<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity</title>
	<atom:link href="https://axisofeasy.com/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 25 Jul 2025 00:42:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Cybersecurity</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Prophet of Hypertext: Ted Nelson&#8217;s War Against the Digital Priesthood</title>
		<link>https://axisofeasy.com/cybersecurity/the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood/?pk_campaign=feed&#038;pk_kwd=the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood</link>
					<comments>https://axisofeasy.com/cybersecurity/the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood/?pk_campaign=feed&#038;pk_kwd=the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood#respond</comments>
		
		<dc:creator><![CDATA[AxisofEasy Team]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 00:41:58 +0000</pubDate>
				<category><![CDATA[Alt-Ctrl History]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[FreedomTech]]></category>
		<category><![CDATA[FreeSpeech]]></category>
		<category><![CDATA[Big Tech]]></category>
		<category><![CDATA[Blockchain philosophy]]></category>
		<category><![CDATA[Computer Lib]]></category>
		<category><![CDATA[Crypto Rebellion]]></category>
		<category><![CDATA[Cypherpunks]]></category>
		<category><![CDATA[decentralized]]></category>
		<category><![CDATA[Decentralized internet]]></category>
		<category><![CDATA[Digital Age]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[Digital Priesthood]]></category>
		<category><![CDATA[Digital sovereignty]]></category>
		<category><![CDATA[Early Warnings]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[Hypertext]]></category>
		<category><![CDATA[Hypertext History]]></category>
		<category><![CDATA[Information Freedom]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Internet Pioneers]]></category>
		<category><![CDATA[Platform Monopolies]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Project Xanadu]]></category>
		<category><![CDATA[Sovereignty]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[Ted Nelson]]></category>
		<category><![CDATA[Transclusion]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[Web3 Decentralization]]></category>
		<category><![CDATA[Xanadu]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31940</guid>

					<description><![CDATA[The Prophet of Hypertext: Ted Nelson&#8217;s War Against the Digital Priesthood &#160; How a Hollywood insider&#8217;s son called out Big Tech&#8217;s power grab fifty years before it happened and why his warnings hit different when you&#8217;re living in the dystopia &#160; It&#8217;s 1974. Nixon just rage-quit the presidency, everyone&#8217;s wearing bell-bottoms and some guy with [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fcybersecurity%2Fthe-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dthe-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood&amp;action_name=The%20Prophet%20of%20Hypertext%3A%20Ted%20Nelson%26%238217%3Bs%20War%20Against%20the%20Digital%20Priesthood&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/cybersecurity/the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood/?pk_campaign=feed&#038;pk_kwd=the-prophet-of-hypertext-ted-nelsons-war-against-the-digital-priesthood/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AoE Quick Hits: How To Easily Spot a Credit Card Scam in Your Email</title>
		<link>https://axisofeasy.com/aoe/aoe-quick-hits-how-to-easily-spot-a-credit-card-scam-in-your-email/?pk_campaign=feed&#038;pk_kwd=aoe-quick-hits-how-to-easily-spot-a-credit-card-scam-in-your-email&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=aoe-quick-hits-how-to-easily-spot-a-credit-card-scam-in-your-email</link>
					<comments>https://axisofeasy.com/aoe/aoe-quick-hits-how-to-easily-spot-a-credit-card-scam-in-your-email/?pk_campaign=feed&#038;pk_kwd=aoe-quick-hits-how-to-easily-spot-a-credit-card-scam-in-your-email#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Mon, 19 Aug 2024 20:39:13 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30248</guid>

					<description><![CDATA[Whether it&#8217;s for yourself, or so you can easily explain it to somebody else, here&#8217;s a video showing the telltale signs of an email scam purporting to be from your credit card company. (Time: under two minutes). &#160; &#160; Whether it&#8217;s for yourself, or so you can easily explain it to somebody else, here&#8217;s a [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faoe-quick-hits-how-to-easily-spot-a-credit-card-scam-in-your-email%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daoe-quick-hits-how-to-easily-spot-a-credit-card-scam-in-your-email&amp;action_name=AoE%20Quick%20Hits%3A%20How%20To%20Easily%20Spot%20a%20Credit%20Card%20Scam%20in%20Your%20Email&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/aoe-quick-hits-how-to-easily-spot-a-credit-card-scam-in-your-email/?pk_campaign=feed&#038;pk_kwd=aoe-quick-hits-how-to-easily-spot-a-credit-card-scam-in-your-email/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Summary: Solving the Cybersecurity “Skill Gap” Myth</title>
		<link>https://axisofeasy.com/aoe/summary-solving-the-cybersecurity-skill-gap-myth/?pk_campaign=feed&#038;pk_kwd=summary-solving-the-cybersecurity-skill-gap-myth&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=summary-solving-the-cybersecurity-skill-gap-myth</link>
					<comments>https://axisofeasy.com/aoe/summary-solving-the-cybersecurity-skill-gap-myth/?pk_campaign=feed&#038;pk_kwd=summary-solving-the-cybersecurity-skill-gap-myth#respond</comments>
		
		<dc:creator><![CDATA[Bryan Lutz]]></dc:creator>
		<pubDate>Thu, 25 Jan 2024 20:03:56 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=29254</guid>

					<description><![CDATA[&#160; Summary The article challenges the prevailing belief in a cybersecurity skill gap, pointing out that the majority of data breaches are due to human error, not a lack of skilled professionals. It emphasizes that solutions should focus on reducing human error, such as through platforms like DomainSure, which manage communication at the infrastructure level [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Fsummary-solving-the-cybersecurity-skill-gap-myth%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dsummary-solving-the-cybersecurity-skill-gap-myth&amp;action_name=Summary%3A%20Solving%20the%20Cybersecurity%20%E2%80%9CSkill%20Gap%E2%80%9D%20Myth&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/summary-solving-the-cybersecurity-skill-gap-myth/?pk_campaign=feed&#038;pk_kwd=summary-solving-the-cybersecurity-skill-gap-myth/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Summary: How to Prevent Crypto Wallet Drains: $300 Million Stolen in 2023</title>
		<link>https://axisofeasy.com/aoe/summary-how-to-prevent-crypto-wallet-drains-300-million-stolen-in-2023/?pk_campaign=feed&#038;pk_kwd=summary-how-to-prevent-crypto-wallet-drains-300-million-stolen-in-2023&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=summary-how-to-prevent-crypto-wallet-drains-300-million-stolen-in-2023</link>
					<comments>https://axisofeasy.com/aoe/summary-how-to-prevent-crypto-wallet-drains-300-million-stolen-in-2023/?pk_campaign=feed&#038;pk_kwd=summary-how-to-prevent-crypto-wallet-drains-300-million-stolen-in-2023#respond</comments>
		
		<dc:creator><![CDATA[Bryan Lutz]]></dc:creator>
		<pubDate>Sat, 13 Jan 2024 20:03:12 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=29202</guid>

					<description><![CDATA[&#160; &#160; In 2023, the cryptocurrency industry faced a significant challenge with $300 million stolen from crypto wallets, largely due to the rise in phishing scams and wallet drainers. This surge in theft, linked to the anticipation of Bitcoin&#8217;s price increase and new investors unaware of security risks, highlights a major unresolved security gap in [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Fsummary-how-to-prevent-crypto-wallet-drains-300-million-stolen-in-2023%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dsummary-how-to-prevent-crypto-wallet-drains-300-million-stolen-in-2023&amp;action_name=Summary%3A%20How%20to%20Prevent%20Crypto%20Wallet%20Drains%3A%20%24300%20Million%20Stolen%20in%202023&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/summary-how-to-prevent-crypto-wallet-drains-300-million-stolen-in-2023/?pk_campaign=feed&#038;pk_kwd=summary-how-to-prevent-crypto-wallet-drains-300-million-stolen-in-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Summary: China vs. the CIA: Digital Potshots Ramp Up Cyber Threats for Private Organizations</title>
		<link>https://axisofeasy.com/aoe/summary-china-vs-the-cia-digital-potshots-ramp-up-cyber-threats-for-private-organizations/?pk_campaign=feed&#038;pk_kwd=summary-china-vs-the-cia-digital-potshots-ramp-up-cyber-threats-for-private-organizations&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=summary-china-vs-the-cia-digital-potshots-ramp-up-cyber-threats-for-private-organizations</link>
					<comments>https://axisofeasy.com/aoe/summary-china-vs-the-cia-digital-potshots-ramp-up-cyber-threats-for-private-organizations/?pk_campaign=feed&#038;pk_kwd=summary-china-vs-the-cia-digital-potshots-ramp-up-cyber-threats-for-private-organizations#respond</comments>
		
		<dc:creator><![CDATA[Bryan Lutz]]></dc:creator>
		<pubDate>Wed, 03 Jan 2024 23:09:47 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=29152</guid>

					<description><![CDATA[&#160; &#160; The article discusses the intensifying cyber conflict between China, the US and its Central Intelligence Agency, highlighting the evolution of China&#8217;s cyber capabilities under President Xi Jinping and the CIA&#8217;s expansive cyber operations. China has advanced from basic cyber espionage to sophisticated attacks on global infrastructure, using tools like the Daxin malware. The [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Fsummary-china-vs-the-cia-digital-potshots-ramp-up-cyber-threats-for-private-organizations%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dsummary-china-vs-the-cia-digital-potshots-ramp-up-cyber-threats-for-private-organizations&amp;action_name=Summary%3A%20China%20vs.%20the%20CIA%3A%20Digital%20Potshots%20Ramp%20Up%20Cyber%20Threats%20for%20Private%20Organizations&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/summary-china-vs-the-cia-digital-potshots-ramp-up-cyber-threats-for-private-organizations/?pk_campaign=feed&#038;pk_kwd=summary-china-vs-the-cia-digital-potshots-ramp-up-cyber-threats-for-private-organizations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
