<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet Explorer | Octagon Technology</title>
	<atom:link href="http://jeremycatton.co.uk/tag/internet-explorer/feed/" rel="self" type="application/rss+xml" />
	<link>http://jeremycatton.co.uk</link>
	<description>01522 797520</description>
	<lastBuildDate>Mon, 18 Oct 2021 14:36:37 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.3.5</generator>

<image>
	<url>http://jeremycatton.co.uk/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>Internet Explorer | Octagon Technology</title>
	<link>http://jeremycatton.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Internet Explorer Vulnerability</title>
		<link>http://jeremycatton.co.uk/2019/10/28/internet-explorer-vulnerability/</link>
		
		<dc:creator><![CDATA[Michael]]></dc:creator>
		<pubDate>Mon, 28 Oct 2019 10:56:53 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=4124</guid>

					<description><![CDATA[<img width="500" height="333" src="http://jeremycatton.co.uk/wp-content/uploads/2019/10/internet-explorer-vulnerability-500x333.jpg" class="attachment-large size-large wp-post-image" alt="" decoding="async" style="float:left; margin:0 15px 15px 0;" fetchpriority="high" srcset="http://jeremycatton.co.uk/wp-content/uploads/2019/10/internet-explorer-vulnerability-500x333.jpg 500w, http://jeremycatton.co.uk/wp-content/uploads/2019/10/internet-explorer-vulnerability-300x200.jpg 300w, http://jeremycatton.co.uk/wp-content/uploads/2019/10/internet-explorer-vulnerability-570x380.jpg 570w, http://jeremycatton.co.uk/wp-content/uploads/2019/10/internet-explorer-vulnerability-380x254.jpg 380w, http://jeremycatton.co.uk/wp-content/uploads/2019/10/internet-explorer-vulnerability-285x190.jpg 285w, http://jeremycatton.co.uk/wp-content/uploads/2019/10/internet-explorer-vulnerability.jpg 600w" sizes="(max-width: 500px) 100vw, 500px" /><p>Microsoft recently released a version of internet explorer with a vulnerability to and exploit called &#8220;zero-day&#8221; which gave attackers the ability to gain the same access rights as the user. This could allow hackers to create full administrator profile for themselves on the victims PC, edit data or install malicious programs. The code could be &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2019/10/28/internet-explorer-vulnerability/"> <span class="screen-reader-text">Internet Explorer Vulnerability</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2019/10/28/internet-explorer-vulnerability/">Internet Explorer Vulnerability</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
