<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	>
		<channel>
			<title><![CDATA[Holtz Communications + Technology | Blog]]></title>
			<link>https://holtz.com/blog</link>
			<description>blogging at the intersection of communication and technology</description>
			<dc:language>en</dc:language>
			<dc:creator>shel@holtz.com</dc:creator>
			<dc:rights>Copyright 2025 Holtz Communications + Technology</dc:rights>
			<dc:date>2025-07-28T07:05:00+00:00</dc:date>
			<atom:link href="https://holtz.com/blog/rss" rel="self" type="application/rss+xml" />
			<admin:generatorAgent rdf:resource="http://expressionengine.com/" />
    			
    				<item>
      				<title><![CDATA[RSS exposes users to attack]]></title>
      				<link>https://holtz.com/blog/blog/rss_exposes_users_to_attack/1444/</link>
      				<guid>https://holtz.com/blog/blog/rss_exposes_users_to_attack/1444/#When:16:06:00Z</guid>
      				<description><![CDATA[
					
						<p><a href="http://news.zdnet.com/2100-1009_22-6102171.html?tag=nl.e589">ZDNet reports</a> from the <a href="http://www.blackhat.com">Black Hat</a> conference in Las Vegas that security experts are increasingly concerned about the potential for malicious attacks perpetrated through web feeds. </p>

<blockquote><p>SPI Dynamics examined a number of online and offline applications used to read RSS and Atom feeds. In many cases, any JavaScript code delivered on the feed would run on the user&#8217;s PC, meaning it could be vulnerable to attack&#8230;JavaScript is a scripting language that experts say is increasingly causing security concerns.</p>
</blockquote>

<p>One wonders when news readers will start coming equipped with detection software. The article notes there are &#8220;non-vulnerable&#8221; readers, but doesn&#8217;t list them. Some that are vulnerable include Bloglines, RSS Reader, RSS Owl, Feed Demon and Sharp Reader.</p>
					
					]]></description>
      				<dc:subject><![CDATA[Blog, RSS, Technology,]]></dc:subject>
      				<dc:date>2006-08-04T16:06:00+00:00</dc:date>
    				</item>
				
    	</channel>
</rss>