<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.securitynewspaper.com/snnews_pl/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='May 17, 2026 5:24 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.securitynewspaper.com/2016/04/11/careful-products-sold-amazon-infected-malware/</loc>
		<lastmod>2016-04-11T05:18:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/11/uk-teen-sold-ddos-tools-dark-web-avoids-going-prison/</loc>
		<lastmod>2016-04-11T05:38:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/11/petya-ransomwares-encryption-defeated-password-generator-released/</loc>
		<lastmod>2016-04-11T06:31:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/11/apple-just-fixed-imessage-bug-researchers-called-easily-exploitable/</loc>
		<lastmod>2016-04-11T13:22:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/12/jigsaw-ransomware-decrypted-will-delete-files-pay-ransom/</loc>
		<lastmod>2016-04-12T05:51:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/12/us-judge-orders-apple-help-fbi-hacking-two-iphones/</loc>
		<lastmod>2016-04-12T06:21:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/12/rokku-ransomware-shows-possible-link-chimera/</loc>
		<lastmod>2016-04-12T08:36:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/12/mobile-devices-used-execute-dns-malware-home-routers/</loc>
		<lastmod>2016-04-12T10:04:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/12/click-fraud-ramdo-malware-family-continues-plague-users/</loc>
		<lastmod>2016-04-12T12:48:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/13/flaws-worldpays-merchant-portal-allow-attackers-modify-payment-forms/</loc>
		<lastmod>2016-04-13T05:31:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/13/webusb-two-google-developers-create-api-connect-usb-devices-directly-web/</loc>
		<lastmod>2016-04-13T05:58:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/13/linux-fight-devs-plan-bundle-kernel-patches-sparks-debate/</loc>
		<lastmod>2016-04-13T07:12:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/13/apple-imessage-flaw-exposed-chat-history-single-click/</loc>
		<lastmod>2016-04-13T08:00:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/14/lottery-security-director-used-hacked-dll-manipulate-predict-winning-tickets/</loc>
		<lastmod>2016-04-14T04:58:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/14/hacking-samsung-galaxy-via-modem-interface-exposed-via-usb/</loc>
		<lastmod>2016-04-14T05:26:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/14/new-version-ios-date-bug-exploited-public-wi-fi-hotspots/</loc>
		<lastmod>2016-04-14T08:56:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/14/linux-computers-targeted-new-backdoor-ddos-trojan/</loc>
		<lastmod>2016-04-14T10:33:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/14/google-makes-self-driving-bicycle-mess-amsterdam/</loc>
		<lastmod>2016-04-14T11:12:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/15/blizzard-world-warcraft-taken-ddos-attacks/</loc>
		<lastmod>2016-04-15T05:22:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/15/apple-stops-patching-quicktime-windows-despite-2-active-vulnerabilities/</loc>
		<lastmod>2016-04-15T05:58:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/15/adware-bundlers-pushing-cryptocurrency-miners-unsuspecting-victims/</loc>
		<lastmod>2016-04-15T06:27:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/15/microsoft-issues-optional-windows-update-fix-mousejack-vulnerability/</loc>
		<lastmod>2016-04-15T13:25:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/16/blackhole-exploit-kit-author-sentenced-seven-years-russian-gulag-camp/</loc>
		<lastmod>2016-04-16T05:14:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/16/fbi-hiding-firefox-zero-day/</loc>
		<lastmod>2016-04-16T05:56:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/16/jboss-backdoor-opens-3-million-servers-risk-attacks/</loc>
		<lastmod>2016-04-16T08:03:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/16/malware-found-surveillance-cameras-sold-amazon/</loc>
		<lastmod>2016-04-16T10:20:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/16/can-hack-server/</loc>
		<lastmod>2016-04-16T10:58:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/18/hackers-rack-bill-playstation-account-sony-makes-user-suffer/</loc>
		<lastmod>2016-04-18T05:01:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/18/decrypted-new-autolocky-ransomware-fails-impersonate-locky/</loc>
		<lastmod>2016-04-18T05:50:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/18/lottery-security-director-hacked-random-number-generator-rig-lotteries/</loc>
		<lastmod>2016-04-18T09:07:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/18/fbi-informant-sabu-says-helped-turkish-hacker-group-redhack/</loc>
		<lastmod>2016-04-18T11:05:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/18/malware-created-microsoft-powershell-rise/</loc>
		<lastmod>2016-04-18T11:17:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/19/bitpay-bitcoin-processor-warns-new-coinbitclip-trojan/</loc>
		<lastmod>2016-04-19T05:15:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/19/hackers-can-spy-smartphone-just-phone-number/</loc>
		<lastmod>2016-04-19T05:44:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/19/hackers-eavesdropped-us-congressman-using-phone-number/</loc>
		<lastmod>2016-04-19T06:32:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/19/flashback-declassified-1970-dod-cybersecurity-document-still-relevant/</loc>
		<lastmod>2016-04-19T06:55:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/19/hack-like-pro-get-facebook-credentials-without-hacking-facebook/</loc>
		<lastmod>2016-04-19T07:13:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/20/four-element-sword-weaponized-document-builder-used-apt-attacks/</loc>
		<lastmod>2016-04-20T05:12:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/20/pos-malware-steals-credit-card-numbers-via-dns-requests/</loc>
		<lastmod>2016-04-20T05:39:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/20/mits-new-ai-squared-can-predict-85-percent-cyberattacks/</loc>
		<lastmod>2016-04-20T06:03:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/20/viber-adds-end-end-encryption-hidden-chats-messaging-app-privacy-wave-grows/</loc>
		<lastmod>2016-04-20T09:02:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/20/google-com-dangerous-website-warns-google-safe-browsing/</loc>
		<lastmod>2016-04-20T09:46:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/21/dram-bitflipping-exploits-hijack-computers-just-got-easier/</loc>
		<lastmod>2016-04-21T05:01:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/21/hacker-promises-kill-apple-mac-ransomware-becomes-nightmare-updated/</loc>
		<lastmod>2016-04-21T05:27:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/21/fake-social-button-plugin-redirects-angler-ek/</loc>
		<lastmod>2016-04-21T07:05:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/21/hackers-jailed-spyeye-virus-robbed-bank-accounts-worldwide/</loc>
		<lastmod>2016-04-21T07:15:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/21/new-strain-teslacrypt-implements-sophisticated-evasion/</loc>
		<lastmod>2016-04-21T08:06:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/22/hacked-facebook-found-someones-backdoor-script/</loc>
		<lastmod>2016-04-22T05:17:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/22/windows-applocker-bypass-allows-attackers-registers-dlls-off-internet/</loc>
		<lastmod>2016-04-22T05:44:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/22/fbi-director-paid-1-2-million-san-bernardino-iphone-hack/</loc>
		<lastmod>2016-04-22T07:00:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/22/asian-nation-state-hackers-use-fileless-rat-hacking-campaign/</loc>
		<lastmod>2016-04-22T07:12:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/22/dutch-canadian-police-seize-criminal-encrypted-smartphone-network/</loc>
		<lastmod>2016-04-22T08:17:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/23/nuclear-exploit-kit-service-cashes-demand-cryptoransomware-rings/</loc>
		<lastmod>2016-04-23T05:06:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/23/million-people-now-access-facebook-dark-web-every-month/</loc>
		<lastmod>2016-04-23T06:20:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/23/mongodb-db-containing-93-4-million-mexican-voter-records-open-online/</loc>
		<lastmod>2016-04-23T08:58:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/23/10-router-blamed-massive-80-million-bangladesh-bank-hack/</loc>
		<lastmod>2016-04-23T09:49:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/23/teaching-old-rat-new-tricks/</loc>
		<lastmod>2016-04-23T10:37:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/25/7ev3n-honet-ransomware-encrypts-renames-files-r5a/</loc>
		<lastmod>2016-04-25T05:09:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/25/anonymous-shuts-city-denver-website-another-fatal-police-shooting/</loc>
		<lastmod>2016-04-25T05:39:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/25/hack-metasploitable-2-including-privilege-escalation/</loc>
		<lastmod>2016-04-25T06:18:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/25/darpa-calls-hacker-proof-encryption-app-will-pay/</loc>
		<lastmod>2016-04-25T11:57:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/25/hackers-got-caught-typo-trying-take-world/</loc>
		<lastmod>2016-04-25T13:35:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/26/businesses-pay-100000-ddos-extortionists-never-ddos-anyone/</loc>
		<lastmod>2016-04-26T04:58:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/26/yeabests-cc-fileless-infection-using-wmi-hijack-browser/</loc>
		<lastmod>2016-04-26T05:25:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/26/active-drive-exploits-critical-android-bugs-care-hacking-team/</loc>
		<lastmod>2016-04-26T06:04:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/26/chaoskey-hardware-true-random-number-generator-attaches-via-usb/</loc>
		<lastmod>2016-04-26T08:33:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/26/dating-website-beautiful-people-hacked-1-1-m-members-data-leaked/</loc>
		<lastmod>2016-04-26T12:09:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/27/facebook-bug-allowed-attackers-take-accounts-sites/</loc>
		<lastmod>2016-04-27T05:04:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/27/hundreds-spotify-credentials-appear-online-users-report-accounts-hacked-emails-changed/</loc>
		<lastmod>2016-04-27T05:26:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/27/decrypted-kaspersky-releases-free-decryptor-cryptxxx-ransomware/</loc>
		<lastmod>2016-04-27T06:37:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/27/hacking-group-platinum-used-windows-patching-system/</loc>
		<lastmod>2016-04-27T07:50:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/27/rumms-latest-family-android-malware-attacking-users-russia-via-sms-phishing/</loc>
		<lastmod>2016-04-27T08:37:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/28/truecrypter-ransomware-accepts-payment-bitcoins-amazon-gift-card/</loc>
		<lastmod>2016-04-28T05:11:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/28/qatar-national-bank-hacked-hackers-leak-1-4gb-database/</loc>
		<lastmod>2016-04-28T05:34:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/28/american-samoa-domain-registry-exposing-client-data-since-mid-1990s/</loc>
		<lastmod>2016-04-28T06:15:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/28/methodologies-penetration-testing/</loc>
		<lastmod>2016-04-28T07:20:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/28/ranumbin-dark-web-service-dedicated-ransomware/</loc>
		<lastmod>2016-04-28T08:28:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/28/former-tor-developer-created-malware-fbi-hack-tor-users/</loc>
		<lastmod>2016-04-28T11:14:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/29/malware-takes-advantage-windows-god-mode/</loc>
		<lastmod>2016-04-29T05:11:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/29/regsvr32-can-used-install-ransomware-jscript-installers/</loc>
		<lastmod>2016-04-29T05:39:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/29/tuto4pc-utilities-silently-install-12m-backdoors-cisco/</loc>
		<lastmod>2016-04-29T06:09:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/29/toy-maker-maisto-unwittingly-serves-cryptxxx-ransomware/</loc>
		<lastmod>2016-04-29T07:07:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/29/ransomware-explosion-continues-cryptflle2-brlock-mm-locker-discovered/</loc>
		<lastmod>2016-04-29T08:16:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/30/tick-cyberespionage-group-zeros-japan/</loc>
		<lastmod>2016-04-30T05:08:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/30/crooks-deliver-android-malware-via-fake-google-chrome-updates/</loc>
		<lastmod>2016-04-30T05:49:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/30/bwl-electric-water-utility-shut-ransomware/</loc>
		<lastmod>2016-04-30T07:39:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/30/dramatic-rise-atm-skimming-attacks/</loc>
		<lastmod>2016-04-30T08:33:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/04/30/now-fbi-can-hack-computer-world-just-one-warrant/</loc>
		<lastmod>2016-04-30T10:21:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/02/garage4hackers-webcast-bypass-modern-wafs-exemplified-xss/</loc>
		<lastmod>2016-05-02T05:07:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/02/canadian-gold-mining-firm-goldcorp-hacked/</loc>
		<lastmod>2016-05-02T05:26:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/02/government-role-cyber-security-protecting-private-sector-companies/</loc>
		<lastmod>2016-05-02T06:38:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/02/decrypted-alpha-ransomware-accepts-itunes-gift-cards-payment/</loc>
		<lastmod>2016-05-02T10:31:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/02/flaws-samsungs-smart-home-let-hackers-unlock-doors-set-off-fire-alarms/</loc>
		<lastmod>2016-05-02T12:28:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/03/valve-fixes-steam-crypto-bug-exposed-passwords-plaintext/</loc>
		<lastmod>2016-05-03T05:07:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/03/flaw-pwnedlist-service-exposed-millions-credentials/</loc>
		<lastmod>2016-05-03T06:00:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/03/michigan-senate-bills-give-car-hackers-life-prison/</loc>
		<lastmod>2016-05-03T09:47:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/03/australian-computer-scientist-claims-satoshi-nakamoto-created-bitcoins/</loc>
		<lastmod>2016-05-03T10:06:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/03/whatsapp-blocked-100-million-users-due-judges-order/</loc>
		<lastmod>2016-05-03T12:51:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/03/hacker-stole-banks-ordered-pay-7-million/</loc>
		<lastmod>2016-05-03T13:06:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/04/imagetragick-exploit-used-attacks-compromise-sites-via-imagemagick-0-day/</loc>
		<lastmod>2016-05-04T05:07:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/04/fbi-announcement-paying-ransom-bad-idea/</loc>
		<lastmod>2016-05-04T05:42:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/04/someone-just-hacked-way-use-imessage-android/</loc>
		<lastmod>2016-05-04T06:12:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/04/qatar-national-bank-declares-systems-fully-secure-sequel-cyber-attack/</loc>
		<lastmod>2016-05-04T11:51:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/04/linux-foundation-badge-program-boost-open-source-security/</loc>
		<lastmod>2016-05-04T12:37:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/04/traffic-youtube-video-predicts-isis-attacks-traffic-youtube-video-predicts-isis-attacks/</loc>
		<lastmod>2016-05-04T13:18:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/05/new-cryptmix-ransomware-promises-give-money-childrens-charity/</loc>
		<lastmod>2016-05-05T05:04:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/05/webmail-firms-probe-login-leak-272-million/</loc>
		<lastmod>2016-05-05T05:40:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/05/lost-door-rat-accessible-customizable-attack-tool/</loc>
		<lastmod>2016-05-05T06:23:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/05/petya-two-one-trojan/</loc>
		<lastmod>2016-05-05T07:54:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/06/critical-qualcomm-security-bug-leaves-many-phones-open-attack/</loc>
		<lastmod>2016-05-06T05:17:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/06/knowing-distributing-illegal-prime-number-get-arrested/</loc>
		<lastmod>2016-05-06T05:31:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/06/new-skype-spam-leads-trojan-download/</loc>
		<lastmod>2016-05-06T06:06:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/06/7-password-experts-lock-online-security/</loc>
		<lastmod>2016-05-06T10:17:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/06/im-stupid-locky-network-gets-hacked-dissed/</loc>
		<lastmod>2016-05-06T12:39:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/07/lenovo-bloatware-patched-fix-system-takeover-bug/</loc>
		<lastmod>2016-05-07T05:18:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/07/ransomware-now-biggest-cybersecurity-threat/</loc>
		<lastmod>2016-05-07T06:08:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/07/alphalocker-professional-ransomware-kit-date/</loc>
		<lastmod>2016-05-07T08:08:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/07/7ev3n-ransomware-turning-honet/</loc>
		<lastmod>2016-05-07T08:42:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/07/founder-online-underworld-bank-jailed-laundering-billions/</loc>
		<lastmod>2016-05-07T10:33:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/09/new-backdoor-attacks-windows-users/</loc>
		<lastmod>2016-05-09T05:16:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/09/hackers-can-break-facility-spending-700-amazon-ebay/</loc>
		<lastmod>2016-05-09T07:39:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/09/inventory-included-investbank-data-dump/</loc>
		<lastmod>2016-05-09T07:48:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/09/malware-museum-lets-look-old-viruses-without-getting-infected/</loc>
		<lastmod>2016-05-09T08:48:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/09/prove-rapid-rise-12000-shared-proof-concept-exploits/</loc>
		<lastmod>2016-05-09T12:24:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/10/security-pros-ill-advised-hack-florida-elections-site-backfired/</loc>
		<lastmod>2016-05-10T05:14:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/10/viking-horde-new-type-android-malware-google-play/</loc>
		<lastmod>2016-05-10T06:00:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/10/bucbi-ransomware-back-ukrainian-makeover/</loc>
		<lastmod>2016-05-10T07:50:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/11/researchers-hack-whatsapp-accounts-ss7-protocol/</loc>
		<lastmod>2016-05-11T05:01:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/11/microsoft-adobe-warn-separate-zero-day-vulnerabilities-attack/</loc>
		<lastmod>2016-05-11T05:38:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/11/define-information-security-plan/</loc>
		<lastmod>2016-05-11T05:44:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/11/seoul-blames-north-korea-hacking-south-korean-defense-contractor/</loc>
		<lastmod>2016-05-11T09:59:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/11/hey-fbi-india-can-hack-iphones-doesnt-want-backdoors/</loc>
		<lastmod>2016-05-11T11:50:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/12/mozilla-begs-court-details-pedophile-tor-hack-keep-firefox-safe/</loc>
		<lastmod>2016-05-12T11:06:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/12/android-malware-promises-porn-roots-device-installs-malware/</loc>
		<lastmod>2016-05-12T11:14:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/12/compression-tool-7-zip-pwned-pain-flows-top-security-software-tools/</loc>
		<lastmod>2016-05-12T11:21:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/12/facebook-wants-teach-hack/</loc>
		<lastmod>2016-05-12T11:27:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/12/hack-88000-sg-accounts-stolen-hacker/</loc>
		<lastmod>2016-05-12T11:37:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/12/chinese-arm-vendor-left-developer-backdoor-kernel-android-devices/</loc>
		<lastmod>2016-05-12T12:06:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/13/petya-back-friend-named-mischa-ransomware/</loc>
		<lastmod>2016-05-13T08:22:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/13/kinky-fetish-forum-hacked-hackers-leak-100000-user-details/</loc>
		<lastmod>2016-05-13T08:51:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/13/jigsaw-ransomware-becomes-cryptohitman-porno-extension/</loc>
		<lastmod>2016-05-13T09:03:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/13/microsoft-windows-zero-day-exposes-companies-credit-card-data-theft/</loc>
		<lastmod>2016-05-13T11:00:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/13/second-bank-hit-sophisticated-malware-attack-says-swift/</loc>
		<lastmod>2016-05-13T13:14:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/14/five-year-old-sap-vulnerability-affects-500-companies-not-36/</loc>
		<lastmod>2016-05-14T05:03:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/14/andromeda-distributors-craft-new-strategies-attacks/</loc>
		<lastmod>2016-05-14T05:44:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/14/hancitor-ruckguv-reappear-updated-vawtrak-deck/</loc>
		<lastmod>2016-05-14T06:48:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/14/two-billboards-alabama-hacked-run-marco-rubio-porn-meme/</loc>
		<lastmod>2016-05-14T08:25:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/14/4-ways-protect-real-threat-ransomware/</loc>
		<lastmod>2016-05-14T09:53:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/14/whatsapp-video-calling-feature-spotted-android-beta-update/</loc>
		<lastmod>2016-05-14T10:33:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/16/android-smsspy-88-origin/</loc>
		<lastmod>2016-05-16T06:36:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/16/ghostshell-returns-exposes-bunch-companies-open-ftp-servers/</loc>
		<lastmod>2016-05-16T07:29:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/16/everything-know-fbi-hacks-people/</loc>
		<lastmod>2016-05-16T09:37:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/16/silk-road-3-0-pops-dark-web/</loc>
		<lastmod>2016-05-16T12:07:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/16/new-simple-attack-squid-proxies-leverages-malicious-flash-ads/</loc>
		<lastmod>2016-05-16T12:19:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/17/cve-2016-4117-fireeye-revealed-exploit-chain-recent-attacks/</loc>
		<lastmod>2016-05-17T05:17:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/17/john-mcafee-apparently-tried-trick-reporters-thinking-hacked-whatsapp/</loc>
		<lastmod>2016-05-17T05:52:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/17/time-patients-heart-procedure-interrupted-virus-scan/</loc>
		<lastmod>2016-05-17T07:26:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/17/malware-reverse-engineering/</loc>
		<lastmod>2016-05-17T07:36:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/17/secure-data-destruction-information-storage-devices/</loc>
		<lastmod>2016-05-17T07:36:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/17/google-face-record-3-4-billion-antitrust-fine/</loc>
		<lastmod>2016-05-17T10:07:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/18/atm-malware-skimer-makes-comeback-seven-years/</loc>
		<lastmod>2016-05-18T05:13:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/18/bank-hack-steal-25-billion-lines-code/</loc>
		<lastmod>2016-05-18T06:03:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/18/implement-data-security-management-system/</loc>
		<lastmod>2016-05-18T07:14:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/18/click-fraud-1m-machines-hacked-adsense-revenue/</loc>
		<lastmod>2016-05-18T08:57:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/18/tech-support-scammers-get-serious-screen-lockers/</loc>
		<lastmod>2016-05-18T11:10:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/18/ukrainian-hacker-admits-role-hacking-three-business-newswire-services/</loc>
		<lastmod>2016-05-18T12:06:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/19/hacker-selling-117-million-linkedin-logins-dark-web/</loc>
		<lastmod>2016-05-19T05:19:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/19/nightmare-russian-facial-recognition-app-one-step-closer-end-privacy/</loc>
		<lastmod>2016-05-19T05:39:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/19/teslacrypt-shuts-releases-master-decryption-key/</loc>
		<lastmod>2016-05-19T07:49:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/19/android-instant-apps-will-blur-lines-apps-mobile-sites/</loc>
		<lastmod>2016-05-19T12:10:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/19/hacker-steals-money-bank-sends-bitcoin-anti-isis-syrian-provence/</loc>
		<lastmod>2016-05-19T13:35:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/20/scientists-find-new-way-generate-random-numbers-encryption-get-boost/</loc>
		<lastmod>2016-05-20T05:25:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/20/telephone-metadata-nsa-can-reveal-deeply-personal-information/</loc>
		<lastmod>2016-05-20T07:32:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/20/foul-mouthed-worm-takes-control-wireless-isps-around-globe/</loc>
		<lastmod>2016-05-20T12:03:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/20/sixty-percent-enterprise-android-phones-affected-critical-qsee-vulnerability/</loc>
		<lastmod>2016-05-20T12:42:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/21/alarmed-swift-urges-banks-report-hacking-attempts/</loc>
		<lastmod>2016-05-21T10:17:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/21/whos-hacking-schools-now-students/</loc>
		<lastmod>2016-05-21T10:22:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/21/say-hello-allo-ai-assistants-set-run-life/</loc>
		<lastmod>2016-05-21T10:32:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/23/archive-historic-bt-email-hack-preserved/</loc>
		<lastmod>2016-05-23T07:56:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/23/shuttered-instagram-holes-opened-20-million-accounts-hijack/</loc>
		<lastmod>2016-05-23T07:59:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/23/identify-devices-unintentional-radiation/</loc>
		<lastmod>2016-05-23T08:02:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/23/audio-fingerprinting-used-track-web-users-study-finds/</loc>
		<lastmod>2016-05-23T08:08:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/23/hack-police-vigilante-hacker-publishes-online-tutorial-video/</loc>
		<lastmod>2016-05-23T08:21:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/24/1-4-billion-yen-stolen-japanese-atms-less-3-hours/</loc>
		<lastmod>2016-05-24T05:31:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/24/targeted-attacks-banks-middle-east/</loc>
		<lastmod>2016-05-24T06:38:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/24/dma-locker-4-0-known-ransomware-preparing-massive-distribution/</loc>
		<lastmod>2016-05-24T07:00:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/24/teenager-charged-mumsnet-hack-ddos-attack/</loc>
		<lastmod>2016-05-24T07:25:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/24/linux-kernel-website-kernel-org-banned-norton/</loc>
		<lastmod>2016-05-24T07:43:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/25/operation-ke3chang-resurfaces-new-tidepool-malware/</loc>
		<lastmod>2016-05-25T05:08:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/25/whatsapp-gold-version-information-stealing-malware-targeting-users/</loc>
		<lastmod>2016-05-25T06:00:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/25/wpad-protocol-bug-puts-windows-users-risk/</loc>
		<lastmod>2016-05-25T08:04:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/25/pastejacking-attack-overrides-clipboard-trick-running-evil-code/</loc>
		<lastmod>2016-05-25T09:04:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/25/next-gen-tor-use-distributed-rng-55-character-addresses/</loc>
		<lastmod>2016-05-25T12:01:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/26/major-dns-provider-hit-mysterious-focused-ddos-attack/</loc>
		<lastmod>2016-05-26T05:06:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/26/hackers-prefer-file-upload-xss-sqli-bugs-attacking-wordpress-sites/</loc>
		<lastmod>2016-05-26T05:55:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/26/new-wave-malvertising-leverages-latest-flash-exploit/</loc>
		<lastmod>2016-05-26T07:55:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/26/hackers-steal-2-million-bitcoin-exchange-hong-kong-bounty-offered-recover-funds/</loc>
		<lastmod>2016-05-26T08:10:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/26/userland-persistence-scheduled-tasks-com-handler-hijacking/</loc>
		<lastmod>2016-05-26T08:36:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/27/swift-bank-attacks-connected-north-korean-group-behind-sony-hacks/</loc>
		<lastmod>2016-05-27T05:53:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/27/detecting-hidden-backdoors-php-opcache/</loc>
		<lastmod>2016-05-27T08:03:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/27/backdoor-teamviewer-49/</loc>
		<lastmod>2016-05-27T08:35:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/27/forbidden-attack-makes-dozens-https-visa-sites-vulnerable-tampering/</loc>
		<lastmod>2016-05-27T09:04:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/28/biggest-spam-flood-years-distributes-locky-ransomware/</loc>
		<lastmod>2016-05-28T05:09:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/28/week-ransomware-may-27-2016-zcrypt-jigsaw/</loc>
		<lastmod>2016-05-28T05:55:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/28/hacker-tries-sell-427-milllion-stolen-myspace-passwords-2800/</loc>
		<lastmod>2016-05-28T10:14:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/30/lg-smartphones-affected-two-severe-vulnerabilities/</loc>
		<lastmod>2016-05-30T05:09:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/30/bypassing-amsi-using-powershell-5-dll-hijacking/</loc>
		<lastmod>2016-05-30T05:48:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/30/china-readying-launch-first-hack-proof-quantum-communication-satellite/</loc>
		<lastmod>2016-05-30T08:18:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/30/know-windows-pc-got-hacked-use-hacked/</loc>
		<lastmod>2016-05-30T12:38:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/30/framework-pos-malware-returns-new-attacks-smbs-chicago-hawaii/</loc>
		<lastmod>2016-05-30T13:23:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/31/pwned-65-million-tumblr-accounts-40-million-fling-360-million-myspace/</loc>
		<lastmod>2016-05-31T05:25:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/31/19-year-old-hacks-toll-free-number-lulz-causes-losses-worth-89000/</loc>
		<lastmod>2016-05-31T05:47:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/31/push-hack-reverse-engineering-ip-camera-2/</loc>
		<lastmod>2016-05-31T08:22:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/31/ancient-bayrob-backdoor-trojan-resurfaces-nine-years-updated-versions/</loc>
		<lastmod>2016-05-31T12:01:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/05/31/pacific-gas-electric-claims-recent-data-breach-exposed-fake-details/</loc>
		<lastmod>2016-05-31T13:23:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/01/windows-zero-day-affecting-os-versions-sale-90000/</loc>
		<lastmod>2016-06-01T05:32:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/01/israeli-researchers-poke-holes-samsung-knox-security-system/</loc>
		<lastmod>2016-06-01T06:45:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/01/hackers-find-bugs-extort-ransom-call-public-service/</loc>
		<lastmod>2016-06-01T11:01:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/01/security-vulnerabilities-top-uk-companies-exposed/</loc>
		<lastmod>2016-06-01T12:42:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/01/research-finds-critical-box-vulnerabilities-big-name-laptops/</loc>
		<lastmod>2016-06-01T13:18:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/02/box-exploitation-possible-pcs-top-5-oems/</loc>
		<lastmod>2016-06-02T05:22:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/02/cryptxxx-rebranding-ultracrypter/</loc>
		<lastmod>2016-06-02T05:49:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/02/teamviewer-denies-hack-pcs-hijacked-paypal-accounts-drained/</loc>
		<lastmod>2016-06-02T07:47:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/02/android-banker-malware-goes-social/</loc>
		<lastmod>2016-06-02T08:27:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/02/demonically-clever-backdoor-hides-tiny-slice-computer-chip/</loc>
		<lastmod>2016-06-02T08:50:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/03/malware-finds-new-trick-hide-rogue-dns-settings-windows/</loc>
		<lastmod>2016-06-03T04:16:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/03/badblock-encrypts-system-files-decryptor-released-emsisoft/</loc>
		<lastmod>2016-06-03T04:39:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/03/mongodb-security-injection-attacks-php/</loc>
		<lastmod>2016-06-03T05:39:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/03/russian-hacker-gang-arrested-25m-theft/</loc>
		<lastmod>2016-06-03T08:48:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/03/20m-israeli-hackers-will-spy-phone-planet/</loc>
		<lastmod>2016-06-03T09:31:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/04/android-malware-finds-new-ways-derive-current-running-tasks/</loc>
		<lastmod>2016-06-04T05:09:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/04/dridex-poses-fake-certificate-latest-spam-run/</loc>
		<lastmod>2016-06-04T06:01:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/04/watch-hackers-hijack-whatsapp-accounts-via-critical-telecoms-flaws/</loc>
		<lastmod>2016-06-04T06:42:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/04/researchers-show-steal-data-pc-components-without-hacking/</loc>
		<lastmod>2016-06-04T08:57:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/04/fastpos-pos-malware-implements-quick-exfiltration-method/</loc>
		<lastmod>2016-06-04T10:11:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/06/sh0ping-su-hacked-stolen-card-data-accounts-available-sale/</loc>
		<lastmod>2016-06-06T05:18:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/06/irongate-malware-targets-industrial-systems-avoids-detection/</loc>
		<lastmod>2016-06-06T06:04:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/06/mark-zuckerbergs-twitter-pinterest-accounts-hacked-linkedin-password-dump-likely-blame/</loc>
		<lastmod>2016-06-06T08:11:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/06/cryptxxx-ransomware-learns-samba-new-tricks-version-3-100/</loc>
		<lastmod>2016-06-06T09:53:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/06/100-million-credentials-russian-facebook-vk-com-go-sale/</loc>
		<lastmod>2016-06-06T12:16:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/07/protecting-pc-ransomware-gets-harder-emet-evading-exploit/</loc>
		<lastmod>2016-06-07T04:29:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/07/new-jigsaw-ransomware-variant-payms-extension/</loc>
		<lastmod>2016-06-07T05:07:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/07/russia-plans-leave-apple-android-behind-building-smartphone-software/</loc>
		<lastmod>2016-06-07T11:40:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/07/mitsubishi-hybrid-suv-hack-puts-drivers-risk-says-researcher/</loc>
		<lastmod>2016-06-07T12:28:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/07/hash-factory-new-cerber-ransomware-morphs-every-15-seconds/</loc>
		<lastmod>2016-06-07T12:43:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/07/facebook-maliciouschat/</loc>
		<lastmod>2016-06-07T13:01:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/08/ftcs-chief-technologist-gets-mobile-phone-number-hijacked-id-thief/</loc>
		<lastmod>2016-06-08T04:23:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/08/android-trojan-hijacks-browsers-redirect-users-custom-urls/</loc>
		<lastmod>2016-06-08T04:40:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/08/ransomware-dominates-threat-landscape/</loc>
		<lastmod>2016-06-08T05:22:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/08/researchers-turn-smartphone-vibration-motor-microphone-spy/</loc>
		<lastmod>2016-06-08T09:52:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/08/howto-port-forwards-socks-proxy/</loc>
		<lastmod>2016-06-08T11:53:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/09/twitter-hacked-hacker-selling-32-million-twitter-passwords-dark-web/</loc>
		<lastmod>2016-06-09T07:46:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/09/hacking-satellites-look-sky/</loc>
		<lastmod>2016-06-09T08:05:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/09/ransomware-leaves-server-credentials-code/</loc>
		<lastmod>2016-06-09T08:26:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/09/crafted-pdf-document-can-hack-chrome-pdf-reader-update-chrome-now/</loc>
		<lastmod>2016-06-09T10:30:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/09/zcrypt-expands-reach-virus-ransomware/</loc>
		<lastmod>2016-06-09T12:16:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/10/bad-ui-decision-microsoft-helped-macro-malware-make-comeback/</loc>
		<lastmod>2016-06-10T05:28:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/10/corporate-shared-folders-cloud-filled-malware-research-finds/</loc>
		<lastmod>2016-06-10T06:10:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/10/necurs-botnet-goes-shutting-off-dridex-locky-spam/</loc>
		<lastmod>2016-06-10T08:05:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/10/zendesk-chiefs-twitter-account-hacked/</loc>
		<lastmod>2016-06-10T08:33:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/10/rip-rop-intels-cunning-plot-kill-stack-hopping-exploits-cpu-level/</loc>
		<lastmod>2016-06-10T11:36:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/11/nsa-couldnt-hack-san-bernardino-iphone-official-says/</loc>
		<lastmod>2016-06-11T05:22:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/11/hack-wi-fi-cracking-wpa2-psk-passwords-using-aircrack-ng/</loc>
		<lastmod>2021-08-01T17:45:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/11/visual-studio-2015-secretly-inserts-telemetry-code-c-binaries/</loc>
		<lastmod>2016-06-11T09:02:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/11/bolek-banking-trojan-carberp-successor-spreading-wild/</loc>
		<lastmod>2016-06-11T10:20:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/13/hackers-find-clever-way-bypass-googles-two-factor-authentication/</loc>
		<lastmod>2016-06-13T05:03:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/13/hacker-puts-51-million-file-sharing-accounts-sale-dark-web/</loc>
		<lastmod>2016-06-13T05:47:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/13/nsa-looking-exploit-internet-things-including-biomedical-devices-official-says/</loc>
		<lastmod>2016-06-13T07:45:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/13/asus-uefi-update-driver-physical-memory-readwrite/</loc>
		<lastmod>2016-06-13T08:00:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/13/lurk-banker-trojan-exclusively-russia/</loc>
		<lastmod>2016-06-13T08:52:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/14/scammers-already-started-trying-exploit-orlando-shooting-bitcoins/</loc>
		<lastmod>2016-06-14T05:12:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/14/new-raa-ransomware-created-entirely-using-javascript/</loc>
		<lastmod>2016-06-14T05:41:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/14/north-korea-mounts-long-running-hack-south-korea-computers-says-seoul/</loc>
		<lastmod>2016-06-14T06:15:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/14/flocker-mobile-ransomware-crosses-smart-tv/</loc>
		<lastmod>2016-06-14T08:58:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/14/fraudsters-can-clone-15-bank-cards-second-hi-tech-contactless-device/</loc>
		<lastmod>2016-06-14T12:36:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/15/hack-pentagon-hackers-already-found-100-flaws/</loc>
		<lastmod>2016-06-15T05:29:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/15/mobile-ad-sdk-exposes-ios-users-remote-attacks/</loc>
		<lastmod>2016-06-15T06:01:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/15/russian-government-hackers-penetrated-dnc-stole-opposition-research-trump/</loc>
		<lastmod>2016-06-15T06:34:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/15/car-hackers-handbook-digs-automotive-data-security/</loc>
		<lastmod>2016-06-15T09:04:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/15/xdedic-marketplace-selling-70000-hacked-servers/</loc>
		<lastmod>2016-06-15T12:25:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/16/hacking-facebook-accounts-just-phone-number-ss7-protocol/</loc>
		<lastmod>2016-06-16T05:19:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/16/mossack-fonseca-worker-arrested-switzerland-suspected-panama-papers-leak/</loc>
		<lastmod>2016-06-16T05:56:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/16/windows-badtunnel-attack-hijacks-network-traffic/</loc>
		<lastmod>2016-06-16T06:10:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/16/microsoft-ole-abused-embed-malicious-code-office-docs-similarly-macros/</loc>
		<lastmod>2016-06-16T07:37:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/17/github-attacker-launched-massive-login-campaign-using-stolen-passwords/</loc>
		<lastmod>2016-06-17T05:00:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/17/intel-x86-cpus-come-secret-backdoor-nobody-can-touch-disable/</loc>
		<lastmod>2016-06-17T05:12:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/17/unsupported-teamviewer-versions-exploited-backdoors-keylogging/</loc>
		<lastmod>2016-06-17T05:30:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/17/advisory-http-header-injection-python-urllib/</loc>
		<lastmod>2016-06-17T09:00:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/18/ded-cryptor-ransomware-thinks-naughty-year/</loc>
		<lastmod>2016-06-18T05:02:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/18/ransomware-works-tactics-routines-beyond-encryption/</loc>
		<lastmod>2016-06-18T06:05:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/18/pirate-bay-co-founder-slapped-395000-fine-finnish-court/</loc>
		<lastmod>2016-06-18T08:39:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/18/fbis-facial-recognition-system-can-access-411-million-photos-including-foreigners/</loc>
		<lastmod>2016-06-18T08:50:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/18/fund-based-digital-currency-ethereum-wind-alleged-hack/</loc>
		<lastmod>2016-06-18T10:51:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/20/tor-browser-integrates-tool-fend-off-deanonymization-exploits/</loc>
		<lastmod>2016-06-20T05:05:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/20/acer-holes-pc-maker-leaks-payment-cards-e-store-hack/</loc>
		<lastmod>2016-06-20T05:53:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/20/gotomypc-remote-desktop-service-attack-resets-user-passwords/</loc>
		<lastmod>2016-06-20T08:37:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/20/t-mobile-insider-steals-customer-data-make-quick-koruna/</loc>
		<lastmod>2016-06-20T11:20:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/20/hacker-breached-canadian-quebec-liberal-partys-video-conferencing-software/</loc>
		<lastmod>2016-06-20T13:08:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/21/aggressive-triada-horde-variants-mobile-malware-threat/</loc>
		<lastmod>2016-06-21T05:29:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/21/exploiting-recursion-linux-kernel/</loc>
		<lastmod>2016-06-21T07:27:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/21/apple-disables-old-flash-player-versions-due-security-vulnerabilities/</loc>
		<lastmod>2016-06-21T10:29:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/21/malware-uses-google-talk-make-malicious-phone-calls/</loc>
		<lastmod>2016-06-21T10:51:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/21/former-twitter-ceo-dick-costolo-hacked/</loc>
		<lastmod>2016-06-21T11:13:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/22/godless-mobile-malware-uses-multiple-exploits-root-devices/</loc>
		<lastmod>2016-06-22T04:55:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/22/jscript-toting-ransomware-can-steal-passwords-bitcoin-wallets/</loc>
		<lastmod>2016-06-22T05:49:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/22/3-million-strong-botnet-grows-right-twitters-nose/</loc>
		<lastmod>2016-06-22T06:11:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/22/%e2%80%8bhackers-hit-central-banks-indonesia-south-korea/</loc>
		<lastmod>2016-06-22T06:48:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/23/zimbra-ransomware-written-python-targets-zimbra-mail-store/</loc>
		<lastmod>2016-06-23T05:13:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/23/firm-pays-950000-penalty-using-wi-fi-signals-secretly-track-phone-users/</loc>
		<lastmod>2016-06-23T05:28:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/23/advantech-patches-webaccess-remote-code-execution-flaws/</loc>
		<lastmod>2016-06-23T06:15:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/23/always-log-facebook-watching-porn/</loc>
		<lastmod>2016-06-23T09:53:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/23/tracking-stolen-smartphone-bad-idea-report-police/</loc>
		<lastmod>2016-06-23T12:10:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/24/court-rules-fbi-not-need-warrant-hack-computer/</loc>
		<lastmod>2016-06-24T05:09:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/24/mobile-advertising-firm-found-tracking-users-pay-950k/</loc>
		<lastmod>2016-06-24T05:55:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/24/uber-hacking-found-went/</loc>
		<lastmod>2016-06-24T06:30:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/24/reverse-engineering-dubniums-flash-targeting-exploit/</loc>
		<lastmod>2016-06-24T08:24:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/24/researchers-hack-way-punkey-pos-malware-backend/</loc>
		<lastmod>2016-06-24T10:24:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/24/facebook-ceo-mark-zuckerberg-protecting-privacy-tape/</loc>
		<lastmod>2016-06-24T12:01:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/25/teardrop-attack-work/</loc>
		<lastmod>2016-06-25T05:32:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/25/facebooks-bug-delete-video-facebook/</loc>
		<lastmod>2016-06-25T06:48:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/25/writing-exploits-win32-systems-scratch/</loc>
		<lastmod>2016-06-25T08:47:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/25/bug-chrome-makes-easy-pirate-movies/</loc>
		<lastmod>2016-06-25T10:10:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/27/ever-seen-atm-skimmer-automated-teller-machine/</loc>
		<lastmod>2016-06-27T05:03:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/27/hacker-selling-651894-patient-records-dark-web/</loc>
		<lastmod>2016-06-27T06:05:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/27/scottish-hacker-dark-web-drug-dealer-sentenced-200-hours-unpaid-work/</loc>
		<lastmod>2016-06-27T08:01:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/27/lenovo-fixed-two-high-severity-flaws-lenovo-solution-center/</loc>
		<lastmod>2016-06-27T08:16:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/27/google-ceo-sundar-pichais-social-media-account-hacked/</loc>
		<lastmod>2016-06-27T08:31:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/27/doh-new-bart-ransomware-threat-actors-spreading-dridex-locky/</loc>
		<lastmod>2016-06-27T11:26:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/28/large-cctv-botnet-leveraged-ddos-attacks/</loc>
		<lastmod>2016-06-28T05:15:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/28/widespread-attack-office-365-corporate-users-zero-day-ransomware-virus/</loc>
		<lastmod>2016-06-28T05:39:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/28/infamous-nuclear-exploit-kit-shuts/</loc>
		<lastmod>2016-06-28T08:44:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/28/leveldropper-android-app-infected-autorooting-malware/</loc>
		<lastmod>2016-06-28T09:01:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/28/retefe-banking-trojan-targets-uk-banking-customers/</loc>
		<lastmod>2016-06-28T10:22:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/28/facebook-comment-tagging-malware-spreading-via-google-chrome/</loc>
		<lastmod>2016-06-28T10:44:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/29/meet-jigsaw-ransomware-taunts-victims-offers-live-support/</loc>
		<lastmod>2016-06-29T04:04:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/29/hackers-steal-10-million-ukrainian-bank-swift-loophole/</loc>
		<lastmod>2016-06-29T04:55:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/29/apple-leaves-ios-10-beta-kernel-unencrypted-pros-cons/</loc>
		<lastmod>2016-06-29T05:30:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/29/clever-attack-uses-sound-computers-fan-steal-data/</loc>
		<lastmod>2016-06-29T06:27:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/30/100-ddos-botnets-based-lizard-squads-lizardstresser/</loc>
		<lastmod>2016-06-30T05:07:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/30/high-severity-bugs-25-symantecnorton-products-imperil-millions/</loc>
		<lastmod>2016-06-30T05:24:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/30/global-terror-database-world-check-leaked/</loc>
		<lastmod>2016-06-30T08:52:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/30/chinese-hacking-group-making-500000-per-day-trojan-created/</loc>
		<lastmod>2016-06-30T10:07:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/06/30/latest-android-overlay-malware-spreading-via-sms-phishing-europe/</loc>
		<lastmod>2016-06-30T10:34:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/01/satana-bootkit-encrypts-files-locks-windows/</loc>
		<lastmod>2016-07-01T05:29:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/01/detect-malicious-macros-without-antivirus/</loc>
		<lastmod>2016-07-01T06:13:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/01/foxit-patches-12-vulnerabilities-pdf-reader/</loc>
		<lastmod>2016-07-01T08:20:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/01/google-finds-16-bugs-2-zero-days-windows-kernel-font-handling/</loc>
		<lastmod>2016-07-01T12:18:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/02/androids-full-disk-encryption-just-got-much-weaker-heres/</loc>
		<lastmod>2016-07-02T05:09:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/02/magento-re-installation-account-hijacking-vulnerabilities/</loc>
		<lastmod>2016-07-02T05:35:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/02/100-snooping-tor-nodes-spying-dark-web-sites/</loc>
		<lastmod>2016-07-02T06:10:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/02/intel-refutes-claim-includes-backdoors-cpus/</loc>
		<lastmod>2016-07-02T08:50:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/02/banking-trojans-go-loonie-toonies-dridex-vawtrak-others-increase-focus-canada/</loc>
		<lastmod>2016-07-02T10:25:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/04/chinese-gang-pakistan-specializes-atm-skimmer-attacks/</loc>
		<lastmod>2016-07-04T05:29:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/04/lenovo-scrambling-get-fix-bios-vuln/</loc>
		<lastmod>2016-07-04T06:11:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/04/cracked-keylogger-ended-someones-inbox/</loc>
		<lastmod>2016-07-04T07:25:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/04/klepto-zepto-steal-millions-looming-ransomware-wave/</loc>
		<lastmod>2016-07-04T08:20:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/05/ransom-note-cleaner-removes-ransomware-junk-pc/</loc>
		<lastmod>2016-07-05T05:38:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/05/popular-android-keyboard-app-spies-android-smartphone-users/</loc>
		<lastmod>2016-07-05T06:06:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/05/chinese-advertiser-behind-yispecter-ios-malware-hummingbad-android-malware/</loc>
		<lastmod>2016-07-05T07:27:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/05/second-celebgate-hacker-pleads-guilty/</loc>
		<lastmod>2016-07-05T10:49:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/05/undetectable-adwind-rat-used-targeted-attacks/</loc>
		<lastmod>2016-07-05T11:17:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/05/exploring-exploiting-lenovo-firmware-secrets/</loc>
		<lastmod>2016-07-05T11:48:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/06/new-malware-uses-tor-open-backdoor-mac-os-x-systems/</loc>
		<lastmod>2016-07-06T05:16:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/06/forensic-files-cerber-ransomware-distribution-using-office-dotm-files/</loc>
		<lastmod>2016-07-06T05:55:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/06/israeli-advertising-company-behind-osx-pirrit-mac-adware/</loc>
		<lastmod>2016-07-06T08:00:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/06/hacker-found-flaw-uk-defence-gateway-exposes-army-data/</loc>
		<lastmod>2016-07-06T08:05:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/06/android-nougat-prevents-ransomware-resetting-device-passwords/</loc>
		<lastmod>2016-07-06T08:33:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/07/new-osxkeydnap-malware-hungry-credentials/</loc>
		<lastmod>2016-07-07T05:06:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/07/tp-link-forgets-register-domain-name-leaves-config-pages-open-hijack/</loc>
		<lastmod>2016-07-07T05:55:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/07/new-alfa-alpha-ransomware-devs-cerber/</loc>
		<lastmod>2016-07-07T08:49:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/07/facebooks-opencellular-new-open-source-wireless-access-platform-remote-areas/</loc>
		<lastmod>2016-07-07T09:45:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/07/phishing-campaign-blurred-images/</loc>
		<lastmod>2016-07-07T11:53:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/08/dangerous-gnu-wget-vulnerability-still-not-patched-linux-distros/</loc>
		<lastmod>2016-07-08T03:59:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/08/extracting-multiple-bits-per-request-full-blind-sql-injection-vulnerabilities/</loc>
		<lastmod>2016-07-08T04:17:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/08/new-cryptxxx-changes-name-microsoft-decryptor/</loc>
		<lastmod>2016-07-08T05:25:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/08/wendys-admits-credit-card-hack-far-worse-first-thought/</loc>
		<lastmod>2016-07-08T06:01:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/08/flaws-bmw-connecteddrive-infotainment-system-allow-remote-hack/</loc>
		<lastmod>2016-07-08T07:36:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/09/facebook-messenger-end-end-encryption-not-default/</loc>
		<lastmod>2016-07-09T05:26:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/09/hidden-voice-commands-embedded-youtube-videos-can-hijack-smartphone/</loc>
		<lastmod>2016-07-09T05:33:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/09/10-youtube-channels-learning-ethical-hacking-course-online/</loc>
		<lastmod>2016-07-09T06:27:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/09/databases-hot-scripts-mac-forums-web-hosting-talk-surface-dark-web/</loc>
		<lastmod>2016-07-09T07:09:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/09/ghost-squad-hackers-dox-united-cyber-caliphate-including-mauritania-attacker/</loc>
		<lastmod>2016-07-09T10:27:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/11/connection-lurk-arrests-angler-necurs-botnet/</loc>
		<lastmod>2016-07-11T05:22:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/11/jigsaw-ransomware-defeated-free-decrypter-available/</loc>
		<lastmod>2016-07-11T06:15:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/11/malicious-pokemon-go-app-installing-backdoors-android-devices/</loc>
		<lastmod>2016-07-11T08:57:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/11/code-destruction-malware-analysis/</loc>
		<lastmod>2016-07-11T09:12:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/12/vivaldi-gets-built-webrtc-ip-leak-protection/</loc>
		<lastmod>2016-07-12T06:21:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/12/ctb-faker-ransomware-poor-job-imitating-ctb-locker/</loc>
		<lastmod>2016-07-12T06:38:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/12/malwares-constant-evolution-requires-advanced-protections/</loc>
		<lastmod>2016-07-12T08:04:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/12/mits-anonymous-online-communications-protocol-riffle-beat-tor-game/</loc>
		<lastmod>2016-07-12T08:46:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/12/now-easy-see-leaked-passwords-work-sites/</loc>
		<lastmod>2016-07-12T10:40:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/13/posing-ransomware-windows-malware-just-deletes-victims-files/</loc>
		<lastmod>2016-07-13T05:16:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/13/nation-backed-malware-infected-energy-firm-1-2016s-sneakiest/</loc>
		<lastmod>2016-07-13T05:53:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/13/xdedic-hacked-server-market-resurfaces-tor-domain/</loc>
		<lastmod>2016-07-13T07:14:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/13/vulnerability-exploitable-via-printer-protocols-affects-windows-versions/</loc>
		<lastmod>2016-07-13T08:50:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/13/russians-malware-involved-2-million-atm-heist-taiwan/</loc>
		<lastmod>2016-07-13T11:23:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/13/cracking-sega-saturn-20-years/</loc>
		<lastmod>2016-07-13T12:23:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/14/tor-linux-users-extremists-nsa-thinks/</loc>
		<lastmod>2016-07-14T06:36:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/14/fdic-hacked-china-cio-covered/</loc>
		<lastmod>2016-07-14T08:21:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/14/drupal-patches-remote-code-execution-vulnerabilities-three-modules/</loc>
		<lastmod>2016-07-14T08:57:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/14/darpa-hopes-automation-can-create-perfect-hacker/</loc>
		<lastmod>2016-07-14T10:26:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/14/printer-network-point-print-drive/</loc>
		<lastmod>2016-07-14T11:04:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/15/ransomwares-motto-simpler-scarier-better/</loc>
		<lastmod>2016-07-15T06:49:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/15/first-iphone-hacker-shows-easy-hack-computer/</loc>
		<lastmod>2016-07-15T07:24:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/15/hackers-steal-data-polish-defence-ministry-ask-50000-ransom/</loc>
		<lastmod>2016-07-15T08:39:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/</loc>
		<lastmod>2016-07-15T11:24:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/15/foolishly-open-sourced-internet-explorer-exploit-code-added-neutrino-ek/</loc>
		<lastmod>2016-07-15T12:05:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/16/juniper-crypto-bug-let-attackers-eavesdrop-router-switch-traffic/</loc>
		<lastmod>2016-07-16T13:08:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/16/eleanor-mac-malware-connects-webcam-dark-web/</loc>
		<lastmod>2016-07-16T13:29:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/16/ubuntu-linux-forums-hacked/</loc>
		<lastmod>2016-07-16T13:47:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/16/ransomware-service-offered-39-dark-net/</loc>
		<lastmod>2016-07-16T14:33:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/16/second-circuit-rules-favor-microsoft-govt-cant-force-access-email-irish-server/</loc>
		<lastmod>2016-07-16T15:02:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/18/hacking-3d-printers-just-another-way-destroy-modern-companies/</loc>
		<lastmod>2016-07-18T04:44:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/18/security-firm-clarifies-power-station-scada-malware-claim/</loc>
		<lastmod>2016-07-18T06:16:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/18/tor-veteran-lucky-green-exits-torpedos-critical-tonga-node-relays/</loc>
		<lastmod>2016-07-18T09:46:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/18/website-remote-admin-app-compromised-spread-malware/</loc>
		<lastmod>2016-07-18T13:40:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/18/hackers-easily-crack-strongest-passwords-explained/</loc>
		<lastmod>2016-07-18T13:49:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/19/cve-2015-1641-cve-2015-2545-todays-popular-microsoft-word-exploits/</loc>
		<lastmod>2016-07-19T03:41:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/19/steem-social-network-hacked-user-funds-stolen-ddos-attack-followed/</loc>
		<lastmod>2016-07-19T03:53:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/19/httpoxy-vulnerability-affects-cgi-based-apps-php-python-go/</loc>
		<lastmod>2016-07-19T08:16:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/19/malicious-macros-arrive-phishing-emails-steal-banking-information/</loc>
		<lastmod>2016-07-19T10:18:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/19/malware-browser-might-get-hacked-chrome-extension/</loc>
		<lastmod>2016-07-19T12:41:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/20/ddos-attack-takes-us-congress-website-three-days/</loc>
		<lastmod>2016-07-20T03:59:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/20/wave-business-websites-hijacked-deliver-crypto-ransomware/</loc>
		<lastmod>2016-07-20T04:18:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/20/new-made-china-web-shell-threatens-security-web-servers-worldwide/</loc>
		<lastmod>2016-07-20T09:52:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/20/delilah-first-trojan-recruit-insiders/</loc>
		<lastmod>2016-07-20T12:41:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/20/may-worth-paying-ransom-ransomware-attack/</loc>
		<lastmod>2016-07-20T12:53:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/21/backdoor-account-found-dell-network-security-products/</loc>
		<lastmod>2016-07-21T06:45:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/21/odcodc-ransomware-decryptor-released-blooddolly/</loc>
		<lastmod>2016-07-21T07:29:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/21/new-python-ransomware-called-holycrypt-discovered/</loc>
		<lastmod>2016-07-21T08:03:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/21/captain-hook-pirating-avs-bypass-exploit-mitigations/</loc>
		<lastmod>2016-07-21T09:17:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/21/iphone-can-hacked-just-sending-message/</loc>
		<lastmod>2016-07-21T18:38:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/22/apple-facebook-got-kickasstorrents-founder-arrested/</loc>
		<lastmod>2016-07-22T02:32:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/22/snowden-presents-anti-spying-iphone-case-attachment/</loc>
		<lastmod>2016-07-22T03:40:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/22/blackmoon-banking-trojan-infected-160000-south-koreans/</loc>
		<lastmod>2016-07-22T08:07:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/22/3d-printing-dead-mans-fingers-allows-unlocking-phone/</loc>
		<lastmod>2016-07-22T08:53:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/22/canadian-man-behind-popular-orcus-rat/</loc>
		<lastmod>2016-07-22T09:32:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/23/meet-one-anonymous-hackers-bombarding-isis-websites-ddos-attacks/</loc>
		<lastmod>2016-07-23T08:51:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/23/malicious-computers-caught-snooping-tor-anonymized-dark-web-sites/</loc>
		<lastmod>2016-07-23T08:50:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/23/paypal-fixes-csrf-vulnerability-paypal/</loc>
		<lastmod>2016-07-23T09:21:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/25/adwind-rat-affects-macs-almost-useless/</loc>
		<lastmod>2016-07-25T06:04:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/25/researchers-put-together-php-zero-day-order-hack-pornhub/</loc>
		<lastmod>2016-07-25T08:48:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/25/bug-hunter-downloaded-entire-vine-source-code/</loc>
		<lastmod>2016-07-25T10:20:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/25/cybersecurity-experts-say-russia-hacked-democrats/</loc>
		<lastmod>2016-07-25T16:06:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/26/keysniffer-flaw-lets-attackers-log-inject-keystrokes-wireless-keyboards/</loc>
		<lastmod>2016-07-26T14:27:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/26/windows-uac-bypass-leaves-systems-open-malicious-dlls/</loc>
		<lastmod>2016-07-26T14:41:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/26/hackers-steal-1-6-million-clash-kings-forum-accounts/</loc>
		<lastmod>2016-07-26T15:13:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/26/no-ransom-helps-recover-data-malware-attack/</loc>
		<lastmod>2016-07-26T15:32:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/27/new-attack-bypasses-https-protection-macs-windows-linux/</loc>
		<lastmod>2016-07-27T07:30:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/27/binary-sms-old-backdoor-new-thing/</loc>
		<lastmod>2016-07-27T07:43:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/27/radio-hack-steals-keystrokes-millions-wireless-keyboards/</loc>
		<lastmod>2016-07-27T08:18:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/27/honions-used-find-100-snooping-tor-nodes/</loc>
		<lastmod>2016-07-27T10:28:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/27/keys-chimera-ransomware-leaked/</loc>
		<lastmod>2016-07-27T13:41:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/28/attack-wpad-protocol-pac-files-can-leak-https-traffic/</loc>
		<lastmod>2016-07-28T03:36:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/28/another-media-stealing-app-found-google-play/</loc>
		<lastmod>2016-07-28T04:31:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/28/locky-ransomware-now-relies-javascript-instead-downloaders/</loc>
		<lastmod>2016-07-28T06:18:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/28/tpb-founder-peter-sunde-ive-saying-years-want-pirate-bay-shut/</loc>
		<lastmod>2016-07-28T14:16:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/28/security-bots-will-battle-vegas-darpas-hacking-crown/</loc>
		<lastmod>2016-07-28T15:02:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/29/qrljacking-hacking-technique-hijack-qr-code-based-quick-login-system/</loc>
		<lastmod>2016-07-29T03:12:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/29/10-best-password-cracking-tools-2016-windows-linux-os-x/</loc>
		<lastmod>2016-07-29T03:49:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/29/spynote-android-trojan-builder-leaked/</loc>
		<lastmod>2016-07-30T04:10:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/29/scammers-exploit-recent-wave-attacks-trick-victims-phishing-attacks/</loc>
		<lastmod>2016-07-29T07:38:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/29/brazil-prosecutor-freezes-11-7-million-facebook-funds-due-whatsapp-case/</loc>
		<lastmod>2016-07-29T09:40:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/30/hacker-mass-scans-dark-web-sites-vulnerabilities-dumps-results/</loc>
		<lastmod>2016-07-30T04:04:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/30/malware-used-dnc-hack-roots-chinese-open-source-tool/</loc>
		<lastmod>2016-07-30T04:47:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/30/lulzsec-member-reveals-details-gchq-covert-operations/</loc>
		<lastmod>2016-07-30T05:00:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/30/new-jersey-town-website-hacked-8-times-20-days/</loc>
		<lastmod>2016-07-30T08:50:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/07/30/osram-smart-light-bugs-allow-corporate-wi-fi-access/</loc>
		<lastmod>2016-07-30T10:52:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/01/limits-2fa-can-near-crippling-digital-life/</loc>
		<lastmod>2016-08-01T04:04:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/01/journey-complete-osx-privilege-escalation-single-vulnerability/</loc>
		<lastmod>2016-08-01T04:15:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/01/proxy-pac-hack-allows-intercept-https-urls/</loc>
		<lastmod>2016-08-01T04:45:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/01/niantic-ceo-john-hankes-twitter-account-hacked/</loc>
		<lastmod>2016-08-01T08:45:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/01/major-exploit-kit-campaign-switches-cryptxxx-ransomware-back-locky/</loc>
		<lastmod>2016-08-01T09:48:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/02/use-google-hacking/</loc>
		<lastmod>2016-08-02T01:47:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/02/android-trojan-threatens-2-8-million-users-unwanted-ads/</loc>
		<lastmod>2016-08-02T01:59:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/02/threat-actors-using-legitimate-paypal-accounts-distribute-chthonic-banking-trojan/</loc>
		<lastmod>2016-08-02T02:14:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/02/yahoo-probing-potential-data-breach-200-million-user-accounts-appear-dark-web/</loc>
		<lastmod>2016-08-02T02:38:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/02/windows-flaw-reveals-microsoft-account-passwords-vpn-credentials/</loc>
		<lastmod>2016-08-02T10:29:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/02/hackers-brew-intel-chip-defence-kit-neuter-budding-exploits/</loc>
		<lastmod>2016-08-02T12:29:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/03/venmo-patches-flaws-allowed-attackers-steal-2999-99-using-siri/</loc>
		<lastmod>2016-08-03T03:15:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/03/renaming-office-files-enough-disguise-macro-malware/</loc>
		<lastmod>2016-08-03T03:45:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/03/6-hacker-tool-pops-cash-registers-hotel-rooms-wide-open/</loc>
		<lastmod>2016-08-03T10:01:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/03/bitcoin-exchange-bitfinex-reports-65-million-stolen-users/</loc>
		<lastmod>2016-08-03T12:07:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/03/really-happened-mass-telegram-secure-messenger-hack/</loc>
		<lastmod>2016-08-03T12:26:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/04/new-attack-steals-ssns-e-mail-addresses-https-pages/</loc>
		<lastmod>2016-08-04T01:22:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/04/hacker-compromises-fosshub-distribute-mbr-hijacking-malware/</loc>
		<lastmod>2016-08-04T01:29:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/04/car-hacking-speed-vulnerabilities-turn-critical-fatal/</loc>
		<lastmod>2016-08-04T07:58:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/04/new-gozi-trojan-version-can-bypass-behavioral-biometrics-defenses/</loc>
		<lastmod>2016-08-04T09:58:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/04/hackers-hijack-big-rig-trucks-accelerator-brakes/</loc>
		<lastmod>2016-08-04T12:45:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/04/mastercard-armours-contactless-cards-relay-attacks/</loc>
		<lastmod>2016-08-04T13:05:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/05/bhusa2016-researcher-explained-hack-pc-found-usb-drive/</loc>
		<lastmod>2016-08-05T02:27:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/05/hackers-used-trojan-malware-spy-territorial-dispute/</loc>
		<lastmod>2016-08-05T03:00:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/05/kazakhstan-government-uses-malware-spy-journalists-political-activists/</loc>
		<lastmod>2016-08-05T08:00:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/05/man-hacked-tinders-swipe-right-feature-send-invites-200000-women/</loc>
		<lastmod>2016-08-05T10:00:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/05/torrentz-eu-follows-kickasstorrents-shuts/</loc>
		<lastmod>2016-08-05T11:57:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/06/understanding-windows-credential-leak-flaw-prevent/</loc>
		<lastmod>2016-08-06T03:18:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/06/cracking-hawkeye-keylogger-reborn/</loc>
		<lastmod>2016-08-06T07:10:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/06/hack-election-7-minutes/</loc>
		<lastmod>2016-08-06T10:20:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/06/backdoor-remvio-highly-customizable-remote-access-trojan-sold-online/</loc>
		<lastmod>2016-08-06T10:24:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/08/flaw-samsung-pay-exploited-remotely-skim-credit-cards/</loc>
		<lastmod>2016-08-08T00:59:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/08/hackers-make-first-ever-ransomware-smart-thermostats/</loc>
		<lastmod>2016-08-08T01:53:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/08/quadrooter-new-android-vulnerabilities-900-million-devices/</loc>
		<lastmod>2016-08-08T05:09:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/08/microsoft-wont-fix-windows-flaw-lets-hackers-steal-username-password/</loc>
		<lastmod>2016-08-08T13:40:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/08/robot-malware-brains-work/</loc>
		<lastmod>2016-08-08T14:21:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/09/development-version-hitler-ransomware-discovered/</loc>
		<lastmod>2016-08-11T02:02:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/09/oracle-owned-point-sale-service-suffers-malware-attack/</loc>
		<lastmod>2016-08-09T04:01:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/09/researchers-crack-open-unusually-advanced-malware-hid-5-years/</loc>
		<lastmod>2016-08-09T10:35:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/09/nemucod-back-serving-ad-clicking-backdoor-instead-ransomware/</loc>
		<lastmod>2016-08-09T12:59:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/09/risk-linux-kernel-hidden-windows-10-exposed-black-hat/</loc>
		<lastmod>2016-08-09T13:23:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/10/ipv6-router-bug-juniper-spins-hotfix-thwart-ddos-attacks/</loc>
		<lastmod>2016-08-10T03:23:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/10/automated-systems-crawl-darkweb-find-zero-days/</loc>
		<lastmod>2016-08-10T04:05:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/10/researchers-hide-malware-inside-digitally-signed-files-without-breaking-hashes/</loc>
		<lastmod>2016-08-10T04:56:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/10/security-researcher-found-vulnerabilities-hp-website/</loc>
		<lastmod>2016-08-10T09:14:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/10/bungling-microsoft-singlehandedly-proves-golden-backdoor-keys-terrible-idea/</loc>
		<lastmod>2016-08-10T13:14:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/11/linux-bug-leaves-usa-today-top-sites-vulnerable-serious-hijacking-attacks/</loc>
		<lastmod>2016-08-11T01:47:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/11/instagram-accounts-hacked-altered-promote-adult-dating-spam/</loc>
		<lastmod>2016-08-11T02:08:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/11/windows-activation-scam-locks-screen-doesnt-shut/</loc>
		<lastmod>2016-08-11T02:45:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/11/cryptfile2-ransomware-returns-high-volume-url-campaigns/</loc>
		<lastmod>2016-08-11T05:33:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/11/worlds-spies-used-instead-msn-messenger/</loc>
		<lastmod>2016-08-11T12:55:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/12/looming-threat-ransomware-companies-stockpile-bitcoins/</loc>
		<lastmod>2016-08-12T03:00:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/12/atm-hack-pin-pad-hack-show-chip-cards-arent-impervious-fraud/</loc>
		<lastmod>2016-08-12T03:18:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/12/bluetooth-hack-leaves-many-smart-locks-iot-devices-vulnerable/</loc>
		<lastmod>2016-08-12T09:04:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/12/new-air-gap-jumper-covertly-transmits-data-hard-drive-sounds/</loc>
		<lastmod>2016-08-12T12:41:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/13/new-information-stealing-trojan-steals-uploads-corporate-files/</loc>
		<lastmod>2016-08-13T02:15:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/13/new-scylex-banking-trojan-kit-surfaces-dark-web/</loc>
		<lastmod>2016-08-13T02:26:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/13/hacker-guccifer-2-0-claims-dccc-hack-leaks-data-online/</loc>
		<lastmod>2016-08-13T12:17:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/13/world-anti-doping-agency-site-hacked-thousands-accounts-leaked/</loc>
		<lastmod>2016-08-13T12:45:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/13/road-warriors-beware-video-jacking/</loc>
		<lastmod>2016-08-13T13:28:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/15/pokemongo-ransomware-installs-backdoor-account-spreads-drives/</loc>
		<lastmod>2016-08-15T02:13:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/15/cryptography-experts-say-apple-needs-replace-imessage-encryption/</loc>
		<lastmod>2016-08-15T02:25:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/15/guy-tricks-windows-tech-support-scammers-installing-ransomware-code/</loc>
		<lastmod>2016-08-15T10:58:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/15/starwood-marriott-hyatt-ihg-hit-malware-hei/</loc>
		<lastmod>2016-08-15T11:58:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/16/group-claims-hack-nsa-tied-hackers-posts-exploits-proof/</loc>
		<lastmod>2016-08-16T02:25:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/16/linux-bug-leaves-1-4-billion-android-users-vulnerable-hijacking-attacks/</loc>
		<lastmod>2016-08-16T02:31:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/16/scammy-looking-shark-project-delivers-fully-working-ransomware/</loc>
		<lastmod>2016-08-16T04:26:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/16/china-launches-quantum-satellite-hack-proof-communications/</loc>
		<lastmod>2016-08-16T10:24:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/16/falseconnect-vulnerability-affects-software-apple-microsoft-oracle/</loc>
		<lastmod>2016-08-16T13:31:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/17/backdoor-trojan-uses-teamviewer-components-spy-pcs-europe-russia-us/</loc>
		<lastmod>2016-08-17T03:42:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/17/bad-news-bears-panda-banker-starts-looking-like-grizzly/</loc>
		<lastmod>2016-08-17T04:18:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/17/hacking-grid-cyber-criminals-can-gain-access-critical-infrastructure/</loc>
		<lastmod>2016-08-17T09:57:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/17/snowden-speculates-leak-nsa-spying-tools-tied-russian-dnc-hack/</loc>
		<lastmod>2016-08-17T10:16:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/17/now-data-stealing-marcher-android-malware-posing-security-update/</loc>
		<lastmod>2016-08-17T12:03:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/18/non-existent-video-involving-hillary-clinton-isis-leader-used-bait-malicious-spam/</loc>
		<lastmod>2016-08-18T03:47:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/18/aveo-trojan-used-attacks-japanese-users/</loc>
		<lastmod>2016-08-18T04:31:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/18/jbifrost-yet-another-incarnation-adwind-rat/</loc>
		<lastmod>2016-08-18T08:45:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/18/vulnerable-smart-home-iot-sockets-let-hackers-access-email-account/</loc>
		<lastmod>2016-08-18T11:32:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/18/browser-address-bar-spoofing-vulnerability-disclosed/</loc>
		<lastmod>2016-08-18T12:05:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/19/new-fsociety-ransomware-pays-homage-mr-robot/</loc>
		<lastmod>2016-08-19T03:39:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/19/gpg-patches-18-year-old-libgcrypt-rng-bug/</loc>
		<lastmod>2016-08-19T04:48:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/19/malware-infected-eddie-bauer-stores-u-s-canada/</loc>
		<lastmod>2016-08-19T10:02:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/19/bitcoin-org-suspects-state-sponsored-attacks-horizon/</loc>
		<lastmod>2016-08-19T11:01:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/19/uac-bypass-elevated-privileges-works-windows-versions/</loc>
		<lastmod>2016-08-20T03:41:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/20/new-detoxcrypto-ransomware-pretends-pokemongo-uploads-picture-screen/</loc>
		<lastmod>2016-08-20T03:39:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/20/nsa-snooped-encrypted-internet-traffic-decade/</loc>
		<lastmod>2016-08-20T04:04:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/20/rex-linux-trojan-can-launch-ddos-attacks-lock-websites-mine-cryptocurrency/</loc>
		<lastmod>2016-08-20T07:45:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/20/iphones-live-photos-can-used-hack-bank-apps-claims-researcher/</loc>
		<lastmod>2016-08-20T08:00:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/20/brazilian-banking-trojans-meet-powershell/</loc>
		<lastmod>2016-08-20T10:21:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/22/around-four-five-dnssec-servers-can-hijacked-ddos-attacks/</loc>
		<lastmod>2016-08-22T03:02:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/22/restore-access-pc-trend-micro-ransomware-screen-unlocker/</loc>
		<lastmod>2016-08-22T03:51:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/22/multiple-vulnerabilities-bhu-wifi-urouter/</loc>
		<lastmod>2016-08-22T08:40:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/22/bitcoin-helped-fuel-explosion-ransomware-attacks/</loc>
		<lastmod>2016-08-22T12:54:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/22/smishing-campaign-uses-twilio-deliver-droidjack-malware/</loc>
		<lastmod>2016-08-22T13:07:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/23/new-alma-locker-ransomware-distributed-via-rig-exploit-kit/</loc>
		<lastmod>2016-08-23T04:53:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/23/obihai-patches-memory-corruption-dos-csrf-vulnerabilities-ip-phones/</loc>
		<lastmod>2016-08-23T05:12:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/23/epics-forums-hacked-thousands-logins-stolen/</loc>
		<lastmod>2016-08-23T12:29:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/23/threat-intelligence-report-telecommunications-industry/</loc>
		<lastmod>2016-08-23T12:38:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/23/hancitor-downloader-shifts-attack-strategy/</loc>
		<lastmod>2016-08-23T13:15:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/24/nsa-linked-cisco-exploit-poses-bigger-threat-previously-thought/</loc>
		<lastmod>2016-08-24T02:52:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/24/critical-flaws-let-attackers-hijack-cellular-phone-towers/</loc>
		<lastmod>2016-08-24T03:48:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/24/navis-webaccess-app-used-us-ports-affected-sql-injection-flaw/</loc>
		<lastmod>2016-08-24T08:54:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/24/file-middle-hijackers/</loc>
		<lastmod>2016-08-24T12:05:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/24/wildfire-ransomware-code-cracked-victims-can-now-unlock-encrypted-files-free/</loc>
		<lastmod>2016-08-24T13:13:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/25/atms-thailand-hacked-cybercrime-gang-linked-taiwan-theft/</loc>
		<lastmod>2016-08-25T03:59:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/25/https-openvpn-face-new-attack-can-decrypt-secret-cookies/</loc>
		<lastmod>2016-08-25T04:22:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/25/25-million-accounts-stolen-mail-ru-forums-hacked/</loc>
		<lastmod>2016-08-25T06:45:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/25/linux-pnscan-trojan-back-compromise-routers-install-backdoors/</loc>
		<lastmod>2016-08-25T09:08:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/25/wi-fi-speeds-triple-range-double-thanks-mit-breakthrough/</loc>
		<lastmod>2016-08-25T12:26:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/26/band-ios-update-released-prevent-installation-pegasus-spyware-kit/</loc>
		<lastmod>2016-08-26T02:14:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/26/nightmare-tor-street-new-ursnif-variant-dreambot-adds-tor-functionality/</loc>
		<lastmod>2016-08-26T02:54:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/26/sweet32-attack-3des-blowfish-ciphers-considered-insecure/</loc>
		<lastmod>2016-08-26T08:45:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/26/firefox-adds-protection-mime-confusion-attacks/</loc>
		<lastmod>2016-08-26T14:02:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/26/%e2%80%8bmonitoring-ssl-traffic-now-everyones-concern-a10-networks/</loc>
		<lastmod>2016-08-26T14:10:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/27/curious-case-domino-ransomware-windows-crack-cow/</loc>
		<lastmod>2016-08-27T02:03:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/27/web-scripting-language-php-7-vulnerable-remote-exploits/</loc>
		<lastmod>2016-08-27T02:20:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/27/trading-stock-medical-device-paused-hackers-team-short-seller/</loc>
		<lastmod>2016-08-27T09:09:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/27/opera-says-service-syncing-web-browser-data-hacked/</loc>
		<lastmod>2016-08-27T11:11:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/27/hacked-multiple-facebook-accounts/</loc>
		<lastmod>2016-08-27T11:30:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/29/researchers-use-wi-fi-signals-sniff-keystrokes/</loc>
		<lastmod>2016-08-29T02:44:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/29/megaupload-seized-fbi-serves-adult-content/</loc>
		<lastmod>2016-08-29T03:11:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/29/hacker-stole-2-9-million-credit-card-numbers-russian-lawmakers-son/</loc>
		<lastmod>2016-08-29T09:03:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/29/tech-support-scammers-find-new-trick-hijack-chrome-browsers/</loc>
		<lastmod>2016-08-29T12:05:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/29/kaspersky-fixes-bug-allowed-attackers-crash/</loc>
		<lastmod>2016-08-29T13:11:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/30/meet-usbee-malware-uses-usb-drives-covertly-jump-airgaps/</loc>
		<lastmod>2016-08-30T01:32:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/30/ripper-atm-malware-12-million-baht-jackpot/</loc>
		<lastmod>2016-08-30T02:29:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/30/illinois-hack-fbi-warns-attacks-state-election-board-systems/</loc>
		<lastmod>2016-08-30T15:02:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/30/google-login-page-bug-can-lead-automatic-malware-download/</loc>
		<lastmod>2016-08-30T15:28:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/31/osxkeydnap-spreads-via-signed-transmission-application/</loc>
		<lastmod>2016-08-31T03:05:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/31/the-hunt-for-lurk/</loc>
		<lastmod>2016-08-31T03:58:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/31/hackers-stole-account-details-60-million-dropbox-users/</loc>
		<lastmod>2016-08-31T09:37:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/31/ios-9-3-4-minor-versions-vulnerable-trident-exploit/</loc>
		<lastmod>2016-08-31T13:06:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/08/31/unsophisticated-revenge-rat-released-online-free-exclusive/</loc>
		<lastmod>2016-08-31T13:14:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/01/hacked-redis-servers-used-install-fairware-ransomware-attack/</loc>
		<lastmod>2016-09-01T04:00:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/01/new-cloud-attack-takes-full-control-virtual-machines-little-effort/</loc>
		<lastmod>2016-09-01T04:22:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/01/building-new-tor-can-resist-next-generation-state-surveillance/</loc>
		<lastmod>2016-09-01T08:14:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/01/vulnerability-yandex-browser-allows-attackers-steal-victims-browsing-data/</loc>
		<lastmod>2016-09-01T13:43:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/01/double-click-not-malicious-proxy-settings-ole-embedded-script/</loc>
		<lastmod>2016-09-01T14:38:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/02/apple-patches-os-x-safari-zero-days-related-nso-group-spyware/</loc>
		<lastmod>2016-09-02T03:25:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/02/talos-shadowgate-take-global-malvertising-campaign-thwarted/</loc>
		<lastmod>2016-09-02T03:47:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/02/betabot-trojan-steals-passwords-installs-ransomware/</loc>
		<lastmod>2016-09-02T08:41:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/02/nullbyte-ransomware-pretends-necrobot-pokemon-go-application/</loc>
		<lastmod>2016-09-02T10:37:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/02/florida-man-arrested-hacking-linux-kernel-organization/</loc>
		<lastmod>2016-09-02T13:21:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/03/attackers-combine-three-botnets-launch-massive-ddos-attack/</loc>
		<lastmod>2016-09-03T02:53:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/03/40-million-usernames-passwords-2012-breach-last-fm-surface/</loc>
		<lastmod>2016-09-03T03:30:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/03/android-patch-fixes-nexus-5x-critical-vulnerability/</loc>
		<lastmod>2016-09-03T05:48:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/03/hacker-shows-easy-hack-credit-card-passport/</loc>
		<lastmod>2016-09-03T08:56:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/03/kid-hacked-countrys-presidents-website-try-cancel-exams/</loc>
		<lastmod>2016-09-03T16:56:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/05/hong-kong-government-hacked-apt3-group-elections/</loc>
		<lastmod>2016-09-05T00:30:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/05/sundown-just-bunch-exploits-stolen-exploit-kits/</loc>
		<lastmod>2016-09-05T01:05:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/05/dirty-rat-spy-versus-spy-cybercrime-underworld/</loc>
		<lastmod>2016-09-05T09:33:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/05/mirai-ddos-trojan-next-big-threat-iot-devices-linux-servers/</loc>
		<lastmod>2016-09-05T12:12:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/05/hacked-android-app-get-free-beer/</loc>
		<lastmod>2016-09-05T12:17:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/06/central-security-treatment-organization-ransomware-uses-cry-extension-communicates-via-udp/</loc>
		<lastmod>2016-09-06T02:08:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/06/hackers-steal-nearly-100-million-user-records-rambler-ru/</loc>
		<lastmod>2016-09-06T02:15:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/06/nsa-extrabacon-exploit-still-threatens-tens-thousands-cisco-asa-boxes/</loc>
		<lastmod>2016-09-06T05:26:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/06/fake-attacks-insiders-fool-companies/</loc>
		<lastmod>2016-09-06T12:07:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/06/luabot-first-botnet-malware-coded-lua-targeting-linux-platforms/</loc>
		<lastmod>2016-09-06T13:22:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/07/gugi-trojan-guffaws-android-6-security-measures-bypasses/</loc>
		<lastmod>2016-09-07T02:03:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/07/locky-now-using-embedded-rsa-key-instead-contacting-command-control-servers/</loc>
		<lastmod>2016-09-07T02:28:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/07/sniff-credentials-locked-laptops-via-ethernet-adapter-usb/</loc>
		<lastmod>2016-09-07T08:37:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/07/just-one-photo-can-silently-hack-millions-androids/</loc>
		<lastmod>2016-09-07T10:41:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/07/chromebooks-get-fingerprint-scanner-pin-unlock-features-better-security/</loc>
		<lastmod>2016-09-07T13:16:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/08/not-dridex-begins-targeting-crypto-currency-wallets/</loc>
		<lastmod>2016-09-08T08:28:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/08/missing-piece-sophisticated-os-x-backdoor-discovered/</loc>
		<lastmod>2016-09-08T09:18:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/08/leaked-video-shows-government-spyware-infects-computer/</loc>
		<lastmod>2016-09-08T11:51:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/08/brazzers-forum-hack-exposes-800000-email-ids-passwords/</loc>
		<lastmod>2016-09-08T12:15:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/08/windows-media-player-drm-used-malware/</loc>
		<lastmod>2016-09-08T13:24:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/09/hypervisor-security-ero-xen-guest-vms-can-hijack-host-servers/</loc>
		<lastmod>2016-09-09T03:21:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/09/two-cwa-hackers-arrested-hacking-several-three-letter-us-agencies/</loc>
		<lastmod>2016-09-09T03:51:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/09/now-can-buy-usb-kill-fry-pc-via-usb/</loc>
		<lastmod>2016-09-09T13:00:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/09/cryptocurrency-mining-malware-discovered-targeting-seagate-nas-hard-drives/</loc>
		<lastmod>2016-09-09T14:03:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/09/33-million-qip-ru-accounts-hacked/</loc>
		<lastmod>2016-09-09T14:28:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/10/two-critical-bugs-malicious-apps-make-bad-week-android/</loc>
		<lastmod>2016-09-10T01:04:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/10/expanding-known-vulnerability-attacking-jython/</loc>
		<lastmod>2016-09-10T01:19:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/10/doctor-web-discovers-first-linux-trojan-written-rust-language/</loc>
		<lastmod>2016-09-10T09:22:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/10/niche-software-vulnerabilities-leave-enterprises-open-attack/</loc>
		<lastmod>2016-09-10T10:32:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/10/using-remote-access-trojans-rats-monitor-kids-acceptable/</loc>
		<lastmod>2016-09-10T12:04:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/12/everything-csv-excel-macro-injection/</loc>
		<lastmod>2016-09-12T02:49:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/12/federal-judge-hacking-someones-computer-definitely-search/</loc>
		<lastmod>2016-09-12T03:29:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/12/americas-911-emergency-response-system-can-hacked/</loc>
		<lastmod>2016-09-12T05:52:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/12/hacking-wannabe-hackers-watch-facebook-hacker-tools/</loc>
		<lastmod>2016-09-12T08:52:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/12/fire-drill-gone-bad-shuts-ing-bank-data-center-ten-hours/</loc>
		<lastmod>2016-09-12T12:08:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/13/hands-blue-hydra-can-expose-unhidden-world-bluetooth/</loc>
		<lastmod>2016-09-13T01:37:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/13/thousands-infected-ftp-servers-net-attackers-88k-cryptocurrency/</loc>
		<lastmod>2016-09-13T01:48:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/13/bad-press-forces-shark-ransomware-project-rebrand/</loc>
		<lastmod>2016-09-13T12:01:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/13/noobcrypt-ransomware-dev-shows-noobness-using-password-everyone/</loc>
		<lastmod>2016-09-13T13:08:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/14/324000-financial-records-leaked-online-victim/</loc>
		<lastmod>2016-09-14T03:03:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/14/dualtoy-windows-trojan-secretly-sideloads-apps-android-ios-devices/</loc>
		<lastmod>2016-09-14T03:13:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/14/microsoft-publisher-files-spread-backdoor-steal-corporate-data-bitdefender-warns/</loc>
		<lastmod>2016-09-14T10:03:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/14/6-6-million-plaintext-passwords-exposed-site-gets-hacked-bone/</loc>
		<lastmod>2016-09-14T15:17:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/14/hack-google-fr-exploiting-cross-site-scripting-flaw/</loc>
		<lastmod>2016-09-14T16:27:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/15/science-press-site-hacked-hackers-release-random-crap/</loc>
		<lastmod>2016-09-15T03:40:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/15/case-misplaced-trust-third-party-app-store-abuses-apples-developer-enterprise-program-serve-adware/</loc>
		<lastmod>2016-09-15T04:25:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/15/look-french-underground-pen-guns-euthanasia-kits/</loc>
		<lastmod>2016-09-15T09:38:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/15/shark-ransomware-rebrands-atom-fresh-start/</loc>
		<lastmod>2016-09-15T13:16:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/15/neutrino-eks-afraidgate-pushed-malvertising-attack/</loc>
		<lastmod>2016-09-15T13:37:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/16/us-911-emergency-services-can-shut-ddos-attacks-mobile-botnets/</loc>
		<lastmod>2016-09-16T05:34:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/16/mamba-new-full-disk-encryption-ransomware-family-member/</loc>
		<lastmod>2016-09-16T05:54:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/16/backdoor-xiaomi-device-allows-silent-remote-deliver-app/</loc>
		<lastmod>2016-09-16T08:37:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/16/windows-safe-mode-can-used-steal-pc-logins-disable-antivirus-software/</loc>
		<lastmod>2016-09-16T12:24:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/16/hackers-actively-scanning-drupal-sites-vulnerability-patched-july/</loc>
		<lastmod>2016-09-16T13:43:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/17/mozilla-plans-firefox-fix-malware-vulnerability-bit-tor/</loc>
		<lastmod>2016-09-17T03:32:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/17/bugs-signal-messaging-app-corrupt-attachments-crash-app/</loc>
		<lastmod>2016-09-17T03:53:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/17/luabot-author-says-malware-not-harmful/</loc>
		<lastmod>2016-09-17T08:20:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/17/nand-mirroring-unlock-san-bernardino-shooter-iphone-just-100/</loc>
		<lastmod>2016-09-17T10:54:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/17/psa-detoxcrypto-ransomware-imitating-malwarebytes/</loc>
		<lastmod>2016-09-17T11:36:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/19/hddcryptor-ransomware-overwrites-mbr-using-open-source-tools/</loc>
		<lastmod>2016-09-19T03:53:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/19/h1n1-malware-adds-support-infostealing-features-uac-bypass/</loc>
		<lastmod>2016-09-19T04:40:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/19/cve-2016-6415-cisco-confirms-new-zero-day-linked-equation-group-hack/</loc>
		<lastmod>2016-09-19T09:07:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/19/nearly-800000-ftp-servers-accessible-online-without-authentication/</loc>
		<lastmod>2016-09-19T12:41:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/19/boffins-analyzed-exif-metadata-photos-principal-blackmarkets/</loc>
		<lastmod>2016-09-19T12:49:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/20/facebook-fixes-vulnerability-led-account-takeover-pays-researcher-16k/</loc>
		<lastmod>2016-09-20T02:14:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/20/ispy-keylogger/</loc>
		<lastmod>2016-09-20T03:30:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/20/car-hacking-research-remote-attack-tesla-motors/</loc>
		<lastmod>2016-09-20T08:44:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/20/ransomware-lucrative-attackers-profits-near-100-million/</loc>
		<lastmod>2016-09-20T11:02:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/20/spider-crawls-dark-web-looking-stolen-data/</loc>
		<lastmod>2016-09-20T13:34:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/21/iphone-passcode-bypassed-nand-mirroring-attack/</loc>
		<lastmod>2016-09-21T03:08:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/21/banker-can-steal-anything/</loc>
		<lastmod>2016-09-21T03:43:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/21/infoarmor-uncovers-malicious-torrent-distribution-network/</loc>
		<lastmod>2016-09-21T09:02:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/21/just-men-website-serves-malware/</loc>
		<lastmod>2016-09-21T09:47:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/21/matchlight-dark-web-data-leak-detection-software-available-worldwide/</loc>
		<lastmod>2016-09-21T13:43:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/22/hacking-sql-servers-without-password/</loc>
		<lastmod>2016-09-22T03:02:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/22/ddos-mitigation-firm-history-hijacks/</loc>
		<lastmod>2016-09-22T03:31:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/22/tick-tock-tick-tock-new-malware-hitting-network-every-four-seconds/</loc>
		<lastmod>2016-09-22T08:53:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/22/iot-devices-increasingly-used-ddos-attacks/</loc>
		<lastmod>2016-09-22T16:42:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/22/purported-data-200-million-yahoo-accounts-may-legit/</loc>
		<lastmod>2016-09-22T17:05:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/23/bt-wi-fi-extender-extends-xss-password-changing-vulnerabilities/</loc>
		<lastmod>2016-09-23T02:38:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/23/dont-touch-hackers-sending-malicious-usb-sticks-mail/</loc>
		<lastmod>2016-09-23T06:27:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/23/malware-evades-detection-novel-technique/</loc>
		<lastmod>2016-09-23T07:24:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/23/exclusive-probe-leaked-u-s-nsa-hacking-tools-examines-operatives-mistake/</loc>
		<lastmod>2016-09-23T08:19:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/24/hacked-e-mail-account-white-house-worker-exposed-2013-password-breach/</loc>
		<lastmod>2016-09-24T05:15:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/24/locky-ransomware-fuels-surge-rar-javascript-attachments/</loc>
		<lastmod>2016-09-24T06:00:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/24/just-24-hours-teen-hacker-jailbreaks-apple-iphone-7/</loc>
		<lastmod>2016-09-24T06:22:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/24/top-10-passwords-used-hijack-iot-devices-stupid-think/</loc>
		<lastmod>2016-09-24T11:51:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/24/cyber-crooks-focus-future-atm-biometric-skimmers-go-sale/</loc>
		<lastmod>2016-09-24T12:41:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/26/nation-state-actor-testing-methods-massive-takedown-internet/</loc>
		<lastmod>2016-09-26T08:46:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/26/armenian-hackers-leak-azerbaijani-banking-military-data/</loc>
		<lastmod>2016-09-26T09:03:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/26/hack-start-irc-channel/</loc>
		<lastmod>2016-09-26T11:38:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/26/confirmed-researchers-close-creating-hack-proof-code/</loc>
		<lastmod>2016-09-26T12:54:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/26/marsjoke-ransomware-mimics-ctb-locker/</loc>
		<lastmod>2016-09-26T13:09:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/27/speak-teen-social-site-leaking-millions-plaintext-passwords/</loc>
		<lastmod>2016-09-27T03:30:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/27/sofacys-komplex-os-x-trojan/</loc>
		<lastmod>2016-09-27T06:07:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/27/new-ponyforx-infostealer-malware-sold-russian-hacking-forums/</loc>
		<lastmod>2016-09-27T09:21:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/27/windows-10-will-run-edge-browser-virtual-machine-extra-security/</loc>
		<lastmod>2016-09-27T12:19:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/27/hancitor-downloader-abusing-apis-powershell-commands/</loc>
		<lastmod>2016-09-27T12:38:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/28/unsafe-clock-speed-linux-kernel-security-needs-rethink/</loc>
		<lastmod>2016-09-28T02:18:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/28/facebooks-osquery-now-available-windows/</loc>
		<lastmod>2016-09-28T04:16:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/28/150000-iot-devices-behind-1tbps-ddos-attack-ovh/</loc>
		<lastmod>2016-09-28T11:24:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/28/part-1-minor-cross-site-scripting-asus-rt-ac66u-router-displaying-ssid-site-survey/</loc>
		<lastmod>2016-09-28T12:18:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/28/unlock92-ransomware-quiet-threat-nobody-heard/</loc>
		<lastmod>2016-09-28T15:01:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/29/introducing-royal-highness-princess-locker-ransomware/</loc>
		<lastmod>2016-09-29T03:05:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/29/record-breaking-ddos-reportedly-delivered-145k-hacked-cameras/</loc>
		<lastmod>2016-09-29T04:09:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/29/russian-hackers-spy-citizen-journalists-investigating-flight-mh17-crash/</loc>
		<lastmod>2016-09-29T11:49:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/29/cisco-sinkholes-goznym-banking-trojan-botnet/</loc>
		<lastmod>2016-09-29T12:46:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/30/bitter-ransomware-operator-shuts-service-deletes-decryption-master-key/</loc>
		<lastmod>2016-09-30T03:40:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/30/kaspersky-decrypts-ransomware-teamxrat/</loc>
		<lastmod>2016-09-30T03:47:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/30/spy-tech-hacks-whatsapp-encrypted-chat-backpack/</loc>
		<lastmod>2016-09-30T09:07:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/30/android-lockscreen-ransomware-now-using-pseudorandom-numbers/</loc>
		<lastmod>2016-09-30T11:24:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/09/30/top-shelf-iphone-hack-now-goes-1-5-million/</loc>
		<lastmod>2016-09-30T13:13:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/01/hacked-steam-accounts-spreading-remote-access-trojan/</loc>
		<lastmod>2016-10-01T02:49:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/01/money-mule-gangs-turn-bitcoin-atms/</loc>
		<lastmod>2016-10-01T03:42:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/01/angry-apple-customer-goes-beserk-destroys-iphones-macbooks-rampage/</loc>
		<lastmod>2016-10-01T11:29:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/01/microsoft-seeks-testers-project-springfield-bug-detection-service/</loc>
		<lastmod>2016-10-01T12:54:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/01/hacking-paypals-express-checkout/</loc>
		<lastmod>2016-10-01T15:29:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/03/source-code-iot-botnet-mirai-released/</loc>
		<lastmod>2016-10-03T12:39:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/03/space-wars-will-fought-hacks-not-missiles/</loc>
		<lastmod>2016-10-03T13:05:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/03/wanted-google-deanonymize-large-number-tor-connections/</loc>
		<lastmod>2016-10-03T13:19:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/03/south-koreas-military-cyber-command-suffers-embarrassing-hack/</loc>
		<lastmod>2016-10-03T13:31:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/03/openjpeg-zero-day-flaw-leads-remote-code-execution/</loc>
		<lastmod>2016-10-03T14:11:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/04/hack-crashes-linux-distros-48-characters-code/</loc>
		<lastmod>2016-10-04T13:14:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/04/remember-68-million-hacked-dropbox-data-available-free-download/</loc>
		<lastmod>2016-10-04T13:44:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/04/peace_of_mind-hacked-hacking-forum-w0rm_ws-doxed-alleged-owner/</loc>
		<lastmod>2016-10-04T14:15:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/04/no-one-wants-buy-shadow-brokers-stolen-nsa-tools/</loc>
		<lastmod>2016-10-04T14:32:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/04/trump-calls-crippling-cyberwar-attack-capabilities/</loc>
		<lastmod>2016-10-04T14:51:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/05/badkernel-vulnerability-affects-one-16-android-smartphones/</loc>
		<lastmod>2016-10-05T10:12:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/05/cerber-ransomware-switches-random-extension-ends-database-processes/</loc>
		<lastmod>2016-10-05T10:48:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/05/wordpress-hack-modifies-core-files-share-spam/</loc>
		<lastmod>2016-10-05T10:58:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/05/encrypt-facebook-messenger-send-self-destruct-texts/</loc>
		<lastmod>2016-10-05T11:51:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/06/us-government-arrests-nsa-contractor-accused-stealing-classified-data/</loc>
		<lastmod>2016-10-06T12:52:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/06/oracle-delphi-will-steal-credentials/</loc>
		<lastmod>2016-10-06T13:08:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/06/animas-onetouch-ping-insulin-pumps-remotely-hacked/</loc>
		<lastmod>2016-10-06T13:36:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/06/wildfire-rises-grave-rebranded-hades-locker/</loc>
		<lastmod>2016-10-06T13:47:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/06/explained-wmi-hijackers/</loc>
		<lastmod>2016-10-06T14:08:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/07/new-fastpos-pos-malware-implements-quickly-dirty-approach-steal-card-data/</loc>
		<lastmod>2016-10-07T12:44:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/07/web-based-keylogger-used-steal-credit-card-data-popular-sites/</loc>
		<lastmod>2016-10-07T13:06:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/07/learn-reverse-engineering-basics-free-antivirus-hackers-handbook/</loc>
		<lastmod>2016-10-08T04:27:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/07/london-cops-charge-atm-malware-hacker/</loc>
		<lastmod>2016-10-07T14:04:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/07/students-hacked-chip-give-smartphone-sense-touch/</loc>
		<lastmod>2016-10-07T18:07:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/08/update-x-org-libraries-avoid-privilege-escalation-dos-attacks/</loc>
		<lastmod>2016-10-08T09:38:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/08/reversing-exploiting-embedded-devices-walking-software-hardware-stack/</loc>
		<lastmod>2016-10-08T10:24:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/08/100-online-stores-targeted-new-magecart-malware/</loc>
		<lastmod>2016-10-08T10:40:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/08/yahoo-spying-scandal-shows-us-exactly-need-encryption/</loc>
		<lastmod>2016-10-08T11:41:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/10/dropbox-google-drive-microsoft-onedrive-cloud-services-blocked-turkey-following-leaks/</loc>
		<lastmod>2016-10-10T13:11:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/10/javascript-leads-browser-hijacking/</loc>
		<lastmod>2016-10-10T13:27:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/10/breaking-microsoft-jea-technology-hack-system/</loc>
		<lastmod>2016-10-10T13:43:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/10/crypto-needs-transparency-researchers-warn/</loc>
		<lastmod>2016-10-10T14:27:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/10/hack-security-cctv-camera/</loc>
		<lastmod>2016-10-10T14:43:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/11/tv5monde-saved-airtime-ko-hack-unplugging-infected-box/</loc>
		<lastmod>2016-10-11T12:10:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/11/german-nuclear-plant-suffered-disruptive-cyber-attack-news-publicly-confirmed-iaea-director-yukiya-amano/</loc>
		<lastmod>2016-10-11T13:03:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/12/microsoft-patches-four-zero-days-used-live-attacks/</loc>
		<lastmod>2016-10-12T17:45:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/12/cerber-4-0-fuels-new-wave-ransomware-attacks/</loc>
		<lastmod>2016-10-12T20:30:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/13/bitcoin-wallet-blockchain-info-recovers-dns-hijacking-attack/</loc>
		<lastmod>2016-10-13T05:10:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/13/disappearing-messages-added-signal-app/</loc>
		<lastmod>2016-10-13T08:27:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/13/dxxd-ransomware-displays-legal-notice-encrypts-files-unmapped-network-shares/</loc>
		<lastmod>2016-10-13T08:29:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/13/executable-files-old-exploit-kits-top-effective-attack-methods/</loc>
		<lastmod>2016-10-13T12:26:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/13/offensiveware-sold-hacking-forums-exploit-builder-next-gen-keylogger/</loc>
		<lastmod>2016-10-13T12:42:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/14/clinton-campaign-chiefs-iphone-hacked-wiped-photos-suggest/</loc>
		<lastmod>2016-10-14T04:05:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/14/new-linux-trojan-called-nyadrop-threatens-iot-landscape/</loc>
		<lastmod>2016-10-14T05:15:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/14/crypy-ransomware-behind-israeli-lines/</loc>
		<lastmod>2016-10-14T10:25:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/15/eviltwins-exotic-ransomware-continuously-monitors-new-files-encrypt/</loc>
		<lastmod>2016-10-15T04:28:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/15/android-banking-trojan-asks-selfie-id/</loc>
		<lastmod>2016-10-15T04:49:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/15/surge-email-attacks-using-malicious-wsf-attachments/</loc>
		<lastmod>2016-10-15T07:57:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/15/android-devices-contain-foxconn-firmware-may-secret-backdoor/</loc>
		<lastmod>2016-10-15T09:07:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/15/beware-powerful-ddos-malware-infecting-cellular-gateways-feds-warn/</loc>
		<lastmod>2016-10-15T10:01:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/17/crooks-leverage-explosives-rob-atms-malware-overrated/</loc>
		<lastmod>2016-10-17T02:39:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/17/netflix-passwords-hacked/</loc>
		<lastmod>2016-10-17T03:36:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/17/can-learn-tridentpegasus-ios-vulnerability/</loc>
		<lastmod>2016-10-17T13:56:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/17/nrsc-hack-financial-data-donors-sent-russian-domain/</loc>
		<lastmod>2016-10-17T16:24:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/18/magento-malware-uses-steganography-steal-payment-card-data/</loc>
		<lastmod>2016-10-18T04:03:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/18/defense-contractor-white-hat-tells-fbi-judicial-watch-paid-hunt-clinton-hack/</loc>
		<lastmod>2016-10-18T05:04:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/18/crooks-exploit-zero-day-wordpress-ecommerce-plugin-upload-backdoor/</loc>
		<lastmod>2016-10-18T14:03:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/18/hackers-steal-research-user-data-japanese-nuclear-research-lab/</loc>
		<lastmod>2016-10-18T15:47:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/18/veracrypt-security-audit-concludes-despite-rocky-start/</loc>
		<lastmod>2016-10-18T16:25:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/19/sin-card-criminals-unlocked-stolen-iphone-6s/</loc>
		<lastmod>2016-10-19T02:31:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/19/new-looking-sundown-ek-drops-smoke-loader-kronos-banker/</loc>
		<lastmod>2016-10-19T03:10:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/19/indian-bank-blocks-600000-debit-cards-atm-malware-incident/</loc>
		<lastmod>2016-10-19T14:26:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/19/czech-police-arrest-russian-hacker-cyber-attacks-us/</loc>
		<lastmod>2016-10-19T14:50:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/19/flaw-intel-chips-make-malware-attacks-potent/</loc>
		<lastmod>2016-10-19T17:44:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/20/linkedin-says-hacking-suspect-tied-breach-stole-117m-passwords/</loc>
		<lastmod>2016-10-20T07:50:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/20/sql-injection-zero-day-component-ja-k2-filter-search-joomla/</loc>
		<lastmod>2016-10-20T08:01:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/20/ozapft-cyber-criminals-tap-german-speaking-targets-time-oktoberfest/</loc>
		<lastmod>2016-10-20T11:02:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/20/adult-friendfinder-vulnerability-leaves-millions-exposed/</loc>
		<lastmod>2016-10-20T11:22:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/20/development-ransomware-encrypts-pretending-click-game/</loc>
		<lastmod>2016-10-20T12:40:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/21/russia-linked-phishing-campaign-behind-dnc-breach-also-hit-podesta-powell/</loc>
		<lastmod>2016-10-21T03:22:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/21/serious-linux-privilege-escalation-bug-ever-active-exploit/</loc>
		<lastmod>2016-10-21T03:33:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/21/attackers-use-discord-voip-chat-servers-host-nanocore-njrat-spyrat/</loc>
		<lastmod>2016-10-21T13:54:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/21/feds-seized-50tb-data-nsa-contractor-suspected-theft/</loc>
		<lastmod>2016-10-21T14:08:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/21/hack-overdue-python-primer/</loc>
		<lastmod>2016-10-21T14:31:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/22/fakefile-trojan-opens-backdoors-linux-computers-except-opensuse/</loc>
		<lastmod>2016-10-22T03:36:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/22/dyn-confirms-ddos-attack-affecting-twitter-github-many-others/</loc>
		<lastmod>2016-10-22T06:00:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/22/chinese-hackers-targeted-us-aircraft-carrier/</loc>
		<lastmod>2016-10-22T10:21:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/22/ddos-attack-friday-hits-twitter-reddit-spotify-others/</loc>
		<lastmod>2016-10-22T10:40:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/24/inthecyber-discovered-serious-flaw-messaging-systems/</loc>
		<lastmod>2016-10-24T02:34:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/24/using-rowhammer-bitflips-root-android-phones-now-thing/</loc>
		<lastmod>2016-10-24T03:19:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/24/24-hours-life-home-router-francisco-j-rodriguez/</loc>
		<lastmod>2016-10-24T14:30:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/24/cracking-sphinx-trojan-dga-opens-door-botnet-takedown/</loc>
		<lastmod>2016-10-24T14:42:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/24/chinese-tech-giant-recalls-webcams-used-dyn-cyberattack/</loc>
		<lastmod>2016-10-24T15:44:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/25/locky-ransomwares-new-shit-extension-shows-cant-polish-turd/</loc>
		<lastmod>2016-10-25T02:31:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/25/android-phones-rooted-serious-linux-escalation-bug-ever/</loc>
		<lastmod>2016-10-25T03:31:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/25/nearly-2017-jpegs-pdfs-font-files-can-hijack-apple-mac-iphone-ipad/</loc>
		<lastmod>2016-10-25T14:47:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/25/capturing-packets-linux-speed-millions-packets-per-second-without-using-third-party-libraries/</loc>
		<lastmod>2016-10-25T15:07:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/25/hacking-mac-empyre/</loc>
		<lastmod>2016-10-25T15:17:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/26/nuclear-plants-leak-critical-alerts-unencrypted-pager-messages/</loc>
		<lastmod>2016-10-26T03:19:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/26/joomla-readies-patch-core-vulnerability-critical-isnt-talking/</loc>
		<lastmod>2016-10-26T03:53:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/26/middle-eastern-hackers-using-phishing-technique-infect-political-targets-trojan-malware/</loc>
		<lastmod>2016-10-26T14:18:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/26/cellebrite-digital-forensics-tools-leaked-online-reseller/</loc>
		<lastmod>2016-10-26T14:58:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/26/trick-bot-dyrezas-successor/</loc>
		<lastmod>2016-10-26T15:45:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/27/theres-new-way-take-drones-doesnt-involve-shotguns/</loc>
		<lastmod>2016-10-27T03:06:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/27/attackers-now-abusing-exposed-ldap-servers-amplify-ddos-attacks/</loc>
		<lastmod>2016-10-27T03:26:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/27/cloudfanta-malware-steals-banking-information-via-cloud-storage-apps/</loc>
		<lastmod>2016-10-27T16:18:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/27/android-ransomware-gets-around-auto-start-restrictions-pretending-launcher/</loc>
		<lastmod>2016-10-27T16:32:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/27/atombombing-brand-new-code-injection-windows/</loc>
		<lastmod>2016-10-27T17:07:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/28/hacked-e-mails-documents-putin-advisor-confirmed-genuine/</loc>
		<lastmod>2016-10-28T03:56:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/28/wannabe-hackers-adding-terrible-stupid-features-mirai/</loc>
		<lastmod>2016-10-28T04:58:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/28/blackgear-espionage-campaign-evolves-adds-japan-target-list/</loc>
		<lastmod>2016-10-28T09:42:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/28/36-year-old-pennsylvania-man-gets-18-months-phishing-nude-celebrity-pics/</loc>
		<lastmod>2016-10-28T10:39:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/28/mobile-pwn2own-215k-awarded-android-iphone-hacks/</loc>
		<lastmod>2016-10-28T12:01:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/29/super-dangerous-rex-botnet-around-150-bots/</loc>
		<lastmod>2016-10-29T04:39:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/29/global-trends-wanted-malware/</loc>
		<lastmod>2016-10-29T05:30:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/29/michigan-state-university-hacked-personal-information-leaked-online/</loc>
		<lastmod>2016-10-29T09:07:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/29/researchers-expose-mirai-vuln-used-hack-back-botnet/</loc>
		<lastmod>2016-10-29T11:10:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/29/hacking-forum-cuts-section-allegedly-linked-ddos-attacks/</loc>
		<lastmod>2016-10-29T15:37:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/31/problems-reappear-iot-devices-owners-discovery-new-ddos-trojan/</loc>
		<lastmod>2016-10-31T04:11:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/31/anonymous-warns-world-world-war-3-coming-soon/</loc>
		<lastmod>2016-10-31T08:43:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/31/iphone-hack-threatened-emergency-911-system-lands-teen-jail/</loc>
		<lastmod>2016-10-31T11:43:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/31/10-gadgets-every-white-hat-hacker-needs-toolkit/</loc>
		<lastmod>2016-10-31T15:05:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/10/31/mass-surveillance-cell-phone-data-att-service-provider/</loc>
		<lastmod>2016-10-31T15:37:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/01/new-leak-may-show-hacked-nsa/</loc>
		<lastmod>2016-11-01T04:08:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/01/google-reveals-windows-kernel-zero-day-attack/</loc>
		<lastmod>2016-11-01T04:38:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/01/whatsapp-blasted-eu-data-protection-group-facebook-sharing/</loc>
		<lastmod>2016-11-01T10:59:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/01/discovery-new-nymaim-malware-variant-employing-advanced-delivery-obfuscation-blacklisting-methods/</loc>
		<lastmod>2016-11-01T14:59:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/01/learning-buggy-wordpress-wp-login-malware/</loc>
		<lastmod>2016-11-01T15:19:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/02/0-day-sap-vulnerability-published-heres-can/</loc>
		<lastmod>2016-11-02T02:45:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/02/phony-android-flash-player-installs-banking-malware/</loc>
		<lastmod>2016-11-02T03:14:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/02/recent-windows-kernel-zero-day-exploited-hackers-behind-dnc-hack/</loc>
		<lastmod>2016-11-02T15:12:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/02/stealth-cell-tower-spy-workers-harmless-printer/</loc>
		<lastmod>2016-11-02T15:35:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/02/vulnerability-spotlight-remotely-exploitable-bugs-memcached-identified-patched/</loc>
		<lastmod>2016-11-02T15:51:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/03/critical-mysql-vulnerabilities-can-lead-server-compromise/</loc>
		<lastmod>2016-11-03T02:58:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/03/%e2%80%8blinux-developers-denial-service-attack/</loc>
		<lastmod>2016-11-03T03:24:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/03/universal-hijack-hole-turns-diy-wix-blogs-botnets/</loc>
		<lastmod>2016-11-03T15:43:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/03/computer-virus-cripples-uk-hospital-system/</loc>
		<lastmod>2016-11-03T15:59:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/03/william-hill-website-knocked-offline-sophisticated-ddos-attack/</loc>
		<lastmod>2016-11-03T17:13:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/04/block-ultrasonic-signals-didnt-know-tracking/</loc>
		<lastmod>2016-11-04T03:31:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/04/cisco-job-applicants-warned-potential-mobile-site-data-leak/</loc>
		<lastmod>2016-11-04T04:04:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/04/us-air-forces-biggest-spy-planes-hunting-isis-fighters/</loc>
		<lastmod>2016-11-04T14:09:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/04/bugging-devices-found-iran-nuclear-talks-hotel-say-swiss-officials/</loc>
		<lastmod>2016-11-04T15:32:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/04/dmca-exemptions-lift-hacking-restrictions/</loc>
		<lastmod>2016-11-04T16:05:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/05/atombombing-new-threat-windows/</loc>
		<lastmod>2016-11-05T03:51:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/05/inside-rig-exploit-kit/</loc>
		<lastmod>2016-11-05T04:30:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/05/compromise-plc-systems-via-stealthy-pin-control-attacks/</loc>
		<lastmod>2016-11-05T08:38:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/05/fake-cain-xpii-cleaner-app-actually-backdoor-annoying-features/</loc>
		<lastmod>2016-11-05T10:29:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/05/ransomware-goes-retro-paydos-serpent-written-batch-files/</loc>
		<lastmod>2016-11-05T10:32:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/07/hacker-discovered-vulnerability-gmail-allows-anyone-hack-email-account/</loc>
		<lastmod>2016-11-07T05:40:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/07/defusing-virus-hack-hacker/</loc>
		<lastmod>2016-11-07T05:58:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/07/seven-websites-indian-embassy-hacked-database-leaked/</loc>
		<lastmod>2016-11-07T11:08:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/07/avg-wants-home-router-fight-internet-things-malware/</loc>
		<lastmod>2016-11-07T15:19:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/07/hacked-user-develops-filezilla-version-encrypts-ftp-passwords/</loc>
		<lastmod>2016-11-07T16:11:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/08/dridex-dyre-malware-gang-members-arrested-uk/</loc>
		<lastmod>2016-11-08T03:07:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/08/apk-analysis-using-appmon/</loc>
		<lastmod>2016-11-08T03:32:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/08/unsealed-court-docs-show-fbi-used-malware-like-grenade/</loc>
		<lastmod>2016-11-08T14:46:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/08/fix-critical-android-rooting-bug-no-show-november-patch-release/</loc>
		<lastmod>2016-11-08T15:03:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/08/tesco-bank-halts-online-transactions-money-taken-20000-accounts/</loc>
		<lastmod>2016-11-08T15:20:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/09/exploit-belkin-wemo-gear-hack-android-devices/</loc>
		<lastmod>2016-11-09T03:18:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/09/google-stops-adsense-attack-forced-banking-trojan-android-phones/</loc>
		<lastmod>2016-11-09T03:30:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/09/ddos-attack-halts-heating-finland-amidst-winter/</loc>
		<lastmod>2016-11-09T14:51:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/09/d-link-dir-routers-found-buffer-overfow-flaw/</loc>
		<lastmod>2016-11-09T16:23:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/09/gchq-belives-isps-can-prevent-ddos-attacks/</loc>
		<lastmod>2016-11-09T16:40:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/10/ios-webview-bug-can-force-iphones-make-calls-ui-freezes/</loc>
		<lastmod>2016-11-10T03:20:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/10/wikileaks-hit-ddos-attack/</loc>
		<lastmod>2016-11-10T03:56:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/10/bangladesh-central-bank-team-manila-retrieve-cyber-heist-funds/</loc>
		<lastmod>2016-11-10T12:08:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/10/cylance-discloses-voting-machine-vulnerability/</loc>
		<lastmod>2016-11-10T12:50:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/10/new-usb-killer-made-camera-flash-parts-computers-worst-enemy/</loc>
		<lastmod>2016-11-10T14:07:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/11/oauth-2-0-hack-exposes-1-billion-mobile-apps-account-hijacking/</loc>
		<lastmod>2016-11-11T03:38:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/11/russian-dukes-hackers-pounce-trump-win/</loc>
		<lastmod>2016-11-11T04:12:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/11/first-cryptor-exploit-telegram/</loc>
		<lastmod>2016-11-11T10:06:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/11/hacker-compromises-microsofts-windows-10-browser-just-18-seconds/</loc>
		<lastmod>2016-11-11T12:27:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/12/fbi-operated-23-tor-hidden-child-porn-sites-deployed-malware/</loc>
		<lastmod>2016-11-12T02:33:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/12/exploiting-python-code-injection-web-applications/</loc>
		<lastmod>2016-11-12T10:56:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/12/scientists-working-cpu-can-detect-malware-hardware-level/</loc>
		<lastmod>2016-11-12T06:26:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/12/locky-ransomware-campaign-exploits-fears-data-stolen-opm-hack/</loc>
		<lastmod>2016-11-12T10:55:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/12/google-pixel-hacked-60-seconds-chinese-team/</loc>
		<lastmod>2016-11-12T16:42:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/14/adultfriendfinder-network-hack-exposes-412-million-accounts/</loc>
		<lastmod>2016-11-14T02:44:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/14/linkedin-ban-russia-warns-facebook-twitter/</loc>
		<lastmod>2016-11-14T03:21:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/14/new-attack-reportedly-lets-1-modest-laptop-knock-big-servers-offline/</loc>
		<lastmod>2016-11-14T16:42:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/14/master-decryption-keys-decryptor-crysis-ransomware-released/</loc>
		<lastmod>2016-11-14T17:04:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/15/smartphone-wifi-signals-can-leak-keystrokes-passwords-pins/</loc>
		<lastmod>2016-11-15T03:25:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/15/researcher-finds-karma-ransomware-distributed-via-pay-per-install-network/</loc>
		<lastmod>2016-11-15T03:46:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/15/whatsapp-adds-two-step-verification-android-along-new-features/</loc>
		<lastmod>2016-11-15T10:32:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/15/adware-found-android-app-one-million-installs-google-play-store/</loc>
		<lastmod>2016-11-15T13:31:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/16/chinese-company-installed-secret-backdoor-hundreds-thousands-phones/</loc>
		<lastmod>2016-11-16T03:07:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/16/cryptoluck-ransomware-malvertised-via-rig-e-exploit-kits/</loc>
		<lastmod>2016-11-16T03:27:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/16/ourmine-hackers-hacked-mark-zuckerbergs-online-accounts-second-time/</loc>
		<lastmod>2016-11-16T16:51:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/16/adobe-fined-1-million-2013-hack-affected-millions-users/</loc>
		<lastmod>2016-11-16T17:28:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/16/poisontap-can-hijack-web-traffic-install-backdoors-password-protected-pcs/</loc>
		<lastmod>2016-11-16T17:34:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/17/old-cryptolocker-copycat-named-pclock-resurfaces-new-attacks/</loc>
		<lastmod>2016-11-17T03:02:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/17/weaponizing-princess-toys-crafting-wi-fi-attack-kits/</loc>
		<lastmod>2016-11-17T15:45:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/17/ios-bug-lets-attackers-bypass-iphone-ipad-passcodes-using-siri/</loc>
		<lastmod>2016-11-17T16:10:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/18/android-banking-malware-whitelists-stay-connected-attackers/</loc>
		<lastmod>2016-11-18T02:55:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/18/crypton-ransomware-not-bad/</loc>
		<lastmod>2016-11-18T03:35:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/18/cd-private-music-torrent-tracker-shut/</loc>
		<lastmod>2016-11-18T14:53:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/18/three-mobile-cyber-data-breach-six-million-customers-private-data-risk/</loc>
		<lastmod>2016-11-18T15:10:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/18/three-appear-court-talktalk-hack/</loc>
		<lastmod>2016-11-18T15:35:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/19/rig-e-exploit-kit-now-distributing-new-chip-ransomware/</loc>
		<lastmod>2016-11-19T03:01:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/19/powerful-backdoorrootkit-found-preinstalled-3-million-android-phones/</loc>
		<lastmod>2016-11-19T04:06:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/19/kapustkiy-breached-italian-government-website-exposing-9000-45000-records/</loc>
		<lastmod>2016-11-19T09:35:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/19/mirai-botnet-hacks-security-camera-seconds/</loc>
		<lastmod>2016-11-19T17:48:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/19/malware-attack-starts-fake-ccall/</loc>
		<lastmod>2016-11-19T18:07:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/21/microsoft-xbox-playstation-popular-twitter-accounts-hacked/</loc>
		<lastmod>2016-11-21T02:42:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/21/hackers-program-bank-atms-spew-cash/</loc>
		<lastmod>2016-11-21T03:34:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/21/watch-locky-ransomware-spread-via-svg-images-facebook-messenger/</loc>
		<lastmod>2016-11-21T16:39:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/21/human-rights-foundation-website-hacked-thousands-accounts-exposed/</loc>
		<lastmod>2016-11-21T17:22:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/22/security-firm-detects-57m-attempts-exploit-2-year-old-router-firmware-backdoor/</loc>
		<lastmod>2016-11-22T03:33:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/22/blocking-local-network-hijacking-attacks/</loc>
		<lastmod>2016-11-22T03:49:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/22/office-depot-caught-claiming-box-pcs-showed-symptoms-malware/</loc>
		<lastmod>2016-11-22T14:58:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/22/botnet-iot-devices-behind-many-instagram-fake-profiles/</loc>
		<lastmod>2016-11-22T15:23:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/22/hacker-took-tel-avivs-public-wi-fi-network-prove/</loc>
		<lastmod>2016-11-22T15:20:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/23/elegant-0-day-unicorn-underscores-serious-concerns-linux-security/</loc>
		<lastmod>2016-11-23T02:48:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/23/fbi-hacked-8000-computers-120-countries-based-one-warrant/</loc>
		<lastmod>2016-11-23T02:58:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/23/exploit-code-released-ntp-vulnerability/</loc>
		<lastmod>2016-11-23T16:09:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/23/look-recent-stampado-ransomware-variant/</loc>
		<lastmod>2016-11-23T16:39:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/23/technical-teardown-exploit-malware-hwp-files/</loc>
		<lastmod>2016-11-23T17:30:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/24/great-now-even-headphones-can-spy/</loc>
		<lastmod>2016-11-24T02:30:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/24/mailchimp-accounts-hacked-spam-malicious-emails/</loc>
		<lastmod>2016-11-24T03:19:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/24/threat-actors-leverage-inpage-zero-day-targeted-attacks-asia/</loc>
		<lastmod>2016-11-24T15:52:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/24/cert-microsoft-dont-kill-emet-windows-10-not-secure-think/</loc>
		<lastmod>2016-11-24T16:18:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/24/new-decryption-tool-crysis-ransomware/</loc>
		<lastmod>2016-11-24T16:37:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/25/hacking-wpa-enterprise-kali-linux/</loc>
		<lastmod>2016-11-25T03:47:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/25/hackers-hijack-madison-square-garden-payment-systems-credit-card-data-risk/</loc>
		<lastmod>2016-11-25T04:16:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/25/crooks-steal-millions-european-atms-jackpotting-attacks/</loc>
		<lastmod>2016-11-25T16:34:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/25/massive-ddos-attack-hit-servers-european-commission-several-hours/</loc>
		<lastmod>2016-11-25T16:40:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/25/facebook-linkedin-spam-campaign-spreads-locky-ransomware/</loc>
		<lastmod>2016-11-25T16:41:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/26/keygen-websites-spreading-gatak-backdoor-trojan/</loc>
		<lastmod>2016-11-26T05:15:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/26/tesla-cars-can-stolen-hacking-app/</loc>
		<lastmod>2016-11-26T05:26:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/26/powerful-greek-army-hacker-breaches-high-commission-websites-india/</loc>
		<lastmod>2016-11-26T08:51:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/26/tor-phone-super-secure-version-android-developed-tor-project/</loc>
		<lastmod>2016-11-26T13:33:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/26/hackers-hunting-hackers-backdoor-infected-phishing-kits-sale-youtube/</loc>
		<lastmod>2016-11-26T14:05:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/28/hacker-found-issues-uber-ubercentral-tool-exposed-user-data/</loc>
		<lastmod>2016-11-28T02:29:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/28/us-navy-waits-till-thanksgiving-eve-disclose-hack-130000-sailors/</loc>
		<lastmod>2016-11-28T03:06:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/29/newly-discovered-router-flaw-hammered-wild-attacks/</loc>
		<lastmod>2016-11-30T15:15:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/29/san-francisco-rail-system-hacker-hacked/</loc>
		<lastmod>2016-11-29T08:55:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/29/kangaroo-ransomware-not-encrypts-data-tries-lock-windows/</loc>
		<lastmod>2016-11-29T09:08:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/29/audit-revealed-dozen-vulnerabilities-curl/</loc>
		<lastmod>2016-11-29T11:40:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/29/paypal-fixes-oauth-token-leaking-vulnerability/</loc>
		<lastmod>2016-11-29T15:28:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/30/firefox-0day-wild-used-attack-tor-users/</loc>
		<lastmod>2016-11-30T02:41:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/30/json-hijacking-modern-web/</loc>
		<lastmod>2016-11-30T02:53:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/30/windows-10-upgrade-vulnerability-makes-pc-super-easy-hack/</loc>
		<lastmod>2016-11-30T14:33:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/30/reported-cases-webcam-blackmail-double-linked-four-suicides/</loc>
		<lastmod>2016-11-30T15:25:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/11/30/new-proteus-malware-can-mine-crypto-currency-log-keystrokes/</loc>
		<lastmod>2016-11-30T15:35:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/01/1-million-google-accounts-breached-gooligan/</loc>
		<lastmod>2016-12-01T03:20:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/01/pluginphantom-new-android-trojan-abuses-droidplugin-framework/</loc>
		<lastmod>2016-12-01T04:05:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/01/uk-national-lottery-hacked-26000-accounts-accessed/</loc>
		<lastmod>2016-12-01T08:02:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/01/mozilla-tor-release-urgent-update-firefox-0-day-active-attack/</loc>
		<lastmod>2016-12-01T09:09:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/01/gps-spoofing-dangers-gps-data-hacking/</loc>
		<lastmod>2016-12-01T09:46:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/02/least-10-million-android-users-imperiled-popular-airdroid-app/</loc>
		<lastmod>2016-12-02T10:02:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/02/today-us-law-enforcement-new-hacking-powers/</loc>
		<lastmod>2016-12-02T10:12:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/02/avalanche-malware-network-hit-law-enforcement-takedown/</loc>
		<lastmod>2016-12-02T11:42:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/02/usb-killer-50-lets-easily-fry-almost-every-device/</loc>
		<lastmod>2016-12-02T17:09:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/02/pacemakers-can-hacked-harm-kill-patients/</loc>
		<lastmod>2016-12-02T17:17:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/03/researchers-bypass-apples-activation-lock-iphones-ipads/</loc>
		<lastmod>2016-12-03T04:07:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/03/fsb-accuses-foreign-hackers-plotting-undermine-russian-banks/</loc>
		<lastmod>2016-12-03T05:14:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/03/cnacom-open-source-exploitation-via-strategic-web-compromise/</loc>
		<lastmod>2016-12-03T06:33:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/03/porn-website-hacked-380000-accounts-spilled-online-xhamster-claims-fhack/</loc>
		<lastmod>2016-12-03T10:02:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/05/experts-cloudflare-spotted-new-dangerous-botnet/</loc>
		<lastmod>2016-12-05T03:10:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/05/russian-central-bank-says-bank-account-hacked-45-million-cyber-heist/</loc>
		<lastmod>2016-12-05T04:35:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/05/uber-asks-track-location-even-youre-not-using-app/</loc>
		<lastmod>2016-12-05T13:59:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/05/android-malware-uses-teamviewer-mobile-app-take-control-remote-devices/</loc>
		<lastmod>2016-12-05T14:42:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/05/north-koreas-super-secure-red-star-os-can-hacked-just-link/</loc>
		<lastmod>2016-12-05T14:53:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/06/dailymotion-allegedly-hacked-85-million-user-accounts-stolen/</loc>
		<lastmod>2016-12-06T03:00:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/06/russian-state-owned-bank-says-sites-hit-cyberattack/</loc>
		<lastmod>2016-12-06T03:26:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/06/backdoor-found-80-sony-surveillance-camera-models/</loc>
		<lastmod>2016-12-06T13:38:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/06/canadian-government-asking-citizens-want-encryption-backdoors/</loc>
		<lastmod>2016-12-06T14:23:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/06/readers-popular-websites-targeted-stealthy-stegano-exploit-kit-hiding-pixels-malicious-ads/</loc>
		<lastmod>2016-12-06T15:56:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/07/petya-ransomware-returns-goldeneye-version-continuing-james-bond-theme/</loc>
		<lastmod>2016-12-07T04:07:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/07/millions-exposed-malvertising-hid-attack-code-banner-pixels/</loc>
		<lastmod>2016-12-07T04:38:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/07/top-10-best-wi-fi-hacking-apps-android/</loc>
		<lastmod>2019-08-06T01:42:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/07/spoofing-address-bar-malware-warning/</loc>
		<lastmod>2016-12-07T17:26:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/07/new-flavor-dirty-cow-attack-discovered-patched/</loc>
		<lastmod>2016-12-07T17:56:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/08/hacker-steals-300000-major-cryptocurrency-investor/</loc>
		<lastmod>2016-12-08T04:30:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/08/hackers-favourite-distro-backbox-linux-4-7-kernel-4-4-lts-updated-hacking-tools/</loc>
		<lastmod>2016-12-08T05:44:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/08/russian-police-arrested-hackers-suspected-central-bank-attack/</loc>
		<lastmod>2016-12-08T12:50:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/08/see-kid-hacked-mcdonalds-drive-thru-speaker-pull-vulgar-prank/</loc>
		<lastmod>2016-12-08T14:12:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- <p>Please edit wp-db.inc.php in wp-includes and set SAVEQUERIES to true if you want to see the queries.</p> --> <!-- Request ID: fd243b1adfac9da5b74dcfb3c6ba3f22; Queries for sitemap: 2; Total queries: 51; Seconds: 0.09; Memory for sitemap: 1KB; Total memory: 16MB -->
