<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Zeus Malware Reboot SMEs and Small Financial Institutions Beware	</title>
	<atom:link href="https://www.interxect.com/zeus-malware-reboot/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.interxect.com/zeus-malware-reboot/</link>
	<description>Helping You Use Information Technology Productively</description>
	<lastBuildDate>Thu, 14 Nov 2013 00:05:34 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>
	<item>
		<title>
		By: Have You Ever Had a Data Breach?: Think hard before you answer that question.		</title>
		<link>https://www.interxect.com/zeus-malware-reboot/#comment-653</link>

		<dc:creator><![CDATA[Have You Ever Had a Data Breach?: Think hard before you answer that question.]]></dc:creator>
		<pubDate>Thu, 14 Nov 2013 00:05:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=702#comment-653</guid>

					<description><![CDATA[[&#8230;] Targeted attacks are some of the most difficult, as the attackers are willing to invest both time and money for a much larger payoff. These attacks, often called Advanced Persistent Threats (APT), may take place over several days, weeks or even months and use evasive techniques to avoid detection with the aim to create a connection that they could continually siphon information from the infiltrated network. And don&#8217;t believe that these attacks cannot happen to you, as SMEs are also being targeted. [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Targeted attacks are some of the most difficult, as the attackers are willing to invest both time and money for a much larger payoff. These attacks, often called Advanced Persistent Threats (APT), may take place over several days, weeks or even months and use evasive techniques to avoid detection with the aim to create a connection that they could continually siphon information from the infiltrated network. And don&#8217;t believe that these attacks cannot happen to you, as SMEs are also being targeted. [&#8230;]</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Database Caching using Disk (Request-wide modification query)

Served from: www.interxect.com @ 2025-06-01 09:22:17 by W3 Total Cache
-->