<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; BTA Blog</title>
	<atom:link href="https://www.businesstechnologyassociates.com/blog/category/technology/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.businesstechnologyassociates.com/blog</link>
	<description>Weblog about business and technology issues</description>
	<lastBuildDate>Tue, 16 Dec 2025 02:06:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Big Bad Bug!</title>
		<link>https://www.businesstechnologyassociates.com/blog/2025/12/big-bad-bug/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Tue, 16 Dec 2025 02:06:48 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.businesstechnologyassociates.com/blog/?p=417</guid>

					<description><![CDATA[A really serious bug exists in the React Server Components, a popular JavaScript library and the Next.js framework that has reached a imperfect  CVSS score of 10.0! CVE-2025-55182 is a critical remote code execution vulnerability in React Server Components that allows attackers to execute arbitrary code without authentication by exploiting improper input deserialization. This vulnerability &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2025/12/big-bad-bug/" class="more-link">Continue reading<span class="screen-reader-text"> "Big Bad Bug!"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Best Practices for Password Security</title>
		<link>https://www.businesstechnologyassociates.com/blog/2024/10/best-practices-for-password-security/</link>
					<comments>https://www.businesstechnologyassociates.com/blog/2024/10/best-practices-for-password-security/#comments</comments>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Wed, 16 Oct 2024 02:32:24 +0000</pubDate>
				<category><![CDATA[How To]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.businesstechnologyassociates.com/blog/?p=410</guid>

					<description><![CDATA[In today’s internet-connect age, strong passwords are your first line of defense against unauthorized access to your personal and professional accounts. Following best practices for password security is crucial to protect your sensitive information from cyber threats. Here are some essential guidelines to help you create and manage secure passwords. 1. Use Long and Complex &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2024/10/best-practices-for-password-security/" class="more-link">Continue reading<span class="screen-reader-text"> "Best Practices for Password Security"</span></a></p>]]></description>
		
					<wfw:commentRss>https://www.businesstechnologyassociates.com/blog/2024/10/best-practices-for-password-security/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Privacy for All</title>
		<link>https://www.businesstechnologyassociates.com/blog/2017/03/privacy-for-all/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Fri, 31 Mar 2017 01:25:56 +0000</pubDate>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.businesstechnologyassociates.com/blog/?p=283</guid>

					<description><![CDATA[The Founding Fathers created the Bill of Rights to protect citizens&#8217; rights including the Fourth Amendment (Amendment IV) to the United States Constitution that states: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2017/03/privacy-for-all/" class="more-link">Continue reading<span class="screen-reader-text"> "Privacy for All"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Web Security for All</title>
		<link>https://www.businesstechnologyassociates.com/blog/2016/06/web-security-for-all/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Sat, 04 Jun 2016 20:20:37 +0000</pubDate>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.businesstechnologyassociates.com/blog/?p=288</guid>

					<description><![CDATA[Accessing a web site sends information back and forth as you access pages and click on links.  This data travels through numerous computers on its way to the web site&#8217;s server and to your computer.  This varies depending on your Internet provider and the provider of the web site.  Recently, I traced my access to &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2016/06/web-security-for-all/" class="more-link">Continue reading<span class="screen-reader-text"> "Web Security for All"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Password Shenanigans</title>
		<link>https://www.businesstechnologyassociates.com/blog/2016/01/password-shenanigans/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Fri, 08 Jan 2016 14:34:56 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=253</guid>

					<description><![CDATA[There seems to be a trend in web security that requires that you type your password, no pasting allowed! This combined with other password &#8220;requirements&#8221; are creating problems for people like me that use very secure long passwords.  That means I use a password safe that generates long random strings of letters and numbers like: &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2016/01/password-shenanigans/" class="more-link">Continue reading<span class="screen-reader-text"> "Password Shenanigans"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>New Year Resolutions</title>
		<link>https://www.businesstechnologyassociates.com/blog/2015/01/new-year-resolutions/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Sat, 03 Jan 2015 23:26:26 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=217</guid>

					<description><![CDATA[I usually do not make New Year&#8217;s resolutions because I mostly forget them by the Super Bowl. But this year I am getting my online life more secure. I will change all my passwords to 20+ random characters. I will store these passwords in a secure format. I will encrypt more email. The first 2 &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2015/01/new-year-resolutions/" class="more-link">Continue reading<span class="screen-reader-text"> "New Year Resolutions"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Antivirus is Dead!</title>
		<link>https://www.businesstechnologyassociates.com/blog/2014/05/antivirus-is-dead/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Mon, 05 May 2014 15:09:43 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=205</guid>

					<description><![CDATA[So declared Brian Dye, Symantec&#8217;s senior vice president for information security. &#8220;We don&#8217;t think of antivirus as a moneymaker in any way.&#8221;  Mr. Dye went on to say &#8220;antivirus now catches just 45% of cyberattacks.&#8221; So because they cannot make money, this segment of the software industry is dead?  Maybe they are not any good &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2014/05/antivirus-is-dead/" class="more-link">Continue reading<span class="screen-reader-text"> "Antivirus is Dead!"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Stop Using Microsoft Internet Explorer</title>
		<link>https://www.businesstechnologyassociates.com/blog/2014/04/stop-using-microsoft-internet-explorer/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Tue, 29 Apr 2014 18:59:54 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[IE]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=198</guid>

					<description><![CDATA[If you are using Microsoft Internet Explorer (IE), there are hackers actively using a software bug to gain control of Microsoft Windows computers.  Stop using IE now! This is twice as dangerous as the Heartbleed Bug because an attacker can take control of your computer and do whatever they want with it. US-CERT issued an &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2014/04/stop-using-microsoft-internet-explorer/" class="more-link">Continue reading<span class="screen-reader-text"> "Stop Using Microsoft Internet Explorer"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Heartbleed Bug &#8211; End of the World or Non-event?</title>
		<link>https://www.businesstechnologyassociates.com/blog/2014/04/heartbleed-bug-end-of-the-world-or-non-event/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Sat, 12 Apr 2014 14:05:57 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=187</guid>

					<description><![CDATA[That about covers the risks.  Now what can you do about it?  First, update your computer (Windows, Mac OS X or Linux/Unix), right now!  Before you read the rest of this post. Most software vendors/service providers recognized the serious nature of this bug and updated their software (the easy part).  So getting the fix is &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2014/04/heartbleed-bug-end-of-the-world-or-non-event/" class="more-link">Continue reading<span class="screen-reader-text"> "Heartbleed Bug &#8211; End of the World or Non-event?"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft dropping XP support</title>
		<link>https://www.businesstechnologyassociates.com/blog/2014/04/microsoft-dropping-xp-support/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Mon, 07 Apr 2014 19:03:54 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=179</guid>

					<description><![CDATA[Microsoft has finally made good on their threat to stop supporting Windows XP and on April 8, 2014 will stop providing update and fixes for one of their most popular operating system releases.  Microsoft released Windows XP in 2001 and end development of it in 2008.  They have continued to provide bug-fixes and minor updates &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2014/04/microsoft-dropping-xp-support/" class="more-link">Continue reading<span class="screen-reader-text"> "Microsoft dropping XP support"</span></a></p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
