<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Word Press Archives -</title>
	<atom:link href="https://cvtfradio.net/category/wordpress/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfradio.net/category/wordpress/</link>
	<description>Conscious Vibrations from terra firma radio</description>
	<lastBuildDate>Sun, 23 Dec 2018 13:28:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>WordPress 5.0.2 is here</title>
		<link>https://cvtfradio.net/2018/12/wordpress-5-0-2-is-here/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-5-0-2-is-here</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Sun, 23 Dec 2018 13:24:48 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<guid isPermaLink="false">https://cvtfradio.net/?p=3400</guid>

					<description><![CDATA[<p>&#160; WordPress 5.0.2 is now available! 5.0.2 is a maintenance release that addresses 73 bugs. The primary focus of this release was performance improvements in the block editor: the cumulated performance gains make it 330% faster for a post with 200 blocks. Here are a few of the additional highlights: 45 total Block Editor improvements [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2018/12/wordpress-5-0-2-is-here/">WordPress 5.0.2 is here</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo.png"><img fetchpriority="high" decoding="async" class="aligncenter  wp-image-3403" src="https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo.png" alt="" width="374" height="367" srcset="https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo.png 1000w, https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo-300x294.png 300w, https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo-768x753.png 768w" sizes="(max-width: 374px) 100vw, 374px" /></a></p>
<p>&nbsp;</p>
<p>WordPress 5.0.2 is now available!</p>
<p>5.0.2 is a maintenance release that addresses 73 bugs. The primary focus of this release was performance improvements in the block editor: the cumulated performance gains make it 330% faster for a post with 200 blocks.</p>
<p>Here are a few of the additional highlights:</p>
<ul>
<li>45 total Block Editor improvements are included (14 performance enhancements &amp; 31 bug fixes).</li>
<li><a href="https://core.trac.wordpress.org/query?component=Bundled+Theme&amp;milestone=5.0.2&amp;col=id&amp;col=summary&amp;col=milestone&amp;col=owner&amp;col=type&amp;col=status&amp;col=priority&amp;order=priority">17 Block Editor related bugs</a> have been fixed across all of the bundled themes.</li>
<li>Some <a href="https://core.trac.wordpress.org/query?component=I18N&amp;milestone=5.0.2&amp;col=id&amp;col=summary&amp;col=status&amp;col=owner&amp;col=type&amp;col=priority&amp;col=milestone&amp;order=priority">internationalization (i18n) issues</a> related to script loading have also been fixed.</li>
</ul>
<p>For a full list of changes, please consult the <a href="https://core.trac.wordpress.org/query?status=closed&amp;milestone=5.0.2&amp;group=component">list of tickets on Trac</a> or the <a href="https://core.trac.wordpress.org/log/branches/5.0?action=stop_on_copy&amp;mode=stop_on_copy&amp;rev=44339&amp;stop_rev=44183&amp;limit=100&amp;sfp_email=&amp;sfph_mail=">changelog</a>.</p>
<p>You can <a href="https://wordpress.org/download/">download WordPress 5.0.2</a> or visit Dashboard → Updates and click <em>Update Now</em>. Sites that support automatic background updates have already started to update automatically.</p>
<p>Thank you to everyone who contributed to WordPress 5.0.2:</p>
<p>The post <a href="https://cvtfradio.net/2018/12/wordpress-5-0-2-is-here/">WordPress 5.0.2 is here</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress 4.2.4 Security and Maintenance Release</title>
		<link>https://cvtfradio.net/2015/08/wordpress-4-2-4-security-and-maintenance-release/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-4-2-4-security-and-maintenance-release</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Tue, 04 Aug 2015 19:21:05 +0000</pubDate>
				<category><![CDATA[Portfolio]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WP Security and Maintenance Release]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2920</guid>

					<description><![CDATA[<p>WordPress 4.2.4 Security and Maintenance Release  Posted August 4, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.4 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/08/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><span style="color: #ff6600;"><a style="color: #ff6600;" href="https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a></span></h2>
<div class="meta"><img decoding="async" class=" aligncenter" src="https://1.bp.blogspot.com/_wICHhTiQmrA/Sfg33R1tfZI/AAAAAAAADko/HM3HTRYJlQg/s1600/help1.PNG" alt="" width="754" height="397" /></div>
<div class="meta"></div>
<div class="meta"></div>
<div class="meta"> Posted August 4, 2015 by <a href="https://profiles.wordpress.org/samuelsidler">Samuel Sidler</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</div>
<div class="storycontent">
<p>WordPress 4.2.4 is now available. This is a<strong> security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that could be used to compromise a site, which were discovered by <a href="https://sucuri.net/">Marc-Alexandre Montpas</a> of Sucuri, <a href="https://helenhousandi.com/">Helen Hou-Sandí</a> of the WordPress security team, <a href="https://www.checkpoint.com/">Netanel Rubin</a> of Check Point, and <a href="https://hackerone.com/reactors08">Ivan Grigorov</a>. It also includes a fix for a potential timing side-channel attack, discovered by <a href="https://www.scrutinizer-ci.com/">Johannes Schmitt</a> of Scrutinizer, and prevents an attacker from locking a post from being edited, discovered by <a href="https://www.linkedin.com/in/symbiansymoh">Mohamed A. Baset</a>.</p>
<p>Our thanks to those who have practiced <a href="https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/">responsible disclosure</a> of security issues.</p>
<p>WordPress 4.2.4 also fixes four bugs. For more information, see the <a href="https://codex.wordpress.org/Version_4.2.4">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.2?rev=33573&amp;stop_rev=33396">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.2.4</a> or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.4.</p>
<p><em>Already testing WordPress 4.3? The second release candidate is now available (<a href="https://wordpress.org/wordpress-4.3-RC2.zip">zip</a>) and it contains these fixes. For more on 4.3, see <a href="https://wordpress.org/news/2015/07/wordpress-4-3-release-candidate/">the RC 1 announcement post</a>.</em></p>
<div class="sharedaddy sd-sharing-enabled">
<div class="robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing">
<h3 class="sd-title">Share this:</h3>
</div>
</div>
</div>
<p>The post <a href="https://cvtfradio.net/2015/08/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress 4.2.2 Security and Maintenance Release</title>
		<link>https://cvtfradio.net/2015/05/wordpress-4-2-2-security-and-maintenance-release/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-4-2-2-security-and-maintenance-release</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Tue, 12 May 2015 22:04:03 +0000</pubDate>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WordPress 4.2.2 Security and Maintenance Release]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2885</guid>

					<description><![CDATA[<p>WordPress 4.2.2 Security and Maintenance Release Posted May 7, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.2 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Version 4.2.2 addresses two security issues: &#160; The Genericons icon font package, which [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/05/wordpress-4-2-2-security-and-maintenance-release/">WordPress 4.2.2 Security and Maintenance Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><a href="https://wordpress.org/news/2015/05/wordpress-4-2-2/">WordPress 4.2.2 Security and Maintenance Release</a></h2>
<p><a href="https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo.jpg"><img decoding="async" class=" size-medium wp-image-2886 alignleft" src="https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo-300x159.jpg" alt="WordPress-logo" width="300" height="159" srcset="https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo-300x159.jpg 300w, https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo.jpg 780w" sizes="(max-width: 300px) 100vw, 300px" /></a>Posted May 7, 2015 by <a href="https://samuelsidler.com/">Samuel Sidler</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</p>
<div class="storycontent">
<p>WordPress 4.2.2 is now available. This is a <strong>critical security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>Version 4.2.2 addresses two security issues:</p>
<p>&nbsp;</p>
<ul>
<li>The Genericons icon font package, which is used in a number of popular themes and plugins, contained an HTML file vulnerable to a cross-site scripting attack. All affected themes and plugins hosted on <a href="https://wordpress.org/">WordPress.org</a> (including the Twenty Fifteen default theme) have been updated today by the WordPress security team to address this issue by removing this nonessential file. To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it. Reported by Robert Abela of <a href="https://netsparker.com">Netsparker</a>.</li>
<li>WordPress versions 4.2 and earlier are affected by a <a href="https://wordpress.org/news/2015/04/wordpress-4-2-1/">critical cross-site scripting vulnerability</a>, which could enable anonymous users to compromise a site. WordPress 4.2.2 includes a comprehensive fix for this issue. Reported separately by Rice Adu and Tong Shi from Baidu[X-team].</li>
</ul>
<p>The release also includes hardening for a potential cross-site scripting vulnerability when using the visual editor. This issue was reported by Mahadev Subedi.</p>
<p>Our thanks to those who have practiced <a href="https://make.wordpress.org/core/handbook/reporting-security-vulnerabilities/">responsible disclosure</a> of security issues.</p>
<p>WordPress 4.2.2 also contains fixes for 13 bugs from 4.2. For more information, see the <a href="https://codex.wordpress.org/Version_4.2.2">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.2?rev=32418&amp;stop_rev=32324">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.2.2</a> or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.2.</p>
<p>Thanks to everyone who contributed to 4.2.2:</p>
</div>
<p>The post <a href="https://cvtfradio.net/2015/05/wordpress-4-2-2-security-and-maintenance-release/">WordPress 4.2.2 Security and Maintenance Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress 4.2.1 released new patch</title>
		<link>https://cvtfradio.net/2015/04/wordpress-4-2-1-released-new-patch/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-4-2-1-released-new-patch</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 27 Apr 2015 21:48:29 +0000</pubDate>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2364</guid>

					<description><![CDATA[<p>WordPress 4.2.1 Released to Patch Comment Exploit Vulnerability Sarah Gooding April 27, 2015 4 photo credit: Will Montague – cc This morning we reported on an XSS vulnerability in WordPress 4.2, 4.1.2, 4.1.1, and 3.9.3, which allows an attacker to compromise a site via its comments. The security team quickly patched the vulnerability and released [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-4-2-1-released-new-patch/">WordPress 4.2.1 released new patch</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<article id="post-42873" class="entry post publish author-sarah post-42873 format-standard has-post-thumbnail category-news category-wordpressorg post_tag-security">
<header class="entry-header">
<h1 class="entry-title font-headlines">WordPress 4.2.1 Released to Patch Comment Exploit Vulnerability</h1>
<div class="entry-byline font-secondary"><span class="entry-author"><a class="url fn n" title="Posts by Sarah Gooding" href="https://wptavern.com/author/sarah" rel="author">Sarah Gooding</a></span> <time class="entry-published updated" title="Monday, April 27, 2015, 3:46 pm" datetime="2015-04-27T15:46:07-04:00">April 27, 2015</time> <a class="comments-link" href="https://wptavern.com/wordpress-4-2-1-released-to-patch-comment-exploit-vulnerability#comments">4</a></div>
</header>
<div class="entry-content">
<figure id="attachment_20655" class="wp-caption aligncenter"><a class="img-hyperlink" href="https://i2.wp.com/wptavern.com/wp-content/uploads/2014/04/security-release.jpg" rel="prettyPhoto[42873]"><img loading="lazy" decoding="async" class="size-full wp-image-20655" src="https://i2.wp.com/wptavern.com/wp-content/uploads/2014/04/security-release.jpg?resize=1024%2C505" alt="photo credit: Will Montague - cc" width="644" height="318" /></a><figcaption class="wp-caption-text font-secondary">photo credit: <a href="https://www.flickr.com/photos/willmontague/3813295674/">Will Montague</a> – <a href="https://creativecommons.org/licenses/by-nc/2.0/">cc</a></figcaption></figure>
<p>This morning we reported on an <a href="https://wptavern.com/zero-day-xss-vulnerability-in-wordpress-4-2-currently-being-patched" target="_blank">XSS vulnerability in WordPress 4.2</a>, 4.1.2, 4.1.1, and 3.9.3, which allows an attacker to compromise a site via its comments. The security team quickly patched the vulnerability and <a href="https://wordpress.org/news/2015/04/wordpress-4-2-1/" target="_blank">released 4.2.1</a> within hours of being notified.</p>
<p>WordPress’ official statement on the security issue:</p>
<blockquote><p>The WordPress team was made aware of a XSS issue a few hours ago that we will release an update for shortly. It is a core issue, but the number of sites vulnerable is much smaller than you may think because the vast majority of WordPress-powered sites run Akismet, which blocks this attack. When the fix is tested and ready in the coming hours WordPress users will receive an auto-update and should be safe and protected even if they don’t use Akismet.</p></blockquote>
<p>That auto-update is now being rolled out to sites where updates have not been disabled. If you are unsure of whether or not your site can perform automatic background updates, Gary Pendergast linked to the <a href="https://wordpress.org/plugins/background-update-tester/" target="_blank">Background Update Tester</a> plugin in the security release. This is a core-supported plugin that will check your site for background update compatibility and explain any issues.</p>
<p>Since <a href="https://wordpress.org/plugins/akismet/" target="_blank">Akismet</a> is active on more than a million websites, the number of affected users that were not protected is much smaller than it might have been otherwise.</p>
<p>WordPress 4.2.1 is a critical security release for a widely publicized vulnerability that you do not want to ignore. Users are advised to update immediately. The background update may already have hit your site. If not, you can update manually by navigating to Dashboard → Updates.</p>
</div>
</article>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-4-2-1-released-new-patch/">WordPress 4.2.1 released new patch</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Critical Vulnerability in popular WordPress themes</title>
		<link>https://cvtfradio.net/2014/12/critical-vulnerability-popular-wordpress-themes/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=critical-vulnerability-popular-wordpress-themes</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Sat, 27 Dec 2014 21:37:37 +0000</pubDate>
				<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[Critical Vulnerability in WP themes]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2029</guid>

					<description><![CDATA[<p><img width="580" height="388" src="https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery.jpg 580w, https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery-300x201.jpg 300w" sizes="(max-width: 580px) 100vw, 580px" /></p>
<p>Hackers exploit critical vulnerability in popular WordPress theme component WordPress admins should check if their sites use the Slider Revolution plug-in and update it immediately, researchers said By Lucian Constantin &#124; 04 September 14. Attackers are actively exploiting a critical vulnerability in a WordPress plug-in that&#8217;s used by a large number of themes, researchers from [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2014/12/critical-vulnerability-popular-wordpress-themes/">Critical Vulnerability in popular WordPress themes</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img width="580" height="388" src="https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery.jpg 580w, https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery-300x201.jpg 300w" sizes="(max-width: 580px) 100vw, 580px" /></p><p>Hackers exploit critical vulnerability in popular WordPress theme component WordPress admins should check if their sites use the Slider Revolution plug-in and update it immediately, researchers said By Lucian Constantin | 04 September 14.</p>
<p>Attackers are actively exploiting a critical vulnerability in a WordPress plug-in that&#8217;s used by a large number of themes, researchers from two security companies warned Wednesday.</p>
<p>The vulnerability affects versions 4.1.4 and older of Slider Revolution, a commercial WordPress plug-in for creating mobile-friendly content display sliders. The flaw was fixed in Slider Revolution 4.2 released in February, but some themes &#8212; collections of files or templates that determine the overall look of a site &#8212; still bundle insecure versions of the plug-in.</p>
<p>The vulnerability can be exploited to execute a local file inclusion (LFI) attack that gives hackers access to a WordPress site&#8217;s wp-config.php file, researchers from Web security firm Sucuri said in a blog post. This sensitive file contains database access credentials that can be used to compromise the whole site, the researchers said.</p>
<p>The post <a href="https://cvtfradio.net/2014/12/critical-vulnerability-popular-wordpress-themes/">Critical Vulnerability in popular WordPress themes</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Web Security Issues</title>
		<link>https://cvtfradio.net/2014/10/web-security-issues/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=web-security-issues</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:49:57 +0000</pubDate>
				<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[Web Security Issues]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1801</guid>

					<description><![CDATA[<p><img width="540" height="260" src="https://cvtfradio.net/wp-content/uploads/2014/10/ecryption.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://cvtfradio.net/wp-content/uploads/2014/10/ecryption.jpg 540w, https://cvtfradio.net/wp-content/uploads/2014/10/ecryption-300x144.jpg 300w" sizes="(max-width: 540px) 100vw, 540px" /></p>
<p>A serious vulnerability in the WP eCommerce Plugin was announced within the last 24 hours (321st Oct 2014) . A fix has been released and some hosting companies are already auto-upgrading customers to the newest version. Upgrade to 3.8.14.4 of WP eCommerce immediately if you use this plugin. Please spread the word because with almost [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2014/10/web-security-issues/">Web Security Issues</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img width="540" height="260" src="https://cvtfradio.net/wp-content/uploads/2014/10/ecryption.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://cvtfradio.net/wp-content/uploads/2014/10/ecryption.jpg 540w, https://cvtfradio.net/wp-content/uploads/2014/10/ecryption-300x144.jpg 300w" sizes="(max-width: 540px) 100vw, 540px" /></p><p id="yui_3_16_0_1_1416864681517_48384">A serious vulnerability in the <a class="yiv4485711366valid-link yiv4485711366validation-enabled yiv4485711366validating" href="https://clicks.aweber.com/y/ct/?l=FLnrU&amp;m=3kDg7Km37O6aApy&amp;b=0ptQiJ6leDcIw2mMKUw6kg" target="_blank" rel="nofollow">WP eCommerce Plugin</a> was announced within the last 24 hours (321st Oct 2014) . A fix has been released and some hosting companies are already auto-upgrading customers to the newest version.</p>
<p id="yui_3_16_0_1_1416864681517_48387">Upgrade to 3.8.14.4 of WP eCommerce immediately if you use this plugin. Please spread the word because with almost 3 million downloads this is a very popular plugin.</p>
<p id="yui_3_16_0_1_1416864681517_48390"><strong id="yui_3_16_0_1_1416864681517_48389"><a id="yui_3_16_0_1_1416864681517_48388" class="yiv4485711366valid-link yiv4485711366validation-enabled yiv4485711366validating" href="https://clicks.aweber.com/y/ct/?l=FLnrU&amp;m=3kDg7Km37O6aApy&amp;b=lF4QGQud_ZQEoo5ZAytSMA" target="_blank" rel="nofollow">Details on our blog&#8230;</a></strong></p>
<p id="yui_3_16_0_1_1416864681517_48391"><strong>​</strong></p>
<p>The post <a href="https://cvtfradio.net/2014/10/web-security-issues/">Web Security Issues</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Modern Cars CAN Be Hacked Remotely From Any Where On Earth — Senator Markey</title>
		<link>https://cvtfradio.net/2014/08/modern-cars-can-be-hacked-remotely-from-any-where-on-earth-senator-markey/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=modern-cars-can-be-hacked-remotely-from-any-where-on-earth-senator-markey</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Wed, 06 Aug 2014 11:49:38 +0000</pubDate>
				<category><![CDATA[Word Press]]></category>
		<guid isPermaLink="false">http://localhost/spot/?p=1123</guid>

					<description><![CDATA[<p>The gadget that can hack any CAR &#8211; Terrifying £12 tool can remotely control headlights, locks, steering and even brakes &#160; Gadget is fitted to the Controller Area Network (CAN) of a modern car Depending on the make of car, the CAN controls lights, locks and brakes Hackers claim it can be fitted to any [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2014/08/modern-cars-can-be-hacked-remotely-from-any-where-on-earth-senator-markey/">Modern Cars CAN Be Hacked Remotely From Any Where On Earth — Senator Markey</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>The gadget that can hack any CAR &#8211; Terrifying £12 tool can remotely control headlights, locks, steering and even brakes</h3>
<p><img loading="lazy" decoding="async" class=" aligncenter" src="https://i.dailymail.co.uk/i/pix/2014/02/06/article-2553026-1B3DD01800000578-736_634x398.jpg" alt="Diagram of the computer electronics in a car that can be hacked from anywhere" width="634" height="398" /></p>
<p>&nbsp;</p>
<p>Gadget is fitted to the Controller Area Network (CAN) of a modern car</p>
<p>Depending on the make of car, the CAN controls lights, locks and brakes</p>
<p>Hackers claim it can be fitted to any car&#8217;s network &#8216;within five minutes&#8217;</p>
<p>CAN Hacking Tool (CHT) runs malicious code into the car&#8217;s system</p>
<p>Researchers in the U.S. previously hacked the software in a Toyota Prius</p>
<p class="author-section byline-plain">By <a class="author" href="https://www.dailymail.co.uk/home/search.html?s=&amp;authornamef=Victoria+Woollaston" rel="nofollow">Victoria Woollaston</a> Dailymail.co.uk</p>
<p class="byline-section"><span class="article-timestamp article-timestamp-published"> <span class="article-timestamp-label">Published:</span> 13:36, 6 February 2014 </span> | <span class="article-timestamp article-timestamp-updated"> <span class="article-timestamp-label">Updated:</span> 12:14, 8 May 2014</span></p>
<div>Follow us: <a href="https://ec.tynt.com/b/rw?id=bBOTTqvd0r3Pooab7jrHcU&amp;u=MailOnline" target="_blank">@MailOnline on Twitter</a> | <a href="https://ec.tynt.com/b/rf?id=bBOTTqvd0r3Pooab7jrHcU&amp;u=DailyMail" target="_blank">DailyMail on Facebook</a></div>
<div class="zak-oembed-container"><iframe title="Digital Carjackers Show Off New Attacks | Forbes" width="1110" height="624" src="https://www.youtube.com/embed/oqe6S6m73Zw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></div>
<p>We found this on investmentwatchblog.com</p>
<div class="zak-oembed-container"><iframe title="Markey Issues Car Security Report - CBS This Morning Feb. 9. 2015" width="1110" height="624" src="https://www.youtube.com/embed/UPdAjrUw2Lw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></div>
<p>The post <a href="https://cvtfradio.net/2014/08/modern-cars-can-be-hacked-remotely-from-any-where-on-earth-senator-markey/">Modern Cars CAN Be Hacked Remotely From Any Where On Earth — Senator Markey</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
