ready-to-save-your-pc-from-huge-ransomware-infection/</loc>
		<lastmod>2015-10-17T05:16:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/17/first-major-ubuntu-touch-exploit-is-a-wake-up-call-for-canonical/</loc>
		<lastmod>2015-10-17T07:27:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/17/russian-hackers-of-dow-jones-said-to-have-sought-trading-tips/</loc>
		<lastmod>2015-10-17T08:48:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/17/how-a-few-legitimate-app-developers-threaten-the-entire-android-userbase/</loc>
		<lastmod>2015-10-17T10:36:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/17/yahoo-only-the-latest-at-kill-the-password-altar/</loc>
		<lastmod>2015-10-17T12:44:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/19/finfisher-spyware-becomes-more-popular-among-government-agencies/</loc>
		<lastmod>2015-10-19T05:21:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/19/smtp-bug-hunt-turns-up-vuln-in-libressl/</loc>
		<lastmod>2015-10-19T06:57:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/19/anonymous-shut-down-japanese-airport-websites-against-dolphin-slaughter/</loc>
		<lastmod>2015-10-19T10:18:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/19/facebook-will-warn-users-when-state-sponsored-groups-are-trying-to-hack-their-accounts/</loc>
		<lastmod>2015-10-19T12:11:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/19/researchers-find-256-ios-apps-that-collect-users-personal-info/</loc>
		<lastmod>2015-10-19T13:08:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/19/magento-websites-exploited-in-massive-malware-distribution-campaign/</loc>
		<lastmod>2015-10-19T13:32:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/20/teen-who-hacked-cia-directors-email-tells-how-he-did-it/</loc>
		<lastmod>2015-10-20T05:17:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/20/x-ray-scans-expose-an-ingenious-chip-and-pin-card-hack/</loc>
		<lastmod>2015-10-20T05:51:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/20/tricky-new-malware-replaces-your-entire-browser-with-a-dangerous-chrome-lookalike/</loc>
		<lastmod>2015-10-20T08:51:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/20/insecure-internet-connected-kettles-help-researchers-crack-wifi-networks-across-london/</loc>
		<lastmod>2015-10-20T10:49:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/20/android-6-0-re-implements-mandatory-storage-encryption-for-new-devices/</loc>
		<lastmod>2015-10-20T12:37:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/20/malware-is-using-the-dark-web-to-stay-hidden/</loc>
		<lastmod>2015-10-20T13:12:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/21/academics-find-critical-flaws-in-self-encrypting-hardware-drives/</loc>
		<lastmod>2015-10-21T04:56:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/21/support-scams-that-plagued-windows-users-for-years-now-target-mac-customers/</loc>
		<lastmod>2015-10-21T06:12:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/21/10-second-hack-jogs-fitbits-into-malware-spreading-mode/</loc>
		<lastmod>2015-10-21T07:44:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/21/multi-stage-exploit-installing-trojan/</loc>
		<lastmod>2015-10-21T10:33:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/21/with-goal-of-universal-https-lets-encrypt-reaches-important-milestone/</loc>
		<lastmod>2015-10-21T11:41:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/22/wikileaks-is-publishing-the-cia-directors-hacked-emails/</loc>
		<lastmod>2015-10-22T09:56:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/22/apple-fixes-49-security-bugs-in-ios-9-1-kills-jailbreak/</loc>
		<lastmod>2015-10-22T10:03:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/22/apple-claims-new-iphones-are-impossible-to-hack/</loc>
		<lastmod>2015-10-22T10:09:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/22/oracle-quarterly-security-update-patches-154-vulnerabilities/</loc>
		<lastmod>2015-10-22T10:17:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/22/how-to-root-xiaomi-smartphones-effectively/</loc>
		<lastmod>2015-10-22T10:28:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/22/new-attacks-on-network-time-protocol-can-defeat-https-and-create-chaos/</loc>
		<lastmod>2015-10-22T10:34:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/23/linux-kernel-4-2-4-is-now-available-for-download-has-hundreds-of-changes/</loc>
		<lastmod>2015-10-23T09:12:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/23/fitbit-trackers-can-easily-be-infected-with-malware-and-spread-it-on/</loc>
		<lastmod>2015-10-23T09:15:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/23/apple-pushes-out-critical-security-updates-for-os-x-ios-watchos-and-other-products/</loc>
		<lastmod>2015-10-23T09:21:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/23/novel-ntp-attacks-roll-back-time/</loc>
		<lastmod>2015-10-23T09:25:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/23/sony-pays-up-to-8m-over-employees-hacked-data/</loc>
		<lastmod>2015-10-23T11:04:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/24/data-of-4-million-talktalk-customers-likely-stolen-in-wake-of-website-attack/</loc>
		<lastmod>2015-10-24T07:53:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/24/privacy-advocates-launch-anonymous-calling-app/</loc>
		<lastmod>2015-10-24T07:58:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/24/joomla-update-patches-critical-sql-injection-vulnerability/</loc>
		<lastmod>2015-10-24T08:01:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/24/a-russian-cyber-spy-group-might-have-tried-to-hack-the-mh17-investigation/</loc>
		<lastmod>2015-10-24T08:08:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/24/trillions-of-facebook-posts-added-to-search-results/</loc>
		<lastmod>2015-10-24T08:16:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/26/apple-users-beware-your-payment-info-can-be-swiped-by-this-new-phishing-scam/</loc>
		<lastmod>2015-10-26T08:41:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/26/hackers-found-conducting-ddos-attacks-through-hacked-cctv-cameras/</loc>
		<lastmod>2015-10-26T08:46:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/26/security-nightmare-of-driverless-cars/</loc>
		<lastmod>2015-10-26T08:51:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/26/talktalk-hackers-demanded-80k-in-bitcoin/</loc>
		<lastmod>2015-10-26T08:55:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/26/researchers-hack-off-the-shelf-3d-printer-to-make-hearts-arteries/</loc>
		<lastmod>2015-10-26T09:00:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/27/whatsapp-collects-phone-numbers-call-duration-and-more/</loc>
		<lastmod>2015-10-27T12:06:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/27/new-campaign-shows-dridex-active-targeting-french/</loc>
		<lastmod>2015-10-27T12:18:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/27/nsa-warns-of-growing-danger-of-cyber-attack-by-nation-states/</loc>
		<lastmod>2015-10-27T12:14:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/27/how-to-completely-delete-data-from-mobile-devices/</loc>
		<lastmod>2015-10-27T12:17:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/27/as-sites-move-to-sha2-encryption-millions-face-https-lock-out/</loc>
		<lastmod>2015-10-27T12:19:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/28/senate-passes-controversial-cybersecurity-act/</loc>
		<lastmod>2015-10-28T09:37:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/28/fbi-wants-you-to-just-pay-the-ransom-to-cyber-criminals/</loc>
		<lastmod>2015-10-28T10:02:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/28/train-rider-has-his-contactless-card-e-pickpocketed/</loc>
		<lastmod>2015-10-28T17:20:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/28/fake-chrome-browser-replaces-real-thing-and-serves-up-unwanted-ads/</loc>
		<lastmod>2015-10-28T17:21:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/28/timing-attack-vulnerability-in-most-zeus-server-sides/</loc>
		<lastmod>2015-10-28T17:22:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/28/us-army-experts-call-for-military-bug-bounty-program-avrp/</loc>
		<lastmod>2015-10-28T17:23:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/29/jaguar-car-hack-in-new-zealand/</loc>
		<lastmod>2015-10-29T07:55:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/29/fewer-ipsec-vpn-connections-at-risk-from-weak-diffie-hellman/</loc>
		<lastmod>2015-10-29T07:59:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/29/when-sharing-google-links-make-sure-you-check-the-url-for-leaks-first/</loc>
		<lastmod>2015-10-29T08:05:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/29/google-http-search-yes-it-is-still-possible/</loc>
		<lastmod>2015-10-29T08:10:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/29/multi-stage-exploit-installing-trojan-2/</loc>
		<lastmod>2015-10-29T08:21:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/30/webhosting-company-loses-13-million-plaintext-passwords-says-thanks-for-your-understanding/</loc>
		<lastmod>2015-10-30T08:15:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/30/police-raid-homes-across-europe-over-droidjack-malware/</loc>
		<lastmod>2015-10-30T08:17:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/30/chikdos-cross-platform-ddos-botnet-hit-sql-servers-worldwide/</loc>
		<lastmod>2015-10-30T08:20:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/30/thousands-stolen-identities-of-britons-available-on-the-darkweb/</loc>
		<lastmod>2015-10-30T08:23:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/30/european-police-agencies-declare-war-on-droidjack-rat/</loc>
		<lastmod>2015-10-30T08:25:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/30/how-to-build-a-portable-hacking-station-with-a-raspberry-pi-and-kali-linux/</loc>
		<lastmod>2015-10-30T08:38:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/31/ietf-recognizes-onion-as-special-use-domain-name/</loc>
		<lastmod>2015-10-31T07:53:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/31/tor-launches-anti-censorship-messenger-service/</loc>
		<lastmod>2015-10-31T07:59:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/31/google-merging-chrome-os-and-android-not-so-fast/</loc>
		<lastmod>2015-10-31T08:05:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/31/report-cryptowall-creators-earned-325-million-in-bitcoin-ransoms/</loc>
		<lastmod>2015-10-31T08:11:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/10/31/european-parliament-offers-support-to-edward-snowden/</loc>
		<lastmod>2015-10-31T08:18:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/02/home-network-analysis-dvrs-and-my-network-interact/</loc>
		<lastmod>2015-11-02T06:14:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/02/vodafone-hacked-customers-personal-data-banking-information-stolen/</loc>
		<lastmod>2015-11-02T06:02:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/02/leaving-laptops-in-hotel-rooms-a-bad-idea/</loc>
		<lastmod>2015-11-02T06:05:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/02/snapchat-to-save-modify-and-republish-your-private-photos/</loc>
		<lastmod>2015-11-02T06:09:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/02/yahoos-crypto-witch-exploits-web-security-feature-learns-your-site-history/</loc>
		<lastmod>2015-11-02T06:12:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/02/how-to-exploit-new-facebook-feature-to-access-personal-photos-of-people-without-being-their-friend/</loc>
		<lastmod>2020-05-06T02:46:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/03/activision-buys-candy-crush-maker-king-for-5-9-billion/</loc>
		<lastmod>2015-11-03T07:28:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/03/browser-based-ios-9-19-2-jailbreak-wins-1m-bounty-will-be-sold-for-corporate-and-government-use/</loc>
		<lastmod>2015-11-03T07:34:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/03/maine-mendozas-twitter-account-hacked-by-anonymous-philippines/</loc>
		<lastmod>2015-11-03T07:42:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/03/third-man-arrested-over-talktalk-hack-as-vodafone-reveals-cyberattack-of-its-own/</loc>
		<lastmod>2015-11-03T07:44:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/03/this-chip-is-implanted-under-the-skin-and-used-to-pay-for-things-using-bitcoin/</loc>
		<lastmod>2015-11-03T07:56:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/04/vbulletin-password-hack-fuels-fears-of-serious-internet-wide-0-day-attacks/</loc>
		<lastmod>2015-11-05T11:23:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/04/security-researcher-creates-tool-to-extract-passwords-from-keepass-databases/</loc>
		<lastmod>2015-11-04T06:59:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/04/google-project-zero-turns-over-11-bugs-in-galaxy-s6-edge/</loc>
		<lastmod>2015-11-04T10:09:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/04/return-of-the-exif-php-joomla-backdoor/</loc>
		<lastmod>2015-11-04T11:40:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/04/stuxnet-style-code-signing-of-malware-becomes-darknet-cottage-industry/</loc>
		<lastmod>2015-11-04T13:10:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/05/new-type-of-auto-rooting-android-adware-is-nearly-impossible-to-remove/</loc>
		<lastmod>2015-11-05T05:00:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/05/russian-banks-under-attack-from-tinba-banking-botnet/</loc>
		<lastmod>2015-11-05T06:24:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/05/teen-hackers-who-doxed-cia-chief-are-targeting-more-government-officials/</loc>
		<lastmod>2015-11-05T09:50:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/05/uk-cyber-spy-law-takes-snowdens-revelations-of-mass-surveillance-and-sets-them-in-stone/</loc>
		<lastmod>2015-11-05T12:13:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/05/linux-servers-to-blame-for-45-percent-of-all-ddos-attacks-in-the-past-3-months/</loc>
		<lastmod>2015-11-05T13:18:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/06/crypto-e-mail-service-pays-6000-ransom-gets-taken-out-by-ddos-anyway/</loc>
		<lastmod>2015-11-06T05:24:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/06/jquery-min-php-malware-affects-thousands-of-websites/</loc>
		<lastmod>2015-11-06T08:16:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/06/top-fbi-lawyer-you-win-weve-given-up-on-encryption-backdoors/</loc>
		<lastmod>2015-11-06T11:32:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/06/quick-qa-with-the-author-of-mabouia-first-mac-os-x-ransomware/</loc>
		<lastmod>2015-11-06T12:16:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/07/fcc-fines-cox-for-falling-for-lizard-squad-scam-exposing-customer-data/</loc>
		<lastmod>2015-11-07T05:00:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/07/cia-email-hackers-return-with-major-law-enforcement-breach/</loc>
		<lastmod>2015-11-07T07:35:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/07/epic-fail-power-worm-ransomware-accidentally-destroys-victims-data-during-encryption/</loc>
		<lastmod>2015-11-07T08:35:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/07/the-vulnerability-that-will-rock-the-entire-java-world/</loc>
		<lastmod>2015-11-07T08:48:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/07/hidden-in-plain-sight-brute-forcing-slack-private-files/</loc>
		<lastmod>2015-11-07T10:05:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/07/ransomware-found-targeting-linux-servers-and-coding-repositories/</loc>
		<lastmod>2015-11-07T10:48:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/09/nsa-discloses-91-percent-of-zero-day-bugs-it-finds-keeps-the-rest-for-itself/</loc>
		<lastmod>2015-11-09T05:10:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/09/the-infernal-twin-tool-easy-hacking-wireless-networks/</loc>
		<lastmod>2015-11-09T07:57:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/09/54000-twitter-accounts-hacked-by-cyber-caliphate-is-anyone-safe-at-all/</loc>
		<lastmod>2015-11-09T08:56:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/09/oz-submarine-bidders-paper-over-hack-attacks-deliver-tenders-by-hand/</loc>
		<lastmod>2015-11-09T10:00:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/09/parliament-hacked-sensitive-data-stolen-used-to-hold-mp-to-ransom/</loc>
		<lastmod>2015-11-09T12:27:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/10/canonical-patches-linux-kernel-vulnerability-in-ubuntu-15-10-15-04-14-04-and-12-04-lts/</loc>
		<lastmod>2015-11-10T05:04:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/10/high-risk-sap-hana-vulnerabilities-patched/</loc>
		<lastmod>2015-11-10T05:43:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/10/man-hacks-norwich-international-airport-website-for-passengers-safety/</loc>
		<lastmod>2015-11-10T06:33:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/10/kilerrat-taking-over-where-njrat-remote-access-trojan-left-off/</loc>
		<lastmod>2015-11-10T07:02:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/10/comcast-resets-nearly-200000-passwords-after-customer-list-goes-on-sale/</loc>
		<lastmod>2015-11-10T07:23:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/11/us-banks-attacked-manipulated-and-left-heartbleeding/</loc>
		<lastmod>2015-11-11T06:32:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/11/badly-coded-ransomware-locks-away-data-forever/</loc>
		<lastmod>2015-11-11T06:43:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/11/flaw-in-linux-encoder1-ransomware-reveals-the-decryption-key/</loc>
		<lastmod>2015-11-11T06:36:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/11/cryptowall-4-0-released-with-new-features-such-as-encrypted-file-names/</loc>
		<lastmod>2015-11-11T06:40:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/11/facebook-told-by-belgian-court-to-stop-tracking-non-users/</loc>
		<lastmod>2015-11-11T06:41:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/12/ransomware-infected-the-uk-parliaments-computer-networks/</loc>
		<lastmod>2015-11-12T07:12:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/12/sap-security-patch-for-november-2015-released/</loc>
		<lastmod>2015-11-12T07:14:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/12/hackers-exploit-kaspersky-microsoft-security-products-to-install-snooping-trojan/</loc>
		<lastmod>2015-11-12T07:17:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/12/official-premier-league-fantasy-website-infected-with-malware/</loc>
		<lastmod>2015-11-12T07:20:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/12/tablets-with-pre-installed-trojan-being-sold-on-amazon/</loc>
		<lastmod>2015-11-12T07:23:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/13/pay-or-well-knock-your-site-offline-ddos-for-ransom-attacks-surge/</loc>
		<lastmod>2015-11-13T05:16:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/13/tor-fbi-paid-cmu-1-million-to-de-anonymize-users/</loc>
		<lastmod>2015-11-13T05:49:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/13/four-indicted-in-massive-jp-morgan-chase-hack/</loc>
		<lastmod>2015-11-13T06:49:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/13/chrome-for-android-has-a-hidden-vulnerability-quite-simple-to-exploit/</loc>
		<lastmod>2015-11-13T08:01:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/13/vizio-smart-tv-hacked-to-give-attackers-access-to-home-wifi-network/</loc>
		<lastmod>2015-11-13T08:43:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/13/oil-and-gas-companies-indirectly-put-at-risk-by-vulnerabilities-in-erp-systems/</loc>
		<lastmod>2015-11-13T12:23:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/14/researchers-show-how-to-remotely-listen-to-record-calls-from-samsung-galaxy-phones/</loc>
		<lastmod>2015-11-14T05:16:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/14/researchers-discover-two-new-strains-of-pos-malware/</loc>
		<lastmod>2015-11-14T06:01:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/14/csi-cyber-somehow-didnt-get-car-hacking-totally-wrongcsi-cyber-somehow-didnt-get-car-hacking-totally-wrong/</loc>
		<lastmod>2015-11-14T07:55:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/14/pos-malware-spread-via-weaponized-microsoft-word-documents/</loc>
		<lastmod>2015-11-14T10:12:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/14/brazilian-army-gets-hacked-following-cyber-games-cheating-accusations/</loc>
		<lastmod>2015-11-14T10:52:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/16/anonymous-announces-payback-for-isis-paris-attacks/</loc>
		<lastmod>2015-11-16T05:26:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/16/png-pongs-critical-bug-patched-in-ubiquitous-libpng/</loc>
		<lastmod>2015-11-16T06:37:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/16/rce-vulnerability-fully-compromises-deutsche-telekom-server/</loc>
		<lastmod>2015-11-16T09:58:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/16/more-pos-malware-just-in-time-for-christmas/</loc>
		<lastmod>2015-11-16T11:39:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/17/linux-encoder-1-ransomware-spreads-to-3000-websites/</loc>
		<lastmod>2015-11-17T05:18:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/17/bitlocker-popper-uses-windows-authentication-to-attack-itself/</loc>
		<lastmod>2015-11-17T05:50:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/17/a-guide-to-malware-binary-reconstruction/</loc>
		<lastmod>2015-11-17T06:43:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/17/xss-in-hidden-input-fields/</loc>
		<lastmod>2015-11-17T07:04:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/18/why-algebraic-eraser-may-be-the-riskiest-cryptosystem-youve-never-heard-of/</loc>
		<lastmod>2015-11-18T08:48:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/18/fbis-website-is-the-easiest-to-hack-says-hacker-who-hacked-fbi-and-home-office-from-his-bedroom/</loc>
		<lastmod>2015-11-18T10:57:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/18/seized-fake-eff-org-linked-to-hackers-hitting-nato-white-house-pcs/</loc>
		<lastmod>2015-11-18T11:54:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/18/56-million-data-records-exposed-via-cloud-based-mobile-app-backends/</loc>
		<lastmod>2015-11-18T12:39:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/19/dyreza-banking-trojan-adds-support-for-microsoft-edge-and-windows-10/</loc>
		<lastmod>2015-11-19T05:16:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/19/carnegie-mellon-denies-fbi-paid-for-tor-breaking-research/</loc>
		<lastmod>2015-11-19T06:12:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/19/canonical-patches-nvidia-graphics-drivers-vulnerability-in-all-supported-ubuntu-oses/</loc>
		<lastmod>2015-11-19T06:47:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/19/spam-campaign-causes-ddos-by-googlebot/</loc>
		<lastmod>2015-11-19T10:17:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/19/heres-a-spy-firms-price-list-for-secret-hacker-techniques/</loc>
		<lastmod>2015-11-19T11:38:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/19/secure-messaging-service-telegram-blocks-78-isis-related-channels/</loc>
		<lastmod>2015-11-19T13:25:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/20/hacked-by-china-hack-them-back-rages-us-congress-report/</loc>
		<lastmod>2015-11-20T05:21:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/20/virustotal-adds-sandbox-execution-for-os-x-apps/</loc>
		<lastmod>2015-11-20T05:28:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/20/no-money-but-pony-from-a-mail-to-a-trojan-horse/</loc>
		<lastmod>2015-11-20T06:55:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/20/600000-cable-modems-have-an-easy-to-pop-backdoor-in-a-backdoor/</loc>
		<lastmod>2015-11-20T10:19:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/20/linkedin-patches-serious-persistent-xss-vulnerability/</loc>
		<lastmod>2015-11-20T13:25:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/21/androids-accessibility-service-grants-god-mode-p0wn-power/</loc>
		<lastmod>2015-11-21T05:09:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/21/some-starwood-hotels-payment-systems-hit-by-malware/</loc>
		<lastmod>2015-11-21T05:39:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/21/ebay-scammer-steals-identity-of-the-police-officer-investigating-his-case/</loc>
		<lastmod>2015-11-21T08:51:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/21/vmware-patches-pesky-xxe-bug-in-flex-blazeds/</loc>
		<lastmod>2015-11-21T09:10:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/21/how-to-baffle-web-trackers-by-obfuscating-your-movements-online/</loc>
		<lastmod>2015-11-21T10:41:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/21/anonymous-has-now-taken-down-20000-isis-twitter-accounts-promises-to-go-on/</loc>
		<lastmod>2015-11-21T12:05:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/23/cryptinfinite-or-decryptormax-ransomware-decrypted/</loc>
		<lastmod>2015-11-23T05:21:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/23/researchers-say-theyve-cracked-the-secret-of-the-sony-pictures-hack/</loc>
		<lastmod>2015-11-23T05:55:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/23/hacking-and-exploiting-active-directory-permissions/</loc>
		<lastmod>2015-11-23T06:14:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/23/heres-the-isis-opsec-manual-used-to-train-recruits-about-cyber-security/</loc>
		<lastmod>2015-11-23T09:12:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/23/spying-on-islamic-state-instead-of-hacking-them/</loc>
		<lastmod>2015-11-23T10:27:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/24/dell-does-a-superfish-ships-pcs-with-easily-cloneable-root-certificates/</loc>
		<lastmod>2015-11-24T05:24:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/24/researchers-find-multiple-chrome-extensions-secretly-tracking-users/</loc>
		<lastmod>2015-11-24T06:38:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/24/documents-demonstrate-nsa-continued-mass-surveillance/</loc>
		<lastmod>2015-11-24T08:50:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/24/catching-eitest-compromise-year-later/</loc>
		<lastmod>2015-11-24T09:47:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/24/glassrat-zero-detection-trojan-targets-chinese-nationals/</loc>
		<lastmod>2015-11-24T17:10:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/25/10-tool-can-guess-steal-next-credit-card-number/</loc>
		<lastmod>2015-11-25T05:07:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/25/adult-apps-android-might-harboring-ransomware-scareware-sms-trojans/</loc>
		<lastmod>2015-11-25T05:48:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/25/united-airlines-slow-patch-mobile-app-vulnerability/</loc>
		<lastmod>2015-11-25T06:32:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/25/easy-hack-cellular-network/</loc>
		<lastmod>2015-11-25T09:12:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/25/gnu-org-website-says-microsofts-software-malware/</loc>
		<lastmod>2015-11-25T10:13:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/25/ransomware-tv-get-ready-coming/</loc>
		<lastmod>2015-11-25T11:22:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/26/nuclear-exploit-kit-spreading-cryptowall-4-0-ransomware/</loc>
		<lastmod>2015-11-26T06:18:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/26/criminals-steal-4-million-cash-novel-reverse-atm-attack/</loc>
		<lastmod>2015-11-26T06:26:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/26/lazy-iot-router-makers-reuse-skeleton-keys-thousands-devices-new-study/</loc>
		<lastmod>2015-11-26T07:15:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/26/dridex-spam-runs-resurface-us-targets/</loc>
		<lastmod>2015-11-26T09:00:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/26/raspberry-pi-zero-costs-just-5-outperforms-first-raspberry-pi/</loc>
		<lastmod>2015-11-26T11:55:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/27/hackers-can-hijack-wi-fi-hello-barbie-spy-children/</loc>
		<lastmod>2015-11-27T05:33:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/27/vts-scans-android-devices-publicly-known-vulnerabilities/</loc>
		<lastmod>2015-11-27T06:03:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/27/httpsohopeless-26000-telstra-cisco-boxen-open-device-hijacking/</loc>
		<lastmod>2015-11-27T06:43:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/27/isis-ghost-sec-anonymous-hack-islamic-state-website/</loc>
		<lastmod>2015-11-27T07:57:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/27/vpn-vulnerability-port-fail-reveals-users-real-ip-address/</loc>
		<lastmod>2015-11-27T12:23:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/28/children-breached-inside-massive-vtech-hack/</loc>
		<lastmod>2015-11-28T05:22:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/28/google-translate-website-affected-xss-bug-google-says-ok/</loc>
		<lastmod>2015-11-28T06:32:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/28/windows-phone-hacked-unlock-lumia-bootloader-get-root-access-flash-custom-roms/</loc>
		<lastmod>2015-11-28T07:22:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/28/russians-embrace-bitcoins-west-sticks-paypal/</loc>
		<lastmod>2015-11-28T09:08:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/30/decryptormax-ransomware-decrypted-no-need-pay-ransom/</loc>
		<lastmod>2015-11-30T05:14:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/30/anonymous-takes-five-government-websites-iceland-protest-whale-hunting/</loc>
		<lastmod>2015-11-30T06:08:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/30/chinas-fringes-cyber-spies-raise-game/</loc>
		<lastmod>2015-11-30T09:38:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/30/nsa-shut-bulk-phone-surveillance-program-sunday/</loc>
		<lastmod>2015-11-30T11:51:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/11/30/multiple-serious-vulnerabilities-rsi-videofieds-alarm-protocol/</loc>
		<lastmod>2015-11-30T13:33:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/01/embedded-devices-share-reuse-private-ssh-keys-https-certificates/</loc>
		<lastmod>2015-12-01T05:08:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/01/hacking-smartwatches-tomtom-runner/</loc>
		<lastmod>2015-12-01T05:30:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/01/cant-get-break-pwned-linux-ransomware-pwned-infects-3000/</loc>
		<lastmod>2015-12-01T07:55:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/01/hack-brief-hacker-strikes-kids-gadget-maker-vtech-steal-5-million-accounts/</loc>
		<lastmod>2015-12-01T11:07:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/01/whatsapp-blocking-links-competing-messenger-app/</loc>
		<lastmod>2015-12-01T11:55:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/01/malware-hides-cc-server-dropbox-detected-wild/</loc>
		<lastmod>2015-12-01T13:08:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/02/patent-troll-sues-big-companies-https/</loc>
		<lastmod>2015-12-02T05:19:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/02/greek-banks-hit-bitcoin-ransom-demand/</loc>
		<lastmod>2015-12-02T06:27:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/02/tech-support-scams-join-forces-nuclear-eks-distribute-ransomware/</loc>
		<lastmod>2015-12-02T07:40:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/02/australia-bureau-meteorology-hacked/</loc>
		<lastmod>2015-12-02T08:47:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/02/critical-medical-equipment-vulnerable-ldap-sql-injection-attacks/</loc>
		<lastmod>2015-12-02T12:09:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/02/microsofts-enterprise-security-software-now-offers-pua-protection/</loc>
		<lastmod>2015-12-02T13:14:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/03/advantech-ics-gear-still-vulnerable-shellshock-heartbleed/</loc>
		<lastmod>2015-12-03T05:13:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/03/gchq-admits-first-time-persistent-hacking-uk-abroad/</loc>
		<lastmod>2015-12-03T06:37:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/03/critical-vulnerabilities-3g4g-modems/</loc>
		<lastmod>2015-12-03T07:00:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/03/china-arrested-hackers-suspected-opm-hack/</loc>
		<lastmod>2015-12-03T08:47:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/03/accidental-ddos-takes-googles-european-cloud/</loc>
		<lastmod>2015-12-03T10:02:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/03/elasticzombie-botnet-exploiting-elasticsearch-vulnerabilities/</loc>
		<lastmod>2015-12-03T12:00:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/04/hacker-leaks-customer-data-united-arab-emirates-bank-fails-pay-ransom/</loc>
		<lastmod>2015-12-04T05:19:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/04/jd-wetherspoon-pub-chain-warns-customers-hack/</loc>
		<lastmod>2015-12-04T05:41:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/04/hack-remote-windows-pc-using-backdoor-factory-metasploit/</loc>
		<lastmod>2015-12-04T06:49:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/04/ponmocup-never-underestimate-botnet-infected-15-million-pcs/</loc>
		<lastmod>2015-12-04T07:41:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/04/new-ransomware-campaign-pilfers-passwords-encrypting-gigabytes-data/</loc>
		<lastmod>2015-12-04T10:18:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/04/kazakhstan-will-force-citizens-install-internet-backdoors/</loc>
		<lastmod>2015-12-04T11:45:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/05/variety-jones-alleged-silk-road-mentor-arrested-thailand/</loc>
		<lastmod>2015-12-05T05:26:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/05/tell-android-hacked/</loc>
		<lastmod>2015-12-07T17:03:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/05/hack-tor-hidden-services/</loc>
		<lastmod>2015-12-05T06:30:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/05/relentless-sofacy-apt-attacks-armed-zero-days-new-backdoors/</loc>
		<lastmod>2015-12-05T07:54:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/05/how-to-hack-smartphones/</loc>
		<lastmod>2015-12-05T09:47:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/07/hackers-build-rootnik-trojan-top-android-rooting-toolkit/</loc>
		<lastmod>2015-12-07T05:17:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/07/3-year-old-vulnerability-affects-millions-smart-tvs-phones-routers/</loc>
		<lastmod>2015-12-07T06:17:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/07/infostealers-exploit-kits-ransomware-just-typical-malware-campaign/</loc>
		<lastmod>2015-12-07T06:25:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/07/france-proposes-ban-tor-forbid-free-wi-fi/</loc>
		<lastmod>2015-12-07T09:07:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/07/java-deserialization-vulnerability-found-java-libraries/</loc>
		<lastmod>2015-12-07T13:17:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/08/nemesis-malware-hijacks-pcs-boot-process-gain-stealth-persistence/</loc>
		<lastmod>2015-12-08T05:04:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/08/malware-steals-ios-blackberry-backups-via-infected-pcs/</loc>
		<lastmod>2015-12-08T05:48:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/08/microsoft-edges-javascript-engine-go-open-source/</loc>
		<lastmod>2015-12-08T07:50:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/08/google-patches-critical-vulnerabilities-android/</loc>
		<lastmod>2015-12-08T10:30:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/08/personal-data-dutch-telecom-providers-extremely-poorly-protected-access-12-million-records-phonehousegate/</loc>
		<lastmod>2015-12-08T12:13:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/08/learn-eliot-mr-robot-hacked-therapists-new-boyfriends-email-bank-accounts/</loc>
		<lastmod>2015-12-08T13:27:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/09/internets-root-servers-take-hit-ddos-attack/</loc>
		<lastmod>2015-12-09T05:33:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/09/apple-patches-50-vulnerabilities-across-ios-os-x-safari/</loc>
		<lastmod>2015-12-09T05:47:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/09/malware-analysis-dridex-process-hollowing/</loc>
		<lastmod>2015-12-09T07:09:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/09/bitcoins-creator-satoshi-nakamoto-probably-unknown-australian-genius/</loc>
		<lastmod>2015-12-09T09:42:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/09/chinese-researchers-develop-mind-controlled-car/</loc>
		<lastmod>2015-12-09T13:01:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/09/dns-root-servers-hit-ddos-attack/</loc>
		<lastmod>2015-12-09T13:21:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/10/hacker-lexicon-malvertising-hack-infects-computers-without-click/</loc>
		<lastmod>2015-12-10T04:55:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/10/raspberry-pi-2-wifi-epic-sdio-hack/</loc>
		<lastmod>2015-12-10T05:36:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/10/google-nasa-quantum-computer-100-million-times-faster-normal-pc/</loc>
		<lastmod>2015-12-10T06:38:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/10/kaspersky-mcafee-avg-vulnerable-major-flaw/</loc>
		<lastmod>2015-12-10T08:36:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/10/fbi-head-terror-fight-requires-open-backdoors-encrypted-user-data/</loc>
		<lastmod>2015-12-10T11:52:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/10/webhost-easily-hit-malware-attack/</loc>
		<lastmod>2015-12-10T13:10:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/10/us-embassy-worker-hacked-sex-images/</loc>
		<lastmod>2015-12-10T13:20:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/11/steam-tightens-trading-security-amid-77000-monthly-account-hijackings/</loc>
		<lastmod>2015-12-11T05:12:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/11/new-spy-banker-trojan-telax-abusing-google-cloud-servers/</loc>
		<lastmod>2015-12-11T05:32:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/11/apt-group-upgrades-malware-black-market-dangerous-backdoor/</loc>
		<lastmod>2015-12-11T06:27:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/11/hackers-add-exploit-kit-article-asking-cyber-crime-control/</loc>
		<lastmod>2015-12-11T08:41:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/11/british-spooks-hack-childrens-toys-spying/</loc>
		<lastmod>2015-12-11T11:11:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/11/firestorm-severe-security-flaw-discovered-next-generation-firewalls/</loc>
		<lastmod>2015-12-11T13:31:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/12/anonymous-github-clone-runs-dark-web/</loc>
		<lastmod>2015-12-12T05:04:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/12/tor-hires-new-leader-help-combat-war-privacy/</loc>
		<lastmod>2015-12-12T05:33:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/12/spike-malvertising-attacks-via-nuclear-ek-pushes-ransomware/</loc>
		<lastmod>2015-12-12T07:20:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/12/website-malware-evolution-pseudo-darkleech/</loc>
		<lastmod>2015-12-12T09:44:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/12/anonymous-just-declared-war-donald-trump/</loc>
		<lastmod>2015-12-12T10:42:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/14/anonymous-hacks-european-space-agency-just-fun/</loc>
		<lastmod>2015-12-14T05:13:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/14/latentbot-one-highly-obfuscated-backdoor-wild/</loc>
		<lastmod>2015-12-14T06:16:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/14/mit-creates-untraceable-anonymous-messaging-system-called-vuvuzela/</loc>
		<lastmod>2015-12-14T09:50:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/14/fairly-bad-core-bug-crushed-linux-4-4-rc5/</loc>
		<lastmod>2015-12-14T13:05:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/15/hackers-actively-exploit-critical-vulnerability-sites-running-joomla/</loc>
		<lastmod>2015-12-15T05:02:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/15/rat-trap-norway-police-nab-five-remote-access-trojan-europol-swoop/</loc>
		<lastmod>2015-12-15T05:38:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/15/government-shouldve-learned-backdoors-clipper-chip/</loc>
		<lastmod>2015-12-15T08:28:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/15/mackeeper-exposed-details-13-million-users/</loc>
		<lastmod>2015-12-15T09:38:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/15/two-mobile-banking-trojans-used-facebook-parse-cc-server/</loc>
		<lastmod>2015-12-15T12:24:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/16/implement-enterprise-data-protection-services-solutions/</loc>
		<lastmod>2015-12-16T01:16:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/16/hacker-lexicon-botnets-zombie-computer-armies-earn-hackers-millions/</loc>
		<lastmod>2015-12-16T05:04:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/16/man-arrested-toymaker-hack-exposed-data-millions-kids/</loc>
		<lastmod>2015-12-16T05:33:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/16/tokyo-uses-drone-equipped-giant-net-catch-illegally-flying-drones/</loc>
		<lastmod>2015-12-16T07:30:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/16/toyota-corolla-hybrid-car-hacked-via-smartphone/</loc>
		<lastmod>2015-12-16T09:37:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/16/fireeye-security-devices-provide-attackers-backdoor-corporate-networks/</loc>
		<lastmod>2015-12-16T12:51:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/17/intense-nemucod-malware-campaign-spreads-teslacrypt-ransomware/</loc>
		<lastmod>2015-12-17T05:08:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/17/four-network-management-systems-vulnerable-sqli-xss-attacks/</loc>
		<lastmod>2015-12-17T05:31:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/17/comcast-users-hit-malvertising-exploit-kit-tech-support-scam-one-go/</loc>
		<lastmod>2015-12-17T05:51:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/17/4-android-notes-apps-cant-hacked/</loc>
		<lastmod>2015-12-17T10:08:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/17/hack-like-pro-digital-forensics-aspiring-hacker/</loc>
		<lastmod>2015-12-17T11:39:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/17/can-hack-linux-system-pressing-backspace-28-times/</loc>
		<lastmod>2015-12-17T12:53:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/18/unauthorized-code-juniper-firewalls-decrypts-encrypted-vpn-traffic/</loc>
		<lastmod>2015-12-18T05:23:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/18/outlook-letterbomb-exploit-auto-open-attacks-e-mail/</loc>
		<lastmod>2015-12-18T05:50:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/18/greatest-hits-samy-kamkar-youtubes-favorite-hacker/</loc>
		<lastmod>2015-12-18T09:08:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/18/researcher-hacks-instagram-gets-backend-access/</loc>
		<lastmod>2015-12-18T09:55:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/18/ios-trojan-tinyv-attacks-jailbroken-devices/</loc>
		<lastmod>2015-12-18T11:54:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/19/xbox-live-pummeled-ddos-attack-hacker-group-claims-responsibility/</loc>
		<lastmod>2015-12-19T05:14:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/19/slembunk-android-banking-trojan-targets-31-banks-across-world/</loc>
		<lastmod>2015-12-19T06:00:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/19/new-improved-macro-malware-hitting-microsoft-office/</loc>
		<lastmod>2015-12-19T06:57:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/19/first-person-hack-iphone-built-self-driving-car-garage/</loc>
		<lastmod>2015-12-19T08:50:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/19/simple-pro-pos-malware-cause-retail-havoc-christmas/</loc>
		<lastmod>2015-12-19T10:47:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/21/data-breach-hello-kitty-servers-3-3-million-accounts-exposed/</loc>
		<lastmod>2015-12-21T06:02:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/21/netspot-maps-wi-fi-network-diagnoses-signal-problems-free/</loc>
		<lastmod>2015-12-21T08:12:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/21/deadline-better-encryption-payment-systems-pushed-back-two-years/</loc>
		<lastmod>2015-12-21T11:31:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/21/hack-mac-without-password/</loc>
		<lastmod>2015-12-21T12:34:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/21/evolving-microsoft-smartscreen-protect-drive-attacks/</loc>
		<lastmod>2015-12-21T13:07:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/22/gomasom-ransomware-decrypted-get-files-back-free/</loc>
		<lastmod>2015-12-22T06:01:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/22/hack-brief-hello-kitty-sites-spill-details-3-3-million-users/</loc>
		<lastmod>2015-12-22T07:03:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/22/oracle-settles-ftc-javas-deceptive-security-patching/</loc>
		<lastmod>2015-12-22T10:39:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/22/angler-exploit-kit-includes-code-recent-flash-flaw/</loc>
		<lastmod>2015-12-22T13:06:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/22/hackers-grab-deluge-qbittorrent-user-databases/</loc>
		<lastmod>2015-12-22T13:15:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/23/yahoo-warn-users-state-sponsored-attacks/</loc>
		<lastmod>2015-12-23T05:14:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/23/quantum-cryptography-vulnerable-attack/</loc>
		<lastmod>2015-12-23T06:08:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/23/cybercriminals-using-facebook-push-spy-banker-trojan/</loc>
		<lastmod>2015-12-23T06:44:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/23/whatsapp-crash-v2-crashing-pc-browser-mobile-app/</loc>
		<lastmod>2015-12-23T09:43:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/23/u-s-says-hacker-stole-ids-unreleased-scripts-host-celebrities/</loc>
		<lastmod>2015-12-23T12:58:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/24/riddle-cash-malware-offer-new-raspberry-pi-computers/</loc>
		<lastmod>2015-12-24T05:53:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/24/hyatt-hotels-attacked-payment-card-stealing-malware/</loc>
		<lastmod>2015-12-24T06:08:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/24/13-years-old-software-bug-led-early-release-3200-us-inmates-year/</loc>
		<lastmod>2015-12-24T10:33:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/24/india-temporarily-bans-facebooks-controversial-free-internet-service/</loc>
		<lastmod>2015-12-24T12:42:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/26/steam-servers-go-christmas-skidnp-hackers-begin-ddos-attacks/</loc>
		<lastmod>2015-12-26T05:38:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/26/spying-using-smartwatches-wearable-devices/</loc>
		<lastmod>2015-12-26T06:04:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/26/hackers-back-threats-attack-playstation-xbox-networks-christmas-day/</loc>
		<lastmod>2015-12-26T06:58:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/26/how-to-become-a-hacker/</loc>
		<lastmod>2015-12-26T08:26:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/26/anonymous-hacks-costa-rican-website-associated-jurassic-park-island/</loc>
		<lastmod>2015-12-26T10:05:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/28/adware-sneakily-turns-off-firefox-safe-browsing/</loc>
		<lastmod>2015-12-28T05:07:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/28/hack-like-pro-using-sparta-reconnaissance/</loc>
		<lastmod>2015-12-28T06:02:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/28/hackers-ddos-coinbase-website/</loc>
		<lastmod>2015-12-28T07:36:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/28/china-passes-controversial-anti-terrorism-law-access-encrypted-user-accounts/</loc>
		<lastmod>2015-12-28T10:44:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/28/internet-things-got-hacked/</loc>
		<lastmod>2015-12-28T12:40:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/29/patch-now-flash-exploitin-pc-hijackin-attack-spotted-wild-huawei-bods/</loc>
		<lastmod>2015-12-29T04:53:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/29/android-malware-uses-built-firewall-block-security-apps/</loc>
		<lastmod>2015-12-29T05:46:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/29/common-payment-processing-protocols-found-full-flaws/</loc>
		<lastmod>2015-12-29T06:19:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/29/cve-2015-8562-16000-daily-attacks-vulnerable-joomla-servers/</loc>
		<lastmod>2015-12-29T09:12:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/29/yandex-worker-stole-search-engine-source-code-tried-selling-just-28k/</loc>
		<lastmod>2015-12-29T10:45:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/29/misconfigured-database-exposes-details-191-million-us-voters/</loc>
		<lastmod>2015-12-29T11:27:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/30/radamant-ransomware-author-fit-researcher-cracks-encryption/</loc>
		<lastmod>2015-12-30T05:53:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/30/microsoft-may-encryption-key-heres-take-back/</loc>
		<lastmod>2015-12-30T06:31:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/30/gadget-hacks-favorite-must-android-apps-2015/</loc>
		<lastmod>2015-12-30T07:15:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/30/north-koreas-linux-based-red-star-os-oppressive-youd-expect/</loc>
		<lastmod>2015-12-30T09:55:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/30/backstab-can-hack-steal-private-data-mobile-phone-without-knowing/</loc>
		<lastmod>2015-12-30T11:16:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/31/ian-murdock-father-debian-dead-42/</loc>
		<lastmod>2015-12-31T04:55:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/31/tor-project-launching-tor-bug-bounty-program/</loc>
		<lastmod>2015-12-31T05:53:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/31/dhs-drug-traffickers-hacking-surveillance-drones-border/</loc>
		<lastmod>2015-12-31T06:17:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/31/microsoft-notify-users-government-spying-chinese-hotmail-hack-goes-public/</loc>
		<lastmod>2015-12-31T08:49:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/31/backspace-flaw-enables-linux-zero-day-attack/</loc>
		<lastmod>2015-12-31T09:40:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2015/12/31/playstation-4-hacked-run-linux-pokemon/</loc>
		<lastmod>2015-12-31T11:03:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/02/bbc-services-suffer-ddos-attack-new-years-eve/</loc>
		<lastmod>2016-01-02T05:09:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/02/religiously-motivated-hacker-defaces-79-escort-sites/</loc>
		<lastmod>2016-01-02T05:59:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/02/dll-hijacking-tutorial/</loc>
		<lastmod>2016-01-02T06:35:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/02/forget-anonymity-can-remember-wholesale-machine-intel-hackers-warned/</loc>
		<lastmod>2016-01-02T08:15:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/02/nsa-spying-us-israeli-politicians-stirs-congress-christmas-slumbers/</loc>
		<lastmod>2016-01-02T08:45:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/04/ransom32-javascript-based-ransomware-uses-node-js-infect-users/</loc>
		<lastmod>2016-01-04T05:00:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/04/turkish-hackers-took-russian-govt-instagram-account/</loc>
		<lastmod>2016-01-04T06:11:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/04/isis-hacker-killed-us-drone-strike-syria/</loc>
		<lastmod>2016-01-04T08:57:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/04/someone-just-hacked-nintendo-3ds-install-windows-95/</loc>
		<lastmod>2016-01-04T09:08:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/04/china-hacked-thousands-hotmail-accounts-belonging-tibetan-uighur-minorities/</loc>
		<lastmod>2016-01-04T11:59:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/04/successfully-hack-website-2016/</loc>
		<lastmod>2016-01-04T13:13:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/05/cisco-jabber-client-flawed-exposes-users-mitm-attacks/</loc>
		<lastmod>2016-01-05T05:20:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/05/discovered-new-db-containing-56-million-records-us-voters/</loc>
		<lastmod>2016-01-05T06:07:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/05/really-happened-juniper-networks-hack/</loc>
		<lastmod>2016-01-05T08:44:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/05/first-known-hacker-caused-power-outage-signals-troubling-escalation/</loc>
		<lastmod>2016-01-05T12:34:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/06/zerodium-offers-100k-adobe-flash-heap-isolation-bypasses/</loc>
		<lastmod>2016-01-06T05:09:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/06/author-linux-encoder-fails-third-time-ransomware-still-decryptable/</loc>
		<lastmod>2016-01-06T05:31:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/06/dark-web-hacking-forum-hell-returned-online/</loc>
		<lastmod>2016-01-06T05:58:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/06/halow-youre-hacking-wi-fi-standard-iot-emitted/</loc>
		<lastmod>2016-01-06T08:59:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/06/father-online-anonymity-plan-end-crypto-war/</loc>
		<lastmod>2016-01-06T12:50:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/06/final-rule-implements-executive-order-13694-us-can-apply-economic-sanctions-response-cyber-attacks/</loc>
		<lastmod>2016-01-06T13:08:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/07/tor-anonymity-things-not-using-tor/</loc>
		<lastmod>2016-01-07T05:23:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/07/windows-linux-malware-linked-chinese-ddos-tool/</loc>
		<lastmod>2016-01-07T06:01:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/07/severe-silent-circle-blackphone-vulnerability-lets-hackers-take/</loc>
		<lastmod>2016-01-07T06:37:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/07/lets-encrypt-now-abused-malvertisers/</loc>
		<lastmod>2016-01-07T09:08:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/07/drupal-update-process-flawed-multiple-bugs-attackers-can-take-sites/</loc>
		<lastmod>2016-01-07T10:11:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/07/remote-exploitation-microsoft-office-dll-hijacking-ms15-132-via-browsers/</loc>
		<lastmod>2016-01-07T11:07:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/08/ghost-squad-hackers-hack-ethiopian-websites-response-killing-protesting-students/</loc>
		<lastmod>2016-01-08T05:32:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/08/authors-digitally-signed-spymel-trojan-evade-detection/</loc>
		<lastmod>2016-01-08T06:21:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/08/fbi-hacked-1000-dark-web-computers-shut-largest-child-pornography-site/</loc>
		<lastmod>2016-01-08T06:29:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/08/new-malware-attack-targets-whatsapp-users/</loc>
		<lastmod>2016-01-08T09:25:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/08/android-based-smart-tvs-hit-backdoor-spread-via-malicious-app/</loc>
		<lastmod>2016-01-08T10:35:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/08/atm-malware-gang-behind-euro-attacks-targeted-police-swoops/</loc>
		<lastmod>2016-01-08T13:05:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/08/propublica-launches-dark-webs-first-major-news-site/</loc>
		<lastmod>2016-01-08T13:21:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/09/apple-google-microsoft-attack-government-hacking-plans/</loc>
		<lastmod>2016-01-09T05:11:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/09/gm-embraces-white-hat-hackers-public-vulnerability-disclosure-program/</loc>
		<lastmod>2016-01-09T05:35:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/09/time-warner-cable-security-breach-may-exposed-320k-customers/</loc>
		<lastmod>2016-01-09T06:45:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/09/experts-revealed-security-camera-vendors-lack-security-design/</loc>
		<lastmod>2016-01-09T08:24:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/09/uncooperative-russian-isp-prevents-cisco-shutting-cybercriminal-gang/</loc>
		<lastmod>2016-01-09T10:33:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/11/ddos-attack-bbc-may-reached-602gbps-never-powerful/</loc>
		<lastmod>2016-01-11T04:55:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/11/kingstons-unhackable-datatraveler-usb-drive-self-destructs-incorrect-pin-entry/</loc>
		<lastmod>2016-01-11T05:33:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/11/juniper-drops-nsa-developed-code-following-new-backdoor-revelations/</loc>
		<lastmod>2016-01-11T06:31:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/11/netflix-hack-reveals-secret-movie-genres-youre-missing/</loc>
		<lastmod>2016-01-11T10:10:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/11/csrf-bug-verizons-api-left-fios-accounts-open-attacks/</loc>
		<lastmod>2016-01-11T12:56:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/12/smartwatches-can-used-spy-cards-pin-code/</loc>
		<lastmod>2016-01-12T05:25:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/12/say-cyber-ars-cringes-csi-cyber/</loc>
		<lastmod>2016-01-12T06:24:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/12/trochilus-rat-evades-antivirus-detection-used-cyber-espionage-south-east-asia/</loc>
		<lastmod>2016-01-12T08:12:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/12/flaw-ebays-site-allowed-hackers-steal-users-passwords/</loc>
		<lastmod>2016-01-12T10:04:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/12/experts-warn-neutrino-rig-exploit-kit-activity-spike/</loc>
		<lastmod>2016-01-12T11:43:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/12/intel-skylake-processors-affected-bug-can-freeze-pcs-complex-work/</loc>
		<lastmod>2016-01-12T12:21:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/13/ssh-backdoor-identified-fortinet-firewalls/</loc>
		<lastmod>2016-01-13T05:19:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/13/android-bankosy-trojan-steals-one-time-passwords-sent-via-voice-calls/</loc>
		<lastmod>2016-01-13T05:49:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/13/black-hat-seo-campaign-leverages-sql-injections-boost-search-rankings/</loc>
		<lastmod>2016-01-13T06:45:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/13/google-hacker-criticized-trendmicro-critical-flaws/</loc>
		<lastmod>2016-01-13T08:34:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/13/teen-hacked-cia-email-back-prank-us-spy-chief/</loc>
		<lastmod>2016-01-13T10:20:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/13/silk-road-appeal-ross-ulbrichts-defense-focuses-corrupt-feds/</loc>
		<lastmod>2016-01-13T12:12:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/14/shoddy-ransomware-destroys-users-files/</loc>
		<lastmod>2016-01-14T05:30:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/14/anonymous-takes-nissans-website-illegal-whale-hunting-japan/</loc>
		<lastmod>2016-01-14T06:02:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/14/steal-wi-fi-key-doorbell-iot-wtf/</loc>
		<lastmod>2016-01-14T06:51:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/14/url-shorteners-ransomware-collide/</loc>
		<lastmod>2016-01-14T12:34:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/14/silk-roads-dark-web-dream-dead/</loc>
		<lastmod>2016-01-14T13:08:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/15/nuclear-power-plants-world-vulnerable-cyberattacks/</loc>
		<lastmod>2016-01-15T05:18:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/15/openssh-patches-critical-flaw-leak-private-crypto-keys/</loc>
		<lastmod>2016-01-15T05:55:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/15/faithless-website-breached-via-sql-injection-fans-data-stolen/</loc>
		<lastmod>2016-01-15T08:41:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/15/suspected-megalodonhttp-ddos-botnet-author-arrested/</loc>
		<lastmod>2016-01-15T11:48:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/15/apples-targeted-gatekeeper-bypass-patch-leaves-os-x-users-exposed/</loc>
		<lastmod>2016-01-15T13:24:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/16/cryptsy-bitcoin-trader-robbed-blames-backdoor-code-wallet/</loc>
		<lastmod>2016-01-16T05:13:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/16/security-firm-sued-filing-woefully-inadequate-forensics-report/</loc>
		<lastmod>2016-01-16T06:05:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/16/real-world-hackers-can-3d-print-keys/</loc>
		<lastmod>2016-01-16T06:23:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/16/new-york-tries-force-phone-makers-put-crypto-backdoors/</loc>
		<lastmod>2016-01-16T08:17:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/16/feds-prod-automakers-play-nice-hackers/</loc>
		<lastmod>2016-01-16T09:59:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/18/lastpass-phishing-attack-allow-attackers-steal-passwords/</loc>
		<lastmod>2016-01-18T05:01:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/18/hack-like-pro-hack-like-nsa/</loc>
		<lastmod>2016-01-18T05:52:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/18/email-transit-can-intercepted-using-dns-hijacking/</loc>
		<lastmod>2016-01-18T09:02:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/18/ukraine-blames-russia-cyber-attacks-boryspil-airport/</loc>
		<lastmod>2016-01-18T11:02:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/18/new-interesting-revelation-stuxnet-cyber-weapon/</loc>
		<lastmod>2016-01-18T12:35:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/18/feds-raided-another-chicago-home-nude-celeb-hack-investigation-still-no-charges-pressed/</loc>
		<lastmod>2016-01-18T13:33:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/19/heres-cheap-webcam-can-converted-network-backdoor/</loc>
		<lastmod>2016-01-19T05:10:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/19/belinda-carlisles-official-website-hacked-sports-viagra-banner/</loc>
		<lastmod>2016-01-19T05:36:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/19/yahoo-mail-nasty-xss-bug/</loc>
		<lastmod>2016-01-19T08:37:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/19/tinba-20kb-trojan-scares-banks-singapore-indonesia/</loc>
		<lastmod>2016-01-19T10:13:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/19/shop-online-asda-website-vuln-created-account-hijack-risk/</loc>
		<lastmod>2016-01-19T12:27:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/19/new-trojan-spies-linux-users-taking-screenshots-recording-audio/</loc>
		<lastmod>2016-01-19T13:05:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/20/new-archive-us-voting-records-appeared-dark-web/</loc>
		<lastmod>2016-01-20T05:18:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/20/android-linux-zero-day-gives-attackers-root-access/</loc>
		<lastmod>2016-01-20T05:44:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/20/facebook-android-app-gets-built-tor-support-still-needs-real-name/</loc>
		<lastmod>2016-01-20T06:20:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/20/chrome-extensions-steal-steam-inventory/</loc>
		<lastmod>2016-01-20T09:50:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/20/hot-potato-exploit-mashes-old-vulns-windows-system-sploit/</loc>
		<lastmod>2016-01-20T10:31:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/20/asacub-evolves-simple-spyware-full-android-banking-trojan/</loc>
		<lastmod>2016-01-20T13:02:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/21/intel-fixes-security-bug-prevent-attackers-hijacking-driver-update-process/</loc>
		<lastmod>2016-01-21T05:27:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/21/trojan-found-pre-installed-firmware-phillips-s307-android-smartphones/</loc>
		<lastmod>2016-01-21T06:12:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/21/teslacrypt-decrypted-flaw-teslacrypt-allows-victims-recover-files/</loc>
		<lastmod>2016-01-21T06:48:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/21/ios-cookie-theft-bug-allowed-hackers-impersonate-users/</loc>
		<lastmod>2016-01-21T09:12:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/21/msn-home-page-drops-malware-via-malvertising/</loc>
		<lastmod>2016-01-21T11:34:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/22/british-government-already-created-data-encryption-protocol-complete-backdoor/</loc>
		<lastmod>2016-01-22T05:18:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/22/media-devices-sold-feds-hidden-backdoor-sniffing-functions/</loc>
		<lastmod>2016-01-22T06:39:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/22/fbi-may-hacked-innocent-tormail-users/</loc>
		<lastmod>2016-01-22T06:46:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/22/dont-open-facebook-email-attachment-malware/</loc>
		<lastmod>2016-01-22T08:35:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/22/chinese-group-trying-exploit-old-fortinet-ssh-backdoor/</loc>
		<lastmod>2016-01-22T11:23:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/23/tormail-hack-fbi-surgical-operation-dragnet-surveillance/</loc>
		<lastmod>2016-01-23T05:34:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/23/trojan-dnschanger-circumvents-powershell-restrictions/</loc>
		<lastmod>2016-01-23T06:13:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/23/web-reconnaissance-attack-infects-3500-websites-possibly-wordpress/</loc>
		<lastmod>2016-01-23T10:11:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/23/lechiffre-ransomware-ran-manually/</loc>
		<lastmod>2016-01-23T10:48:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/25/robot-solves-rubiks-cube-less-2-seconds-flat/</loc>
		<lastmod>2016-01-25T05:15:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/25/eda2-open-source-ransomware-code-used-real-life-attacks/</loc>
		<lastmod>2016-01-25T06:11:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/25/apple-can-still-see-imessages-enable-icloud/</loc>
		<lastmod>2016-01-25T10:14:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/25/javascript-backdoor/</loc>
		<lastmod>2016-01-25T11:10:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/25/opkillingbay-anonymous-shut-japanese-airport-site-protest-slaughter-dolphin/</loc>
		<lastmod>2016-01-25T12:19:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/25/simple-yet-efficient-linux-backdoor-trojan-discovered/</loc>
		<lastmod>2016-01-25T12:39:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/27/careful-opening-crashsafari-com-mobile-will-crash/</loc>
		<lastmod>2016-01-27T05:27:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/27/nanolocker-ransomware-can-cracked-certain-conditions/</loc>
		<lastmod>2016-01-27T05:50:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/27/7ev3n-ransomware-trashes-pc-demands-13-bitcoins/</loc>
		<lastmod>2016-01-27T08:29:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/27/shareit-windows-android-vulnerabilities/</loc>
		<lastmod>2016-01-27T10:16:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/27/israeli-public-utility-authority-hit-severe-cyber-attack/</loc>
		<lastmod>2016-01-27T11:36:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/27/paypal-servers-compromised-via-well-known-java-deserialization-bug/</loc>
		<lastmod>2016-01-27T12:00:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/28/nuclear-threat-initiative-says-nations-not-prepared-repel-cyber-attacks-nuclear-facilities/</loc>
		<lastmod>2016-01-28T05:24:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/28/backbox-linux-4-5-os-comes-pre-installed-new-hacking-tools/</loc>
		<lastmod>2016-01-28T06:04:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/28/nsas-top-hacking-boss-explains-protect-network-attack-squads/</loc>
		<lastmod>2016-01-28T08:03:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/28/android-ransomware-variant-uses-clickjacking-become-device-administrator/</loc>
		<lastmod>2016-01-28T10:25:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/28/whatsapp-will-get-security-indicators-highlight-encrypted-chats/</loc>
		<lastmod>2016-01-28T12:45:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/28/california-police-used-stingrays-planes-spy-phones/</loc>
		<lastmod>2016-01-28T13:05:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/29/facebook-patches-critical-xss-bug-led-total-account-compromise/</loc>
		<lastmod>2016-01-29T05:16:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/29/snap-vulnerability-puts-millions-lg-flagship-g3-smartphones-risk/</loc>
		<lastmod>2016-01-29T05:59:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/29/elaborate-icloud-phish-used-activate-stolen-iphones/</loc>
		<lastmod>2016-01-29T08:39:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/29/tor-announces-official-release-tor-browser-5-5-new-features/</loc>
		<lastmod>2016-01-29T10:28:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/29/atp-group-uses-word-docs-drop-blackenergy-malware/</loc>
		<lastmod>2016-01-29T12:45:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/30/hsbc-online-banking-services-offline-due-ddos-attack/</loc>
		<lastmod>2016-01-30T05:20:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/30/certain-mediatek-phones-contain-dangerous-debug-backdoor/</loc>
		<lastmod>2016-01-30T06:01:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/30/linux-windows-new-family-cross-platform-desktop-backdoors-discovered/</loc>
		<lastmod>2016-01-30T07:07:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/30/isis-first-man-charged-cyber-terrorism-extradited-us/</loc>
		<lastmod>2016-01-30T10:47:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/01/30/whatsapp-get-end-end-encryption-facebook-integration-soon/</loc>
		<lastmod>2016-01-30T11:28:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/01/default-settings-apache-web-servers-can-reveal-details-tor-traffic/</loc>
		<lastmod>2016-02-01T05:05:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/01/theres-lot-vulnerable-os-x-applications/</loc>
		<lastmod>2016-02-01T05:48:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/01/snowden-leak-proves-nsa-gchq-spied-israeli-drones-using-open-source-tools/</loc>
		<lastmod>2016-02-01T08:10:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/01/hackers-keeping-hidden-stash-hp-printers-hard-drive/</loc>
		<lastmod>2016-02-01T10:14:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/01/jspatch-hot-patching-technique-puts-ios-users-risk/</loc>
		<lastmod>2016-02-01T12:51:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/02/audit-shows-department-homeland-security-6-billion-u-s-dollar-firewall-not-effective-hackers/</loc>
		<lastmod>2016-02-02T05:07:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/02/corrupt-silk-road-investigator-re-arrested-allegedly-trying-flee-us/</loc>
		<lastmod>2016-02-02T05:32:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/02/nasa-hacked-anonsec-hijacked-222m-global-hawk-drone/</loc>
		<lastmod>2016-02-02T08:34:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/02/microsoft-makes-windows-10-recommended-update-windows-7-8-1-users/</loc>
		<lastmod>2016-02-02T13:18:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/02/email-photocopier-malware-attack/</loc>
		<lastmod>2016-02-02T13:26:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/03/ebay-flaw-lets-attackers-push-malware-launch-phishing-sites/</loc>
		<lastmod>2016-02-03T05:03:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/03/wikileaks-julian-assange-free-man-friday-thanks-un/</loc>
		<lastmod>2016-02-03T05:52:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/03/push-hack-reverse-engineering-ip-camera/</loc>
		<lastmod>2016-02-03T08:42:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/03/comodo-internet-security-installs-new-browser-force-disables-web-security/</loc>
		<lastmod>2016-02-03T09:50:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/03/dma-locker-new-ransomware-no-reason-panic/</loc>
		<lastmod>2016-02-03T13:20:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/04/usbdriveby-necklace-can-hack-pc-just-60-seconds/</loc>
		<lastmod>2016-02-04T05:30:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/04/python-based-crawler-reveals-dark-web-sites-commonly-used-crime/</loc>
		<lastmod>2016-02-04T06:14:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/04/possible-encryption-backdoor-discovered-socat-networking-utility/</loc>
		<lastmod>2016-02-04T08:56:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/04/someone-mostly-3-d-printed-working-semi-automatic-gun/</loc>
		<lastmod>2016-02-04T12:16:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/04/hack-like-pro-digital-forensics-aspiring-hacker-2/</loc>
		<lastmod>2016-02-04T12:58:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/05/dell-adds-boot-scanner-protect-users-bootkit-malware/</loc>
		<lastmod>2016-02-05T05:08:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/05/login-duplication-allows-20m-alibaba-accounts-attacked/</loc>
		<lastmod>2016-02-05T05:41:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/05/netgear-prosafe-nms300-exploit-hack/</loc>
		<lastmod>2016-02-05T09:27:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/05/mystery-hacker-pwns-dridex-trojan-botnet-serve-antivirus-installer/</loc>
		<lastmod>2016-02-05T12:08:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/05/australian-nsw-government-department-resources-energy-attack-chinese-cyber-espionage/</loc>
		<lastmod>2016-02-05T12:26:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/06/avast-safezone-browser-lets-attackers-access-filesystem/</loc>
		<lastmod>2016-02-06T05:10:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/06/roll-roll-malware-museum-run-classic-dos-viruses-web-browser/</loc>
		<lastmod>2016-02-06T05:32:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/06/new-lock-screen-passcode-bypass-flaw-puts-iphones-ipads-risk/</loc>
		<lastmod>2016-02-06T08:09:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/06/researchers-spotted-new-os-x-scareware-campaign/</loc>
		<lastmod>2016-02-06T08:50:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/06/julian-assanges-3-5-year-detainment-embassy-ruled-unlawful/</loc>
		<lastmod>2016-02-06T11:00:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/06/brazilian-companies-receive-40000-spam-emails-infostealer-campaign/</loc>
		<lastmod>2016-02-06T11:50:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/08/dyre-crackdown-biggest-effort-date-russian-authorities-cybercrime/</loc>
		<lastmod>2016-02-08T05:17:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/08/t9000-backdoor-malware-targets-skype-users-records-conversations/</loc>
		<lastmod>2016-02-08T05:39:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/08/whatsapp-users-tricked-opening-malware-sent-friends-steals-personal-data/</loc>
		<lastmod>2016-02-08T07:34:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/08/hacking-microsoft-sql-server-without-password/</loc>
		<lastmod>2016-02-08T08:18:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/08/dll-hijacking-issue-plagues-products-like-firefox-chrome-itunes-openoffice/</loc>
		<lastmod>2016-02-08T12:12:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/08/hackers-leaked-dhs-staff-records-200gb-files-hands/</loc>
		<lastmod>2016-02-08T13:01:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/09/tor-project-patches-critical-xss-bug-blog-researcher-publicly-discloses/</loc>
		<lastmod>2016-02-09T05:11:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/09/clever-bank-hack-allowed-crooks-make-unlimited-atm-withdrawals/</loc>
		<lastmod>2016-02-09T05:42:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/09/steam-uses-date-chromium-browser-security-feature-disabled/</loc>
		<lastmod>2016-02-09T08:31:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/09/hacker-leaks-personal-information-20000-fbi-agents/</loc>
		<lastmod>2016-02-09T12:12:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/09/oxford-school-district-victim-hackers-crypto-ransomware/</loc>
		<lastmod>2016-02-09T12:43:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/10/facebook-hacking-tool-hack-accounts-heres-catch/</loc>
		<lastmod>2016-02-10T05:09:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/10/huge-number-mac-apps-vulnerable-hijacking-fix-elusive/</loc>
		<lastmod>2016-02-10T05:47:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/10/rent-infamous-alienspy-backdoor-now-quite-easy/</loc>
		<lastmod>2016-02-10T07:04:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/10/vigilante-hackers-fight-lizard-squad-control-150000-home-routers/</loc>
		<lastmod>2016-02-10T11:07:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/10/hack-power-grid-home-air-conditioners/</loc>
		<lastmod>2016-02-10T12:37:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/10/hearthstone-add-ons-cheating-tools-come-data-stealing-malware/</loc>
		<lastmod>2016-02-10T12:49:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/10/remote-code-execution-versions-windows-hit-severe-security-vulnerabilities/</loc>
		<lastmod>2016-02-10T13:11:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/11/twitter-bug-allows-hackers-hijack-big-twitter-accounts-like-god-vagina-etc/</loc>
		<lastmod>2016-02-11T05:07:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/11/irs-website-attack-nets-e-filing-credentials-101000-taxpayers/</loc>
		<lastmod>2016-02-11T05:57:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/11/user-beware-rooting-malware-found-3rd-party-app-stores/</loc>
		<lastmod>2016-02-11T08:48:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/11/gmail-warn-friends-arent-using-secure-e-mail/</loc>
		<lastmod>2016-02-11T11:38:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/11/severe-vulnerability-affects-cisco-asa-vpn-server-equipment/</loc>
		<lastmod>2016-02-11T13:03:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/12/ibm-researchers-hack-smart-building-highlight-backdoors-created-hackers/</loc>
		<lastmod>2016-02-12T04:58:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/12/netflix-malware-phishing-campaigns-help-build-emerging-black-market/</loc>
		<lastmod>2016-02-12T05:58:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/12/internet-archive-windows-hundreds-windows-3-1-programs-join-collection/</loc>
		<lastmod>2016-02-12T06:24:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/12/android-sms-stealer-hides-mobile-payments-security-app/</loc>
		<lastmod>2016-02-12T09:47:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/12/nypd-admits-using-cell-phone-spy-tool-1000-times-since-2008/</loc>
		<lastmod>2016-02-12T12:14:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/13/uk-police-arrested-teenage-hacker-allegedly-hacked-cia-fbi-officials/</loc>
		<lastmod>2016-02-13T05:17:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/13/mazar-bot-android-malware-can-erase-phones-data-except-youre-russian/</loc>
		<lastmod>2016-02-13T06:59:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/13/hackspy-trojan-exploit/</loc>
		<lastmod>2016-02-13T07:33:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/13/first-time-ever-ransomware-hits-website-defaces-homepage/</loc>
		<lastmod>2016-02-13T08:05:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/13/kaspersky-researcher-shows-hacked-hospital-sitting-car/</loc>
		<lastmod>2016-02-13T09:55:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/15/man-charged-laundering-19-6-million-earned-pbx-system-hacking/</loc>
		<lastmod>2016-02-15T04:59:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/15/hackers-demand-3-6-million-hollywood-hospital-following-cyber-attack/</loc>
		<lastmod>2016-02-15T06:23:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/15/russian-hackers-spying-linux-pc-using-sophisticated-malware-fysbis/</loc>
		<lastmod>2016-02-15T06:39:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/15/padcrypt-ransomware-provides-victims-live-support/</loc>
		<lastmod>2016-02-15T11:56:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/15/dont-set-iphones-date-january-1-1970-will-brick/</loc>
		<lastmod>2016-02-15T12:59:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/16/password-cracking-attacks-bitcoin-wallets-net-103000/</loc>
		<lastmod>2016-02-16T04:58:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/16/skimmers-hijack-atm-network-cables/</loc>
		<lastmod>2016-02-16T06:13:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/16/gchq-allowed-hack-computers-smartphones/</loc>
		<lastmod>2016-02-16T08:54:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/16/white-hat-hackers-stole-crypto-keys-offline-laptop-another-room/</loc>
		<lastmod>2016-02-16T18:38:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/17/backdoor-mvpower-dvr-firmware-sends-cctv-stills-email-address-china/</loc>
		<lastmod>2016-02-17T05:03:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/17/extremely-severe-bug-leaves-dizzying-number-software-devices-vulnerable/</loc>
		<lastmod>2016-02-17T07:56:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/17/dridex-financial-trojan-aggressively-spread-millions-spam-emails-day/</loc>
		<lastmod>2016-02-17T10:16:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/17/bypass-lg-smartphones-fingerprint-security-just-30-seconds/</loc>
		<lastmod>2016-02-17T10:35:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/17/nsas-skynet-program-may-killing-thousands-innocent-people/</loc>
		<lastmod>2016-02-17T13:19:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/18/tim-cook-right-call-court-ordered-iphone-hack-backdoor/</loc>
		<lastmod>2016-02-18T05:05:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/18/millions-airdroid-users-exposed-severe-vulnerability/</loc>
		<lastmod>2016-02-18T05:36:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/18/wordpress-sites-leveraged-layer-7-ddos-campaigns/</loc>
		<lastmod>2016-02-18T09:22:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/18/remotely-disabling-wireless-burglar-alarm/</loc>
		<lastmod>2016-02-18T11:04:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/18/vxe-flaw-allowed-threats-bypass-fireeye-detection-engine/</loc>
		<lastmod>2016-02-18T13:36:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/19/new-android-malware-combines-ransomware-banking-trojan/</loc>
		<lastmod>2016-02-19T05:18:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/19/locky-ransomware-aggressive-hunt-victims/</loc>
		<lastmod>2016-02-19T06:38:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/19/comodo-internet-security-opened-pc-attackers/</loc>
		<lastmod>2016-02-19T10:03:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/19/gozi-banking-trojan-now-fully-compatible-edge-browser-windows-10/</loc>
		<lastmod>2016-02-19T10:17:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/19/hackers-paid-17000-bitcoin-ransom-l-hospital-get-back-medical-records/</loc>
		<lastmod>2016-02-19T13:21:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/20/man-admits-stole-nude-celebrity-pics-apple-gmail-accounts/</loc>
		<lastmod>2016-02-20T05:15:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/20/jsf-ebay-xss-bug-exploited-wild-despite-companys-fix/</loc>
		<lastmod>2016-02-20T06:18:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/20/use-nmap-7-discover-vulnerabilities-launch-dos-attacks/</loc>
		<lastmod>2016-02-20T07:59:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/20/internet-things-goes-open-source-linux-foundations-zephyr-project/</loc>
		<lastmod>2016-02-20T10:14:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/20/android-malware-get-worse-gm-bot-source-code-leaked/</loc>
		<lastmod>2016-02-20T10:39:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/21/how-to-secure-databases/</loc>
		<lastmod>2016-02-21T02:42:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/22/linux-mint-hacked-website-served-malicious-iso-saturday/</loc>
		<lastmod>2016-02-22T05:14:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/22/nsa-data-center-effect-state-experiences-300000000-hacking-attacks-day/</loc>
		<lastmod>2016-02-22T06:02:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/22/gps-hacking-part-1/</loc>
		<lastmod>2016-02-22T07:28:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/22/anonymous-took-several-government-websites-saudi-arabia/</loc>
		<lastmod>2016-02-22T08:27:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/22/hack-scripting-deeper-better-hacks-python/</loc>
		<lastmod>2016-02-22T09:37:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/23/admedia-attacks-now-rely-also-joomla-serve-ransomware/</loc>
		<lastmod>2016-02-23T04:41:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/23/http-gzip-leaks-data-general-location-tor-websites/</loc>
		<lastmod>2016-02-23T05:34:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/23/russian-bank-employees-received-fake-job-offers-targeted-email-attack/</loc>
		<lastmod>2016-02-23T07:14:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/23/acecard-one-todays-dangerous-android-trojans/</loc>
		<lastmod>2016-02-23T11:34:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/23/nsa-data-center-experiences-300-million-cyber-attacks-per-day/</loc>
		<lastmod>2016-02-23T13:24:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/24/anonymous-hacked-frances-ministry-defense-portal-cimd-centre-didentification-des-materiels-de-la-defense/</loc>
		<lastmod>2016-02-24T05:18:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/24/new-silverlight-attacks-appear-angler-exploit-kit/</loc>
		<lastmod>2016-02-24T05:51:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/24/android-ransomware-variants-created-directly-mobile-devices/</loc>
		<lastmod>2016-02-24T08:21:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/24/mousejack-attack-hijack-wireless-mousekeyboard-dongles-100-meters-control-pcs/</loc>
		<lastmod>2016-02-24T11:50:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/24/malware-targets-indias-largest-private-bank/</loc>
		<lastmod>2016-02-24T12:58:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/25/group-behind-sony-hack-dangerous-previously-thought/</loc>
		<lastmod>2016-02-25T05:25:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/25/google-red-hat-discover-critical-dns-security-flaw-enables-malware-infect-entire-internet/</loc>
		<lastmod>2016-02-25T05:58:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/25/ricochet-peer-peer-messenger-uses-power-dark-web-escape-metadata/</loc>
		<lastmod>2016-02-25T10:08:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/25/german-police-can-now-use-spying-malware-monitor-suspects/</loc>
		<lastmod>2016-02-25T11:36:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/25/remotely-hacking-nissan-leaf-via-vulnerable-apis/</loc>
		<lastmod>2016-02-25T11:40:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/26/journo-got-hacked-covering-fbi-vs-apple-iphone-hack-story/</loc>
		<lastmod>2016-02-26T04:12:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/26/malware-skimmers-explosions-hammers-attackers-go-atms/</loc>
		<lastmod>2016-02-26T04:47:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/26/author-angler-ek-integrated-recently-silverlight-exploit/</loc>
		<lastmod>2016-02-26T05:55:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/26/dod-funded-carnegie-mellon-universitys-research-tor-hacking/</loc>
		<lastmod>2016-02-26T07:36:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/26/ftc-forces-asus-comply-20-years-security-audits/</loc>
		<lastmod>2016-02-26T08:26:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/27/discover-many-ways-hack-apple-tv/</loc>
		<lastmod>2016-02-27T05:17:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/27/security-cameras-bank-accounts-can-hacked-email-demonstrated-hacker/</loc>
		<lastmod>2016-02-27T05:54:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/27/medical-superbugs-two-german-hospitals-hit-ransomware/</loc>
		<lastmod>2016-02-27T08:31:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/27/chinese-isps-caught-injecting-ads-malware-network-traffic/</loc>
		<lastmod>2016-02-27T09:37:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/29/fbi-use-3-hacks-killers-iphone-besides-apple-backdoor/</loc>
		<lastmod>2016-02-29T05:16:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/29/tor-takes-aim-malicious-nodes-network/</loc>
		<lastmod>2016-02-29T06:12:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/29/system-updates-governments-can-hack-software-using-golden-key-backdoor/</loc>
		<lastmod>2016-02-29T10:06:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/02/29/journalist-hacked-plane-writing-apple-fbi-story/</loc>
		<lastmod>2016-02-29T11:55:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/01/security-vulnerability-testing/</loc>
		<lastmod>2016-03-01T02:03:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/01/malware-jumps-pc-pc-via-cloud-sync-apps/</loc>
		<lastmod>2016-03-01T04:48:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/01/largely-undetected-mac-malware-suggests-disgraced-hackingteam-returned/</loc>
		<lastmod>2016-03-01T05:06:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/01/payroll-data-leaked-current-former-snapchat-employees/</loc>
		<lastmod>2016-03-01T08:03:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/01/raspberry-pi-3-wi-fi-bluetooth-64-bit-chip-still-just-35/</loc>
		<lastmod>2016-03-01T08:31:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/01/facebook-video-spam-teases-adult-videosand-leaked-iphone/</loc>
		<lastmod>2016-03-01T09:50:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/02/33-percent-https-websites-open-drown-attack/</loc>
		<lastmod>2016-03-02T08:08:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/02/spam-offering-fake-visa-benefits-rewards-leads-teslacrypt-ransomware/</loc>
		<lastmod>2016-03-02T08:46:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/02/facebook-latin-americas-vice-president-arrested-brazilian-police/</loc>
		<lastmod>2016-03-02T09:53:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/02/look-into-locky/</loc>
		<lastmod>2016-03-02T11:37:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/02/fbi-admits-mistake-reset-san-bernardino-shooters-icloud-password/</loc>
		<lastmod>2016-03-02T13:23:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/03/us-dod-invites-restricted-number-hackers-hack-pentagon/</loc>
		<lastmod>2016-03-03T05:00:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/03/windows-built-pdf-reader-exposes-edge-browser-hacking/</loc>
		<lastmod>2016-03-03T05:37:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/03/french-gov-fine-apple-google-e1m-unless-hack-mobile-devices/</loc>
		<lastmod>2016-03-03T09:05:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/03/sea-pirates-hacked-shipping-company-plan-attacks-find-valuable-cargo/</loc>
		<lastmod>2016-03-03T11:48:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/03/17-smartwatch-includes-backdoor-pairing-app/</loc>
		<lastmod>2016-03-03T12:45:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/04/new-attack-steals-secret-crypto-keys-android-ios-phones/</loc>
		<lastmod>2016-03-04T05:21:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/04/russian-ransomware-encrypts-files-speaks/</loc>
		<lastmod>2016-03-04T06:06:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/04/triada-trojan-infects-androids-zygote-core-process/</loc>
		<lastmod>2016-03-04T09:12:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/04/tale-dns-exploit-cve-2015-7547/</loc>
		<lastmod>2016-03-04T12:34:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/04/accessibility-clickjacking-malware-impact-500-million-android-devices/</loc>
		<lastmod>2016-03-04T13:25:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/05/popular-wordpress-plugin-comes-backdoor-steals-site-admin-credentials/</loc>
		<lastmod>2016-03-05T05:10:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/05/whole-lotta-onions-number-tor-hidden-sites-spikes-along-paranoia/</loc>
		<lastmod>2016-03-05T05:58:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/05/history-hacking-10-best-hackers-past-happened/</loc>
		<lastmod>2016-03-05T06:24:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/05/espionage-malware-watering-hole-attacks-target-diplomats/</loc>
		<lastmod>2016-03-05T08:56:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/05/macro-malware-dridex-locky-using-forms-hide-code/</loc>
		<lastmod>2016-03-05T10:03:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/07/first-fully-functional-mac-ransomware-spread-via-transmission-bittorrent-client/</loc>
		<lastmod>2016-03-07T05:09:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/07/operation-transparent-tribe-targets-indian-diplomats-military/</loc>
		<lastmod>2016-03-07T05:34:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/07/internet-connected-trucks-can-tracked-hacked-researcher-finds/</loc>
		<lastmod>2016-03-07T07:51:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/07/connect-android-pcmac-without-wifi/</loc>
		<lastmod>2016-03-07T11:43:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/07/remove-keranger-ransomware-mac/</loc>
		<lastmod>2016-03-07T13:19:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/07/car-hacking-really-dummies-sexy-free-software/</loc>
		<lastmod>2016-03-07T13:26:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/08/expert-discovered-hack-facebook-account/</loc>
		<lastmod>2016-03-08T04:47:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/08/burrp-compromised-serve-angler-ek-deliver-teslacrypt-ransomware/</loc>
		<lastmod>2016-03-08T05:18:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/08/bangladesh-bank-says-hackers-stole-money-us-federal-reserve-account/</loc>
		<lastmod>2016-03-08T06:15:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/08/bypass-apple-passcode-9-1-later/</loc>
		<lastmod>2016-03-08T10:03:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/08/natwest-tightens-online-banking-security-hacks-hack-expose/</loc>
		<lastmod>2016-03-08T13:05:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/09/south-korea-accused-north-korea-hacking-key-officials-mobile/</loc>
		<lastmod>2016-03-09T04:43:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/09/security-pros-believe-encryption-backdoor-open-abuse/</loc>
		<lastmod>2016-03-09T05:21:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/09/keranger-ransomware-actually-linux-encoder-ported-macs/</loc>
		<lastmod>2016-03-09T05:52:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/09/boffins-bust-biometrics-inkjet-printer/</loc>
		<lastmod>2016-03-09T06:47:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/09/cve-2015-7547-glibc-getaddrinfo-dns-vulnerability/</loc>
		<lastmod>2016-03-09T07:32:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/09/exploit-tftp-protocol-launch-powerful-ddos-amplification-attacks/</loc>
		<lastmod>2016-03-09T12:45:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/10/phishers-creating-youtube-channels-document-attacks/</loc>
		<lastmod>2016-03-10T05:28:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/10/billion-android-devices-easy-hack/</loc>
		<lastmod>2016-03-10T06:18:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/10/tracking-users-tor-network-mouse-movements/</loc>
		<lastmod>2016-03-10T09:00:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/10/android-banking-trojan-masquerades-flash-player-bypasses-2fa/</loc>
		<lastmod>2016-03-10T11:03:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/10/playstation-4-capable-booting-linux-due-latest-hack/</loc>
		<lastmod>2016-03-10T11:28:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/11/triada-trojan-sophisticated-mobile-malware-seen-date/</loc>
		<lastmod>2016-03-11T05:18:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/11/one-greatest-art-heists-time-actually-data-hack/</loc>
		<lastmod>2016-03-11T05:40:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/11/majority-cctv-cameras-can-easily-hacked/</loc>
		<lastmod>2016-03-11T06:20:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/11/0-day-critical-flaws-mobile-modems-allow-hackers-take-pc/</loc>
		<lastmod>2016-03-11T08:56:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/11/flash-aaah-aarrgh-patch-now-hackers-exploit-fresh-holes/</loc>
		<lastmod>2016-03-11T13:13:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/12/can-decrypt-files-locked-keranger-mac-ransomware-says-russian-av-vendor/</loc>
		<lastmod>2016-03-12T05:08:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/12/javascript-functions-mouse-movements-can-reveal-tor-users-true-identity/</loc>
		<lastmod>2016-03-12T05:58:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/12/typos-stopped-hackers-stealing-1bn-federal-reserve-bangladesh-account/</loc>
		<lastmod>2016-03-12T08:42:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/12/hack-windows-7-user-password/</loc>
		<lastmod>2016-03-12T10:47:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/14/microsoft-stops-accepting-bitcoin-windows-store/</loc>
		<lastmod>2016-03-14T05:20:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/14/chrome-extension-stealing-bitcoins-users/</loc>
		<lastmod>2016-03-14T05:56:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/14/imgurs-video-gif-feature-abused-send-spam-shut-service/</loc>
		<lastmod>2016-03-14T06:40:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/14/auto-vulnerability-scanners-turn-nostly-false-positives/</loc>
		<lastmod>2016-03-14T07:02:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/14/operator-online-payment-company-indicted-stealing-customers/</loc>
		<lastmod>2016-03-14T07:09:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/15/best-system-rescue-tools-malware-attack/</loc>
		<lastmod>2016-03-15T05:29:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/15/hackers-hijack-instagram-accounts-steal-tens-thousands-euros/</loc>
		<lastmod>2016-03-15T06:02:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/15/placing-skimmer-gas-station-card-scanner-less-3-seconds/</loc>
		<lastmod>2016-03-15T09:38:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/15/powersniff-malware-used-macro-based-attacks/</loc>
		<lastmod>2016-03-15T10:32:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/15/optrump-anonymous-declares-total-war-donald-trump-april-1/</loc>
		<lastmod>2016-03-15T12:34:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/16/fappening-hacker-36-old-man-lancaster-pennsylvania/</loc>
		<lastmod>2016-03-16T05:22:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/16/suckfly-revealing-secret-life-code-signing-certificates/</loc>
		<lastmod>2016-03-16T05:55:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/16/big-name-sites-hit-rash-malicious-ads-spreading-crypto-ransomware-updated/</loc>
		<lastmod>2016-03-16T07:17:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/16/crooks-exploit-oman-websites-typosquatting-attacks/</loc>
		<lastmod>2016-03-16T07:56:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/16/canadian-librarians-must-ready-fight-feds-running-tor-node/</loc>
		<lastmod>2016-03-16T13:13:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/17/bypass-code-signing-checks-malware-gang-steals-lots-certificates/</loc>
		<lastmod>2016-03-17T05:18:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/17/acedeceiver-first-ios-trojan-exploiting-apple-drm-design-flaws-infect-ios-device/</loc>
		<lastmod>2016-03-17T08:02:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/17/qualcomm-snapdragon-bug-leaves-android-devices-open-hacks/</loc>
		<lastmod>2016-03-17T08:11:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/17/millions-android-devices-vulnerable-new-stagefright-exploit/</loc>
		<lastmod>2016-03-17T10:05:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/17/researchers-trick-radamant-ransomware-cc-server-revealing-decryption-keys/</loc>
		<lastmod>2016-03-17T12:21:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/18/thought-safe-ddr4-memory-shown-vulnerable-rowhammer/</loc>
		<lastmod>2016-03-18T05:10:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/18/icloud-account-hijacking-scam-bad-ransomware/</loc>
		<lastmod>2016-03-18T05:39:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/18/android-sms-stealer-trojan-hides-adult-video-player/</loc>
		<lastmod>2016-03-18T05:54:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/18/protonmail-easy-use-encrypted-email-service-opens-public/</loc>
		<lastmod>2016-03-18T09:07:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/18/malware-botnet-can-abused-launch-ddos-attacks/</loc>
		<lastmod>2016-03-18T11:32:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/19/95-https-servers-vulnerable-trivial-mitm-attacks/</loc>
		<lastmod>2016-03-19T05:15:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/19/fbi-microsoft-warn-samas-ransomware/</loc>
		<lastmod>2016-03-19T05:44:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/19/fbi-warns-risks-car-hacking/</loc>
		<lastmod>2016-03-19T06:44:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/19/build-stealth-backdoors/</loc>
		<lastmod>2016-03-19T07:44:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/19/google-well-pay-100k-can-hack-chromebook-remotely/</loc>
		<lastmod>2016-03-19T09:58:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/21/bitcoin-trading-platform-shuts-2-4-weeks-following-cyber-attack/</loc>
		<lastmod>2016-03-21T05:07:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/21/new-carbanak-attacks-detected-early-stages-infection/</loc>
		<lastmod>2016-03-21T05:53:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/21/hackers-brought-websites-principal-swedish-newspapers/</loc>
		<lastmod>2016-03-21T09:10:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/21/hacking-tesla-model-s-much-noise-around-great-research/</loc>
		<lastmod>2016-03-21T12:57:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/21/google-microsoft-yahoo-join-forces-create-new-email-encryption-protocol/</loc>
		<lastmod>2016-03-21T13:04:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/22/surprise-ransomware-uses-teamviewer-infect-victims/</loc>
		<lastmod>2016-03-22T05:09:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/22/google-slings-critcial-patch-exploited-linux-kernel-root-hole/</loc>
		<lastmod>2016-03-22T05:22:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/22/radio-attack-lets-hackers-steal-24-different-car-models/</loc>
		<lastmod>2016-03-22T07:52:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/22/canadian-hospital-serves-ransomware-via-hacked-website/</loc>
		<lastmod>2016-03-22T11:16:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/22/cryptostalker-tool-detect-crypto-ransomware-linux/</loc>
		<lastmod>2016-03-22T12:22:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/23/new-ios-vulnerability-allow-attackers-crack-encrypted-imessage-attachments/</loc>
		<lastmod>2016-03-23T05:31:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/23/psst-heres-ubers-vulnerable-code-just-waiting-hacked/</loc>
		<lastmod>2016-03-23T06:14:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/23/microsoft-adds-new-feature-office-2016-can-block-macro-malware/</loc>
		<lastmod>2016-03-23T10:42:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/24/apple-release-ios-9-3-fixing-imessages-encryption-vulnerability/</loc>
		<lastmod>2016-03-24T16:04:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/24/new-self-protecting-usb-trojan-able-avoid-detection/</loc>
		<lastmod>2016-03-24T16:11:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/24/microsoft-chatbot-taught-swear-twitter/</loc>
		<lastmod>2016-03-24T16:14:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/24/three-us-hospitals-hit-ransomware/</loc>
		<lastmod>2016-03-24T16:18:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/25/seven-iranian-hackers-indicted-by-the-us-government-for-hacking/</loc>
		<lastmod>2016-03-25T07:50:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/25/billions-risk-computer-hack-due-wireless-mouse/</loc>
		<lastmod>2016-03-25T08:09:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/25/petya-ransomware-uses-dos-level-lock-screen-prevents-os-boot/</loc>
		<lastmod>2016-03-25T08:39:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/25/hackers-stole-records-1-5-million-customers-verizon-enterprise/</loc>
		<lastmod>2016-03-25T09:35:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/25/art-maktub-locker-ransomware/</loc>
		<lastmod>2016-03-25T10:19:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/26/ec-council-website-hacked-used-serve-malicious-code/</loc>
		<lastmod>2016-03-26T05:03:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/26/powerware-new-ransomware-written-powershell-targets-organizations-via-microsoft-word/</loc>
		<lastmod>2016-03-26T05:55:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/26/18-million-stolen-ids-discovered-server-criminals-china-got-illegal-access/</loc>
		<lastmod>2016-03-26T07:03:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/26/new-bill-seeks-kill-anonymous-burner-phones-requiring-registration/</loc>
		<lastmod>2016-03-26T08:41:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/26/png-embedded-malicious-payload-hidden-png-file/</loc>
		<lastmod>2016-03-26T10:44:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/28/remotely-exploitable-flaw-truecaller-leaves-100-million-android-devices-vulnerable/</loc>
		<lastmod>2016-03-28T05:25:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/28/node-js-package-manager-vulnerable-malicious-worm-packages/</loc>
		<lastmod>2016-03-28T06:15:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/28/top-australian-classifieds-site-serves-malware-malvertising-attack/</loc>
		<lastmod>2016-03-28T06:53:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/28/web-application-security-risks-attacks/</loc>
		<lastmod>2016-03-28T08:15:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/28/nuclear-plants-germany-vulnerable-terrorism-threats/</loc>
		<lastmod>2016-03-28T10:50:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/29/1-million-gmail-accounts-victim-state-sponsored-hacking/</loc>
		<lastmod>2016-03-29T05:11:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/29/popular-shopping-cart-app-plugs-dozens-xss-vulnerabilities/</loc>
		<lastmod>2016-03-29T05:44:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/29/pos-malware-tool-treasurehunt-targets-small-us-based-banks-retailers/</loc>
		<lastmod>2016-03-29T08:16:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/29/fbi-hacks-terrorists-iphone-without-apple/</loc>
		<lastmod>2016-03-29T08:43:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/29/hacker-known-weev-claims-responsibility-anti-semitic-printer-blast/</loc>
		<lastmod>2016-03-29T12:47:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/30/hacked-websites-used-black-hat-seo-campaign-redirecting-users-adult-sites/</loc>
		<lastmod>2016-03-30T04:58:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/30/taiwan-targeted-new-cyberespionage-back-door-trojan/</loc>
		<lastmod>2016-03-30T05:27:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/30/feds-request-judge-review-order-reveal-tor-exploit-code/</loc>
		<lastmod>2016-03-30T08:12:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/30/following-revelations-paris-attacks-us-lawmakers-target-burner-phones/</loc>
		<lastmod>2016-03-30T08:32:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/30/chinese-hacker-accused-stealing-f-35-fighter-lauded-hero-china/</loc>
		<lastmod>2016-03-30T11:47:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/31/hacker-exposes-thousands-insecure-desktops-anyone-can-remotely-view/</loc>
		<lastmod>2016-03-31T05:17:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/31/paypal-flaw-allowed-hackers-send-malicious-emails/</loc>
		<lastmod>2016-03-31T05:37:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/31/kimcilware-ransomware-targets-web-sites-running-magento-platform/</loc>
		<lastmod>2016-03-31T08:17:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/31/microsoft-adding-linux-command-line-windows-10/</loc>
		<lastmod>2016-03-31T11:14:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/03/31/marine-corps-cyberspace-warfare-group-new-hacker-unit/</loc>
		<lastmod>2016-03-31T13:03:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/01/code-bypass-apple-system-integrity-protection-security-mechanism-fits-tweet/</loc>
		<lastmod>2016-04-01T05:09:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/01/prevalent-android-ransomware-west-arrives-japan/</loc>
		<lastmod>2016-04-01T05:34:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/01/evolution-brazilian-malware/</loc>
		<lastmod>2016-04-01T06:27:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/01/latest-steam-malware-shows-signs-rat-activity/</loc>
		<lastmod>2016-04-01T11:00:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/01/hackers-can-unlock-hid-door-controller-one-udp-packet/</loc>
		<lastmod>2016-04-01T13:32:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/02/hackers-hacked-election-make-pena-nieto-president/</loc>
		<lastmod>2016-04-02T05:01:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/02/artist-using-museums-amplify-tors-anonymity-network/</loc>
		<lastmod>2016-04-02T05:42:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/02/uk-cops-tell-suspect-hand-crypto-keys-us-hacking-case/</loc>
		<lastmod>2016-04-02T08:28:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/02/hacker-breaches-team-skeet-adult-network-puts-data-sale-dark-web/</loc>
		<lastmod>2016-04-02T10:11:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/02/petya-taking-ransomware-low-level/</loc>
		<lastmod>2016-04-02T10:52:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/04/hacking-connected-lightbulbs-breach-air-gapped-networks/</loc>
		<lastmod>2016-04-04T05:05:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/04/rokku-ransomware-encrypts-file-unique-key/</loc>
		<lastmod>2016-04-04T06:22:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/04/us-uk-will-simulate-cyber-attacks-nuclear-plants-2016/</loc>
		<lastmod>2016-04-04T08:45:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/04/top-firefox-extensions-can-hide-silent-malware-using-easy-pre-fab-tool/</loc>
		<lastmod>2016-04-04T09:02:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/04/panama-papers-mossack-fonseca-leak-reveals-elites-tax-havens/</loc>
		<lastmod>2016-04-04T11:37:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/05/malware-like-samsam-ransomware-dangerous-hospitals/</loc>
		<lastmod>2016-04-05T05:16:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/05/cisco-high-severity-flaw-lets-malware-bypass-firepower-firewal/</loc>
		<lastmod>2016-04-05T06:04:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/05/photos-show-nsa-implants-trojan-routers-hidden-access-spying/</loc>
		<lastmod>2016-04-05T09:15:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/05/chrome-extension-caught-hijacking-users-browsers/</loc>
		<lastmod>2016-04-05T10:24:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/05/db-records-50-million-turkish-citizens-leaked-online-recycled-data/</loc>
		<lastmod>2016-04-05T12:24:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/05/top-silk-road-2-0-admin-doctorclu-pleads-guilty-face-8-years-prison/</loc>
		<lastmod>2016-04-05T12:57:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/06/rearchers-discover-way-hack-gmail-facebook-500-times-faster/</loc>
		<lastmod>2016-04-06T05:21:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/06/whatsapp-now-widely-used-end-end-crypto-tool-planet/</loc>
		<lastmod>2016-04-06T05:47:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/06/locky-variant-changes-c2-communication-found-nuclear-ek/</loc>
		<lastmod>2016-04-06T06:43:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/06/hack-like-pro-scan-vulnerabilities-nessus/</loc>
		<lastmod>2016-04-06T07:45:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/06/easily-bypass-iphone-6s-lockscreen-access-photos-contacts/</loc>
		<lastmod>2016-04-06T08:38:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/06/adobe-patch-flash-player-zero-day-vulnerability-actively-exploited-wild/</loc>
		<lastmod>2016-04-06T12:37:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/07/ubuntu-plugs-code-exec-dos-linux-kernel-holes/</loc>
		<lastmod>2016-04-07T05:28:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/07/surreptitious-sharing-attack-android-apps-can-leak-private-data/</loc>
		<lastmod>2016-04-07T05:45:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/07/ta530-group-spear-phishing-meets-ransomware/</loc>
		<lastmod>2016-04-07T10:56:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/07/google-recaptcha-cracked-new-automated-attack/</loc>
		<lastmod>2016-04-07T11:34:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/08/nation-wide-radio-station-hack-airs-hours-vulgar-furry-sex-ramblings/</loc>
		<lastmod>2016-04-08T05:15:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/08/ddos-attacks-billgates-linux-malware-intensify/</loc>
		<lastmod>2016-04-08T05:39:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/08/anonymous-philippines-hacked-comelec-biggest-government-related-data-breach/</loc>
		<lastmod>2016-04-08T08:30:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/08/onionscan-tool-check-dark-web-site-really-anonymous/</loc>
		<lastmod>2016-04-08T10:49:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/08/killing-zero-day-egg-adobe-cve-2016-1019/</loc>
		<lastmod>2016-04-08T13:10:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/09/135-million-arris-cable-modems-vulnerable-remote-attacks/</loc>
		<lastmod>2016-04-09T04:58:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/09/cryptohost-decrypted-locks-files-password-protected-rar-file/</loc>
		<lastmod>2016-04-09T05:19:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/09/ok-panic-newly-evolved-ransomware-bad-news-everyone/</loc>
		<lastmod>2016-04-09T06:58:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/09/open-source-vulnerabilities-database-osvdb-shuts-permanently/</loc>
		<lastmod>2016-04-09T08:49:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/09/qihoo-360-just-tip-whitelisted-malware-iceberg/</loc>
		<lastmod>2016-04-09T10:06:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- <p>Please edit wp-db.inc.php in wp-includes and set SAVEQUERIES to true if you want to see the queries.</p> --> <!-- Request ID: fc4a7181557979a0a149cf0441e2b2e8; Queries for sitemap: 2; Total queries: 51; Seconds: 0.09; Memory for sitemap: 1KB; Total memory: 16MB -->
