<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>malware &#8211; Startupware: Managing Startups</title>
	<atom:link href="https://www.startupware.com/tag/malware-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.startupware.com</link>
	<description>Autorunning Software &#38; Running a Software Business</description>
	<lastBuildDate>Mon, 10 Jul 2023 13:28:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Trojan Phish</title>
		<link>https://www.startupware.com/newsletter-reprints/trojan_phish/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Mon, 10 Jul 2023 13:08:45 +0000</pubDate>
				<category><![CDATA[Newsletter Reprints]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware safety]]></category>
		<category><![CDATA[phish]]></category>
		<category><![CDATA[trojan horse]]></category>
		<category><![CDATA[Westminster MD]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[windows 11]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=2424</guid>

					<description><![CDATA[<p>When is a phish also a trojan horse? When the phish is bait and the trojan horse is making a delivery of malware.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/trojan_phish/">Trojan Phish</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="400" height="368" src="https://www.startupware.com/wp-content/uploads/2023/07/TrojanPhish1-400.jpg" alt="Trojan Phish" class="wp-image-2423" srcset="https://www.startupware.com/wp-content/uploads/2023/07/TrojanPhish1-400.jpg 400w, https://www.startupware.com/wp-content/uploads/2023/07/TrojanPhish1-400-300x276.jpg 300w" sizes="(max-width: 400px) 100vw, 400px" /></figure>



<p>Is that email in your morning flood of junk a phish? Or a trojan horse? It is frequently both, as phishing results in the trojan horse being allowed to deliver a load of Greek Soldiers. Or usually malware installation links and scripts. Read more in the <a href="https://startupware.com/newsletter" target="_blank" rel="noopener">July PC Updater News</a>, free.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/trojan_phish/">Trojan Phish</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/newsletter-reprints/trojan_phish/">Trojan Phish</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
