<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://securelist.lat/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2019-11-29 05:29:49 GMT -->
	<url>
		<loc>https://securelist.lat/</loc>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/all/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estadisticas/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/etiquetas/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/rss-feeds/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mapa/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/contacts/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/subscribe/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/subscription/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/unsubscribe/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/preferences/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/confirm-subscription/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q3-2019/89857/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q3-2019-statistics/89858/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-informatico-a-t-mobile-expone-los-datos-de-alrededor-de-1-millon-de-usuarios/89853/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-report-q3-2019/89777/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/unwanted-notifications-in-browser/89722/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/pronostico-de-ciberseguridad-del-2020-para-america-latina/89704/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/advanced-threat-predictions-for-2020/89698/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-report-q3-2019/89671/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/criminales-atacan-con-ransomware-a-dos-importantes-empresas-espanolas-everis-y-cadena-ser/89674/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/steam-powered-scammers/89644/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/data-collectors/89613/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hqwar-the-higher-it-flies-the-harder-it-drops/89591/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-datos-personales-de-millones-de-ecuatorianos-estan-a-la-venta-en-la-red/89586/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/atacantes-secuestran-cuentas-influyentes-de-youtube-para-venderlas-en-internet/89587/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ransomware-two-pieces-of-good-news/89576/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-descubren-un-truco-que-permite-exponer-las-historias-privadas-de-los-usuarios-de-facebook-e-instagram/89572/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/electricity-and-mining/89552/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/detienen-a-281-personas-por-estafas-millonarias-de-correo-electronico/89564/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-encuentran-millones-de-numeros-telefonicos-de-usuarios-de-facebook-filtrados-en-la-red/89549/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/threats-to-macos-users/89516/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/parental-control-report-summer-results/89487/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-canadiense-admite-que-creo-y-administro-la-red-zombi-satori-compuesta-por-dispositivos-iot/89513/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/212-000-conversaciones-de-teletext-holidays-con-sus-clientes-quedan-expuestas-en-la-red/89485/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/fully-equipped-spying-android-rat-from-brazil-brata/89476/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q2-2019/89423/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-expulsado-del-programa-de-recompensas-de-valve-expone-una-segunda-vulnerabilidad-de-dia-cero-en-steam/89425/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-de-talktalk-es-sentenciado-por-robar-datos-de-internautas-a-cambio-de-bitcoins/89421/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/filtracion-de-biostar-2-expone-millones-de-registros-de-reconocimiento-facial-y-huellas-dactilares/89416/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q2-2019-statistics/89347/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q2-2019/89345/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-en-el-protocolo-ctf-puede-explotarse-con-notepad-para-tomar-control-del-equipo/89352/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-filtra-datos-de-la-policia-argentina-e-irrumpe-en-la-cuenta-de-twitter-de-la-prefectura-naval/89350/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/empleados-de-att-ayudaron-a-un-intruso-a-desbloquear-celulares-e-infectar-a-la-compania/89343/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-report-q2-2019/89325/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-del-proyecto-cero-de-google-descubren-seis-vulnerabilidades-en-ios/89323/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-roba-los-datos-de-mas-de-100-millones-clientes-potenciales-del-banco-capital-one/89321/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-programa-chantajista-deja-sin-electricidad-a-parte-de-johannesburgo/89318/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/on-the-iot-road/89270/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/equifax-se-compromete-a-pagar-700-millones-por-su-filtracion-de-datos-de-2017/89297/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/how-to-steal-a-million-of-your-data/89275/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/portugal-pide-mas-tiempo-para-investigar-el-complejo-caso-del-hacker-de-football-leaks/89272/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-viejo-paquete-de-phishing-se-actualiza-para-atacar-en-visperas-del-amazon-prime-day/89262/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/parchan-la-vulnerabilidad-de-dia-cero-que-exponia-las-camaras-y-microfonos-de-los-usuarios-de-zoom/89261/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-roban-archivos-transferidos-por-wetransfer/89220/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sentencian-a-hacker-que-se-dedicaba-a-colapsar-servidores-de-juegos-con-ataques-ddos-en-2013/89215/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sodin-ransomware/89189/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-irrumpe-en-una-red-de-la-nasa-usando-un-raspberry-pi/89187/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-descubre-que-una-empresa-de-recuperacion-de-datos-pagaba-a-los-cibercriminales-a-espaldas-de-sus-clientes/89184/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/europol-arresta-a-seis-sospechosos-de-estafar-27-millones-de-dolares-a-usuarios-de-ciptomonedas/89177/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-acechan-a-los-jugadores-de-internet-para-convertir-bienes-virtuales-en-dinero-real/89172/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-equipo-internacional-de-expertos-desarrolla-con-exito-una-herramienta-de-descifrado-del-ransomware-gandcrab/89173/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mobile-subscriptions/89164/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-exponen-los-datos-de-mas-de-20-millones-de-pacientes-de-centros-medicos-de-estados-unidos/89158/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/radiohead-publica-18-horas-de-musica-inedita-que-hackers-les-habian-robado/89149/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kids-report-2018-2019/89085/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-nuevo-malware-blacksquid-explota-ocho-vulnerabilidades-para-minar-criptomonedas-en-secreto/89102/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-plugin-malicioso-esconde-adware-en-cientos-de-aplicaciones-de-google-play/89101/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/expertos-alertan-sobre-hiddenwasp-el-inusual-malware-para-linux-compuesto-por-azazel-y-mirai/89100/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-urge-a-sus-clientes-a-que-parchen-sus-sistemas-contra-la-vulnerabilidad-bluekeep/89097/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/filtracion-del-gigante-inmobiliario-first-american-expone-885-millones-de-documentos-personales/89090/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/g-suite-de-google-ha-estado-guardando-contrasenas-en-texto-simple-durante-14-anos/89082/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ladron-que-roba-a-ladron-hackers-exponen-datos-de-sus-colegas-del-foro-cibercriminal-ogusers/89080/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q1-2019-statistics/88983/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q1-2019/89040/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-en-mexico-a-8-personas-vinculadas-a-la-banda-de-cibercriminales-bandidos-revolutions-team/88981/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-report-q1-2019/88828/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-advierte-sobre-una-vulnerabilidad-en-sus-llaves-de-seguridad-titan-bluetooth/88956/</loc>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://securelist.lat/zombieload-vulnerabilidad-en-intel-permite-el-robo-de-datos-directo-desde-el-procesador/88944/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberespias-descubren-como-invadir-telefonos-con-una-llamada-de-whatsapp/88942/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q1-2019/88830/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-toman-control-de-cientos-de-repositorios-de-codigo-en-github-gitlab-y-bitbucket/88825/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/autoridades-cierran-el-sitio-deepdotweb-y-detienen-a-varios-posibles-administradores/88824/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/japon-desarrolla-su-primer-virus-informatico-para-defenderse-de-ciberataques/88822/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-play-expulsa-a-un-desarrollador-de-aplicaciones-que-tenia-mas-de-600-millones-de-descargas/88813/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-a-un-usuario-de-nido-org-que-incito-a-la-violencia-contra-una-mujer/88809/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-base-militar-mas-grande-de-ee-uu-y-del-mundo-se-disculpa-por-haber-inquietado-a-los-ciudadanos-con-un-simulacro-de-ciberataque/88807/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/infosecurity-mexico-2019-expertos-en-seguridad-abren-debates-sobre-el-panorama-de-la-ciber-seguridad-en-mexico-y-latinoamerica/88803/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-ponen-en-marcha-operaciones-para-robar-las-donaciones-dirigidas-a-la-catedral-de-notre-dame/88800/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ecuador-recibe-ayuda-internacional-para-combatir-mas-de-40-millones-de-ciberataques-por-quitarle-el-asilo-a-julian-assange/88795/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/digital-doppelgangers/88751/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/game-of-threats/88768/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-duo-de-hackers-enfrenta-prision-en-ee-uu-por-crear-y-distribuir-malware-para-robar-datos-minar-criptomonedas-y-estafar-a-internautas/88793/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/basbanke-trend-setting-brazilian-banking-trojan/88740/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-rey-de-internet-fue-sentenciado-a-6-anos-de-prision-por-distribuir-ransomware-en-sitios-pornograficos/88738/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/apple-frena-un-programa-espia-que-utilizaba-certificados-de-autentificacion-corporativos-para-atacar-a-sus-clientes/88736/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/bots-and-botnets-in-2018/88697/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/shadowhammer-un-programa-malicioso-se-propaga-mediante-actualizaciones-oficiales-de-asus/88693/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-return-of-the-bom/88665/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/o-retorno-do-bom/88676/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-error-de-facebook-hizo-que-almacenara-cientos-de-millones-de-contrasenas-en-texto-simple-y-las-dejara-al-alcance-de-sus-empleados/88619/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-elimina-de-play-store-un-adware-que-habia-sido-descargado-casi-150-millones-de-veces/88617/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-argentino-de-19-anos-gana-su-primer-millon-denunciando-vulnerabilidades/88613/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/facebook-parcha-una-vulnerabilidad-que-permite-a-intrusos-ver-con-quien-conversas-en-facebook-messenger/88610/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-2018/88487/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/por-que-ji32k7au4a83-es-una-contrasena-insegura/88575/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-filtran-mas-de-300-millones-de-conversaciones-privadas-e-informacion-de-usuarios-de-china/88573/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cierre-de-nido-org-el-sitio-de-celibes-involuntarios-donde-se-coordinaba-el-maltrato-y-secuestro-de-mujeres/88571/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mobile-malware-evolution-2018/88378/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/winrar-soluciona-una-vulnerabilidad-que-puso-en-riesgo-a-sus-usuarios-durante-19-anos/88539/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sentencian-al-funcionario-de-un-banco-chino-que-se-volvio-millonario-explotando-una-vulnerabilidad-en-los-cajeros-automaticos/88372/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-attacks-in-q4-2018/88346/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-y-jigsaw-ensenan-a-reconocer-los-correos-phishing-con-un-cuestionario-basado-en-mensajes-reales/88353/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/autoridades-se-infiltran-en-la-red-zombi-joanap-para-combatirla-desde-dentro/88351/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-a-cryptopia-se-estiman-perdidas-de-16-millones-de-dolares-en-monedas-criptograficas/88343/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-descubre-una-coleccion-masiva-773-millones-de-correos-y-21-millones-de-contrasenas-filtradas/88336/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-publican-segundo-lote-de-documentos-robados-sobre-el-ataque-terrorista-del-11-de-septiembre/88328/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cientos-de-politicos-hackeados-alemania-sufre-la-mayor-filtracion-de-datos-de-su-historia/88320/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-consigue-las-identidades-y-direcciones-de-1-000-desertores-norcoreanos-que-se-mudaron-a-corea-del-sur/88318/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-conferencia-de-seguridad-mas-austral-del-mundo/88302/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mensaje-navideno-de-whatsapp-recolecta-datos-personales-de-sus-victimas/88306/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-filtran-cables-diplomaticos-que-estuvieron-interceptando-durante-anos/88299/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estados-unidos-acusa-a-hackers-chinos-de-lanzar-ciberataques-a-sus-companias-y-agencias/88297/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2018-statistics/88267/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2018-top-security-stories-2018/88270/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-cierre-de-google-se-adelanta-por-una-falla-de-seguridad-que-afecta-a-525-millones-de-usuarios/88262/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/intrusion-informatica-a-quora-expone-los-datos-de-100-millones-de-usuarios/88259/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-cyberthreats-to-financial-institutions-2019-overview-and-predictions/88201/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-threat-predictions-for-2019/88189/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-threat-predictions-for-cryptocurrencies-in-2019/88199/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-threat-predictions-for-industrial-security-in-2019/88197/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2018-story-of-the-year-miners/88205/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-embiste-contra-los-responsables-de-las-operaciones-de-fraude-publicitario-3ve-y-methbot/88209/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberacosadores-podrian-hackear-un-reloj-para-ninos-con-una-aplicacion-para-hacer-bromas-telefonicas/88191/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/black-friday-alert/88177/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cathay-pacific-admite-que-tardo-medio-ano-en-informar-a-sus-clientes-sobre-un-ciberataque-de-mas-de-3-meses-de-duracion/88173/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-white-company-un-nuevo-grupo-de-ciberespionaje-gubernamental-ataca-a-la-fuerza-aerea-de-paquistan/88171/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q3-2018/88053/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q3-2018-statistics/88066/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/agentes-iranies-encuentran-con-google-los-sistemas-que-la-cia-usaba-para-comunicarse-con-sus-agentes-encubiertos/88112/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/surge-una-nueva-herramienta-para-descifrar-los-equipos-afectados-por-el-ransomware-gandcrab/88109/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q3-2018/88064/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-podrian-tomar-el-control-de-implantes-cerebrales-para-robar-datos-confidenciales-y-causar-danos-fisicos/88061/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-report-in-q3-2018/88036/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-ciberataque-a-british-airways-tuvo-mas-victimas-de-las-que-se-pensaba/88034/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/super-micro-apple-y-amazon-niegan-que-el-gobierno-chino-haya-infiltrado-chips-espia-en-sus-sistemas/88030/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/phishing-for-knowledge/88014/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sentencian-al-ex-funcionario-de-equifax-que-aprovecho-un-ciberataque-a-la-empresa-para-especular-con-sus-acciones/88016/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-roban-los-registros-de-viajes-de-funcionarios-del-pentagono/88010/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-usan-credenciales-de-apple-id-robadas-para-robar-dinero-en-china/88003/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-y-extraditan-a-ee-uu-a-un-ciberespia-con-supuestos-vinculos-con-el-gobierno-de-china/88000/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/exposicion-de-datos-privados-de-google-impulsa-su-cierre-en-medio-de-debates-sobre-ciberseguridad/87999/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-director-de-phantom-secure-admite-que-vendia-telefonos-ultra-seguros-a-carteles-de-drogas/87991/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/facebook-confirma-un-ciberataque-que-puede-haber-puesto-50-millones-de-cuentas-en-manos-de-criminales/87977/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/fallas-de-seguridad-exponen-documentos-datos-personales-y-credenciales-de-funcionarios-de-la-onu/87975/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-hacker-rumana-admite-que-infecto-126-camaras-de-vigilancia-que-protegian-a-trump/87968/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-de-ransomware-afecta-las-operaciones-del-aeropuerto-de-bristol/87966/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/new-trends-in-the-world-of-iot-threats/87948/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-roban-los-datos-de-tarjetas-de-credito-de-380-000-clientes-de-british-airways/87950/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-imputa-a-un-hacker-norcoreano-por-los-ataques-de-wannacry-y-a-sony-entertainment/87881/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kids-summer-threats/87564/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/atacantes-toman-control-de-routers-mikrotik-para-espiar-el-trafico-de-redes-de-sus-usuarios/87561/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-consiguen-los-datos-de-20-000-usuarios-de-la-app-de-air-canada/87553/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/instituciones-financieras-niegan-que-hackers-hayan-eliminado-las-deudas-de-500-personas-en-chile/87550/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-atacan-76-universidades-para-robar-sus-investigaciones-y-propiedad-intelectual/87546/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/operacion-internacional-de-cibercrimen-roba-135-millones-de-dolares-a-un-banco-de-india-en-dos-dias/87539/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-informante-reality-winner-recibe-una-sentencia-historica-por-filtrar-informacion-sobre-ciberataques/87538/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/alex-stamos-advierte-que-es-demasiado-tarde-para-proteger-las-elecciones-de-2018-en-ee-uu/87535/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/dark-tequila-anejo/87527/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidades-en-los-modems-de-telefonia-movil-permiten-rastrear-a-los-patrulleros-y-ambulancias/87522/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/defcon-nino-de-11-anos-toma-el-control-de-una-replica-de-un-portal-electoral-de-los-estados-unidos/87518/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/keypass-ransomware/87497/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q2-2018/87462/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidades-en-antenas-de-comunicacion-satelital-podrian-convertirlas-en-armas-que-atacan-con-campos-de-radiacion-de-alta-intensidad/87490/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q2-2018-statistics/87391/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q2-2018/87394/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/facebook-cierra-paginas-falsas-y-deslegitima-movimientos-sociales-legitimos-y-masivos/87456/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/documentos-filtrados-develan-planes-de-google-de-aceptar-las-politicas-de-censura-de-china-para-reintroducirse-en-su-mercado/87454/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-roba-informacion-sobre-drones-y-tanques-militares-y-la-vende-por-150-dolares/87380/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-programa-chantajista-ataca-a-uno-de-los-mayores-laboratorios-de-analisis-medicos-de-ee-uu/87378/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-report-in-q2-2018/87217/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-encargado-de-servicio-al-cliente-de-silk-road-enfrenta-cadena-perpetua-al-ser-extraditado-a-ee-uu/87370/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/giftcard-generators/87206/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/banco-de-chile-promete-actualizar-sus-sistemas-a-windows-7-para-reforzar-su-ciberseguridad/87209/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-credulidad-una-forma-de-perder-criptomonedas/87171/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/china-afloja-las-restricciones-de-internet-para-promover-el-turismo-en-hainan/87162/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ransomware-and-malicious-crypto-miners-in-2016-2018/87155/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-parlamento-europeo-aprueba-una-ley-de-derechos-de-autor-con-fuerte-imposicion-de-los-consumidores-e-industria-de-la-tecnologia/87147/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-baron-del-bitcoin-ira-a-prision-por-inhabilitar-el-servicio-de-emergencias-911-en-una-ciudad-de-wisconsin/87145/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-entrena-a-perros-policia-para-detectar-dispositivos-electronicos-en-los-aeropuertos/87142/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/facebook-compartio-datos-de-sus-clientes-con-huawei-y-ee-uu-teme-que-se-hayan-filtrado-hasta-el-gobierno-chino/87137/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/a-mitm-extension-for-chrome/87105/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/fifa-public-wi-fi-guide/87067/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kids-report-2018/87065/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estados-unidos-responsabiliza-a-corea-del-norte-por-dos-daninas-cepas-de-malware/87069/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/2018-fraud-world-cup/87043/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/tres-imputados-por-la-disputa-en-call-of-duty-que-resulto-en-la-muerte-de-un-inocente/87040/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vpnfilter-nuevo-malware-para-routers-se-propaga-a-una-velocidad-alarmante/87035/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/aplicacion-de-proteccion-de-menores-expone-decenas-de-miles-de-contrasenas-sin-cifrar/87033/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q1-2018/86992/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-nuevo-programa-malicioso-trata-de-secuestrar-las-sesiones-de-telegram/87031/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ecuador-invirtio-mas-de-5-millones-de-dolares-en-proteger-a-assange/86994/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/apple-ensena-programacion-en-las-escuelas-para-ninos-con-discapacidad/86997/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q1-2018/86963/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q1-2018-statistics/86929/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ibm-refuerza-su-seguridad-prohibiendo-el-uso-de-memorias-usb-en-la-compania/86927/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/controversia-por-los-miles-de-falsos-positivos-del-sistema-de-reconocimiento-facial-de-la-policia-de-gales/86924/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/twitter-pide-a-sus-320-millones-de-usuarios-que-cambien-sus-contrasenas-por-un-problema-de-cifrado/86922/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminal-intenta-sacar-a-su-amigo-de-prision-y-acaba-entrando-el-mismo-por-7-anos/86919/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/accion-conjunta-de-autoridades-logra-el-cierre-de-un-portal-que-vendia-ataques-ddos/86910/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-sistema-de-reconocimiento-facial-encontro-3-000-ninos-perdidos-en-4-dias/86904/</loc>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-report-in-q1-2018/86887/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-vulnerabilidad-en-la-aplicacion-de-la-conferencia-de-seguridad-rsa-expone-los-datos-de-sus-asistentes/86885/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-que-robo-11-000-cuentas-de-yahoo-podria-pasar-hasta-8-anos-en-prision/86882/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-pone-a-prueba-un-modo-confidencial-que-permitira-autodestruir-correos-enviados/86879/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/leaking-ads/86848/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-atacan-vevo-y-eliminan-el-videoclip-de-despacito-de-youtube/86846/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/t-mobile-austria-almacena-contrasenas-en-texto-legible-y-no-lo-considera-un-problema/86841/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-de-cisco-encuentran-vulnerabilidades-en-monitores-de-actividad-cerebral/86839/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/pocket-cryptofarms/86819/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-confirma-que-hay-dispositivos-de-espionaje-de-telecomunicaciones-rondando-en-washington-dc/86817/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-roban-los-datos-de-tarjetas-de-credito-de-5-millones-de-clientes-de-saks-fifth-avenue-y-lord-taylor/86814/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/posible-ataque-de-wannacry-se-esparce-en-una-planta-de-produccion-de-boeing/86812/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-en-alicante-al-supuesto-lider-de-las-operaciones-del-malware-carbanak/86810/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-acusa-a-nueve-iranies-de-robar-31-tb-de-informacion-academica-para-entregarsela-a-su-gobierno/86808/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mozilla-retira-sus-publicidades-de-facebook-a-causa-del-problema-con-cambridge-analytica/86806/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/netflix-inaugura-un-programa-de-recompensas-publico/86804/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/facebook-acusa-a-cambridge-analytica-de-haber-robado-los-datos-de-sus-usuarios-para-hacerlos-votar-a-favor-de-trump-y-brexit/86801/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/graykey-un-dispositivo-de-30-000-us-promete-desbloquear-los-iphones-para-las-autoridades/86405/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/apple-inaugura-un-sitio-para-aportar-al-cuidado-de-los-ninos-que-usan-sus-dispositivos/86403/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-conflicto-entre-rusia-y-gran-bretana-trae-consigo-vientos-de-ciberguerra/86401/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-al-dueno-de-una-empresa-de-telefonos-cifrados-por-facilitar-asesinatos-y-trafico-de-drogas-con-sus-productos/86398/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-colegio-de-abogados-de-utah-envia-un-correo-oficial-con-la-imagen-de-una-mujer-en-topless-a-miles-de-miembros/86393/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/goodfellas-the-brazilian-carding-scene-is-after-you/86369/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/oursa-surge-una-conferencia-paralela-a-la-rsa-para-visibilizar-la-representacion-casi-nula-de-las-mujeres-en-el-evento-a-las-charlas-desde-cualquier-otro-lugar-del-mundo/86389/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mobile-malware-review-2017/86322/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/github-hace-frente-al-mayor-ataque-ddos-de-la-historia-y-sobrevive-con-heridas-menores/86363/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/revocan-23-000-certificados-de-autentificacion-porque-un-vendedor-envio-sus-llaves-por-correo-electronico/86357/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nace-veil-la-nueva-herramienta-de-navegacion-ultra-privada-que-no-deja-ningun-rastro-en-el-equipo/86355/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/financial-cyberthreats-in-2017/86317/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/atm-malware-from-latin-america-to-the-world/86299/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/senadores-de-ee-uu-denuncian-que-sus-agentes-de-inmigracion-no-pueden-verificar-la-legitimidad-de-los-pasaportes-electronicos-que-ingresan-al-pais/86295/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/descubren-un-almacenamiento-en-la-nube-de-tesla-minando-criptomonedas-para-cibercriminales/86292/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/tax-season-phishing/86248/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-infectan-dispositivos-android-para-minar-monero-hasta-fundirlos/86243/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-justicia-estadounidense-acusa-a-13-rusos-de-haber-interferido-en-las-elecciones-presidenciales-de-ee-uu/86065/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/dos-hackers-rusos-son-sentenciados-en-ee-uu-por-haber-robado-mas-de-160-millones-de-datos-de-tarjetas-de-credito/86061/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/abogado-de-inmigraciones-de-ee-uu-admite-que-robo-la-identidad-de-los-inmigrantes-para-cometer-fraude/86062/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-causan-disturbios-en-la-inauguracion-de-las-olimpiadas-de-pyeongchang/86059/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-2017/85992/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-policia-de-belgica-publica-las-llaves-de-descifrado-de-cryakl-con-la-ayuda-de-kaspersky-lab-y-nomoreransom/85994/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-descubre-el-primer-caso-de-un-sistema-de-control-industrial-comprometido-para-minar-monedas-criptograficas/85985/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-policia-de-ee-uu-atrapa-in-fraganti-a-dos-ladrones-de-cajeros-automaticos-disfrazados-de-tecnicos-de-reparacion/85981/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-en-la-extension-grammarly-expone-los-datos-y-actividades-de-sus-22-millones-de-usuarios/85983/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-attacks-in-q4-2017/85956/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/atacantes-explotan-una-vulnerabilidad-de-dia-cero-en-flash-player-para-espiar-a-investigadores-en-corea-del-sur/85971/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/corea-del-sur-se-defiende-de-ciberataques-en-visperas-de-las-olimpiadas-de-invierno/85969/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-en-micros-de-oracle-expone-las-terminales-de-venta-a-ataques-internos/85954/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/aplicacion-para-ponerse-en-forma-expone-las-actividades-que-se-esconden-dentro-de-los-muros-de-fuertes-y-bases-militares/85950/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/espias-de-la-inteligencia-holandesa-rastrearon-y-grabaron-a-los-atacantes-de-cozy-bear-con-sus-propias-camaras-de-vigilancia/85947/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/las-redes-zombi-masuta-y-puremasuta-arman-un-ejercito-compuesto-por-routers-comprometidos/85944/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/denis-and-company/85930/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidades-en-tinder-permiten-a-los-atacantes-merodear-en-las-sesiones-de-sus-usuarios-en-tiempo-real/85926/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-arregla-un-algoritmo-racista-de-google-photos-desterrando-a-los-gorilas/85923/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-programas-que-predicen-la-reincidencia-criminal-en-los-tribunales-no-son-mas-certeros-que-los-presentimientos-de-un-internauta-cualquiera/85921/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/dark-caracal-nueva-operacion-de-ciberespionaje-gubernamental-puede-haber-expuesto-una-nueva-forma-de-vender-el-cibercrimen/85919/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-descubren-como-espiar-las-imagenes-que-transmite-un-dron-sin-romper-su-cifrado/85917/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/lets-encrypt-combate-una-vulnerabilidad-que-permite-a-los-atacantes-validar-sitios-web-que-no-les-pertenecen/85915/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-en-whatsapp-permite-colar-miembros-en-conversaciones-grupales/85912/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/creador-del-malware-fruitfly-arrestado-por-sus-13-anos-de-ciberespionaje/85910/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/meltdown-y-spectre-dos-vulnerabilidades-que-afectan-a-millones-y-ponen-de-cabeza-a-las-empresas-de-procesadores/85906/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/accionistas-presionan-a-apple-para-que-investigue-y-desarrolle-nuevas-herramientas-de-control-parental/85908/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/fallas-de-seguridad-en-la-tienda-forever-21-expone-los-datos-bancarios-sin-cifrar-de-sus-clientes/85902/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/criminales-que-difundian-cerber-y-dharma-irrumpieron-en-los-sistemas-de-control-de-las-camaras-cctv-de-washington/85904/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-gobierno-de-iran-bloquea-el-acceso-a-las-redes-moviles-telegram-e-instagram-para-combatir-levantamientos-sociales/85900/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mailsploit-se-descubren-vulnerabilidades-que-permiten-falsificar-los-encabezados-de-correos-electronicos-2/85898/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-ruso-acusa-al-kremlin-de-haberlo-involucrado-en-el-ataque-al-comite-nacional-democrata-y-otros-ciberataques-prominentes/85896/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-en-goahead-pone-en-peligro-cientos-de-miles-de-dispositivos/85893/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-a-cinco-supuestos-distribuidores-de-ransomware-ctb-locker-y-cerber-en-una-operacion-internacional/85889/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nissan-canada-confirma-que-un-hacker-tuvo-acceso-a-la-informacion-financiera-de-mas-de-1-millon-de-clientes/85888/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-arman-una-red-de-mineria-de-monero-usando-facebook-messenger/85885/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/project-zero-encadena-fallas-para-ataque-apocaliptico-contra-windows-10/85884/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estados-unidos-acusa-de-forma-frontal-y-sin-tapujos-a-corea-del-norte-por-los-ataques-de-wannacry/85880/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-versatil-y-agresivo-troyano-para-android-deforma-fisicamente-el-telefono-de-sus-victimas/85878/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-overall-statistics-2017/85873/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hp-neutraliza-un-keylogger-instalado-de-fabrica-en-500-modelos-de-computadoras/85869/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sentencian-a-prision-a-un-hacker-vietnamita-que-robo-secretos-de-seguridad-de-un-aeropuerto-australiano/85870/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/apple-parcha-una-vulnerabilidad-en-homekit-que-invita-a-los-delincuentes-a-invadir-el-hogar-de-sus-usuarios/85865/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-cierre-abrupto-del-mercado-de-datos-filtrados-leakbase-llena-de-intriga-a-la-comunidad-de-internet/85863/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/teamviewer-publica-parche-de-emergencia-para-error-en-permisos-de-acceso/85861/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mailsploit-se-descubren-vulnerabilidades-que-permiten-falsificar-los-encabezados-de-correos-electronicos/85858/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/intel-repara-fallas-en-procesadores-que-afectan-a-millones-de-computadoras-y-servidores/85855/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-review-of-the-year-2017/85849/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/falla-critica-de-apple-en-el-inicio-de-sesion-expone-el-sistema-macos-high-sierra/85840/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/imgur-confirma-el-robo-de-17-millones-de-credenciales-en-2014/85837/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/pronosticos-de-ataques-ciberneticos-en-america-latina-2018/85816/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-story-of-the-year-2017/85827/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/expertos-en-seguridad-dan-pautas-a-los-consumidores-para-salir-victoriosos-del-campo-minado-de-las-ciberofertas-de-fin-de-ano/85824/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/autoridades-develan-al-posible-responsable-de-las-filtraciones-de-hbo-y-spoilers-de-juego-de-tronos/85822/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/us-cert-advierte-sobre-falla-en-implementacion-de-aslr-en-windows/85820/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/uber-paga-100-000-us-para-encubrir-un-ciberataque-que-expuso-los-datos-de-57m-de-usuarios/85814/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-threat-predictions-for-connected-life-in-2018/85802/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-mascara-burla-la-tecnologia-de-reconocimiento-facial-del-iphone-x-de-apple/85798/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-threat-predictions-for-industrial-security-in-2018/85756/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-threat-predictions-for-connected-health-in-2018/85752/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/boletin-de-seguridad-kaspersky-predicciones-sobre-amenazas-para-el-2018/85748/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-threat-predictions-for-automotive-in-2018/85750/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-threat-predictions-for-cryptocurrencies-in-2018/85758/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksb-threat-predictions-for-financial-services-and-fraud-in-2018/85754/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-fbi-lucha-contra-el-cifrado-que-protege-el-telefono-del-responsable-de-los-tiroteos-de-texas/85778/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cientos-de-millones-de-monedas-ethereum-quedan-congeladas-por-una-vulnerabilidad-en-parity/85776/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q3-2017-statistics/85714/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q3-2017/85686/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/recaptcha-de-google-hackeado-otra-vez/85706/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/extension-maliciosa-de-chrome-roba-datos-en-sitios-web/85705/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-roban-los-datos-de-telecomunicaciones-de-casi-todos-los-habitantes-de-malasia/85707/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-attacks-in-q3-2017/85669/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q3-2017/85626/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-conejo-malo-extorsiona-a-los-internautas-tomando-como-modelo-al-ransomware-notpetya/85664/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-tercer-hacker-acosador-del-fappeningcelebgate-se-declara-culpable-de-haber-robado-archivos-intimos-de-casi-100-mujeres-famosas/85628/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/lenovo-parcha-discretamente-un-error-masivo-que-afectaba-a-sus-tabletas-android-y-sus-telefonos-zuk-y-vibe/85624/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-fbi-lamenta-que-el-cifrado-le-haya-bloqueado-el-acceso-a-mas-de-la-mitad-de-los-dispositivos-que-trato-de-investigar/85622/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/expertos-descubren-una-vulnerabilidad-critica-que-afecta-al-cifrado-rsa-de-una-amplia-gama-de-productos/85620/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/t-mobile-parcha-vulnerabilidad-que-exponia-la-informacion-personal-de-sus-76-millones-de-clientes/85618/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/dangerous-liaisons/85578/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-roban-secretos-militares-australianos-a-un-contratista-que-protegia-los-datos-con-contrasenas-predeterminadas-y-compartidas/85576/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/us-top-law-enforcement-calls-strong-encryption-a-serious-problem/85571/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/emergency-apple-patch-fixes-high-sierra-password-hint-leak/85569/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/2013-yahoo-breach-affected-all-3-billion-accounts/85561/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/threat-landscape-for-industrial-automation-systems-in-h1-2017/85531/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/equifax-says-breach-affects-143-million-americans/85528/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/connected-medicine-and-its-diagnosis/85507/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/us-government-site-removes-link-to-cerber-ransomware-downloader/85522/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-alertan-sobre-graves-fallas-de-seguridad-en-el-programa-que-se-utilizara-para-contar-los-votos-en-las-elecciones-generales-de-alemania/85519/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-adquieren-conocimientos-y-habilidades-para-controlar-las-operaciones-de-plantas-de-energia-en-europa-y-estados-unidos-2/85505/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-adquieren-conocimientos-y-habilidades-para-controlar-las-operaciones-de-plantas-de-energia-en-europa-y-estados-unidos/85503/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-roban-los-datos-de-contacto-de-500-celebridades-de-instagram-y-los-venden-por-10-us/85500/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/expertos-unen-fuerzas-para-encontrar-y-combatir-una-red-zombi-de-androids-contaminados/85497/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/miembros-del-consejo-de-ciberseguridad-del-gobierno-de-ee-uu-renuncia-en-protesta-contra-trump/85494/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-de-hbo-filtran-la-trama-del-final-de-temporada-de-game-of-thrones/85490/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q2-2017/85433/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-de-lulzsec-invaden-paginas-gubernamentales-de-peru/85485/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/servidor-sin-contrasenas-expone-los-datos-de-18-millones-de-votantes-de-illinois/85483/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-paga-10-000-dolares-a-un-estudiante-que-encontro-un-error-en-su-sitio-web/85420/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q2-2017-statistics/85335/</loc>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q2-2017/85309/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/demandan-a-disney-por-monitorear-ninos-mediante-apps/85403/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/secuestran-extension-para-navegadores-copyfish-para-propagar-spam/85305/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/dos-conocidas-camaras-ip-estan-plagadas-de-vulnerabilidades/85302/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberatacantes-toman-el-control-de-una-extension-de-chrome-para-propagar-spam/85297/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-noche-es-oscura-y-alberga-spoilers-hackers-filtran-los-guiones-de-los-proximos-episodios-de-juego-de-tronos/85295/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-attacks-in-q2-2017/85272/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-iranies-se-disfrazan-de-una-fotografa-britanica-para-conseguir-los-secretos-de-empresas-del-medio-oriente/85268/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-de-defcon-rompen-la-proteccion-de-los-aparatos-de-votacion-electronica-en-solo-minutos/85265/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/alex-stamos-abre-blackhat-pidiendo-responsabilidad-social-diversidad-e-inclusion/85261/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-operacion-internacional-tiende-una-trampa-mortal-a-dos-importantes-mercados-negros-virtuales/85258/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-se-convierten-en-maestros-de-escuelas-virtuales-para-hackers/85253/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/apple-construye-un-centro-para-almacenar-los-datos-de-sus-clientes-en-china/85249/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/bithumb-descubre-una-intrusion-que-ha-estado-filtrando-datos-de-sus-usuarios-por-cuatro-meses/85246/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-pueden-leer-las-senales-cerebrales-de-los-jugadores-para-robar-sus-contrasenas/85244/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-ofrece-a-ee-uu-el-codigo-fuente-de-sus-productos-para-demostrar-que-no-tiene-vinculos-con-la-inteligencia-rusa/85242/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/neurocientificos-alertan-sobre-los-peligros-de-los-dispositivos-que-utilizan-ondas-cerebrales-para-leer-la-mente/85238/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/tp-link-corrige-una-vulnerabilidad-que-permitia-ejecutar-codigo-en-los-routers-antiguos/85235/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/internet-enabled-drill-demonstrates-iot-security-done-right/85232/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/honda-suspendio-temporalmente-produccion-debido-al-malware-cifrador-wannacry/85228/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-en-un-router-de-virgin-media-permite-a-cualquiera-controlar-los-dispositivos-domesticos-de-sus-victimas/85226/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksn-report-ransomware-in-2016-2017/85207/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-atacante-burla-el-sistema-de-pagos-freedompay-para-robar-mas-de-3-000-us-en-dulces-de-una-maquina-expendedora-de-la-cia/85204/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-eu-propone-una-ley-para-reforzar-el-cifrado-de-las-telecomunicaciones-y-prohibir-el-ciberespionaje-gubernamental/85198/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/samsung-pierde-un-dominio-y-deja-a-sus-usuarios-a-merced-de-los-cibercriminales/85192/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cientificos-apresuran-el-desarrollo-de-redes-de-cifrado-cuantico-con-base-en-satelites/85189/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-rusos-atacaron-39-sistemas-electorales-de-ee-uu-antes-de-las-elecciones-presidenciales-2/85186/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/honeypots-and-the-internet-of-things/85165/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-rusos-atacaron-39-sistemas-electorales-de-ee-uu-antes-de-las-elecciones-presidenciales/85162/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/two-tickets-trap/85138/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-alteran-una-pantalla-publicitaria-para-pasar-pornografia-en-las-calles-de-buenos-aires/85135/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-al-administrador-de-contrasenas-onelogin-expone-las-claves-de-los-usuarios/85130/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-publican-25-000-fotografias-de-pacientes-de-cirugia-estetica/85126/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/android-actualiza-su-seguridad-con-google-play-project/85120/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/parches-pendientes-para-equipos-medicos-atacados-por-wannacry/85115/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-primer-robocop-ya-patrulla-las-calles-de-dubai/85112/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/wannacry-mistakes-that-can-help-you-restore-files-after-infection/85073/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/what-interests-children-online/85088/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-rusos-alteran-informacion-filtrada-para-danar-la-reputacion-de-sus-victimas/85068/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/despues-del-wannacry-en-latinoamerica/85056/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-amenazan-con-filtrar-la-pelicula-piratas-del-caribe-si-no-reciben-un-pago-de-disney/85053/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q1-2017/85002/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q1-2017-statistics/85017/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/criminales-roban-los-codigos-fuente-de-los-productos-de-un-desarrollador-de-apps-con-el-viejo-truco-de-la-actualizacion-fraudulenta/85023/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/orden-ejecutiva-de-trump-actualiza-y-estandariza-el-estado-de-la-ciberseguridad-de-las-agencias-gubernamentales-de-ee-uu/85020/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-de-ransomware-causa-estragos-en-74-paises-con-herramientas-robadas-a-la-nsa/84997/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-parcha-el-peor-codigo-de-ejecucion-remota-de-windows-en-su-motor-de-seguridad/84992/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidades-de-seguridad-podrian-hacer-que-se-pierda-el-control-un-brazo-robotico-de-100-kg/84989/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sentencian-a-8-anos-de-prision-a-un-cibercriminal-que-publicaba-tutoriales-de-seguridad-informatica-para-terroristas/84986/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-nuevo-presidente-de-francia-responde-a-las-filtraciones-y-ciber-sabotaje-que-sufrio-dias-antes-de-su-eleccion/84983/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-nueva-estratagema-de-los-spammers-una-botnet-como-centro-de-administracion/84980/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-attacks-in-q1-2017/84964/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/israel-acusa-a-hackers-iranies-de-haber-utilizado-un-programa-invisible-para-atacar-sus-agencias-e-instituciones/84960/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-linterna-en-google-play-llevaba-en-si-un-programa-malicioso/84957/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q1-2017/84922/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-puerta-trasera-en-un-dispositivo-de-mineria-de-bitmains-deja-que-cualquiera-pueda-detener-la-produccion-de-forma-remota/84916/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/detectan-un-nuevo-malware-raas/84913/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/bankbot-sigue-causando-problemas/84910/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/compania-de-seguridad-exponia-los-datos-de-un-hospital-sin-autorizacion-para-promocionarse/84906/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-filtran-17-millones-de-credenciales-de-snapchat-porque-su-fundador-llamo-pais-pobre-a-india/84902/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-malware-extorsionista-matrix-se-propaga-a-traves-de-accesos-directos-maliciosos/84898/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/reclusos-construyen-computadoras-en-secreto-y-las-usan-para-aprender-a-fabricar-explosivos/84893/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nuevo-malware-hace-que-los-dispositivos-del-internet-de-las-cosas-se-conviertan-en-inutiles-ladrillos/84890/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-ataque-ddos-pudo-haber-inhabilitado-el-sitio-para-registrarse-a-la-votacion-de-brexit/84887/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/wonga-no-pide-cambiar-las-contrasenas-despues-de-un-ciberataque-que-puso-en-riesgo-a-270-000-clientes/84884/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-troyano-rat-creado-por-fans-de-tom-y-jerry/84881/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/develan-el-funcionamiento-de-un-programa-fantasma-que-ayudo-a-vaciar-8-cajeros-en-una-noche/84875/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-roban-la-informacion-medica-de-reconocidos-atletas-internacionales/84872/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nueva-ola-de-spam-enviada-por-cerber/84869/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-nuevo-virus-ataca-a-windows-y-macos/84866/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/locky-y-serber-perfeccionan-sus-tecnicas-de-camuflaje/84863/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/pornhub-adopta-el-cifrado-https-un-dia-despues-de-que-el-congreso-de-eeuu-permitiera-a-los-servidores-vender-los-datos-de-los-internautas/84859/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-errores-de-la-medicina-inteligente/84832/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-play-sigue-borrando-adware/84854/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nace-una-nueva-compania-para-conectar-computadoras-al-cerebro-humano/84852/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/botnet-necurs-se-reactiva-y-modifica-su-estrategia/84850/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/apple-lanza-ios-10-3-para-combatir-el-chantaje-virtual-y-reforzar-el-cifrado/84827/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-ruso-juzgado-en-ee-uu-se-declara-culpable-de-haber-creado-y-distribuido-el-troyano-citadel/84823/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-guia-de-seguridad-informatica-para-a-victimas-de-violencia-domestica-reformula-los-ejes-de-la-lucha-por-la-privacidad/84821/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-extorsionan-a-apple-con-atacar-600-millones-de-cuentas-de-icloud/84815/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-cost-of-launching-a-ddos-attack/84768/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-vulnerabilidad-en-whatsapp-y-telegram-web-podria-exponer-los-mensajes-de-millones-de-usuarios/84809/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-pone-freno-a-chamois-un-malware-publicitario-para-android/84804/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-auteur-de-virus-vexe-attaque-un-site-cree-par-des-chercheurs-en-securite-de-linformation/84800/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/escritor-de-virus-se-ofende-con-investigadores-de-seguridad-informatica-y-les-lanza-un-ataque-ddos/84797/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-a-una-asociacion-de-agentes-de-viaje-expone-los-datos-de-mas-de-43-000-viajeros/84793/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-puso-a-prueba-programas-para-revisar-las-redes-sociales-de-los-inmigrantes-que-pedian-visas-para-su-pais/84790/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-elimina-13-aplicaciones-fraudulentas-para-instagram-de-su-tienda-para-android/84787/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigador-descubre-200-000-camaras-web-servidas-en-bandeja-de-plata-para-construir-una-red-zombi/84765/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/wikileaks-expone-operaciones-de-ciberespionaje-domestico-de-la-cia/84761/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-agregan-extorsiones-a-los-ataques-contra-los-militantes-de-partidos-liberales-de-ee-uu/84758/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/from-shamoon-to-stonedrill/84737/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-botnet-necurs-aprendio-trucos-ddos/84742/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-vulnerabilidad-de-inyeccion-sql-pone-en-riesgo-a-un-millon-de-sitios-de-wordpress/84734/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/financial-cyberthreats-in-2016/84719/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/lideres-de-francia-y-alemania-llevan-a-la-ue-la-lucha-por-agregar-puertas-traseras-a-sistemas-de-cifrado/84728/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mobile-malware-evolution-2016/84689/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cloudbleed-le-quita-la-antorcha-a-heartbleed-una-vulnerabilidad-en-cloudflare-filtra-datos-privados-de-millones-de-sitios/84709/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/34-meses-de-prision-para-un-hacker-vengativo-que-causo-perdidas-millonarias-a-la-empresa-que-lo-despidio/84706/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-campana-de-insercion-tecnologica-pone-en-circulacion-una-controvertida-encuesta-para-detectar-a-ninos-cibercriminales/84685/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-spam-and-phishing-in-2016/84615/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nuevo-ataque-a-yahoo-irrumpe-en-las-cuentas-sin-necesidad-de-contrasenas/84679/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sql-slammer-ha-vuelto/84668/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spora-un-extorsionista-orientado-hacia-los-clientes/84658/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-de-nintendo-ensena-a-instalar-700-juegos-en-nes-classic/84612/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/malware-para-mac-ataca-a-sus-victimas-con-macros-de-word/84608/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/grandes-de-la-tecnologia-se-alian-para-investigar-y-proteger-el-internet-de-las-cosas/84605/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-universidad-estadounidense-abre-un-programa-de-leyes-de-ciberseguridad/84600/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ddos-attacks-in-q4-2016/84586/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/400-000-llamadas-filtradas-de-una-compania-de-mercadeo-exponen-los-datos-financieros-de-sus-clientes/84582/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/esporas-maliciosas-se-expanden-por-el-mundo/84579/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/eliminan-de-google-play-el-malware-extorsionista-charger/84576/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/las-amenazas-sin-fundamento-tambien-traen-ganancias-a-los-extorsionistas-ciberneticos/84573/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-policia-de-una-ciudad-de-texas-pierde-8-anos-de-evidencia-por-un-ataque-de-ransomware/84570/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-descubre-un-nuevo-programa-malicioso-distribuyendose-en-20-aplicaciones-de-google-play/84567/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-resurreccion-de-lavabit-el-servidor-que-se-sacrifico-por-la-privacidad-de-sus-usuarios/84563/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/expensive-free-apps/84533/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-perturban-la-copa-africana-de-naciones-en-protesta-contra-el-dictador-de-gabon/84554/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-infanteria-naval-de-ee-uu-quiere-reclutar-3-000-guerreros-virtuales/84549/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/obama-libera-a-chelsea-manning-de-su-sentencia-de-35-anos-por-exponer-al-ejercito-en-wikileaks/84529/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/operacion-contra-un-sitio-de-pornografia-infantil-arresta-a-3-administradores-200-miembros-y-libera-a-49-menores/84524/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-malware-extorsionador-killdisk-ahora-apunta-a-linux/84521/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/firecrypt-un-malware-extorsionista-con-funciones-de-ddos/84518/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberchantajistas-convencen-a-un-instituto-de-los-angeles-para-que-les-paguen-un-rescate-de-28-000-us/84515/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/killdisk-un-componente-de-blackenergy-adquiere-caracteristicas-de-ransomware/84511/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminal-demanda-a-verizon-por-facilitar-sus-delitos-con-su-negligencia/84508/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-irrumpen-en-una-planta-de-energia-con-el-mismo-codigo-que-se-utilizo-en-los-ataques-contra-hillary-clinton/84505/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-utilizan-whatsapp-para-distribuir-programas-maliciosos/84502/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-trio-de-hackers-son-acusados-de-robar-informacion-para-cometer-fraude-de-acciones/84497/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-exponen-la-alarmante-desproteccion-de-los-datos-de-los-viajeros-de-todo-el-mundo/84494/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nueve-hackers-tailandeses-arrestados-por-lanzar-ciberataques-contra-la-vigilancia-y-censura-de-internet/84491/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-se-prepara-para-desarrollar-tecnologias-de-cifrado-resistentes-a-computadoras-cuanticas/84487/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/atacantes-podrian-tomar-el-control-de-una-aeronave-usando-el-sistema-de-entretenimiento-de-la-cabina-de-pasajeros/84483/</loc>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-malware-multinivel-loki-se-arraiga-en-android/84480/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/programa-extorsionista-ofrece-llave-de-descifrado-a-cambio-de-propagar-infeccion/84474/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-de-plantas-de-energia-podrian-estar-detras-de-una-oleada-de-ataques-a-bancos-ucranianos/84471/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/yahoo-un-nuevo-ataque-informatico-expone-mil-millones-de-cuentas/84468/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nuevos-trucos-de-cerber-proxy-tor2web-y-redirecciones-google/84464/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/28-modelos-de-smartphones-se-distribuyen-con-firmware-infectado/84460/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-botnet-kelihos-propaga-el-troyano-troldesh/84457/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-malware-para-android-va-cargando-modulos-sobre-la-marcha/84453/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2016-executive-summary/84412/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/84429/84429/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2016-story-of-the-year/84382/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-cibernetico-en-el-metro-de-san-francisco-paraliza-2100-sistemas/84405/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-malware-cerber-5-0-aparece-en-el-mundo-real/84402/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-se-vuelven-millonarios-robando-monedas-del-juego-fifa/84378/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/intrusos-filtran-los-datos-de-400-millones-de-miembros-de-adultfriendfinder-y-penthouse/84375/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/pronosticos-de-ataques-ciberneticos-en-america-latina-2017/84363/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-predictions-for-2017/84341/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ibm-comenta-las-novedades-introducidas-en-trickbot/84338/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-espia-android-comercial-ataca-a-ejecutivos-de-empresas-y-corporaciones/84335/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-hacker-arremete-contra-la-campana-de-clinton-sin-saber-que-tambien-atacaba-a-trump/84332/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-triunfo-de-trump-podria-reavivar-las-luchas-en-torno-a-la-privacidad-el-cifrado-y-el-espionaje-gubernamental/84329/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q3-2016/84261/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vuela-pero-sin-caer-en-las-trampas-de-hoax-en-el-whatsapp/84316/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-prepara-el-campo-de-batalla-para-los-posibles-ciberataques-del-dia-de-las-elecciones/84258/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-centro-de-ciberseguridad-de-eeuu-ofrece-una-guia-para-proteger-los-correos-electronicos/84255/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-first-cryptor-to-exploit-telegram/84246/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/disassembling-a-mobile-trojan-attack/84063/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-publica-una-vulnerabilidad-de-microsoft-10-dias-despues-de-haberse-dado-a-conocer/84234/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q3-2016-statistics/84164/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q3-2016/84162/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-ataque-ddos-que-desactivo-twitter-fue-causado-por-100-000-dispositivos-iot-de-la-red-zombi-mirai/84158/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-ddos-intelligence-report-for-q3-2016/84143/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-los-jovenes-caen-mas-seguido-en-estafas-informaticas-que-los-abuelos/84138/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/level-3-la-poblacion-de-mirai-se-duplica-despues-de-la-publicacion-de-su-codigo-fuente/84135/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hajime-el-gusano-para-el-internet-de-las-cosas-supera-a-su-predecesor/84131/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/disparo-a-quemarropa/84120/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sierra-los-bots-de-mirai-atacan-dispositivos-de-telefonia-movil/84115/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/clonadores-de-tarjetas-atacan-a-los-seguidores-de-trump/84111/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/videos-adultos-para-los-usuarios-de-facebook/84102/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-comprometen-6-000-tiendas-virtuales-para-robar-las-tarjetas-de-credito-de-sus-clientes/84100/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberespias-invaden-el-buro-de-meteorologia-de-australia/84097/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/five-myths-about-machine-learning-in-cybersecurity/84088/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mientras-rig-se-perfecciona-neutrino-hace-mutis-por-el-foro/84086/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-codicioso-greedy-elimina-procesos/84083/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spammers-aprovechan-los-destrozos-del-huracan-matthews-para-atrapar-internautas/84077/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-acusa-a-yahoo-de-ayudar-al-gobierno-de-ee-uu-a-recolectar-los-mensajes-de-sus-usuarios/84060/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-cifrado-de-mensajes-ya-esta-disponible-en-messenger-de-facebook/84054/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-devela-el-codigo-fuente-de-mirai-la-red-zombi-compuesta-por-routers-y-camaras/84051/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/teamxrat-brazilian-cybercrime-meets-ransomware/84027/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-extorsionistas-caen-aun-mas-bajo-el-nuevo-truco-de-stampado/84024/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hddcryptor-reemplaza-el-mbr-y-cifra-el-disco-duro/84021/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/yahoo-afronta-repercusiones-por-el-ciberataque-que-comprometio-500-millones-de-sus-cuentas/84013/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-malware-neverquest-experimento-una-gran-renovacion-este-verano/84007/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-distribuyen-memorias-usb-infectadas-con-malware-en-un-barrio-de-australia/84004/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-troyano-dualtoy-para-windows-infecta-dispositivos-android-e-ios/84001/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/future-attack-scenarios-against-atm-authentication-systems/83975/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cz-nic-constata-intensificacion-de-ataques-de-fuerza-bruta-contra-telnet/83989/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/volkswagen-arma-un-frente-de-defensa-informatica-para-automoviles-inteligentes/83979/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-banker-that-can-steal-anything/83964/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/facebook-ha-borrado-tu-foto-o-no/83955/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-programa-chantajista-cry-se-distribuye-con-udp-imgur-y-google-maps/83961/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-rusos-filtran-la-informacion-de-la-agencia-mundial-anti-dopaje-sobre-simone-biles-y-selena-williams/83950/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-missing-piece-sophisticated-os-x-backdoor-discovered/83908/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciertos-ejemplares-de-redis-dejan-pasar-ataques-contra-servidores-linux/83943/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/fooling-the-smart-city/83886/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/malware-que-extrae-monedas-criptograficas-se-instala-en-seagate-central/83905/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/gugi-from-an-sms-trojan-to-a-mobile-banking-trojan/83875/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-neutraliza-campana-de-publicidad-nociva-relacionada-con-neutrino/83883/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-de-azerbaiyan-filtran-documentos-de-seguridad-y-pasaportes-de-los-visitantes-de-armenia/83870/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/banking-trojan-gugi-evolves-to-bypass-android-6-protection/83840/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-duenos-de-la-botnet-kelihos-aumentan-su-potencia/83856/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-familia-bashlite-infecta-1-millon-de-camaras-y-dispositivos-digitales/83862/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/virus-fairware-ataca-a-servidores-linux/83859/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-descubren-68-millones-de-contrasenas-filtradas-de-dropbox/83852/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/juniper-admite-que-el-grupo-equation-ataco-a-screenos/83837/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/how-trojans-manipulate-google-play/83785/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/a-la-caza-de-lurk/83812/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackean-los-foros-de-epic-games-se-apunta-a-vulnerabilidad-de-inyeccion-sql/83815/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/operacion-colaborativa-detiene-una-campana-del-programa-chantajista-wildfire/83808/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-utilizan-modelos-de-realidad-virtual-para-derrotar-a-los-sistemas-de-reconocimiento-facial/83805/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/troyano-bancario-vawtrak-se-fortalece-con-dga-y-pinning-ssl/83779/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-subastan-las-armas-virtuales-de-los-ciberespias-de-equation-group/83776/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-operacion-ghoul-asedia-a-industrias-en-30-paises-en-busca-de-sus-datos/83770/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/trojans-bancarios-brasileiros-encontram-o-powershell/83754/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q2-2016/83721/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-descubren-como-robar-datos-usando-el-sonido-de-los-discos-duros/83750/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-convierten-perfiles-legitimos-de-instagram-en-cuentas-de-spam-pornografico/83716/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/apple-presenta-su-nuevo-programa-de-recompensas-de-hasta-200-000-us/83708/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-in-q2-2016-overview/83661/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-in-q2-2016-statistics/83674/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-toman-el-control-de-cuentas-iranies-de-telegram/83645/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-insultos-de-un-equipo-de-cibercriminales-generan-caos-en-dos-aeropuertos-de-vietnam/83641/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-ddos-intelligence-report-for-q2-2016/83619/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-rivales-filtran-las-llaves-para-descifrar-los-sistemas-secuestrados-por-el-ransomware-chimera/83636/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/no-more-ransom-un-nuevo-sitio-web-ofrece-herramientas-de-lucha-contra-el-ransomware/83633/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-botnet-soaksoak-esta-involucrada-en-el-esquema-neutrino-cryptxxx/83616/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/las-olimpiadas-de-rio-aumentan-la-adrenalina-de-los-cibercriminales/83606/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataques-de-smishing-afetam-usuarios-de-mobile-banking-no-brasil/83594/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/damballa-furtim-y-sfg-son-el-mismo-malware/83591/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/windows-10-whats-new-in-the-security-system/83548/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/surge-un-troyano-que-extorsiona-a-los-usuarios-para-que-revelen-secretos-corporativos/83578/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/aplicacion-maliciosa-para-pokemon-go-abre-puerta-trasera-en-android/83584/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/gootkit-nuevas-medidas-de-camuflaje-y-persistencia/83581/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-maestros-de-pokemon-go-podrian-convertirse-en-presas-de-los-cibercriminales/83545/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/computadoras-mac-atacadas-por-un-backdoor-manejado-desde-tor/83538/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/adwind-regresa-y-ataca-a-los-empresarios-daneses/83535/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/empresa-china-usa-adware-para-obtener-ganancias-adicionales/83533/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-interpol-desmiembra-una-banda-de-clonadores-de-tarjetas-de-credito/83528/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/industrial-cybersecurity-threat-landscape/83507/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/programas-maliciosos-para-facebook-etiquetame-si-puedes/83480/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/whatsapp-gold-no-todo-lo-que-brilla-es-oro/83465/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-filtran-medio-millon-de-mensajes-de-un-sitio-de-citas-para-musulmanes/83462/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/necurs-botnet-esta-de-vuelta-con-un-locky-actualizado/83459/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cryptxxx-mejora-sus-sistemas-de-cifrado-y-proteccion/83455/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/aplicacion-en-google-play-desbloquea-telefonos-e-instala-14-aplicaciones-en-media-hora/83452/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ksn-report-mobile-ransomware-in-2014-2016/83441/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nace-ourmine-un-nuevo-grupo-de-hackers-que-ataca-a-famosos-para-ganar-dinero/83438/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/pc-ransomware-in-2014-2016/83415/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-hacker-de-anonymous-se-aduena-de-las-cuentas-del-estado-islamico-para-publicar-propaganda-lgbt/83428/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vawtrak-es-ahora-un-constructor-y-ha-fortalecido-su-proteccion/83422/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/raa-un-extorsionista-escrito-totalmente-en-javascript/83419/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/las-utilidades-de-descifrado-ahora-funcionan-contra-todas-la-variantes-de-teslacrypt/83411/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-ataca-a-los-democratas-y-filtra-200-paginas-de-investigacion-sobre-trump/83407/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/recomendaciones-para-evitar-que-los-cibercriminales-reciban-tus-donaciones-para-las-victimas-de-orlando/83404/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/xdedic-the-shady-world-of-hacked-servers-for-sale/83389/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threats-during-the-2016-olympic-games-in-brazil/83367/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/lurk-banker-trojan-exclusively-for-russia/83354/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-vulnerabilidad-en-messenger-de-facebook-permite-a-los-atacantes-cambiar-el-contenido-de-las-conversaciones-privadas/83351/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ameacas-ciberneticas-aos-jogos-olimpicos-rio-2016/83327/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-irrumpen-en-las-cuentas-de-mark-zuckerberg/83324/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/everyone-sees-not-what-they-want-to-see/83310/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-etico-chileno-advierte-de-brechas-en-7-sitios-del-gobierno-boliviano/83317/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-toman-el-control-de-la-cuenta-mas-popular-de-twitter-para-llegar-a-sus-89-millones-de-seguidores/83308/</loc>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-hacker-de-linkedin-pone-a-la-venta-427-millones-de-contrasenas-robadas-de-myspace/83305/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/small-users-in-a-big-network/83266/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/dma-locker-ya-es-mayor-de-edad/83301/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-desarrolladores-de-tor-ponen-a-prueba-un-nuevo-proyecto-de-cifrado-en-la-hackfest-de-montreal/83298/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/revelan-los-detalles-del-ataque-de-turla-en-suiza/83288/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/clonadores-de-tarjetas-robaron-127-millones-de-dolares-en-3-horas/83263/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-flash-de-dia-cero-ya-se-propaga-en-los-paquetes-de-exploits/83260/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-concentran-sus-ataques-en-los-candidatos-presidenciales-de-ee-uu/83248/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-ddos-contra-proveedor-de-dns-afecto-a-varias-regiones/83245/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-hacker-vende-la-informacion-robada-de-167-millones-de-usuarios-de-linkedin/83242/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-expone-las-identidades-de-536-000-miembros-de-un-foro-cibercriminal/83237/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-bot-con-casi-un-millon-de-victimas-suplanta-resultados-de-busquedas/83234/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-ransomware-cerber-toma-impulso-con-botnets-dridex/83231/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-programa-chantajista-petya-ahora-viene-con-un-jugador-suplente-mischa/83226/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/atm-infector/83182/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-rio-olympics-scammers-already-competing/83163/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-ucranianos-ponen-en-peligro-a-miles-de-periodistas-al-exponer-su-informacion/83217/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/usuarios-da-netflix-na-mira-dos-cibercrimosos-brasileiros/83193/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/adobe-y-microsoft-publican-parches-para-combatir-vulnerabilidades-peligrosas/83177/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/pornhub-abre-un-programa-de-recompensas-para-sus-fanaticos-amantes-de-la-tecnologia/83160/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q1-2016/83115/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-fbi-admite-que-pago-un-millon-para-acceder-al-telefono-que-apple-no-quiso-desbloquear/83153/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-in-q1-2016/83079/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-ddos-intelligence-report-for-q1-2016/83049/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/malware-and-non-malware-ways-for-atm-jackpotting-extended-cut/83039/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spammers-all-geared-up-for-euro-2016/83022/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/criminales-alteran-los-cables-y-teclados-de-los-cajeros-automaticos-para-robar-a-sus-usuarios/83036/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/how-to-trick-traffic-sensors/83002/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-descubre-el-codigo-para-descifrar-los-equipos-secuestrados-por-el-troyano-chantajista-petya/83028/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/whatsapp-introduce-un-cifrado-de-punta-a-punta-para-defender-la-privacidad-de-sus-clientes/82998/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/locky-the-encryptor-taking-the-world-by-storm/82963/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estados-unidos-convoca-a-hackers-para-el-primer-programa-de-recompensas-del-pentagono/82984/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-evolution-of-brazilian-malware/82896/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-hacker-admite-haber-robado-fotos-intimas-de-actrices-de-hollywood/82960/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/png-embedded-malicious-payload-hidden-in-a-png-file/82875/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hospitals-are-under-attack-in-2016/82864/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-hace-un-llamado-a-las-armas-contra-donald-trump/82871/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-lider-de-ghostshell-team-trata-de-limpiar-su-nombre-develando-su-identidad/82859/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/all-your-creds-are-belong-to-us/82794/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-programa-malicioso-se-hospeda-en-la-cadena-de-hoteles-rosen-rhr-durante-17-meses/82845/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ctb-locker-is-back-the-web-server-edition/82821/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/primer-programa-chantajista-para-mac-se-propaga-en-un-instalador-de-bittorrent/82805/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/amazon-used-as-bait/82786/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/first-step-in-cross-platform-trojan-bankers-from-brazil-done/82763/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-proyecto-tor-y-la-universidad-de-princeton-preparan-municiones-contra-los-ataques-sybil/82778/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/attack-on-zygote-a-new-twist-in-the-evolution-of-mobile-threats/82731/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-return-of-hackingteam-with-new-implants-for-os-x/82741/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/aplicativo-malicioso-de-recarga-de-celular-clona-cartoes-de-credito/82714/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/operation-blockbuster-revealed/82697/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-congreso-de-ee-uu-promete-crear-una-comision-para-solucionar-conflictos-de-cifrado/82694/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-distribuye-copias-maliciosas-de-linux-mint-desde-el-sitio-oficial/82691/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mobile-malware-evolution-2015/82669/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-evolution-of-acecard/82623/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-documental-incluye-a-stuxnet-en-una-operacion-de-ataque-de-gran-envergadura/82655/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/troyano-chantajista-secuestra-los-sistemas-de-un-centro-medico-de-hollywood/82651/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/asi-roban-en-los-cajeros-automaticos-los-cibercriminales/82648/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-expone-la-informacion-personal-de-20-000-agentes-del-fbi/82620/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/samsung-patenta-un-sistema-de-autentificacion-basado-en-la-estructura-de-las-venas-de-sus-usuarios/82614/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-alteran-al-troyano-dridex-para-que-distribuya-un-programa-antivirus/82611/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/from-linux-to-windows-new-family-of-cross-platform-desktop-backdoors-discovered/82589/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-spam-and-phishing-in-2015/82540/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-fbi-usa-un-sitio-de-pornografia-infantil-como-carnada-para-atrapar-criminales-2/82534/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-fbi-usa-un-sitio-de-pornografia-infantil-como-carnada-para-atrapar-criminales/82531/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-ddos-intelligence-report-for-q4-2015/82509/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/starwars-debuta-entre-las-contrasenas-mas-comunes-de-2015/82526/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/fabricante-de-partes-de-aviones-pierde-54-millones-de-dolares-por-problemas-de-ciberseguridad/82522/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-protege-a-sus-usuarios-de-una-vulnerabilidad-0-day-en-el-kernel-de-linux/82506/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estados-unidos-desarrolla-una-guia-para-proteger-los-dispositivos-medicos-de-ciberamenazas/82499/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-troyano-asacub-de-espia-a-ladron-de-bancos/82483/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/troyano-para-android-pone-en-jaque-la-autentificacion-de-dos-factores-por-mensajes-de-voz/82492/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/programas-maliciosos-en-los-smart-tvs/82467/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-atacan-los-sitios-de-nissan-para-protestar-por-la-caza-de-delfines/82464/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/implantes-moviles-en-la-era-de-los-ataques-selectivos/82437/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-entorpece-300-sitios-tailandeses-para-defender-a-dos-sentenciados-a-muerte/82460/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-vulnerabilidad-en-trend-micro-podria-exponer-las-contrasenas-de-sus-usuarios/82424/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-alertan-sobre-vulnerabilidades-que-podrian-hacer-descarrilar-trenes/82415/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ucrania-culpa-a-hackers-rusos-de-haber-cortado-la-energia-en-su-territorio/82411/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/agente-encubierto-arresta-a-un-cibercriminal-que-intento-filtrar-el-guion-de-una-serie/82422/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/miembros-de-ashley-madison-reciben-extorsiones-por-correo-postal/82398/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-se-enfrenta-a-trump-en-defensa-de-los-musulmanes-y-en-contra-del-estado-islamico/82419/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2015-estadistica-principal-de-2015/82311/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-descubre-una-operacion-de-ciberespionaje-de-7-anos-en-latinoamerica/82335/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/juez-sentencia-a-6-anos-de-prision-a-un-agente-que-robo-a-los-cibercriminales-de-silk-road/82331/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2015-evolution-of-cyber-threats-in-the-corporate-sector/82277/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-rebeldia-ante-la-autoridad-ubica-a-los-hackers-argentinos-entre-los-mas-codiciados-del-mundo/82298/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-cuentos-arabes-de-los-nigerianos/82230/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/china-arresta-a-sospechosos-de-haber-expuesto-a-22-millones-de-trabajadores-del-gobierno-de-eeuu/82272/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-20152016-die-top-security-stories/82250/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-nueva-ley-limita-el-espionaje-telefonico-de-la-nsa-hacia-sus-ciudadanos/82265/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-vulnerabilidad-en-la-primera-barbie-interactiva-puede-convertirla-en-una-herramienta-de-ciberespionaje/82247/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/autoridades-arrestan-a-los-responsables-de-un-sitio-de-ofuscacion-de-malware/82244/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-irrumpen-en-la-cadena-de-hoteles-de-lujo-starwood/82227/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-pide-ayuda-para-combatir-la-presencia-virtual-del-estado-islamico/82224/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/pronosticos-de-ataques-ciberneticos-en-america-latina-el-2016/82197/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataques-de-paris-reviven-los-debates-sobre-el-cifrado-de-telecomunicaciones-y-su-relacion-con-la-seguridad-nacional/82219/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/russian-financial-cybercrime-how-it-works/82165/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2016-predictions/82158/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/amazon-distribuye-tabletas-que-vienen-infectadas-de-fabrica/82170/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/beaches-carnivals-and-cybercrime-a-look-inside-the-brazilian-underground/82063/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-desenmascara-a-miembros-del-ku-klux-klan/82155/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-de-seguridad-secuestran-el-servidor-cc-de-cibercriminales-iranies/82152/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q3-2015/82120/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/disbanding-the-zoo/82042/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/protonmail-paga-para-detener-a-sus-ciberatacantes-y-recibe-una-segunda-oleada-de-agresiones/82054/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/programa-chantajista-amenaza-con-exponer-los-archivos-de-sus-victimas/82039/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/surviving-in-an-iot-enabled-world/81963/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-en-bloqueador-de-adblocker-expone-a-los-visitantes-de-500-sitios-a-ataques-de-malware/81987/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-ddos-intelligence-report-q3-2015/81942/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-in-q3-2015/81917/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-amenaza-con-revelar-las-identidades-de-miembros-del-ku-klux-klan/81954/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/expertos-alertan-sobre-una-red-zombi-compuesta-por-camaras-de-seguridad/81912/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/wikileaks-filtra-correos-privados-del-director-de-la-cia/81910/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ea-niega-ser-el-origen-de-las-credenciales-filtradas-de-sus-clientes/81907/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-burlan-a-siri-y-google-now-con-ondas-de-radio-para-controlar-moviles-ajenos/81904/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/como-mitigar-el-85-de-las-amenazas-con-solo-cuatro-estrategias/81899/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/autoridades-dan-un-golpe-mortal-a-la-red-zombi-dridex/81541/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-roban-informacion-de-los-clientes-de-las-tiendas-americas-thrift-stores/81538/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/china-arresta-a-cinco-cibercriminales-para-ayudar-a-las-autoridades-de-estados-unidos/81535/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-informe-desvela-las-debilidades-en-la-ciberseguridad-de-las-centrales-nucleares/81432/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-cibercriminal-voyerista-evade-la-pena-de-prision/81430/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cisco-pega-un-golpe-critico-al-paquete-de-exploits-angler/81373/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-a-scottrade-expone-la-informacion-personal-de-46-millones-de-personas/81312/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-a-experian-pone-en-peligro-los-datos-de-15-millones-de-usuarios-de-t-mobile/81206/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-intentaron-atacar-a-hillary-clinton-usando-correos-fraudulentos/81203/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-imitan-a-morgan-freeman-para-burlar-los-sistemas-de-autentificacion-de-voz/81189/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/can-an-inevitable-evil-be-conquered/81185/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/lenovo-en-el-ojo-del-huracan-por-pre-instalar-un-programa-sospechoso-en-sus-productos/81182/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/china-y-estados-unidos-llegan-a-un-historico-acuerdo-contra-el-ciberespionaje-economico/81138/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-de-seguridad-utilizan-siri-para-burlar-el-bloqueo-de-seguridad-de-iphones/81135/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-roban-la-informacion-de-las-huellas-digitales-de-45-millones-de-empleados-del-gobierno-de-ee-uu/81132/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/aplicaciones-infectadas-se-infiltran-en-la-app-store-de-apple/81034/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/coinvault-are-we-reaching-the-end-of-the-nightmare/81016/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/jugadores-tramposos-de-poquer-utilizan-spyware-para-espiar-a-sus-contrincantes/80990/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-primer-certificado-de-autentificacion-gratuito-hace-su-debut-en-la-red/80987/</loc>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-dark-web-aumenta-su-seguridad-al-ser-reconocida-como-dominio-de-uso-especial/80555/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-malware-cifrador-shade-una-amenaza-doble/81547/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-en-whatsapp-web-pone-en-riesgo-a-sus-usuarios/80984/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/satellite-turla-apt-command-and-control-in-the-sky/74858/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-buscan-victimas-entre-los-solteros-de-match-com/80981/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/uber-contrata-a-los-hackers-de-fiat-chrystler-para-que-le-ayuden-a-desarrollar-conductores-automaticos/80978/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-rey-del-spam-se-declara-culpable-de-haber-invadido-facebook/81210/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-atacan-un-refrigerador-inteligente-para-robar-credenciales-de-gmail/74853/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/youre-paying-for-your-starbucks-one-way-or-the-other/74702/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/a-phishing-trampoline-embedding-redirects-in-pdf-documents/74682/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/impact-team-compromete-a-los-ejecutivos-de-ashley-madison-con-una-segunda-filtracion/74677/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-publican-la-informacion-de-los-33-millones-de-miembros-de-ashley-madison/74668/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/indicators-of-compromise-as-a-way-to-reduce-risk/76578/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/what-is-a-secure-os/76598/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-and-phishing-in-q2-of-2015/76602/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estafadores-virtuales-roban-467-millones-de-dolares-a-ubiquiti-networks/81214/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/darkhotels-attacks-in-2015/76585/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mozilla-parcha-una-vulnerabilidad-de-firefox-que-se-estaba-explotando-en-la-red/81544/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-rush-for-windows-10-infects-pcs-with-spy-trojan/81193/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-desarrollan-el-primer-gusano-de-firmware-para-mac/81216/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-ddos-intelligence-report-q2-2015/76601/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-descubren-como-alterar-las-comunicaciones-por-satelite-de-vehiculos-vigilados/81208/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/publicidad-maliciosa-usa-redirectores-ssl/74876/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-logran-desenmascarar-a-los-usuarios-de-tor/76572/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/it-threat-evolution-q2-2015/76600/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/activistas-anti-aborto-amenazan-con-exponer-a-los-funcionarios-de-planned-parenthood/76571/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-de-ashley-madison-publican-datos-que-identifican-a-sus-dos-primeras-vctimas/76570/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-grupo-femenino-de-hackers-le-declara-la-guerra-al-estado-islmico/76569/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/zero-day-exploits-now-available-for-cars/76596/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-researchers-warns-linkedin-from-potential-spear-phishing/76595/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-irrumpen-en-el-sitio-ashley-madison-y-amenazan-con-exponer-a-los-infieles/76568/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-descubren-como-controlar-y-chocar-un-jeep-de-forma-remota/81212/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/develando-a-los-usuarios-de-tor-donde-termina-el-anonimato-en-darknet/76603/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/united-airlines-recompensa-a-un-hacker-con-1-milln-de-millas-de-viaje-por-denunciar-una-vulnerabilidad/76567/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/wild-neutron-economic-espionage-threat-actor-returns-with-new-tricks/76594/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mozilla-expulsa-a-flash-de-su-navegador-hasta-que-se-recupere-de-sus-vulnerabilidades/76566/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/teslacrypt-2-0-disguised-as-cryptowall/76593/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-atacan-a-los-investigadores-espaciales-de-india-para-vender-artculos-deportivos/76565/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-duqu-2-0-persistence-module/76584/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/long-live-recon-my-10th-recon-anniversary/76592/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-atacan-una-compaa-de-ciberespionaje-para-probar-sus-vnculos-con-gobiernos-represivos/76564/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/one-night-to-hack-in-paris/76589/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-comprometen-las-tarjetas-de-crdito-usadas-en-los-hoteles-de-donald-trump/76563/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-usan-la-ltima-vulnerabilidad-parchada-de-flash-para-distribuir-ransomware/76562/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/games-are-over/76582/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/adobe-lanza-un-parche-de-emergencia-para-controlar-una-amenaza-de-la-red/76561/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/intrusos-virtuales-retrasan-y-cancelan-vuelos-en-una-aerolnea-de-polonia/76538/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigan-un-caso-de-ciberespionaje-entre-equipos-de-las-ligas-mayores-de-bisbol-de-ee-uu/76557/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-chinos-roban-informacin-detallada-de-millones-de-funcionarios-del-gobierno-de-ee-uu/76558/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-vergonzoso-video-pornogrfico-malicioso-se-propaga-en-facebook/76551/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/76581/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/senado-estadounidense-aprueba-un-acta-para-limitar-el-espionaje-de-la-nsa/76555/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/lessons-learned-from-flame-three-years-later/76583/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-spring-dragon-apt/76588/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/infosecurity-europe-2015/76591/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/facebook-introduce-el-cifrado-pgp-en-sus-correos-electrnicos/75627/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mobile-forensics-world-2015/76590/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sentencian-al-dueo-de-silk-road-a-pasar-el-resto-de-su-vida-en-prisin/76552/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-onu-considera-que-el-cifrado-es-necesario-para-defender-los-derechos-humanos/76549/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/statistics-on-botnet-assisted-ddos-attacks-in-q1-2015/70844/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-roban-formularios-enteros-de-los-contribuyentes-de-estados-unidos/75762/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/grabit-and-the-rats/76580/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/does-cctv-put-the-public-at-risk-of-cyberattack/72153/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-hacker-publica-informacin-de-los-usuarios-de-adultfriendfinder/76539/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-naikon-apt-and-the-msnmm-campaigns/74663/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-vulnerabilidad-de-cifrado-destaca-el-rol-de-las-leyes-en-la-seguridad-de-internet/76536/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/fraudsters-can-have-rights-too/72158/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/expertos-alertan-sobre-venom-una-vulnerabilidad-envenena-la-nube/76547/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/atacantes-esconden-el-cc-de-su-malware-en-los-comentarios-de-microsoft-technet/76542/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-apt-naikon/72276/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-y-phishing-en-el-primer-trimestre-de-2015/72832/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/rusia-y-china-hacen-un-acuerdo-de-paz-ciberntica/76546/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/extremistas-publican-pornografa-infantil-en-el-sitio-web-de-un-campo-de-concentracin/76545/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-australiano-acusado-de-cibercrimenes-se-fuga-a-europa-en-vsperas-de-su-juicio/76544/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/desarrollo-de-las-amenazas-informticas-en-el-primer-trimestre-de-2015/72499/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/otro-antivirus-pierde-certificaciones-por-tomar-medidas-desesperadas-para-pasar-sus-pruebas-de-rendimiento/76537/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-nuevo-programa-malicioso-destruye-el-mbr-de-los-equipos-que-tratan-de-eliminarlo/76535/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-se-apoderan-de-los-datos-de-los-clientes-del-hard-rock-hotel/76534/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-descubre-que-qihoo-360-haca-trampa-en-las-evaluaciones-de-sus-productos/76533/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/rsa-conference-2015-houses-were-harmed-for-iot-security/76586/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hospitales-protegen-sus-equipos-con-herramientas-que-miden-el-consumo-de-energa-para-detectar-malware/76532/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-atacan-la-cuenta-de-tesla-motors-en-twitter-para-inundar-de-spam-telefnico-a-un-joven-de-illinois/76531/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-vulnerabilidad-en-1-500-apps-de-ios-expone-a-los-usuarios-a-ataques-de-ciberespas/76530/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cmo-esconder-paquetes-de-exploits-en-un-objeto-flash/67523/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-cozyduke-apt/76597/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/florida-acusa-a-un-adolescente-de-14-aos-de-una-felona-por-atacar-los-sistemas-de-su-escuela/76529/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sentencian-a-10-aos-de-prisin-a-un-hacker-colombiano-que-espi-las-negociaciones-con-las-farc/76528/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-podran-tomar-el-control-de-los-aviones-mediante-conexiones-wi-fi/76527/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/wikileaks-publica-toda-la-informacin-filtrada-de-sony-pictures-en-formato-de-fcil-navegacin/76526/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/verizon-los-correos-phishing-son-la-herramienta-ms-comn-para-irrumpir-en-organizaciones/76525/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/las-crnicas-del-apt-hellsing-el-imperio-contrataca/67521/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/your-tax-refund-with-a-data-kidnapping-twist/72166/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/challenging-coinvault-its-time-to-free-those-files/72165/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/simdas-hide-and-seek-grown-up-games/72164/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/informe-acusa-a-hackers-rusos-de-espiar-a-la-casa-blanca/76524/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/darwin-nuke/67476/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-malware-bancario-emotet-desarrollo-de-la-amenaza/67475/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-limpia-su-tienda-de-chrome-para-deshacerse-de-extensiones-peligrosas/76523/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/a-flawed-ransomware-encryptor/76587/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/no-te-sientas-excluido-ransomware-para-amantes-de-la-seguridad-informtica/72163/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/abuso-de-las-tecnologas-blockchain-es-hora-de-buscar-soluciones/72162/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-departamento-de-polica-de-ee-uu-cede-ante-la-extorsin-de-cryptolocker/76522/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ibm-alerta-sobre-el-dyre-wolf-un-agente-que-mezcla-ataques-de-virus-con-estafas-telefnicas/76521/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/documentos-filtrados-de-la-nsa-revelan-un-plan-de-espionaje-britnico-hacia-argentina/76520/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/github-se-recupera-de-un-poderoso-ataque-ddos-realizado-por-gente-real-y-sin-bots/76519/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-hacker-altera-tinder-para-enganchar-a-hombres-heterosexuales-entre-s/76518/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/drenaje-de-la-infraestructura-de-volatile-cedar-dga/72160/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-publica-una-herramienta-de-60-para-atacar-automviles/76517/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-programa-chantajista-asla-del-mundo-virtual-a-un-distrito-escolar-de-ee-uu/76516/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cmo-hacke-mi-propia-pulsera-de-fitness/67520/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/poseidon-una-nueva-amenaza-para-puntos-de-venta/76515/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/quin-se-esconde-en-el-sitio-de-noticias-norcoreano/67518/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/openssl-parcha-una-vulnerabilidad-de-severidad-alta-que-permite-ataques-dos/76514/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberactivistas-sacan-a-la-luz-ms-de-9-000-cuentas-de-redes-sociales-del-ei/76513/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/moderador-del-foro-de-silk-road-admite-haber-participado-en-los-delitos-del-sitio-criminal/76512/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/opsec-101-analgica-seguridad-operativa-en-el-mundo-fsico/67517/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/yeti-sigue-agazapado-en-el-bosque/67519/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-cruce-entre-skyfall-y-skype/67516/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/imputan-a-tres-personas-que-se-infiltraron-en-compaas-publicitarias-legtimas-para-distribuir-spam/76511/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/boletn-de-seguridad-kaspersky-spam-y-phishing-en-2014/67537/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/conoce-a-lisa-por-1-euro/67507/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cmo-funciona-una-estafa/67515/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/troyano-sms-encuentra-forma-de-evadir-captcha/67528/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/regulacin-de-seguridad-nacional-pone-en-peligro-a-millones-de-usuarios-de-apple-y-google/76510/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/amenazas-en-internet-para-los-nios-un-peligro-real/67510/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-chilenos-atacan-un-sitio-gubernamental-de-bolivia-para-criticar-su-demanda-martima/76509/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/isis-amenaza-de-muerte-a-los-empleados-de-twitter-por-bloquear-sus-cuentas/76508/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/comodo-distribuye-adware-peligroso-comparable-con-superfish/76507/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-enemigo-en-el-telfono/67536/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-extraordinarios-plugins-be2-sus-ataques-contra-siemens-y-las-fallas-en-su-diseo/67513/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/grupo-equation-de-houston-con-amor/67512/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-ataques-dirigidos-de-los-halcones-del-desierto/67509/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/fanny-equation-yo-soy-tu-padre-stuxnet/67511/</loc>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://securelist.lat/lenovo-en-el-ojo-del-huracn-por-haber-distribuido-ordenadores-con-adware-peligroso/76506/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sitio-oficial-de-jamie-oliver-sirve-malware-en-bandeja-de-plata/76505/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/equation-la-estrella-de-la-muerte-de-la-galaxia-malware/67514/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-descubre-una-operacin-de-robos-multimillonaria-a-ms-de-100-bancos-del-mundo/76504/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-gran-robo-de-banco-el-apt-carbanak/67508/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-construye-listas-blancas-para-reforzar-virustotal/76503/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberamenazas-financieras-en-2014-las-cosas-han-cambiado/67532/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-le-declara-la-guerra-virtual-a-isis/76502/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-anuncia-la-creacin-de-una-agencia-para-transmitir-inteligencia-sobre-ciberamenazas/76501/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-intrusin-a-una-empresa-de-seguros-de-salud-pone-en-riesgo-a-80-millones-de-personas/76500/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ross-ulbricht-hallado-culpable-de-todos-los-cargos-en-su-contra/76499/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spammers-contra-huracanes-y-ataques-terroristas/67501/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/whatsapp-para-web-en-la-mira-de-los-cibercriminales/67483/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-sirios-roban-tcticas-de-ataque-de-los-rebeldes-con-seductores-perfiles-falsos-de-skype/76498/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-enriquece-su-programa-de-recompensas/76497/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-malware-sirio-parte-2-quin-es-the-joe/67506/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/taylor-swift-se-defiende-de-los-hackers-que-la-amenazan-con-publicar-sus-desnudos/76496/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/surge-una-red-callejera-en-cuba-como-alternativa-a-internet/76495/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/por-qu-no-hay-que-confiar-ciegamente-en-los-archivos-firmados-con-certificados-digitales/67504/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anlisis-de-hopscotch-y-legspin-de-regin/67491/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/windows-10-anticipo-y-seguridad/67479/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/comparacin-entre-el-mdulo-50251-de-regin-y-el-keylogger-qwerty/67503/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-joven-de-17-aos-se-quita-la-vida-por-temor-a-las-amenazas-de-un-programa-chantajista/76494/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-espi-a-corea-del-norte-mientras-infiltraba-a-sony/76493/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/activistas-del-partido-pirata-sueco-tienden-una-trampa-a-polticos-y-expertos-en-seguridad/76492/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-deja-de-ofrecer-soporte-tcnico-gratuito-para-windows-7/76491/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-segunda-ronda-de-code-blue-en-japn/67502/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-de-isis-toman-el-control-de-las-redes-sociales-del-comando-central-de-ee-uu/76490/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-valor-de-bitcoin-se-desvanece-despus-del-robo-de-5m-a-bitstamp/67500/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/gigante-de-wall-street-despide-a-un-empleado-que-rob-informacin-de-sus-clientes/76489/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-robo-millonario-de-bitcoins-cierra-temporalmente-bitstamp/76259/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataques-de-hackers-despiertan-discusiones-sobre-la-seguridad-nuclear-en-corea-del-sur/76486/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-filtra-30-millones-de-contraseas-de-servicios-web-como-amazon-y-psn/76487/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataques-ddos-desactivan-las-redes-de-playstation-y-xbox-en-navidad/76485/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cloud-atlas-la-apt-redoctober-regresa-con-estilo/67499/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-nuevo-programa-malicioso-afecta-a-ms-de-100-000-sitios-web-basados-en-wordpress/76483/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-troyano-destover-ahora-tiene-una-firma-digital-de-sony/67505/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sonydestover-el-historial-de-destruccin-del-misterioso-actor-norcoreano/67484/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-arte-de-encontrar-esqueletos-de-ciber-dinosaurios/67498/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/autoridades-suecas-derrumban-the-pirate-bay-en-el-apogeo-de-los-datos-filtrados-de-sony/76481/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-mirada-a-la-bola-de-cristal-apt/67531/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2014-evolucin-del-malware/67534/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2014-estadstica-principal-de-2014/67533/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberatacantes-explotan-la-muerte-de-chespirito-para-atraer-vctimas/76484/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-phishing-contra-clientes-de-un-banco-japons/67495/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-de-sony-pictures-filtran-pelculas-robadas-antes-de-su-estreno/76480/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/consejos-para-proteger-tu-casa/67493/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estado-de-la-situacin-los-dispositivos-de-red-estn-en-la-mira/67494/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-2014-predicciones-para-2015/67535/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/defensores-del-gobierno-sirio-atacan-los-sitios-web-de-agencias-de-noticias/76479/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/spam-y-phishing-en-el-tercer-trimestre-de-2014/67529/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/regin-redes-gsm-bajo-control-gubernamental/67478/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-ataque-a-sony-pictures-podra-exponer-los-secretos-de-la-empresa/76232/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/pesadilla-en-la-calle-malware/67477/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/avar-2014-australia/67480/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-senado-estadounidense-rechaza-las-reformas-para-los-mtodos-de-vigilancia-de-la-nsa/76478/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-a-tres-de-los-supuestos-responsables-del-troyano-wirelurker/76477/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/darknet-law-enforcement-onion-tor/67497/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-se-aduea-de-la-cuenta-de-twitter-del-kkk/75451/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/panorama-de-las-amenazas-cibernticas-en-el-tercer-trimestre-de-2014/67525/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-en-ios-permite-que-los-atacantes-reemplacen-una-aplicacin-legtima-por-otra-maliciosa/75455/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-parcha-una-nueva-vulnerabilidad-crtica-en-schannel-comparable-con-heartbleed/75454/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-sitio-web-recopila-y-comparte-las-imgenes-de-cmaras-de-seguridad-desprotegidas/75453/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/wirelurker-el-troyano-de-ios-estadsticas-y-nueva-informacin/67496/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/plugins-be2-personalizados-abuso-de-routers-y-perfil-de-las-vctimas/67490/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/operacin-internacional-da-un-golpe-letal-a-413-sitios-criminales-incluyendo-silk-road-2-0/75449/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-amenaza-de-darkhotel/66290/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-nuevo-e-inusual-programa-malicioso-amenaza-a-los-clientes-de-apple/75448/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/fallas-de-seguridad-en-redes-corporativas-vulnerabilidades-de-redes/67488/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hack-in-the-box-2014-en-kuala-lumpur/67487/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/conferencia-de-seguridad-ekoparty/67482/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/tu-confianza-quebrantada/67486/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estados-unidos-investiga-una-intrusin-informtica-en-las-redes-de-la-casa-blanca/75450/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vulnerabilidad-del-da-cero-en-office-pone-en-peligro-a-los-usuarios-de-windows/75447/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-programa-chantajista-acampa-en-los-espacios-publicitarios-de-conocidos-sitios-de-internet/75446/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-atacan-a-usuarios-desde-los-mismos-servidores-de-dropbox/75445/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/deja-tus-contraseas-al-salir/67485/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-falsa-eleccin-el-virus-bola-o-virus-informtico/67481/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nuevo-sistema-de-autentificacin-de-dos-factores-de-google-funciona-con-una-llave-usb/75444/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-en-septiembre-de-2014/67524/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/facebook-duplica-las-recompensas-para-quienes-le-ayuden-a-proteger-sus-cdigos-publicitarios/75443/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-de-google-descubren-una-vulnerabilidad-en-ssl-3-0-y-el-modo-de-explotarla/75442/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/dropbox-niega-que-las-contraseas-filtradas-de-sus-clientes-sean-de-un-ataque-a-sus-servidores/75441/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-troyano-ventir-arma-tu-propio-espa-para-macos/66346/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/actualizaciones-de-seguridad-de-microsoft-octubre-de-2014/66340/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hp-revocar-un-certificado-de-autentificacin-que-se-utiliz-para-firmar-malware/75440/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-amenazan-con-publicar-fotos-robadas-de-snapchat/75439/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-publican-poderosos-exploits-y-un-parche-enclenque-para-badusb/75438/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/tic-tac-toe-retorcido/66326/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estados-unidos-confirma-que-es-legal-irrumpir-en-servidores-extranjeros/75437/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/yahoo-descubre-un-ataque-a-sus-servidores-mientras-trataba-de-protegerse-de-shellshock/75435/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/tyupkin-un-programa-malicioso-que-manipula-cajeros-automticos/66352/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/virus-bulletin-2014-nuevos-tiempos-viejos-retos/66345/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/informe-de-kaspersky-security-network-sobre-las-amenazas-mviles-que-android-no-pierda-un-tornillo/66335/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/brechas-en-la-defensa-de-la-red-corporativa-el-control-de-acceso/66344/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-acusa-a-cibercriminales-que-robaron-informacin-para-construir-una-xbox-y-pilotar-un-helicptero/75434/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/surgen-exploits-y-nuevos-parches-para-la-vulnerabilidad-en-bash/75433/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-vulnerabilidad-bash-cve-2014-6271-preguntas-y-respuestas/66324/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataques-contra-boletos-robo-a-usuarios-desconectados/72537/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/expertos-alertan-sobre-una-vulnerabilidad-en-bash-que-podra-ser-ms-catastrfica-que-heartbleed/75432/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-en-agosto-de-2014/72532/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/3x-con-de-septiembre-parte-2/66331/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/3x-con-de-septiembre-parte-1/66323/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-a-un-sitio-de-tripadvisor-pone-en-peligro-la-informacin-de-14-millones-de-usuarios/75436/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nuevas-filtraciones-de-desnudos-afectan-a-rihanna-avril-lavigne-y-aubrey-plaza/75431/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/citadel-deja-el-robo-de-bancos-para-volverse-ciberespa/75430/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-confirma-la-filtracin-de-los-datos-de-5-millones-de-sus-usuarios/75429/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/actualizaciones-de-seguridad-de-microsoft-septiembre-2014/66322/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/vistiendo-seguridad-presente-y-futuro/66361/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/super-mobility-week-de-ctia-2014/66355/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-spammers-hacen-reparto-a-domicilio-peligro-garantizado/72536/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigacin-de-incidentes-robos-en-el-sistema-de-banca-a-distancia/72530/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-mundo-a-tu-alcance-y-al-de-ellos-tambin/66308/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-se-declara-en-desacato-de-la-ley-para-mantener-la-privacidad-de-sus-usuarios/75428/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/actualizacin-de-mozilla-da-la-espalda-a-los-certificados-de-1024-bits/75427/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/home-depot-confirma-intrusin-virtual-a-todas-sus-sucursales-en-ee-uu-y-canad/75426/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-filtracin-de-desnudos-de-celebridades-podra-convertirse-en-un-caso-de-pornografa-infantil/75425/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/las-redes-publicitarias-una-brecha-en-la-seguridad-de-redes-corporativas/66350/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cmo-protegerte-de-los-hackers-de-icloud/66333/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-basado-en-la-web-ataca-routers-domsticos-con-un-toque-brasileo/66321/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/las-fieras-de-internet/72527/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/drenaje-del-troyano-backoff-pos/58449/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ex-oficial-de-ciberseguridad-gubernamental-culpable-de-cargos-de-pornografa-infantil/75424/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/iv-cumbre-de-analistas-de-seguridad-latinoamericanos-en-cartagena/66319/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-en-julio-de-2014/72526/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/coordinador-de-seguridad-estadounidense-admite-no-tener-conocimientos-de-informtica/75423/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-ataque-apt-nettraveler-se-renueva-a-sus-10-aos/66305/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/escuela-de-verano-sobre-la-legislacin-en-internet/65839/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberespas-roban-informacin-del-vuelo-desaparecido-de-malaysia-airlines/75421/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/iot-el-da-que-ataqu-mi-propia-casa/72452/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-roban-los-datos-de-45-millones-de-pacientes-de-hospitales-estadounidenses/75420/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-machete/66291/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/zerolocker-no-vendr-a-tu-rescate/66348/</loc>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securelist.lat/malware-sirio-un-castillo-de-naipes/66341/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-se-equivoca-al-identificar-al-polica-del-caso-ferguson/75419/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/actualizacin-de-adobe-reader-se-est-usando-cve-2014-0546-en-ataques-dirigidos/66318/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/defcon22-warkitteh-computadoras-centrales-y-aviones/66306/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/blackhat-2014-flota-alto-en-la-burbuja-de-la-ciberseguridad/66304/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/una-conferencia-blackhat-post-pc/66303/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/donantes-de-rganos-a-domicilio/66287/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-historia-del-gato-cazador-de-redes-wi-fi-desprotegidas/75418/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-atacan-a-los-usuarios-que-quieren-cambiar-el-color-de-facebook/75417/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-y-el-phishing-en-el-segundo-trimestre-de-2014/72520/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/puerta-trasera-de-android-camuflada-como-una-aplicacin-de-seguridad-de-kaspersky/66289/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/gusano-para-android-en-el-da-de-los-enamorados-de-china/66313/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-alrededor-del-mundo-adoptan-documentos-ofuscados-de-office/66302/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/the-epic-turla-operation-solving-some-of-the-mysteries-of-snakeuroburos/72523/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/falla-de-seguridad-pudo-haber-filtrado-la-informacin-de-los-usuarios-de-mozilla/75416/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-eco-de-stuxnet/66288/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/escenario-de-ciberamenazas-en-el-segundo-trimestre-de-2014/67526/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/amigos-dudosos-del-barrio-en-facebook/66299/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/entre-osos-y-yetis/66278/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataque-a-tor-pone-en-riesgo-el-anonimato-de-sus-usuarios/75415/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-roban-informacin-sobre-el-domo-de-hierro-de-israel/75414/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mensajes-de-texto-falsos-generan-pnico-entre-los-ciudadanos-de-israel/75413/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/abuso-de-la-vulnerabilidad-elasticsearch-en-amazon-cloud/66277/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sony-acuerda-pagar-15-millones-en-productos-a-las-vctimas-del-ataque-a-la-playstation-network/75407/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/desvelando-la-red-de-distribucin-de-androidos-koler/66286/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/autoridades-arrestan-a-los-atacantes-de-stubhub-en-una-operacin-internacional/75411/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nace-un-nuevo-buscador-para-datos-privados-filtrados/75405/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/bajo-fuego-apt/66274/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-descubren-como-tomar-control-del-automvil-elctrico-tesla-model-s/75422/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/snowden-dice-que-las-fotos-ntimas-de-los-internautas-son-un-tema-de-charla-en-las-oficinas-de-la-nsa/75406/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberatacantes-roban-datos-privados-del-sitio-web-de-cnet/75404/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-en-junio-de-2014/72517/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nuevo-proyecto-de-google-examinar-la-red-en-busca-de-vulnerabilidades-de-da-cero/75403/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-a-un-empresario-chino-por-robar-informacin-de-aviones-militares-estadounidenses/75400/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-vistazo-al-troyano-shylockcaphaw/66273/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nuevos-gtlds-viejos-ataques/71186/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-senado-de-ee-uu-aprueba-la-ley-cisa/75401/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/peticin-falsa-en-defensa-de-surez-engaa-a-los-usuarios-y-sus-amigos/66272/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-a-un-notorio-traficante-de-datos-robados/75402/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/brechas-en-la-defensa-de-la-red-corporativa-servicios-en-la-nube/66270/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/miniduke-ha-vuelto-nemesis-gemina-y-el-botgen-studio/66280/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/intrusos-publican-falsa-alerta-de-desastre-nuclear-en-el-twitter-del-ejrcito-israel/75399/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-confisca-22-dominios-no-ip-y-perjudica-las-operaciones-de-cibercriminales-y-programas-maliciosos/66267/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/anonymous-amenaza-a-los-defensores-de-la-ley-cisa/75398/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-agrega-cifrados-y-un-centro-de-transparencia-para-reforzar-la-seguridad-y-confianza-en-sus-productos/75393/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-publican-una-falsa-alarma-de-bomba-desde-el-twitter-de-la-polica-de-brasil/75408/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/recon-2014/58284/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/se-descubre-cmo-los-gobiernos-podran-estar-espiando-los-telfonos-de-sus-ciudadanos/75397/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-en-mayo-de-2014/67522/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-ascenso-de-la-ciberdelincuencia-en-dubai-y-en-eau/71200/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackingteam-2-0-la-historia-se-moviliza/58578/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/usa-la-fuerza-luuuk/58571/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacktivistas-atacan-sitios-brasileos-en-protesta-por-el-mundial-de-la-fifa/75392/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ataques-antes-de-que-arranque-el-sistema/66279/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-cibercriminales-tienen-en-la-mira-una-obsoleta-herramienta-de-blogging-japonesa/58574/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/impostores-en-las-redes-sociales/72449/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminal-usa-malware-para-extraer-500-millones-de-dogecoins/75391/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/no-pierdas-tu-dinero-por-ver-tu-partido-favorito-del-mundial/58563/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/actualizaciones-de-microsoft-junio-de-2014-casi-60-vulnerabilidades-de-ejecucin-remota-de-cdigo-en-ie-y-gditruetype/66245/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-trata-de-extorsionar-a-la-pizzera-dominos-en-twitter/75389/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/surgen-nuevas-acusaciones-de-ciberespionaje-contra-militares-chinos/75395/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-fbi-subastar-30-000-bitcoins-confiscadas-a-silk-road/75390/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-ltima-versin-de-svpeng-ataca-en-estados-unidos/66256/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-primer-troyano-cifrador-de-datos-para-mviles/66242/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/rusia-arresta-a-dos-extorsionistas-de-usuarios-de-iphone/75388/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/openssl-parcha-una-vulnerabilidad-de-10-aos/75387/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/las-redes-wi-fi-inseguras-y-los-puntos-de-recarga-de-energa-falsos-ponen-en-peligro-tus-datos-en-el-mundial-2014/66243/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-reina-de-inglaterra-pide-cadena-perpetua-para-los-hackers-que-causen-daos-catastrficos/75386/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/autoridades-frenan-las-actividades-de-la-banda-responsable-de-cryptolocker-y-gameover-zeus/75385/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/area41-antes-conocido-como/58551/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-ponen-en-peligro-la-informacin-personal-de-los-clientes-de-monsanto/75384/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mundial-2014-consejos-para-el-uso-de-cajeros-automticos-y-evitar-la-clonacin-de-tarjetas-de-crdito/66234/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-nuevo-juego-de-google-ensea-a-combatir-vulnerabilidades-xss/75383/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nios-en-internet-la-frmula-de-su-seguridad/72514/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estafadores-de-corazones-solitarios/58558/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/falso-wechat-nuevo-troyano-bancario/66231/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/informe-spam-de-abril-2014/67538/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-hacker-sabu-evade-la-prisin-por-su-alianza-con-el-fbi/75382/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-infiltran-un-superordenador-neozelands/75379/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estados-unidos-podra-impedir-que-hackers-chinos-asistan-a-def-con-y-black-hat/75376/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ciberataque-a-ebay-arriesga-la-seguridad-de-todos-sus-usuarios/75378/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mundial-2014-no-anote-un-autogol/58549/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-filipinos-atacan-195-sitios-para-quejarse-de-china-y-sus-cazadores-furtivos/75377/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/no-pagues-impuestos-dobles/58565/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/derrota-garantizada-o-el-verdadero-rostro-de-la-engaosa-fortuna/72511/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/antivirus-fraudulentos-el-ataque-de-los-clones/58548/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-conferencia-bitcoin-2014-ha-madurado-el-dinero-virtual-2/66217/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/estados-unidos-demanda-a-militares-chinos-por-ciberespionaje/75375/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/doge-vault-confirma-que-un-ataque-de-hackers-puso-en-peligro-los-ahorros-de-sus-usuarios/75374/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/adobe-y-microsoft-enmiendan-30-vulnerabilidades-en-su-martes-de-parches/75373/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-monedero-de-dogecoins-se-desactiva-y-deja-a-sus-clientes-con-sospechas-de-robo/75372/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/4chan-recompensa-a-quien-le-ayude-a-descubrir-sus-propias-vulnerabilidades/75366/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/advierten-que-ios-7-no-cifra-los-archivos-adjuntos-de-sus-correos-electrnicos/75364/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-en-el-primer-trimestre-de-2014/72507/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-actualiza-ie-contra-una-vulnerabilidad-del-da-cero-que-distribuye-pirpi/66228/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/securmtica-xxv/66237/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/codegate-2014/58542/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-podran-alterar-el-trfico-de-las-carreteras-ms-transitadas-del-mundo/75380/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-novatos-de-facebook-prueban-un-poco-de-su-propia-medicina/75365/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nuevo-flash-player-da-cero-cve-2014-0515-utilizado-en-ataques-watering-hole/66216/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-alerta-sobre-una-nueva-vulnerabilidad-zero-day-en-ie/75370/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/investigadores-advierten-que-viber-manipula-la-informacin-de-sus-clientes-sin-cifrarla/75363/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/troyano-sms-con-ambiciones-mundiales/58534/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-en-marzo-de-2014/72503/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/china-intenta-erradicar-el-contenido-pornogrfico-de-sus-redes/75362/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/tecnologas-de-google-street-view-permiten-solucionar-captchas/75361/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-beb-panda-amenaza-la-seguridad-de-los-usuarios-de-mac/75360/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nueva-amenaza-trojan-sms-androidos-stealer-a/58535/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/canad-hace-el-primer-arresto-a-un-hacker-de-heartbleed/75358/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-contribuyentes-y-los-padres-de-familia-son-las-primeras-vctimas-de-heartbleed/75359/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/evolucin-de-las-amenazas-informticas-en-el-primer-trimestre-de-2014/67527/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/te-gustara-caf-con-zeus/66215/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-pap-omnipresente/66214/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ee-uu-persigue-a-nueve-personas-por-robar-dinero-con-el-troyano-zeus/75357/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hacker-responde-a-la-opisrael-desenmascarando-a-los-atacantes/75356/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-programador-se-responsabiliza-por-la-vulnerabilidad-heartbleed/75291/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/actualizaciones-de-adobe-abril-de-2014/58539/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-fin-del-camino-para-windows-xp/58524/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nio-de-cinco-aos-descubre-cmo-entrar-a-cuentas-ajenas-de-xbox/75367/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/las-amenazas-informticas-financieras-en-2013-parte-2-el-malware/72504/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/yahoo-activa-el-cifrado-predeterminado-para-defender-a-sus-usuarios/75120/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/las-amenazas-informticas-financieras-en-2013-primera-parte-phishing/72501/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cuidado-programas-maliciosos-preinstalados/66213/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/atacantes-roban-dinero-a-los-cajeros-usando-mensajes-sms/75290/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-acusan-a-microsoft-de-vender-la-informacin-de-sus-clientes-al-fbi/75263/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/bitguard-un-sistema-de-bsqueda-forzosa/72500/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-en-febrero-de-2014/72360/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/gmail-obliga-a-sus-usuarios-a-utilizar-conexiones-https-para-protegerlos-de-los-espas/75288/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/confianza-confianza-confianza/58541/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-regalo-para-los-apreciados-clientes-de-apple/66180/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-servicios-ocultos-de-tor-un-refugio-para-los-cibercriminales/66095/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/code-blue-en-tokio/58511/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/rootedcon-v/58538/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/mt-gox-asegura-que-un-robo-de-bitcoins-masivo-lo-llev-a-la-bancarrota/75287/</loc>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-futuro-de-bitcoin-despus-del-incidente-mt-gox/66192/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-gobierno-britnico-husme-las-cmaras-web-de-los-usuarios-de-yahoo/75286/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-operador-de-bitcoins-mt-gox-se-esfuma-con-los-ahorros-de-miles/75284/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/ests-seguro-de-que-quieres-cancelar-tu-suscripcin-a-nuestra-lista-de-correos/66181/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-juramento-nigeriano-nuestras-promesas-por-tu-dinero-2/66191/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-en-enero-de-2014/72497/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/roban-datos-personales-de-hackers-en-una-intrusin-al-sitio-de-ec-council/75294/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/apple-se-apresura-a-parchar-una-falla-en-el-cifrado-de-sus-conexiones-seguras-en-ios/75293/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-roban-ms-de-300-000-datos-personales-de-la-universidad-de-maryland/75283/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/amenazas-para-dispositivos-mviles-en-2013/72491/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/tu-cuenta-facebook-ha-sido-premiada/66186/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/bitcoins-virtuales-vs-billetes-reales/58490/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cibercriminales-reciclan-contraseas-para-ingresar-a-cuentas-de-tesco/75282/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-lab-desenmascara-una-avanzada-operacin-de-espionaje-que-funcion-7-aos/75277/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-estafadores-acechan-a-los-amantes-de-los-deportes/58470/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/obama-lanza-un-programa-de-ciberseguridad-para-proteger-la-infraestructura-crtica/75292/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/snapchat-parcha-una-vulnerabilidad-que-haca-colapsar-smartphones/75279/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/nuevo-anlisis-de-absolute-computrace/72492/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/rumores-activan-discusiones-sobre-el-tema-de-la-seguridad-virtual-en-sochi/75276/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-apt-caretomask-preguntas-ms-frecuentes/66146/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/troyanos-bancarios-brasileos-de-archivos-comprimidos-java/66187/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-sitio-web-ms-grande-de-suecia-est-distribuyendo-malware/66175/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-estafadores-se-preparan-para-las-olimpiadas/58477/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/juegos-olmpicos-made-in-china/66093/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/cve-2014-0497-una-vulnerabilidad-del-da-cero/66169/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-millonarios-quieren-darte-su-dinero/58474/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/inteligencia-britnica-combate-a-anonymous-con-ataques-phishing-malware-y-ddos/75275/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/golpe-de-hackers-latinoamericanos-parte-3-infeccin-por-archivos-de-office/66090/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/amenaza-por-abuso-de-actualizacin-de-gom-player/66094/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-vistazo-al-otro-lado-de-la-mscara/66206/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/golpe-de-hackers-latinoamericanos-2a-parte-correo-por-fuerza-bruta-y-spam/58460/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-atacan-el-sitio-de-los-angry-birds-para-protestar-contra-la-nsa/75274/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/oro-negro-o-un-agujero-negro-en-tus-bolsillos/58447/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-prestamistas-en-el-spam-robo-de-datos-troyanos-y-otras-peculiaridades-de-los-crditos-baratos/72481/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-bot-de-java-para-mltiples-plataformas/66080/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/autoridades-en-cuatro-pases-arrestan-a-ladrones-de-contraseas-por-encargo/75273/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/polglotas-nigerianos/66076/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/google-ofrece-271828-millones-de-dlares-a-los-hackers-de-chrome/75272/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-en-estados-unidos-al-hombre-ms-odiado-de-internet/75271/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/de-latinoamrica-con-amor-jumcar-vuelve-al-ataque/66078/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/conferencia-spooks-collision-dc-2014/58445/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/arrestan-en-rumania-al-conocido-hacker-guccifer/75270/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/kaspersky-security-bulletin-el-spam-en-2013/72486/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-spam-en-diciembre-de-2013/72490/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/whatsapp-para-pc-garantiza-un-troyano-banquero/58415/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-ejrcito-de-refrigeradores-y-routers-saturan-la-red-con-spam/75278/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/aplicacin-de-starbucks-almacena-las-contraseas-en-texto-legible/75269/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/golpe-de-hackers-latinoamericanos-1a-parte-betabot/58471/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-turcos-se-vengan-de-los-ataques-de-la-syrian-electronic-army/75268/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/microsoft-dispara-con-poca-fuerza-sus-primeros-parches-de-2014/75262/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-primer-martes-de-parches-de-adobe-de-2014/58443/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-apt-icefog-ataca-a-sistemas-en-estados-unidos-con-una-puerta-trasera-java/58440/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/hackers-de-tarjetas-de-crdito-atacan-a-la-tienda-neiman-marcus/75258/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/la-intrusin-a-target-puede-haber-cobrado-70-millones-de-vctimas/75261/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/linkedin-inicia-una-demanda-contra-cibercriminales-desconocidos-que-operan-en-su-sitio/75266/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/yahoo-mail-codifica-sus-comunicaciones-con-el-protocolo-https/75265/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/sentencian-al-escritor-del-bot-de-la-red-zombi-mariposa-a-casi-5-aos-de-prisin/75260/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/el-fin-del-soporte-tcnico-de-microsoft-a-windows-xp/65944/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/criminales-perforan-cajeros-automticos-para-insertarles-usbs-infectados/75236/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-hacker-roba-y-vende-el-acceso-clandestino-a-un-servidor-de-la-bbc/75259/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/un-juez-resuelve-que-el-ciberespionaje-de-estados-unidos-no-es-inconstitucional/75249/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/troyano-chepro-la-tormenta-cpl/58428/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/regalo-de-hackers-para-estas-fiestas-coctel-de-vulnerabilidades-y-exploits-de-snapchat/75004/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/los-hackers-de-target-podran-tener-en-su-poder-los-cdigos-pin-de-40-millones-de-tarjetas/75257/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/feliz-natal-brasileo-quiero-tu-dinero-ahora/66048/</loc>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://securelist.lat/documentos-de-snowden-acusan-a-rsa-y-nsa-de-estar-aliadas-por-un-contrato-de-10-millones-de-dlares/75255/</loc>
		<priority>0.0</priority>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
