<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives -</title>
	<atom:link href="https://thepcdoc.co.uk/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://thepcdoc.co.uk/category/security/</link>
	<description></description>
	<lastBuildDate>Mon, 27 Mar 2023 15:33:51 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/thepcdoc.co.uk/wp-content/uploads/2020/06/PCDocFav.png?fit=32%2C32&#038;ssl=1</url>
	<title>Security Archives -</title>
	<link>https://thepcdoc.co.uk/category/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">136127413</site>	<item>
		<title>The offer that is too good to refuse.</title>
		<link>https://thepcdoc.co.uk/the-offer-that-is-too-good-to-refuse/</link>
		
		<dc:creator><![CDATA[THEPCDR]]></dc:creator>
		<pubDate>Thu, 04 Jun 2020 11:19:22 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://thepcdoc.co.uk/?p=729</guid>

					<description><![CDATA[<p>I had a recent call from a customer who was concerned they had been a victim of a scam. They had purchased some branded accessories from an advert, that had appeared on their timeline on a social media platform. I am sure users of this kind of platform will have seen the &#8220;too good to [&#8230;]</p>
<p>The post <a href="https://thepcdoc.co.uk/the-offer-that-is-too-good-to-refuse/">The offer that is too good to refuse.</a> appeared first on <a href="https://thepcdoc.co.uk"></a>.</p>
]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">729</post-id>	</item>
		<item>
		<title>Windows 7: Microsoft end support for a quarter of all computers</title>
		<link>https://thepcdoc.co.uk/windows-7-microsoft-end-support-for-a-quarter-of-all-computers/</link>
		
		<dc:creator><![CDATA[THEPCDR]]></dc:creator>
		<pubDate>Mon, 13 Jan 2020 15:50:36 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech Tips]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[windows 7]]></category>
		<guid isPermaLink="false">http://thepcdoc.co.uk/?p=683</guid>

					<description><![CDATA[<p>On Tuesday 14th Jan 2020, Microsoft will officially end updates and support for Windows 7. The operating system will continue to function, Microsoft will stop offering technical support, software and security updates and fixes. Microsoft recommends replacing the operating system with Windows 10 because the lack of security updates, patches and maintenance fixes will make [&#8230;]</p>
<p>The post <a href="https://thepcdoc.co.uk/windows-7-microsoft-end-support-for-a-quarter-of-all-computers/">Windows 7: Microsoft end support for a quarter of all computers</a> appeared first on <a href="https://thepcdoc.co.uk"></a>.</p>
]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">683</post-id>	</item>
		<item>
		<title>Illicit streaming</title>
		<link>https://thepcdoc.co.uk/illicit-streaming/</link>
		
		<dc:creator><![CDATA[THEPCDR]]></dc:creator>
		<pubDate>Mon, 18 Jun 2018 11:15:56 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech Tips]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://thepcdoc.co.uk/?p=617</guid>

					<description><![CDATA[<p>The post <a href="https://thepcdoc.co.uk/illicit-streaming/">Illicit streaming</a> appeared first on <a href="https://thepcdoc.co.uk"></a>.</p>
]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">617</post-id>	</item>
		<item>
		<title>Sim Swap Fraud</title>
		<link>https://thepcdoc.co.uk/sim-swap-fraud/</link>
		
		<dc:creator><![CDATA[THEPCDR]]></dc:creator>
		<pubDate>Wed, 25 Oct 2017 09:43:26 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[smartphone]]></category>
		<guid isPermaLink="false">http://thepcdoc.co.uk/?p=469</guid>

					<description><![CDATA[<p>The post <a href="https://thepcdoc.co.uk/sim-swap-fraud/">Sim Swap Fraud</a> appeared first on <a href="https://thepcdoc.co.uk"></a>.</p>
]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">469</post-id>	</item>
		<item>
		<title>Wi-Fi Hack</title>
		<link>https://thepcdoc.co.uk/wi-fi-hack/</link>
		
		<dc:creator><![CDATA[THEPCDR]]></dc:creator>
		<pubDate>Mon, 16 Oct 2017 13:44:47 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<guid isPermaLink="false">http://thepcdoc.co.uk/?p=451</guid>

					<description><![CDATA[<p>It has been revealed that the security protocol WPA2, used by most domestic and commercial Wi-Fi networks has a vulnerability which allows the decryption of any data traffic. Wi-Fi Protected Access (WPA,WPA II) became available in 2003 developed by The Wi-Fi Alliance  as response to serious weaknesses researchers had found in the previous system, Wired [&#8230;]</p>
<p>The post <a href="https://thepcdoc.co.uk/wi-fi-hack/">Wi-Fi Hack</a> appeared first on <a href="https://thepcdoc.co.uk"></a>.</p>
]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">451</post-id>	</item>
		<item>
		<title>Password Safety and Best Practice</title>
		<link>https://thepcdoc.co.uk/password-safety/</link>
		
		<dc:creator><![CDATA[THEPCDR]]></dc:creator>
		<pubDate>Mon, 25 Sep 2017 13:46:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[spam]]></category>
		<guid isPermaLink="false">http://thepcdoc.co.uk/?p=390</guid>

					<description><![CDATA[<p>The post <a href="https://thepcdoc.co.uk/password-safety/">Password Safety and Best Practice</a> appeared first on <a href="https://thepcdoc.co.uk"></a>.</p>
]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">390</post-id>	</item>
		<item>
		<title>Phishing and other pursuits</title>
		<link>https://thepcdoc.co.uk/phishing-scams-frauds/</link>
		
		<dc:creator><![CDATA[THEPCDR]]></dc:creator>
		<pubDate>Wed, 20 Sep 2017 14:56:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">http://thepcdoc.co.uk/?p=203</guid>

					<description><![CDATA[<p>I recently had a phishing call, well to be honest in fact I had 5 calls, all in the space of a day, (because they are persistent) from someone purporting to be from BT. The call went something like this. Ring, ring… Me: Hello Caller: “This is BT calling. We have been monitoring your IP [&#8230;]</p>
<p>The post <a href="https://thepcdoc.co.uk/phishing-scams-frauds/">Phishing and other pursuits</a> appeared first on <a href="https://thepcdoc.co.uk"></a>.</p>
]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">203</post-id>	</item>
	</channel>
</rss>
