<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>black hat Archives - R. Lawson Author</title>
	<atom:link href="https://rlawsonauthor.com/tag/black-hat/feed/" rel="self" type="application/rss+xml" />
	<link>https://rlawsonauthor.com/tag/black-hat/</link>
	<description>Intelligent Thrillers</description>
	<lastBuildDate>Tue, 28 Jun 2016 16:47:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">55015724</site>	<item>
		<title>Malware, Intelligence and Espionage</title>
		<link>https://rlawsonauthor.com/hacking-malware-intelligence-espionage/</link>
					<comments>https://rlawsonauthor.com/hacking-malware-intelligence-espionage/#respond</comments>
		
		<dc:creator><![CDATA[R Lawson]]></dc:creator>
		<pubDate>Wed, 29 Jun 2016 00:15:10 +0000</pubDate>
				<category><![CDATA[About the Series]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Killing Time]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Retribution]]></category>
		<category><![CDATA[black hat]]></category>
		<category><![CDATA[CIA intelligence]]></category>
		<category><![CDATA[copmputer virus]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[international espionage]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[spy games]]></category>
		<category><![CDATA[white hat malware]]></category>
		<guid isPermaLink="false">http://rlawsonauthor.com/?p=327</guid>

					<description><![CDATA[<p>Hacking with Malware It all depends whether you are a White Hat or Black Hat when it comes to a national intelligence agency&#8217;s anticipated outcome in a hacking scheme. Are you the  good guy or bad guy in the hacking game?  The hacker or hackee? Most would agree it&#8217;s best to be the hacker controlling [&#8230;]</p>
<p>The post <a href="https://rlawsonauthor.com/hacking-malware-intelligence-espionage/">Malware, Intelligence and Espionage</a> appeared first on <a href="https://rlawsonauthor.com">R. Lawson Author</a>.</p>
]]></description>
		
					<wfw:commentRss>https://rlawsonauthor.com/hacking-malware-intelligence-espionage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">327</post-id>	</item>
	</channel>
</rss>
