<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cryptocurrency &#8211; Martijn Grooten</title>
	<atom:link href="/tag/cryptocurrency/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Lapsed Ordinary</description>
	<lastBuildDate>Wed, 20 Jun 2018 09:49:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>When crypto exchanges act like banks, regulators may treat them as such</title>
		<link>/2018/06/20/when-crypto-exchanges-act-like-banks-regulators-may-treat-them-as-such/</link>
					<comments>/2018/06/20/when-crypto-exchanges-act-like-banks-regulators-may-treat-them-as-such/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 20 Jun 2018 09:49:27 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[bank]]></category>
		<category><![CDATA[cambridge university]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[payment source]]></category>
		<category><![CDATA[regulation]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=464</guid>

					<description><![CDATA[Exchanges aren’t very transparent about their methods, but that in fact most handle such internal transactions exactly how regular banks have worked for centuries. Read more on Payment Source. (Note: subscription wall.)]]></description>
										<content:encoded><![CDATA[<p>Exchanges aren’t very transparent about their methods, but that in fact most handle such internal transactions exactly how regular banks have worked for centuries.<br />
Read more on <a href="https://www.paymentssource.com/news/when-crypto-exchanges-act-like-banks-regulators-may-treat-them-as-such">Payment Source</a>. (Note: subscription wall.)</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/06/20/when-crypto-exchanges-act-like-banks-regulators-may-treat-them-as-such/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>XMRig used in new macOS cryptominer</title>
		<link>/2018/05/23/xmrig-used-in-new-macos-cryptominer/</link>
					<comments>/2018/05/23/xmrig-used-in-new-macos-cryptominer/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 23 May 2018 09:34:35 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[macos]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[monero]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=438</guid>

					<description><![CDATA[A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/05/xmrig-used-new-macos-cryptominer/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/23/xmrig-used-in-new-macos-cryptominer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How cryptocurrency is killing the &#039;money mule&#039;</title>
		<link>/2018/05/04/how-cryptocurrency-is-killing-the-money-mule/</link>
					<comments>/2018/05/04/how-cryptocurrency-is-killing-the-money-mule/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Fri, 04 May 2018 09:44:35 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[money mule]]></category>
		<category><![CDATA[payment source]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=456</guid>

					<description><![CDATA[A new strain of malware that targets cryptocurrency users — but not users of mainstream payment options like bank accounts — highlights how much the cybercrime game is changing behind the scenes. Read more on Payment Source. (Note: subscription wall.)]]></description>
										<content:encoded><![CDATA[<p>A new strain of malware that targets cryptocurrency users — but not users of mainstream payment options like bank accounts — highlights how much the cybercrime game is changing behind the scenes.<br />
Read more on <a href="https://www.paymentssource.com/news/how-cryptocurrency-is-killing-the-money-mule">Payment Source</a>. (Note: subscription wall.)</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/04/how-cryptocurrency-is-killing-the-money-mule/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>$150k in cryptocurrency stolen through combined BGP-DNS hijack</title>
		<link>/2018/04/25/150k-in-cryptocurrency-stolen-through-combined-bgp-dns-hijack/</link>
					<comments>/2018/04/25/150k-in-cryptocurrency-stolen-through-combined-bgp-dns-hijack/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 25 Apr 2018 09:24:28 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[bgp]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[myetherwallet]]></category>
		<category><![CDATA[theft]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=425</guid>

					<description><![CDATA[A BGP hijack was used to take over some of Amazon&#8217;s DNS infrastructure, which was then used to serve a phishing site to users of the MyEtherWallet service. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>A BGP hijack was used to take over some of Amazon&#8217;s DNS infrastructure, which was then used to serve a phishing site to users of the MyEtherWallet service.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/04/150-k-cryptocurrency-stolen-through-cominbed-bgp-dns-hijack/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/04/25/150k-in-cryptocurrency-stolen-through-combined-bgp-dns-hijack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
