<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Computers &#8211; News Journos</title>
	<atom:link href="https://newsjournos.com/tag/computers/feed/" rel="self" type="application/rss+xml" />
	<link>https://newsjournos.com</link>
	<description>Independent News and Headlines</description>
	<lastBuildDate>Tue, 07 Oct 2025 01:30:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://newsjournos.com/wp-content/uploads/2025/02/cropped-The_News_Journos_Fav-1-32x32.png</url>
	<title>Computers &#8211; News Journos</title>
	<link>https://newsjournos.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Effective Methods for Detecting and Removing Malware from Infected Mac Computers</title>
		<link>https://newsjournos.com/effective-methods-for-detecting-and-removing-malware-from-infected-mac-computers/</link>
					<comments>https://newsjournos.com/effective-methods-for-detecting-and-removing-malware-from-infected-mac-computers/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[News Editor]]></dc:creator>
		<pubDate>Tue, 07 Oct 2025 01:30:36 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Consumer Electronics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Science]]></category>
		<category><![CDATA[Detecting]]></category>
		<category><![CDATA[E-Commerce]]></category>
		<category><![CDATA[Effective]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Gadgets]]></category>
		<category><![CDATA[infected]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Methods]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[removing]]></category>
		<category><![CDATA[Robotics]]></category>
		<category><![CDATA[Software Updates]]></category>
		<category><![CDATA[Startups]]></category>
		<category><![CDATA[Tech Reviews]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Virtual Reality]]></category>
		<guid isPermaLink="false">https://newsjournos.com/effective-methods-for-detecting-and-removing-malware-from-infected-mac-computers/</guid>

					<description><![CDATA[<p>This article is published by News Journos</p>
<p>In an increasingly digital age, the reliability of devices like MacBooks has been taken for granted. Many users trust Apple’s macOS to be secure and robust against threats, but recent events reveal that malware targeting Mac systems is becoming more sophisticated and widespread. A cautionary tale from a user in Phoenix illustrates the urgent need [...]</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article is published by News Journos</p>
<p style="text-align:left;">In an increasingly digital age, the reliability of devices like MacBooks has been taken for granted. Many users trust Apple’s macOS to be secure and robust against threats, but recent events reveal that malware targeting Mac systems is becoming more sophisticated and widespread. A cautionary tale from a user in Phoenix illustrates the urgent need for vigilance and protective measures against potential malware infections.</p>
<table style="width:100%; text-align:left; border-collapse:collapse;">
<thead>
<tr>
<th style="text-align:left; padding:5px;">
        <strong>Article Subheadings</strong>
      </th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>1)</strong> Signs Your Mac Might Be Infected
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>2)</strong> How macOS Protects You by Default
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>3)</strong> What to Do If Your Mac Is Already Infected
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>4)</strong> 7 Ways to Keep Your Mac From Getting Infected
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>5)</strong> Key Takeaway on Cybersecurity
      </td>
</tr>
</tbody>
</table>
<h3 style="text-align:left;">Signs Your Mac Might Be Infected</h3>
<p style="text-align:left;">Spotting malware on a Mac could prove challenging, particularly as many threats are stealthily designed to operate unnoticed, gathering sensitive information or creating backdoors for attackers. Users are encouraged to watch for several key indicators that may signify a compromised system.</p>
<p style="text-align:left;">One of the most prevalent signs of malware infection is a noticeable decrease in performance. If your Mac suddenly takes longer to boot or becomes excessively warm during basic tasks, these may serve as red flags. For instance, applications that frequently crash or freeze can indicate that the system is dealing with cyber threats. Observing built-in applications such as Safari or Notes behaving abnormally may also point to problems.</p>
<p style="text-align:left;">Monitoring system activity can be helpful as well. Checking the Activity Monitor can reveal unknown processes that are consuming excessive CPU or memory, which could indicate the presence of malware disguised as ordinary applications. Furthermore, if web traffic is redirected unexpectedly or if strange pop-ups appear, it may be indicative of adware or spyware already infiltrating the user’s device.</p>
<p style="text-align:left;">Finally, unexplained changes to essential security settings should raise suspicion. If users find their firewall disabled or other security permissions modified without their knowledge, their device may have fallen victim to unauthorized access.</p>
<h3 style="text-align:left;">How macOS Protects You by Default</h3>
<p style="text-align:left;">Apple integrated several protective measures into macOS to defend against malware, many of which function silently to maintain user security. Understanding how these systems work is critical to recognizing the safeguards already in place and identifying areas where users may need to implement additional measures.</p>
<p style="text-align:left;">Gatekeeper serves as one of the primary built-in security mechanisms. It evaluates every application prior to execution, verifying if it comes from a legitimate developer. If the app in question is not trusted, Gatekeeper alerts users or blocks the application from launching.</p>
<p style="text-align:left;">XProtect functions as Apple&#8217;s built-in malware scanner, which continuously updates to defend against known threats. While it provides essential protection, it is not a substitute for specialized antivirus software and may lack comprehensive defensive capabilities.</p>
<p style="text-align:left;">System Integrity Protection (SIP) further enhances system security by locking crucial system files and processes, preventing alterations even by malicious software if such intrusions occur. Additionally, macOS employs sandboxing technology and strict permission controls to limit potential threats. Applications operate in isolated environments and must formally request permission to gain access to sensitive data like the user&#8217;s camera, location, or files.</p>
<p style="text-align:left;">Collectively, these features create a robust framework, significantly complicating an attacker&#8217;s ability to compromise a Mac. Nonetheless, no system is entirely invulnerable, as criminals continuously refine their tactics to breach even the most secure software. Hence, taking extra safety precautions is still highly recommended for users.</p>
<h3 style="text-align:left;">What to Do If Your Mac Is Already Infected</h3>
<p style="text-align:left;">If you suspect your Mac is already compromised, following a series of steps can help regain control and secure your information:</p>
<h3 style="text-align:left;">1) Disconnect from the Internet Immediately</h3>
<p style="text-align:left;">Unplugging the Ethernet connection or disabling Wi-Fi and Bluetooth is crucial. This action effectively halts malware from transmitting additional data or pulling in fresh malicious code.</p>
<h3 style="text-align:left;">2) Back Up Your Important Files Safely</h3>
<p style="text-align:left;">Utilize a trusted external drive or cloud service to back up essential files. It is advisable to avoid archiving entire system folders to prevent backing up malware. Concentrate on personal documents, photos, and irreplaceable files instead.</p>
<h3 style="text-align:left;">3) Boot into Safe Mode</h3>
<p style="text-align:left;">Restarting your machine while holding the Shift key enables Safe Mode. This mode inhibits certain types of malware from launching, facilitating easier access for cleanup tools.</p>
<h3 style="text-align:left;">4) Run a Trusted Malware Removal Tool</h3>
<p style="text-align:left;">While XProtect provides basic defenses, utilizing a robust third-party antivirus application can uncover and eliminate infections more effectively. Running a complete system scan is crucial to identifying hidden threats.</p>
<h3 style="text-align:left;">5) Check Your Login Items and Activity Monitor</h3>
<p style="text-align:left;">Examine the list of apps designated to launch at start-up and remove any unrecognized items. If you identify unfamiliar processes utilizing excessive resources, verify these names against trusted sources before proceeding.</p>
<h3 style="text-align:left;">6) Consider a Clean Reinstall of macOS</h3>
<p style="text-align:left;">In cases where malware persists, reinstalling macOS may be necessary. This process entails wiping your hard drive clean and restoring only previously backed-up files that are confirmed to be malware-free.</p>
<h3 style="text-align:left;">7) Secure Your Other Devices</h3>
<p style="text-align:left;">Check other connected devices, such as iPhones or iPads, for abnormal functioning. Conduct security scans, update software, and reset important passwords, particularly if devices share networks or accounts.</p>
<h3 style="text-align:left;">8) Reset Key Passwords and Enable Two-Factor Authentication</h3>
<p style="text-align:left;">Assume that some data may have been compromised. Change passwords for key accounts, enabling two-factor authentication where feasible to bolster security.</p>
<h3 style="text-align:left;">9) Get Professional Help If Needed</h3>
<p style="text-align:left;">If overwhelmed, consider seeking assistance from an Apple Store or scheduling a consultation with Apple Support to address malware issues comprehensively.</p>
<h3 style="text-align:left;">7 Ways to Keep Your Mac From Getting Infected</h3>
<p style="text-align:left;">While many threats may not be immediately apparent, users can bolster their defenses significantly by adhering to the following recommendations:</p>
<h3 style="text-align:left;">1) Install Strong Antivirus Software</h3>
<p style="text-align:left;">Basic protections provided by macOS are beneficial but insufficient. Comprehensive antivirus protection adds an extra layer, offering real-time threat detection and blocking malicious downloads.</p>
<h3 style="text-align:left;">2) Consider a Personal Data Removal Service</h3>
<p style="text-align:left;">Cyberattacks often exploit freely available information. A personal data removal service works to scrub sensitive details from broker sites, mitigating targeted threats and identity theft.</p>
<h3 style="text-align:left;">3) Use a Password Manager</h3>
<p style="text-align:left;">Many malicious activities exploit stolen credentials. A reliable password manager ensures unique, complex passwords for each account while identifying weak or reused entries.</p>
<h3 style="text-align:left;">4) Enable Two-Factor Authentication</h3>
<p style="text-align:left;">Implementing two-factor authentication makes unauthorized account access considerably more difficult, providing an essential security layer even if passwords are compromised.</p>
<h3 style="text-align:left;">5) Keep macOS and Apps Updated</h3>
<p style="text-align:left;">Each update delivered often addresses crucial vulnerabilities, so enabling automatic updates is a simple yet effective tactic for malware prevention.</p>
<h3 style="text-align:left;">6) Review Login Items and Background Processes</h3>
<p style="text-align:left;">Routine checks of System Settings to identify and eliminate untrusted applications from starting at launch can mitigate future attacks. Utilizing Activity Monitor allows users to investigate suspicious background activities.</p>
<h3 style="text-align:left;">7) Use Identity Theft Protection</h3>
<p style="text-align:left;">If personal information has already been compromised, identity theft protection services can assist in monitoring for unauthorized activities and aiding rapid recovery.</p>
<h2 style="text-align:left;">Key Points</h2>
<table style="width:100%; text-align:left;">
<thead>
<tr>
<th style="text-align:left;"><strong>No.</strong></th>
<th style="text-align:left;"><strong>Key Points</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left;">1</td>
<td style="text-align:left;">Macs are not immune to malware; infections can be stealthy and damaging.</td>
</tr>
<tr>
<td style="text-align:left;">2</td>
<td style="text-align:left;">Users should regularly monitor system performance and applications for any suspicious behavior.</td>
</tr>
<tr>
<td style="text-align:left;">3</td>
<td style="text-align:left;">Apple includes essential built-in protection, but additional security measures are vital.</td>
</tr>
<tr>
<td style="text-align:left;">4</td>
<td style="text-align:left;">Users should act promptly if they suspect malware, starting with disconnecting from the internet.</td>
</tr>
<tr>
<td style="text-align:left;">5</td>
<td style="text-align:left;">Proactive steps such as installing antivirus software and utilizing password managers can reduce risk significantly.</td>
</tr>
</tbody>
</table>
<h2 style="text-align:left;">Summary</h2>
<p style="text-align:left;">The increasing sophistication of malware targeting Macs serves as a critical reminder for users to remain vigilant. While Apple’s built-in security measures offer a base level of protection, they are not foolproof. Taking proactive measures can significantly enhance a user’s defenses, safeguarding personal information and maintaining device integrity.</p>
<h2 style="text-align:left;">Frequently Asked Questions</h2>
<p><strong>Question: What should I do if I suspect my Mac is infected with malware?</strong></p>
<p style="text-align:left;">Disconnect from the internet immediately, back up your important files, and run a trusted antivirus program to scan for and remove potential threats.</p>
<p><strong>Question: How can I tell if my Mac is infected with malware?</strong></p>
<p style="text-align:left;">Look for signs such as slower performance, frequent application crashes, and unauthorized changes to system settings. You can also check the Activity Monitor for unusual processes.</p>
<p><strong>Question: Is macOS inherently safer than other operating systems?</strong></p>
<p style="text-align:left;">While macOS has robust built-in security features, it is not invulnerable. Malware is evolving, and users must take additional precautions to protect their systems.</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://newsjournos.com/effective-methods-for-detecting-and-removing-malware-from-infected-mac-computers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Email Scam Exposes Users&#8217; Computers and Bank Accounts to Hackers</title>
		<link>https://newsjournos.com/fake-email-scam-exposes-users-computers-and-bank-accounts-to-hackers/</link>
					<comments>https://newsjournos.com/fake-email-scam-exposes-users-computers-and-bank-accounts-to-hackers/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[News Editor]]></dc:creator>
		<pubDate>Wed, 14 May 2025 14:33:00 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accounts]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[bank]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Consumer Electronics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Science]]></category>
		<category><![CDATA[E-Commerce]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[exposes]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Gadgets]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[Robotics]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[Software Updates]]></category>
		<category><![CDATA[Startups]]></category>
		<category><![CDATA[Tech Reviews]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Virtual Reality]]></category>
		<guid isPermaLink="false">https://newsjournos.com/fake-email-scam-exposes-users-computers-and-bank-accounts-to-hackers/</guid>

					<description><![CDATA[<p>This article is published by News Journos</p>
<p>Online scams are becoming increasingly sophisticated, posing significant threats to individuals&#8217; financial security and personal information. A recent experience shared by a resident from King George, Virginia, highlights the dangers of responding to suspicious emails. This alarming incident serves as a crucial reminder of the tactics employed by cybercriminals in remote access scams and how [...]</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article is published by News Journos</p>
<p style="text-align:left;">Online scams are becoming increasingly sophisticated, posing significant threats to individuals&#8217; financial security and personal information. A recent experience shared by a resident from King George, Virginia, highlights the dangers of responding to suspicious emails. This alarming incident serves as a crucial reminder of the tactics employed by cybercriminals in remote access scams and how individuals can protect themselves effectively.</p>
<table style="width:100%; text-align:left; border-collapse:collapse;">
<thead>
<tr>
<th style="text-align:left; padding:5px;">
        <strong>Article Subheadings</strong>
      </th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>1)</strong> John’s Alarming Experience with a Scam
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>2)</strong> Understanding Remote Access Scams
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>3)</strong> Key Takeaways from John&#8217;s Experience
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>4)</strong> Protecting Yourself from Remote Access Scams
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>5)</strong> Final Thoughts on Cybersecurity Awareness
      </td>
</tr>
</tbody>
</table>
<h3 style="text-align:left;">John’s Alarming Experience with a Scam</h3>
<p style="text-align:left;">In a startling narrative, a resident from King George, Virginia, identified as <strong>John</strong>, recently encountered a severe cyber scam that nearly cost him control over his computer and bank accounts. John&#8217;s experience began when he received a seemingly legitimate email from what appeared to be PayPal, informing him of a dubious laptop purchase he had supposedly made. The email contained phone numbers that looked authentic and a sense of urgency that manipulated John&#8217;s judgment.</p>
<p style="text-align:left;">Thinking he was dealing with an actual PayPal representative, <strong>John</strong> called the number listed in the email. After connecting with an individual who claimed to be a customer service agent, he received instructions that instructed him to enter a strange code into his browser, which ultimately facilitated the installation of malicious software on his computer. Alarmingly, a message soon appeared on his screen declaring, “software updating – do not turn off PC,” as the scammer silently gained access to John&#8217;s entire file system.</p>
<p style="text-align:left;">The situation escalated further as the scammer accessed John&#8217;s bank account, transferring funds between accounts without his knowledge. Compounding the urgency, the scammer urged <strong>John</strong> to keep quiet about the situation and to head to the bank while keeping him on the line. However, after realizing the severity of the situation, John took rapid action. He managed to disconnect from the internet, shut down his computer, and then contacted his bank to report the unauthorized transactions and change his passwords.</p>
<h3 style="text-align:left;">Understanding Remote Access Scams</h3>
<p style="text-align:left;">This type of online deception is classified as a remote access scam, which hinges on tricking users into inadvertently granting hackers control over their devices. The initial contact often occurs via a fraudulent email that impersonates a reputable company, such as PayPal. These emails typically claim that there&#8217;s a pressing issue needing immediate attention, such as a fraudulent charge or security breach.</p>
<p style="text-align:left;">Once communication is established, scammers guide victims to enter a specific code into their web browser or download an application, under the false pretext of securing their account. This action provides the attackers unchecked access to the victim&#8217;s computer and data, allowing them to scour files for sensitive information, access banking accounts, and even install persistent malware that can continue to threaten security long after the initial incident.</p>
<p style="text-align:left;">Victims frequently remain unaware of the ongoing access unless they notice suspicious online activity or account discrepancies. Typically, the entire process can unfold within minutes, leading to substantial theft and loss, highlighting the importance of swift and decisive action for anyone who may find themselves in such a compromised situation.</p>
<h3 style="text-align:left;">Key Takeaways from John&#8217;s Experience</h3>
<p style="text-align:left;"><strong>John&#8217;s</strong> harrowing experience serves as an essential educational tool, emphasizing several critical points that can help others recognize and avoid similar scams.</p>
<p style="text-align:left;"><strong>Fake Emails are Harder to Spot than Ever:</strong> Modern scammers expertly craft emails that closely mirror official communications from recognized entities like PayPal. They clone logos, formatting, and even customer service contact details, making them appear authentic. To safeguard against such threats, users should always scrutinize the sender’s email address and verify communications by accessing the official company website directly rather than relying on links provided within emails.</p>
<p style="text-align:left;"><strong>Remote Access Scams Can Escalate Fast:</strong> The moment scammers gain access to a victim&#8217;s device, the potential for immediate and severe damage increases dramatically. They can steal sensitive data, move funds between accounts, and embed malware that remains hidden to the user, allowing future breaches.</p>
<p style="text-align:left;"><strong>Psychological Pressure Plays a Big Role:</strong> Many scams leverage tactics that induce urgency or fear, such as emphasizing the need for secrecy or pressuring victims to act quickly. Being aware of these strategies can empower individuals to resist the scammers&#8217; control and regain agency over the situation.</p>
<p style="text-align:left;"><strong>Fast Action Can Make All the Difference:</strong> In <strong>John&#8217;s</strong> case, his rapid decision to disconnect his computer and inform his bank effectively reduced the damage inflicted by the scammer. Prompt action can thwart further theft, protect sensitive information, and deter criminals from exploiting compromised credentials.</p>
<h3 style="text-align:left;">Protecting Yourself from Remote Access Scams</h3>
<p style="text-align:left;">Adopting simple yet effective security measures can significantly reduce the risk of falling victim to such scams.</p>
<p style="text-align:left;"><strong>1. Never Call a Number Listed in a Suspicious Email:</strong> Scammers create their own professional-sounding phone numbers, designed to mislead victims into giving up personal information. Always find verified contact numbers from a company&#8217;s official website, never the ones listed in dubious emails.</p>
<p style="text-align:left;"><strong>2. Be Skeptical of Unusual Instructions:</strong> If asked to install software or enter strange codes, alertness is crucial. Legitimate companies typically do not require such actions to secure accounts.</p>
<p style="text-align:left;"><strong>3. Install Strong Antivirus Software:</strong> Reliable antivirus programs can detect suspicious downloads and prevent unauthorized access attempts. Ensure antivirus protection is continuously updated across all devices.</p>
<p style="text-align:left;"><strong>4. Use Identity Theft Protection:</strong> These services monitor your financial accounts and online activity for signs of fraud, providing alerts when suspicious transactions occur.</p>
<p style="text-align:left;"><strong>5. React Immediately if You Suspect a Scam:</strong> Disconnect your device from the internet and notify your bank or credit card company instantly if you detect unusual activity. Acting quickly minimizes potential damages.</p>
<p style="text-align:left;"><strong>6. Use Multifactor Authentication (MFA):</strong> Enabling MFA across all accounts adds an extra layer of security, making unauthorized access much more challenging.</p>
<p style="text-align:left;"><strong>7. Update Devices and Software Promptly:</strong> Regular updates install security patches for known vulnerabilities, hindering the potential for malware installation.</p>
<p style="text-align:left;"><strong>8. Utilize a Password Manager:</strong> A reliable password manager can create complex, unique passwords to prevent credential-stuffing attacks.</p>
<p style="text-align:left;"><strong>9. Never Share Screen Access:</strong> Legitimate tech support will never ask for unsolicited screen access. If pressured for such access, end the conversation.</p>
<p style="text-align:left;"><strong>10. Invest in Personal Data Removal Services:</strong> These services can help automate the process of keeping your personal information secure from potential scammers.</p>
<h3 style="text-align:left;">Final Thoughts on Cybersecurity Awareness</h3>
<p style="text-align:left;"><strong>John&#8217;s</strong> story serves as a crucial reminder of the evolution and increasing aggressiveness of online scams. Individuals need to remain vigilant, verifying the authenticity of suspicious communications, and act swiftly if they sense danger. Protecting personal devices and maintaining a cautious demeanor are invaluable strategies in an age where cyber threats are ever-present.</p>
<table style="width:100%; text-align:left;">
<thead>
<tr>
<th style="text-align:left;"><strong>No.</strong></th>
<th style="text-align:left;"><strong>Key Points</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left;">1</td>
<td style="text-align:left;">Online scams are becoming increasingly sophisticated and aggressive.</td>
</tr>
<tr>
<td style="text-align:left;">2</td>
<td style="text-align:left;">Cybercriminals often use urgent tactics to manipulate victims into acting quickly.</td>
</tr>
<tr>
<td style="text-align:left;">3</td>
<td style="text-align:left;">Victims must be proactive in protecting their personal and financial information.</td>
</tr>
<tr>
<td style="text-align:left;">4</td>
<td style="text-align:left;">Fast recognition and immediate action can significantly mitigate damages.</td>
</tr>
<tr>
<td style="text-align:left;">5</td>
<td style="text-align:left;">Awareness of cybersecurity measures is crucial to avoiding scams.</td>
</tr>
</tbody>
</table>
<h2 style="text-align:left;">Summary</h2>
<p style="text-align:left;">The incident shared by <strong>John</strong> is indicative of the growing prevalence and complexity of online scams. As cybercriminals employ more sophisticated techniques to deceive individuals, it becomes paramount for users to enhance their cybersecurity awareness. By understanding the tactics used by hackers and adhering to recommended safety practices, individuals can better safeguard their digital lives from potential threats.</p>
<h2 style="text-align:left;">Frequently Asked Questions</h2>
<p><strong>Question: What should I do if I suspect I have fallen victim to a scam?</strong></p>
<p style="text-align:left;">If you believe you are a victim of a scam, immediately disconnect your device from the internet, notify your bank, and change your passwords. It&#8217;s crucial to act quickly to minimize potential damage.</p>
<p><strong>Question: How can I recognize a phishing email?</strong></p>
<p style="text-align:left;">Phishing emails often contain spelling errors, require urgent action, and ask for sensitive information. Always verify the sender&#8217;s address and avoid clicking on suspicious links.</p>
<p><strong>Question: What is multifactor authentication, and why should I use it?</strong></p>
<p style="text-align:left;">Multifactor authentication (MFA) adds an extra layer of protection to your accounts by requiring not just a password but also another form of verification, such as a code sent to your phone. This significantly reduces the likelihood of unauthorized access.</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://newsjournos.com/fake-email-scam-exposes-users-computers-and-bank-accounts-to-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Tariffs Exempt Smartphones and Computers from China</title>
		<link>https://newsjournos.com/new-tariffs-exempt-smartphones-and-computers-from-china/</link>
					<comments>https://newsjournos.com/new-tariffs-exempt-smartphones-and-computers-from-china/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[News Editor]]></dc:creator>
		<pubDate>Sun, 13 Apr 2025 05:39:22 +0000</pubDate>
				<category><![CDATA[Europe News]]></category>
		<category><![CDATA[Brexit]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Continental Affairs]]></category>
		<category><![CDATA[Cultural Developments]]></category>
		<category><![CDATA[Economic Integration]]></category>
		<category><![CDATA[Energy Crisis]]></category>
		<category><![CDATA[Environmental Policies]]></category>
		<category><![CDATA[EU Policies]]></category>
		<category><![CDATA[European Leaders]]></category>
		<category><![CDATA[European Markets]]></category>
		<category><![CDATA[European Politics]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Eurozone Economy]]></category>
		<category><![CDATA[Exempt]]></category>
		<category><![CDATA[Infrastructure Projects]]></category>
		<category><![CDATA[International Relations]]></category>
		<category><![CDATA[Migration Issues]]></category>
		<category><![CDATA[Regional Cooperation]]></category>
		<category><![CDATA[Regional Security]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Social Reforms]]></category>
		<category><![CDATA[tariffs]]></category>
		<category><![CDATA[Technology in Europe]]></category>
		<category><![CDATA[Trade Agreements]]></category>
		<guid isPermaLink="false">https://newsjournos.com/new-tariffs-exempt-smartphones-and-computers-from-china/</guid>

					<description><![CDATA[<p>This article is published by News Journos</p>
<p>The administration of US President Donald Trump has officially excluded smartphones and computers from its previously announced 10% global reciprocal tariffs. This exemption aims to stabilize prices for popular consumer electronics that are primarily manufactured overseas. In addition, the decision affects a broader range of electronic devices, promoting advantageous conditions for major American technology companies [...]</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article is published by News Journos</p>
<div style="--widget_related_list_trans: 'Related';">
<p style="text-align:left;">The administration of US President <strong>Donald Trump</strong> has officially excluded smartphones and computers from its previously announced 10% global reciprocal tariffs. This exemption aims to stabilize prices for popular consumer electronics that are primarily manufactured overseas. In addition, the decision affects a broader range of electronic devices, promoting advantageous conditions for major American technology companies amid ongoing trade tensions with China.</p>
<table style="width:100%; text-align:left; border-collapse:collapse;">
<thead>
<tr>
<th style="text-align:left; padding:5px;">
          <strong>Article Subheadings</strong>
        </th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left; padding:5px;">
          <strong>1)</strong> Exemption Details from Tariffs
        </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
          <strong>2)</strong> Impacts on Technology Giants
        </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
          <strong>3)</strong> Trade Policies and Manufacturing Challenges
        </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
          <strong>4)</strong> Apple&#8217;s Manufacturing Dilemma
        </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
          <strong>5)</strong> Future Implications of Tariff Adjustments
        </td>
</tr>
</tbody>
</table>
<h3 style="text-align:left;">Exemption Details from Tariffs</h3>
<p style="text-align:left;">The recent announcement by the Trump administration comes as a surprise to many in the tech industry. A notice from US Customs and Border Protection indicated that the exemption will not only apply to smartphones and computers but will also include other electronic devices and components, such as semiconductors, solar cells, and memory cards. This strategic move aims to mitigate the financial strain on consumers and businesses alike, particularly in sectors heavily reliant on imported technologies.</p>
<p style="text-align:left;">The effective date of this exemption is critical; it applies to products that entered the United States or were removed from warehouses starting from April 5. The timing aligns with ongoing discussions about international trade and the economic landscape influenced by rising tariffs. The exemption reflects a nuanced understanding of the complexities surrounding global supply chains, especially in the electronics sector.</p>
<h3 style="text-align:left;">Impacts on Technology Giants</h3>
<p style="text-align:left;">This new exemption is expected to be particularly beneficial for major American technology companies such as <strong>Apple</strong>. Reports from financial analysts, including those from Wedbush Securities, highlight that approximately 90% of <strong>Apple</strong>&#8216;s iPhone production currently takes place in China. By exempting these products from tariffs, the Trump administration acknowledges the significant economic interdependence between US companies and Asian manufacturing hubs.</p>
<p style="text-align:left;">The exclusion from tariffs aims to keep consumer prices more stable, fostering continued demand for electronic products. Consumer electronics are often viewed as crucial items for the average American; therefore, ensuring their affordability remains essential, especially in a climate of rising costs influenced by tariffs and inflation. By keeping these tariffs out of the equation, the administration seems committed to not stifling a vital sector of the economy.</p>
<h3 style="text-align:left;">Trade Policies and Manufacturing Challenges</h3>
<p style="text-align:left;">The exemption is not merely a standalone decision; it is part of a broader pattern of adjustments made by the Trump administration concerning tariff implementations. The administration initially sought extensive tariffs on a wide range of imports from various countries, especially China, aiming to revive domestic manufacturing. However, the ongoing realities of global trade have led to a reconsideration of these positions. This shift points to the challenges inherent in modifying an established, complex supply chain that predominantly exists in Asia.</p>
<p style="text-align:left;">Reflecting on the administration&#8217;s trade policies, experts note that various tariff rates have been adjusted since they were introduced, indicating a reconsideration of original goals. The aim of fostering domestic manufacturing encounters practical challenges, notably the entrenched nature of global supply chains that are difficult to relocate swiftly. This evolving perspective suggests that while the administration is committed to domestic growth, it must also heed the current economic landscape and its implications for international commerce.</p>
<h3 style="text-align:left;">Apple&#8217;s Manufacturing Dilemma</h3>
<p style="text-align:left;">Despite the favorable tariff exemption, <strong>Apple</strong> still faces significant hurdles regarding shifting its production lines from China to the US. The company has built a comprehensive and intricate supply chain over decades, beginning in the 1990s, which is not easily replicated in the United States. Not only would it take substantial time and investment to establish new manufacturing facilities, but there are also concerns over potential cost increases that could occur from such a transition.</p>
<p style="text-align:left;">Analysts predict that relocating manufacturing operations could triple the costs of producing an iPhone, a scenario that could prove devastating for <strong>Apple</strong>&#8216;s market positioning and sales. This calculation underscores the delicate balance between governmental push for domestic manufacturing and the economic realities faced by well-established corporations reliant on complex manufacturing processes.</p>
<h3 style="text-align:left;">Future Implications of Tariff Adjustments</h3>
<p style="text-align:left;">Looking ahead, the administration&#8217;s recent tariff exemptions may pave the way for further adjustments in international trade policies that could influence not only technology firms but a wide spectrum of industries. As companies navigate these new conditions, they may find opportunities for growth alongside challenges requiring strategic adaptations. The administration&#8217;s willingness to adjust tariffs highlights a responsive approach to economic realities, a necessary trait in a rapidly evolving global market.</p>
<p style="text-align:left;">The dynamic nature of international trade and the tariffs applied by the US government reveal intricate connections between policy, economy, and consumer experiences. By alleviating tariffs on key electronic components and devices, the current administration seems to recognize the value of keeping essential consumer electronics both accessible and affordable. Monitoring these developments will be critical as implications for both consumers and industries continue to unfold.</p>
<table style="width:100%; text-align:left;">
<thead>
<tr>
<th style="text-align:left;"><strong>No.</strong></th>
<th style="text-align:left;"><strong>Key Points</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left;">1</td>
<td style="text-align:left;">Smartphones and computers are exempt from the 10% global reciprocal tariffs announced by the Trump administration.</td>
</tr>
<tr>
<td style="text-align:left;">2</td>
<td style="text-align:left;">The exemption extends to various electronic devices including semiconductors, solar cells, and memory cards.</td>
</tr>
<tr>
<td style="text-align:left;">3</td>
<td style="text-align:left;">American tech giants like <strong>Apple</strong> benefit significantly from lower tariffs on products manufactured overseas.</td>
</tr>
<tr>
<td style="text-align:left;">4</td>
<td style="text-align:left;">There are ongoing challenges in moving manufacturing from China to the US due to established supply chains.</td>
</tr>
<tr>
<td style="text-align:left;">5</td>
<td style="text-align:left;">Future tariff adjustments may continue to shape the economic landscape for various industries and consumer prices.</td>
</tr>
</tbody>
</table>
<h2 style="text-align:left;">Summary</h2>
<p style="text-align:left;">The Trump administration&#8217;s decision to exclude smartphones and computers from new tariffs marks a significant moment in ongoing trade discussions. By recognizing the need to support major technology companies and stabilize consumer prices, this policy adjustment could have lasting implications for the electronics market and broader economy. However, the underlying challenges related to manufacturing logistics and supply chain complexities continue to pose significant obstacles for companies like <strong>Apple</strong>, prompting a careful consideration of future strategies.</p>
<h2 style="text-align:left;">Frequently Asked Questions</h2>
<p>  <strong>Question: What is the rationale behind the tariff exemptions for electronics?</strong></p>
<p style="text-align:left;">The exemptions aim to alleviate financial pressure on consumers and businesses reliant on imported electronics, ensuring continued affordability for essential technological products.</p>
<p>  <strong>Question: How could these tariff changes impact American tech companies?</strong></p>
<p style="text-align:left;">By exempting key products from tariffs, American tech companies, especially those like <strong>Apple</strong>, may maintain their market competitiveness while potentially enhancing production strategies without the burden of increased costs.</p>
<p>  <strong>Question: What are the challenges regarding shifting manufacturing from China to the US?</strong></p>
<p style="text-align:left;">Shifting manufacturing presents significant hurdles, including the need to recreate complex supply chains developed over decades and the potential for drastically increased production costs, which could negatively affect product pricing and sales.</p>
</div>
<p>©2025 News Journos. All rights reserved.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://newsjournos.com/new-tariffs-exempt-smartphones-and-computers-from-china/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>U.S. Exempts Smartphones and Computers from Trump Tariffs</title>
		<link>https://newsjournos.com/u-s-exempts-smartphones-and-computers-from-trump-tariffs/</link>
					<comments>https://newsjournos.com/u-s-exempts-smartphones-and-computers-from-trump-tariffs/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[News Editor]]></dc:creator>
		<pubDate>Sat, 12 Apr 2025 16:26:16 +0000</pubDate>
				<category><![CDATA[Money Watch]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Budgeting]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Consumer Finance]]></category>
		<category><![CDATA[Credit Cards]]></category>
		<category><![CDATA[Debt Management]]></category>
		<category><![CDATA[Economic Indicators]]></category>
		<category><![CDATA[Economic Trends]]></category>
		<category><![CDATA[Entrepreneurship]]></category>
		<category><![CDATA[Exempts]]></category>
		<category><![CDATA[Financial Literacy]]></category>
		<category><![CDATA[Financial News]]></category>
		<category><![CDATA[Financial Planning]]></category>
		<category><![CDATA[Investing]]></category>
		<category><![CDATA[Market Analysis]]></category>
		<category><![CDATA[Money Tips]]></category>
		<category><![CDATA[Personal Finance]]></category>
		<category><![CDATA[Retirement]]></category>
		<category><![CDATA[Saving]]></category>
		<category><![CDATA[Side Hustles]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Stock Market]]></category>
		<category><![CDATA[tariffs]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[U.S]]></category>
		<category><![CDATA[Wealth Management]]></category>
		<guid isPermaLink="false">https://newsjournos.com/u-s-exempts-smartphones-and-computers-from-trump-tariffs/</guid>

					<description><![CDATA[<p>This article is published by News Journos</p>
<p>The ongoing trade conflict between the United States and China continues to impact consumers and businesses, as recent actions by the Trump administration have led to a notable exemption of electronics from tariffs. A recent notice published by U.S. Customs and Border Protection highlighted this decision, which is aimed at mitigating potential price increases on [...]</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article is published by News Journos</p>
<div id="article-0">
<p style="text-align:left;">The ongoing trade conflict between the United States and China continues to impact consumers and businesses, as recent actions by the Trump administration have led to a notable exemption of electronics from tariffs. A recent notice published by U.S. Customs and Border Protection highlighted this decision, which is aimed at mitigating potential price increases on essential tech products. As both countries navigate their escalating tariffs, experts caution about the broader implications for the economy, including risks of recession and inflationary pressures.</p>
<table style="width:100%; text-align:left; border-collapse:collapse;">
<thead>
<tr>
<th style="text-align:left; padding:5px;">
        <strong>Article Subheadings</strong>
      </th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>1)</strong> Exemption of Electronics: A Strategic Move
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>2)</strong> The Potential Impact on Consumers
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>3)</strong> Escalating Tariffs: A Back-and-Forth Battle
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>4)</strong> Economic Implications: Risks and Predictions
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>5)</strong> Governmental Response and Market Reactions
      </td>
</tr>
</tbody>
</table>
<h3 style="text-align:left;">Exemption of Electronics: A Strategic Move</h3>
<p style="text-align:left;">In a recent announcement, U.S. Customs and Border Protection revealed that a variety of consumer electronics, including smartphones and components, will not be subjected to new tariffs imposed during the ongoing trade war with China. This decision appears to be a tactical maneuver by the Trump administration, intended to shield American consumers from the repercussions of increased costs on essential technology.</p>
<p style="text-align:left;">The exemption specifically targets high-demand products that play crucial roles in everyday life, such as smartphones, laptops, and other electronics. By exempting these items, authorities aim to dampen the potential for price surges that could affect millions of consumers who rely on these products for work and communication. The announcement adds a layer of complexity to the already convoluted trade relations between the U.S. and China, reflecting a delicate balancing act as officials attempt to navigate the economic fallout associated with tariffs.</p>
<h3 style="text-align:left;">The Potential Impact on Consumers</h3>
<p style="text-align:left;">For consumers, the implications of this exemption are significant, particularly concerning major manufacturers like <strong>Apple</strong>. Experts speculate that, without this exemption, the cost of devices like the iPhone could escalate dramatically. A recent analysis forecast that the price of an iPhone 16 Pro Max, which currently retails for approximately $1,199, could jump to nearly $1,874 if subjected to tariffs.</p>
<p style="text-align:left;">The effects of such price increases would not be limited to high-end devices. Mid-range and lower-end electronics would also likely see substantial price hikes, further complicating access to technology for consumers on tight budgets. The exemption comes as a relief to many, as it curtails the immediate financial burden on consumers while emphasizing the administration&#8217;s ongoing struggle to balance trade policy with public sentiment.</p>
<h3 style="text-align:left;">Escalating Tariffs: A Back-and-Forth Battle</h3>
<p style="text-align:left;">The trade war between the United States and China has escalated over the past months, marked by a series of tit-for-tat tariff hikes. China&#8217;s announcement that it would increase tariffs on U.S. goods from 84% to 125% demonstrates the severity of the situation. The scheduled implementation of these new tariffs is indicative of the lack of progress in negotiations, with both nations adopting aggressive stances.</p>
<p style="text-align:left;">With President Trump&#8217;s universal tariffs on China reaching a staggering 145%, market analysts have voiced concerns regarding the broader economic implications of such elevated tariff levels. The escalating conflict has not only strained trade relations but has also created uncertainty in global markets, leading to heightened volatility and fears of a potential economic downturn.</p>
<h3 style="text-align:left;">Economic Implications: Risks and Predictions</h3>
<p style="text-align:left;">Experts warn that the ongoing trade conflict, particularly the threat of tariffs, may reignite inflation and propel the economy towards a recession. Increased costs of consumer goods, stemming from tariffs, can lead to reduced consumer spending, which is a crucial driver of economic growth. As prices rise, households may reassess their budgets, delaying significant purchases or opting for cost-effective alternatives.</p>
<p style="text-align:left;">Additionally, the bond market&#8217;s reaction has raised alarms among economists. The bond market’s performance is often seen as a bellwether for economic health, and a hostile reaction could signal investor apprehension about future economic stability. If investor confidence diminishes, it could curtail capital investment, further exacerbating economic issues, including job growth and wage stagnation.</p>
<h3 style="text-align:left;">Governmental Response and Market Reactions</h3>
<p style="text-align:left;">The White House has remained relatively silent in response to the latest round of tariffs and exemptions, confirming that President Trump and his advisors are closely monitoring the situation. As the administration grapples with the implications of its trade policies, market analysts are looking for signs of potential shifts in strategy that could provide relief to American consumers.</p>
<p style="text-align:left;">The lack of comment from government officials on the economic fallout adds to the uncertainty faced by businesses and consumers alike. Meanwhile, market reactions are being closely analyzed, with analysts urging parties involved to consider long-term impacts instead of short-term gains. A more stabilized approach to trade could be essential in fostering a more resilient economic climate.</p>
<table style="width:100%; text-align:left;">
<thead>
<tr>
<th style="text-align:left;"><strong>No.</strong></th>
<th style="text-align:left;"><strong>Key Points</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left;">1</td>
<td style="text-align:left;">U.S. Customs and Border Protection has exempted electronic goods from tariffs amid escalating trade tensions.</td>
</tr>
<tr>
<td style="text-align:left;">2</td>
<td style="text-align:left;">Consumer prices for essential electronics, like smartphones, may see massive price increases without the exemptions.</td>
</tr>
<tr>
<td style="text-align:left;">3</td>
<td style="text-align:left;">The trade war continues with China announcing significant increases in tariffs on U.S. goods.</td>
</tr>
<tr>
<td style="text-align:left;">4</td>
<td style="text-align:left;">Experts warn of potential inflation and recession risks due to ongoing tariff conflicts.</td>
</tr>
<tr>
<td style="text-align:left;">5</td>
<td style="text-align:left;">The White House&#8217;s limited response highlights the uncertainty regarding future trade policy decisions.</td>
</tr>
</tbody>
</table>
<h2 style="text-align:left;">Summary</h2>
<p style="text-align:left;">The exemption of electronics from tariffs represents a significant move amidst the ongoing trade war between the U.S. and China. While this decision may alleviate immediate cost pressures on consumers, the underlying economic issues associated with trade tariffs remain a cause for concern. As both nations continue their back-and-forth negotiations on tariffs, the broader implications for the global economy and the everyday consumer continue to unfold.</p>
<h2 style="text-align:left;">Frequently Asked Questions</h2>
<p><strong>Question: What products are exempt from the new tariffs?</strong></p>
<p style="text-align:left;">Electronics such as smartphones, laptops, and other essential technology are exempt from the latest tariffs, allowing consumers to avoid significant price increases on these products.</p>
<p><strong>Question: How could the tariffs affect consumer prices in the future?</strong></p>
<p style="text-align:left;">Without exemptions, tariffs on consumer electronics could lead to substantial price increases, potentially making essential technology less affordable for many American households.</p>
<p><strong>Question: What are the potential economic consequences of rising tariffs?</strong></p>
<p style="text-align:left;">Experts warn that escalating tariffs could reignite inflation and lead to a recession, as higher consumer prices may reduce spending power and economic growth.</p>
</div>
<p>©2025 News Journos. All rights reserved.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://newsjournos.com/u-s-exempts-smartphones-and-computers-from-trump-tariffs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
