<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news February 2020</title>
	<atom:link href="http://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 18 Apr 2026 17:29:49 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Dr.Hamza Jawwad</title>
		<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/comment-page-5/#comment-1781565</link>
		<dc:creator><![CDATA[Dr.Hamza Jawwad]]></dc:creator>
		<pubDate>Tue, 27 Sep 2022 11:32:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185627#comment-1781565</guid>
		<description><![CDATA[This is really amazing article you have shared, I also write on below topics &lt;a href=&quot;https://www.eclaimsolution.com/&quot; rel=&quot;nofollow&quot;&gt; Medical Billing Services in Pennsylvania&lt;/a&gt;.]]></description>
		<content:encoded><![CDATA[<p>This is really amazing article you have shared, I also write on below topics <a href="https://www.eclaimsolution.com/" rel="nofollow"> Medical Billing Services in Pennsylvania</a>.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Agilemania</title>
		<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/comment-page-5/#comment-1760118</link>
		<dc:creator><![CDATA[Agilemania]]></dc:creator>
		<pubDate>Thu, 17 Mar 2022 09:47:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185627#comment-1760118</guid>
		<description><![CDATA[Great post, thank you for sharing with us.]]></description>
		<content:encoded><![CDATA[<p>Great post, thank you for sharing with us.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Richard Devis</title>
		<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/comment-page-5/#comment-1699042</link>
		<dc:creator><![CDATA[Richard Devis]]></dc:creator>
		<pubDate>Tue, 15 Dec 2020 10:26:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185627#comment-1699042</guid>
		<description><![CDATA[Thanks for sharing, It is really helpful]]></description>
		<content:encoded><![CDATA[<p>Thanks for sharing, It is really helpful</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Trucking and Logistics App Development</title>
		<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/comment-page-5/#comment-1684189</link>
		<dc:creator><![CDATA[Trucking and Logistics App Development]]></dc:creator>
		<pubDate>Thu, 02 Jul 2020 06:35:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185627#comment-1684189</guid>
		<description><![CDATA[Great information, thanks for sharing it with us]]></description>
		<content:encoded><![CDATA[<p>Great information, thanks for sharing it with us</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/comment-page-5/#comment-1674267</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Apr 2020 17:01:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185627#comment-1674267</guid>
		<description><![CDATA[New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices
https://thehackernews.com/2020/02/kr00k-wifi-encryption-flaw.html]]></description>
		<content:encoded><![CDATA[<p>New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices<br />
<a href="https://thehackernews.com/2020/02/kr00k-wifi-encryption-flaw.html" rel="nofollow">https://thehackernews.com/2020/02/kr00k-wifi-encryption-flaw.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/comment-page-5/#comment-1671917</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Mar 2020 15:33:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185627#comment-1671917</guid>
		<description><![CDATA[https://www.zdnet.com/article/new-kr00k-vulnerability-lets-attackers-decrypt-wifi-packets/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.zdnet.com/article/new-kr00k-vulnerability-lets-attackers-decrypt-wifi-packets/" rel="nofollow">https://www.zdnet.com/article/new-kr00k-vulnerability-lets-attackers-decrypt-wifi-packets/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/comment-page-5/#comment-1671871</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Mar 2020 12:52:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185627#comment-1671871</guid>
		<description><![CDATA[https://edri.org/swedish-law-enforcement-given-the-permission-to-hack/]]></description>
		<content:encoded><![CDATA[<p><a href="https://edri.org/swedish-law-enforcement-given-the-permission-to-hack/" rel="nofollow">https://edri.org/swedish-law-enforcement-given-the-permission-to-hack/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/comment-page-5/#comment-1671737</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 29 Feb 2020 13:48:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185627#comment-1671737</guid>
		<description><![CDATA[Raccoon malware affects all browsers
https://www.techradar.com/amp/news/raccoon-malware-affects-all-browsers

Despite its expensive price and subscription-based business model, the Raccoon malware has grown increasingly popular among cybercriminals due to its ability to target at least 60 applications including most popular browsers.

The Raccoon infostealer, also known as Racealer, has gained a following on underground hacking forums as a result of its aggressive marketing strategy, use of bulletproof hosting and easy-to-use backend. This malware was first discovered last year by security researchers at the firm Cybereason and it costs $200 a month.]]></description>
		<content:encoded><![CDATA[<p>Raccoon malware affects all browsers<br />
<a href="https://www.techradar.com/amp/news/raccoon-malware-affects-all-browsers" rel="nofollow">https://www.techradar.com/amp/news/raccoon-malware-affects-all-browsers</a></p>
<p>Despite its expensive price and subscription-based business model, the Raccoon malware has grown increasingly popular among cybercriminals due to its ability to target at least 60 applications including most popular browsers.</p>
<p>The Raccoon infostealer, also known as Racealer, has gained a following on underground hacking forums as a result of its aggressive marketing strategy, use of bulletproof hosting and easy-to-use backend. This malware was first discovered last year by security researchers at the firm Cybereason and it costs $200 a month.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/comment-page-4/#comment-1671707</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 29 Feb 2020 06:12:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185627#comment-1671707</guid>
		<description><![CDATA[Android malware can steal Google Authenticator 2FA codes
https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/

A new version of the &quot;Cerberus&quot; Android banking trojan will be able to steal one-time codes generated by the Google Authenticator app and bypass 2FA-protected accounts.]]></description>
		<content:encoded><![CDATA[<p>Android malware can steal Google Authenticator 2FA codes<br />
<a href="https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/" rel="nofollow">https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/</a></p>
<p>A new version of the &#8220;Cerberus&#8221; Android banking trojan will be able to steal one-time codes generated by the Google Authenticator app and bypass 2FA-protected accounts.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/02/01/cyber-security-news-february-2020/comment-page-4/#comment-1671661</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 28 Feb 2020 07:55:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185627#comment-1671661</guid>
		<description><![CDATA[Android malware can steal Google Authenticator 2FA codes
https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/
A new version of the &quot;Cerberus&quot; Android banking trojan will be able to
steal one-time codes generated by the Google Authenticator app and
bypass 2FA-protected accounts.. &quot;Abusing the Accessibility privileges,
the Trojan can now also steal 2FA codes from Google Authenticator
application,&quot; the ThreatFabric team said.]]></description>
		<content:encoded><![CDATA[<p>Android malware can steal Google Authenticator 2FA codes<br />
<a href="https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/" rel="nofollow">https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/</a><br />
A new version of the &#8220;Cerberus&#8221; Android banking trojan will be able to<br />
steal one-time codes generated by the Google Authenticator app and<br />
bypass 2FA-protected accounts.. &#8220;Abusing the Accessibility privileges,<br />
the Trojan can now also steal 2FA codes from Google Authenticator<br />
application,&#8221; the ThreatFabric team said.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
