<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security Archives - Blog Encounters</title>
	<atom:link href="https://blogencounters.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://blogencounters.com/tag/security/</link>
	<description>More Useful, Everyday!</description>
	<lastBuildDate>Mon, 16 Mar 2020 02:39:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blogencounters.com/wp-content/uploads/2016/11/belogo-48x48.jpg</url>
	<title>security Archives - Blog Encounters</title>
	<link>https://blogencounters.com/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Critical Vulnerabilities in Microsoft Windows Operating Systems (January 2020)</title>
		<link>https://blogencounters.com/202001/critical-vulnerabilities-in-microsoft-windows-operating-systems-january-2020/</link>
					<comments>https://blogencounters.com/202001/critical-vulnerabilities-in-microsoft-windows-operating-systems-january-2020/#respond</comments>
		
		<dc:creator><![CDATA[txg22]]></dc:creator>
		<pubDate>Tue, 14 Jan 2020 20:40:13 +0000</pubDate>
				<category><![CDATA[Technical Support]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[patchtuesday]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[securityalerts]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://blogencounters.com/?p=3899</guid>

					<description><![CDATA[<p><span class="span-reading-time rt-reading-time" style="display: block;"><span class="rt-label rt-prefix">Estimated Reading Time: </span> <span class="rt-time"> 4</span> <span class="rt-label rt-postfix">Minutes</span></span></p>
<div class="mh-excerpt">Critical Vulnerabilities in Microsoft Windows Operating Systems (January 2020) Summary: On January 14, 2020, Microsoft released software fixes to address 49 vulnerabilities as part of their monthly Patch Tuesday announcement. Among the vulnerabilities patched were <a class="mh-excerpt-more" href="https://blogencounters.com/202001/critical-vulnerabilities-in-microsoft-windows-operating-systems-january-2020/" title="Critical Vulnerabilities in Microsoft Windows Operating Systems (January 2020)">[Read More...]</a></div>
<p>The post <a href="https://blogencounters.com/202001/critical-vulnerabilities-in-microsoft-windows-operating-systems-january-2020/">Critical Vulnerabilities in Microsoft Windows Operating Systems (January 2020)</a> appeared first on <a href="https://blogencounters.com">Blog Encounters</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogencounters.com/202001/critical-vulnerabilities-in-microsoft-windows-operating-systems-january-2020/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The BlueKeep (CVE-2019-0708) Vulnerability</title>
		<link>https://blogencounters.com/201906/the-bluekeep-cve-2019-0708-vulnerability/</link>
					<comments>https://blogencounters.com/201906/the-bluekeep-cve-2019-0708-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[txg22]]></dc:creator>
		<pubDate>Wed, 19 Jun 2019 04:06:13 +0000</pubDate>
				<category><![CDATA[Technical Support]]></category>
		<category><![CDATA[bluekeep]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[securityalerts]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://blogencounters.com/?p=3842</guid>

					<description><![CDATA[<p><span class="span-reading-time rt-reading-time" style="display: block;"><span class="rt-label rt-prefix">Estimated Reading Time: </span> <span class="rt-time"> 2</span> <span class="rt-label rt-postfix">Minutes</span></span></p>
<div class="mh-excerpt">The BlueKeep (CVE-2019-0708) Vulnerability Quick Summary A recently discovered, critical, flaw affecting Remote Desktop Protocol (RDP) in multiple versions of Microsoft Windows has been discovered. Both Microsoft and the Department Of Homeland Security strongly urges <a class="mh-excerpt-more" href="https://blogencounters.com/201906/the-bluekeep-cve-2019-0708-vulnerability/" title="The BlueKeep (CVE-2019-0708) Vulnerability">[Read More...]</a></div>
<p>The post <a href="https://blogencounters.com/201906/the-bluekeep-cve-2019-0708-vulnerability/">The BlueKeep (CVE-2019-0708) Vulnerability</a> appeared first on <a href="https://blogencounters.com">Blog Encounters</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogencounters.com/201906/the-bluekeep-cve-2019-0708-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Urgent WordPress Upgrade Alert</title>
		<link>https://blogencounters.com/201702/urgent-wordpress-upgrade-alert/</link>
					<comments>https://blogencounters.com/201702/urgent-wordpress-upgrade-alert/#respond</comments>
		
		<dc:creator><![CDATA[txg22]]></dc:creator>
		<pubDate>Tue, 07 Feb 2017 04:11:20 +0000</pubDate>
				<category><![CDATA[Technical Support]]></category>
		<category><![CDATA[hosting]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[techsupport]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[wordpress]]></category>
		<guid isPermaLink="false">http://blogencounters.com/?p=2585</guid>

					<description><![CDATA[<p><span class="span-reading-time rt-reading-time" style="display: block;"><span class="rt-label rt-prefix">Estimated Reading Time: </span> <span class="rt-time"> &#60; 1</span> <span class="rt-label rt-postfix">Minute</span></span></p>
<div class="mh-excerpt">Urgent WordPress Upgrade Alert For those running WordPress to host their blogs/website, please be aware a recent vulnerability has been discovered on WordPress v4.7.1 and older that allows remote execution of some SQL commands.  Attackers <a class="mh-excerpt-more" href="https://blogencounters.com/201702/urgent-wordpress-upgrade-alert/" title="Urgent WordPress Upgrade Alert">[Read More...]</a></div>
<p>The post <a href="https://blogencounters.com/201702/urgent-wordpress-upgrade-alert/">Urgent WordPress Upgrade Alert</a> appeared first on <a href="https://blogencounters.com">Blog Encounters</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogencounters.com/201702/urgent-wordpress-upgrade-alert/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Netgear Router Security Advisory</title>
		<link>https://blogencounters.com/201612/netgear-router-security-advisory/</link>
					<comments>https://blogencounters.com/201612/netgear-router-security-advisory/#respond</comments>
		
		<dc:creator><![CDATA[txg22]]></dc:creator>
		<pubDate>Tue, 20 Dec 2016 01:28:51 +0000</pubDate>
				<category><![CDATA[Technical Support]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[Router]]></category>
		<category><![CDATA[routers]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[securityadvisory]]></category>
		<guid isPermaLink="false">https://blogencounters.com/?p=2331</guid>

					<description><![CDATA[<p><span class="span-reading-time rt-reading-time" style="display: block;"><span class="rt-label rt-prefix">Estimated Reading Time: </span> <span class="rt-time"> &#60; 1</span> <span class="rt-label rt-postfix">Minute</span></span></p>
<div class="mh-excerpt">Netgear Router Security Advisory Netgear has recently issued a security advisory to users of its routers, where unauthenticated web pages can pass form input directly to the command line interface.  A remote attacker can potentially <a class="mh-excerpt-more" href="https://blogencounters.com/201612/netgear-router-security-advisory/" title="Netgear Router Security Advisory">[Read More...]</a></div>
<p>The post <a href="https://blogencounters.com/201612/netgear-router-security-advisory/">Netgear Router Security Advisory</a> appeared first on <a href="https://blogencounters.com">Blog Encounters</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogencounters.com/201612/netgear-router-security-advisory/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Unable To Launch Legacy Java Applications With Java 7.x Installed</title>
		<link>https://blogencounters.com/201611/unable-launch-legacy-java-applications-java-7-x-installed/</link>
					<comments>https://blogencounters.com/201611/unable-launch-legacy-java-applications-java-7-x-installed/#respond</comments>
		
		<dc:creator><![CDATA[txg22]]></dc:creator>
		<pubDate>Thu, 10 Nov 2016 01:58:59 +0000</pubDate>
				<category><![CDATA[Technical Support]]></category>
		<category><![CDATA[brocade]]></category>
		<category><![CDATA[cipher]]></category>
		<category><![CDATA[cisco]]></category>
		<category><![CDATA[enterprise]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[JDK]]></category>
		<category><![CDATA[san]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[techsupport]]></category>
		<guid isPermaLink="false">https://blogencounters.com/?p=340</guid>

					<description><![CDATA[<p><span class="span-reading-time rt-reading-time" style="display: block;"><span class="rt-label rt-prefix">Estimated Reading Time: </span> <span class="rt-time"> 4</span> <span class="rt-label rt-postfix">Minutes</span></span></p>
<div class="mh-excerpt">Unable To Launch Legacy Java Applications With Java 7.x Installed You are on page 1/2. You are unable to launch older Java applications with Java 7 Update 45 or higher installed due to new security <a class="mh-excerpt-more" href="https://blogencounters.com/201611/unable-launch-legacy-java-applications-java-7-x-installed/" title="Unable To Launch Legacy Java Applications With Java 7.x Installed">[Read More...]</a></div>
<p>The post <a href="https://blogencounters.com/201611/unable-launch-legacy-java-applications-java-7-x-installed/">Unable To Launch Legacy Java Applications With Java 7.x Installed</a> appeared first on <a href="https://blogencounters.com">Blog Encounters</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogencounters.com/201611/unable-launch-legacy-java-applications-java-7-x-installed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
