Home Tags Heartbleed

Tag: Heartbleed

Heartbleed is a security bug disclosed in April 2014 in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. Heartbleed may be exploited regardless of whether the party using a vulnerable OpenSSL instance for TLS is a server or a client. It results from improper input validation (due to a missing bounds check) in the implementation of the TLS heartbeat extension, thus the bug’s name derives from “heartbeat”. The vulnerability is classified as a buffer over-read,  a situation where more data can be read than should be allowed.

Heartbleed is registered in the Common Vulnerabilities and Exposures system as CVE-2014-0160. The federal Canadian Cyber Incident Response Centre issued a security bulletin advising system administrators about the bug. A fixed version of OpenSSL was released on April 7, 2014, on the same day Heartbleed was publicly disclosed.

At the time of disclosure, some 17% (around half a million) of the Internet’s secure web servers certified by trusted authorities were believed to be vulnerable to the attack, allowing theft of the servers’ private keys and users’ session cookies and passwords. The Electronic Frontier Foundation, Ars Technica, and Bruce Schneider all deemed the Heartbleed bug “catastrophic”. Forbes cybersecurity columnist Joseph Steinberg wrote, “Some might argue that [Heartbleed] is the worst vulnerability found (at least in terms of its potential impact) since commercial traffic began to flow on the Internet.”

A British Cabinet spokesman recommended that “People should take advice on changing passwords from the websites they use… Most websites have corrected the bug and are best placed to advise what action, if any, people need to take.” On the day of disclosure, the Tor Project advised anyone seeking “strong anonymity or privacy on the Internet” to “stay away from the Internet entirely for the next few days while things settle.”

As of May 20, 2014, 1.5% of the 800,000 most popular TLS-enabled websites were still vulnerable to Heartbleed.

TLS implementations other than OpenSSL, such as GnuTLS, Mozilla’s Network Security Services, and the TLS stack used by Microsoft products, were not affected because the defect existed in the OpenSSL’s implementation of TLS rather than in the Internet protocol itself.

The Mistakes of Smart Medicine

A technological boom in medicine both encouraged medical institutions to use exclusively information systems in processing data and led to the emergence of new types of technological equipment and personal devices that can be used to interact with traditional systems and networks.

This means that the threats that are relevant for them can also be relevant for medical systems.

HackerOne opens up bug bounties to open source

HackerOne is bringing bug hunting and software testing to open source developers to help make open source software more secure and safer to use. A lot of modern tools and technologies depend on open source software, so a security flaw can wind up h...

Why the ‘Cloudbleed’ Data Leak Flaw Posed a Major Threat to...

A new type of data leak has come to light that could impact millions of people around the globe.

Google Project Zero, the research effort to find and fix critical software security flaws, reported that a vulnerability on the Cloudflare security service could enable the leak of passwords and data.

According to Cloudflare, the flaw could have allowed leaks of sensitive data from thousands of websites over a six-month period.

This incident has been dubbed Cloudbleed by some people in the cyber-security community because the threat was potentially as serious as the "Heartbleed" OpenSSL cryptography flaw that was reported in 2014 which posed a serious security threat to thousands of websites.

Cloudflare says it has patched the data leak flaw and moved quickly to purge any leaked data that may have circulated on search engines. While the full scope of the Cloudflare leak and exactly how many users were affected hasn’t been disclosed, this is the latest in a string of recent data privacy threats to affect internet users worldwide.

This slide show provides more details about the cause of the flaw and discusses why Cloudbleed is a serious problem.

Three Years after Heartbleed, How Vulnerable Are You?

You may have a problem lurking in your open source components and not know it.
Start making a list...

Cloudflare Leaked Web Customer Data For Months

Potential scope of issue evokes comparisons to Heartbleed.

Cloudbleed: Big web brands leaked crypto keys, personal secrets thanks to...

Heartbleed-style classic buffer overrun blunder strikes in 2017 Big-name websites leaked people's private encryption keys and personal information into strangers' browsers, due to a Cloudflare bug uncovered by Google security researchers.…

Newly discovered flaw undermines HTTPS connections for almost 1,000 sites

"Ticketbleed" bug in F5 firewalls is no Heartbleed, but it still poses a threat.

OpenSSL issues new patches as Heartbleed still lurks

The OpenSSL Project has addressed some moderate-severity security flaws, and administrators should be particularly diligent about applying the patches since there are still 200,000 systems vulnerable to the Heartbleed flaw.OpenSSL updated the 1.0.2 ...

That Hearbleed problem may be more pervasive than you think

 That lingering Hearbleed flaw recently discovered in 200,000 devices is more insidious than that number indicates.According to a report posted by Shodan, the Heartbleed vulnerability first exposed in April 2014 was still found in 199,594 internet-accessible devices during a scan it performed last weekend.[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]But according to open-source security firm Black Duck, about 11 percent of more than 200 applications it audited between Oct. 2015 and March 2016 contained the flaw, which enables a buffer overread that endangers data from clients and servers running affected versions of OpenSSL.To read this article in full or to leave a comment, please click here

Heartbleed bug still affects thousands of sites

US still has more than 42,000 websites vulnerable to the flaw, which can allow an attacker to steal data directly from websites and users.

Heartbleed Persists on 200,000 Servers, Devices

Almost 200,000 servers and devices are still vulnerable to Heartbleed, the OpenSSL flaw patched nearly three years ago. The numbers come from search engine Shodan, which released data showing U.S. servers hosted on Amazon AWS are disproportionately vulnerable to the flaw. “There’s a lot to be worried about with this data, but also a lot that’s unsurprising,” said Tim Jarrett senior director of security, Veracode. The Shodan analysis released over the weekend is part of the search engine’s Heartbleed Report (2017-01). It paints a gloomy picture when it comes to Heartbleed mitigation. The report indicates that almost 52,000 Apache HTTPD servers remain vulnerable and exposed to the internet, in particular versions 2.2.22 and 2.2.15. Amazon Web Services hosts the highest number of vulnerable devices (6,380), followed by Verizon Wireless (4,330) and German-based ISP Cronon AG (2,290). “The initial media blizzard for Heartbleed helped secure hundreds of thousands of devices (from 600,000 down to 200,000) but the subsequent follow-up has been lackluster as the problem keeps lingering,” said John Matherly, Shodan founder. He points out that the vast majority of affected services actually support TLSv1.2. “This means they support good encryption, unfortunately their dependencies are old,” he said. Heartbleed was an internet-wide bug that in 2014 affected millions of Linux, UNIX and Apple machines running vulnerable versions of the OpenSSL library. The Heartbleed vulnerability can result in the revelation of 64 KB of memory to any client or server that is connected. In April of 2014, fixes for versions of OpenSSL were quickly pushed out. “Most Heartbleed vulnerabilities are reported in the U.S. This makes sense given the prevalence of web applications hosted in Amazon AWS and Verizon as well as other US-based ISPs,” Jarrett said. He said part of the issue is that it’s easy to create new servers in AWS that don’t enforce the same type of safety provisions as they once required. “What used to require a sysadmin and a capital expenditure can now be done with a few lines of code. And we know that both real and virtual servers are easy to forget about, particularly when created outside of normal IT processes. So it’s unsurprising that some of these ‘forgotten servers’ are unpatched and dangerous,” Jarrett said. The Shodan data shows the overwhelming impacted services are HTTPS with 148,420 vulnerable servers followed by HTTPS (port 8443) with 23,600 servers and then Webmin, the sys admin interface for Unix (5,970).

It’s 2017 and 200,000 services still have unpatched Heartbleeds

What does it take to get people patching? Not Reg readers, obviously. Other, silly people Some 200,000 systems are still susceptible to Heartbleed more than two years and 9 months after the huge vulnerability was disclosed. Patching efforts spiked after news dropped in April 2014 of the world's most well-known and at the time then most catastrophic bug. The vulnerability (CVE-2014-0160) that established the practice of branding bugs lived up to its reputation: the tiny flaw in OpenSSL allows anyone to easily and quietly plunder vulnerable systems stealing passwords, login cookies, private crypto-keys, and much more. Shodan boss John Matherly says about 200,000 services remain Heartbleed-exploitable thanks to unpatched OpenSSL instances. He found 42,032 services in the United States, 15,380 in Korea, 14,116 in China, and 14,072 exposed services in Germany. About 75,000 of the vulnerable boxen bore expired SSL certificates, and ran Linux 3.x. Nearly 3 years later and we're still looking at ~200,000 services vulnerable to Heartbleed: https://t.co/KU04PtWTJU pic.twitter.com/6mZhCUCVu6 — John Matherly (@achillean) January 22, 2017 A year ago one in 10 OpenSSL VPN servers were still vulnerable to Heartbleed. Administrators are not only neglecting Heartbleed; as of may 2016 Stuxnetwas the most common vulnerability (CVE-2010-2568) to hack stuff on the internet, according to Microsoft, despite that it had been widely disclosed for six years at the time Redmond revealed its numbers. It gets worse; the most commonly exploited Microsoft Office vulnerability as of July 2016 affects Office 2012, indicating users had not upgraded their code, something even pirates had done. Redmond warned the world in April 2015 that Word Macros had made a comeback then infecting half a million computers in what looks like a near-everlasting threat.
Significant attack campaigns that relied on Word macros continued to appear throughout 2016. ® Sponsored: Customer Identity and Access Management

FAF deciding on filters on post to be syndicated:

Police get broad phone and computer hacking powers in Germany

Array ( [post_title] => Police get broad phone and computer hacking powers in Germany [post_content] => The German parliament has waved through a massive expansion of police hacking powers. [post_excerpt] => The German parliament has waved through a massive expansion of police hacking powers. [post_date_gmt] => 2017-06-23 12:31:00 [post_date] => 2017-06-23 13:31:00 [post_modified_gmt] => 2017-06-23 12:31:00 [post_modified] => 2017-06-23 13:31:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => fcfedcc9-21be-4850-88c2-1e8a45bd5ae2 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/police-get-broad-phone-and-computer-hacking-powers-in-germany/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 9ca01bbda74336d839637b624796e93e [1] => 9ca01bbda74336d839637b624796e93e [2] => 9ca01bbda74336d839637b624796e93e [3] => 9ca01bbda74336d839637b624796e93e [4] => 9ca01bbda74336d839637b624796e93e [5] => 9ca01bbda74336d839637b624796e93e [6] => 9ca01bbda74336d839637b624796e93e [7] => 9ca01bbda74336d839637b624796e93e [8] => 9ca01bbda74336d839637b624796e93e [9] => 9ca01bbda74336d839637b624796e93e [10] => 9ca01bbda74336d839637b624796e93e [11] => 9ca01bbda74336d839637b624796e93e [12] => 9ca01bbda74336d839637b624796e93e [13] => 9ca01bbda74336d839637b624796e93e [14] => 9ca01bbda74336d839637b624796e93e [15] => 9ca01bbda74336d839637b624796e93e [16] => 9ca01bbda74336d839637b624796e93e [17] => 9ca01bbda74336d839637b624796e93e [18] => 9ca01bbda74336d839637b624796e93e [19] => 9ca01bbda74336d839637b624796e93e [20] => 9ca01bbda74336d839637b624796e93e [21] => 9ca01bbda74336d839637b624796e93e [22] => 9ca01bbda74336d839637b624796e93e [23] => 9ca01bbda74336d839637b624796e93e [24] => 9ca01bbda74336d839637b624796e93e [25] => 9ca01bbda74336d839637b624796e93e [26] => 9ca01bbda74336d839637b624796e93e [27] => 9ca01bbda74336d839637b624796e93e [28] => 9ca01bbda74336d839637b624796e93e [29] => 9ca01bbda74336d839637b624796e93e [30] => 9ca01bbda74336d839637b624796e93e [31] => 9ca01bbda74336d839637b624796e93e [32] => 9ca01bbda74336d839637b624796e93e [33] => 9ca01bbda74336d839637b624796e93e [34] => 9ca01bbda74336d839637b624796e93e [35] => 9ca01bbda74336d839637b624796e93e [36] => 9ca01bbda74336d839637b624796e93e [37] => 9ca01bbda74336d839637b624796e93e [38] => 9ca01bbda74336d839637b624796e93e ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => police-get-broad-phone-and-computer-hacking-powers-in-germany )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/police-get-broad-phone-and-computer-hacking-powers-in-germany/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 9ca01bbda74336d839637b624796e93e [1] => 9ca01bbda74336d839637b624796e93e [2] => 9ca01bbda74336d839637b624796e93e [3] => 9ca01bbda74336d839637b624796e93e [4] => 9ca01bbda74336d839637b624796e93e [5] => 9ca01bbda74336d839637b624796e93e [6] => 9ca01bbda74336d839637b624796e93e [7] => 9ca01bbda74336d839637b624796e93e [8] => 9ca01bbda74336d839637b624796e93e [9] => 9ca01bbda74336d839637b624796e93e [10] => 9ca01bbda74336d839637b624796e93e [11] => 9ca01bbda74336d839637b624796e93e [12] => 9ca01bbda74336d839637b624796e93e [13] => 9ca01bbda74336d839637b624796e93e [14] => 9ca01bbda74336d839637b624796e93e [15] => 9ca01bbda74336d839637b624796e93e [16] => 9ca01bbda74336d839637b624796e93e [17] => 9ca01bbda74336d839637b624796e93e [18] => 9ca01bbda74336d839637b624796e93e [19] => 9ca01bbda74336d839637b624796e93e [20] => 9ca01bbda74336d839637b624796e93e [21] => 9ca01bbda74336d839637b624796e93e [22] => 9ca01bbda74336d839637b624796e93e [23] => 9ca01bbda74336d839637b624796e93e [24] => 9ca01bbda74336d839637b624796e93e [25] => 9ca01bbda74336d839637b624796e93e [26] => 9ca01bbda74336d839637b624796e93e [27] => 9ca01bbda74336d839637b624796e93e [28] => 9ca01bbda74336d839637b624796e93e [29] => 9ca01bbda74336d839637b624796e93e [30] => 9ca01bbda74336d839637b624796e93e [31] => 9ca01bbda74336d839637b624796e93e [32] => 9ca01bbda74336d839637b624796e93e [33] => 9ca01bbda74336d839637b624796e93e [34] => 9ca01bbda74336d839637b624796e93e [35] => 9ca01bbda74336d839637b624796e93e [36] => 9ca01bbda74336d839637b624796e93e [37] => 9ca01bbda74336d839637b624796e93e [38] => 9ca01bbda74336d839637b624796e93e ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Police get broad phone and computer hacking powers in Germany

Array ( [post_title] => Police get broad phone and computer hacking powers in Germany [post_content] => The German parliament has waved through a massive expansion of police hacking powers. [post_excerpt] => The German parliament has waved through a massive expansion of police hacking powers. [post_date_gmt] => 2017-06-23 12:31:00 [post_date] => 2017-06-23 13:31:00 [post_modified_gmt] => 2017-06-23 12:31:00 [post_modified] => 2017-06-23 13:31:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => fcfedcc9-21be-4850-88c2-1e8a45bd5ae2 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/police-get-broad-phone-and-computer-hacking-powers-in-germany/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 9ca01bbda74336d839637b624796e93e [1] => 9ca01bbda74336d839637b624796e93e [2] => 9ca01bbda74336d839637b624796e93e [3] => 9ca01bbda74336d839637b624796e93e [4] => 9ca01bbda74336d839637b624796e93e [5] => 9ca01bbda74336d839637b624796e93e [6] => 9ca01bbda74336d839637b624796e93e [7] => 9ca01bbda74336d839637b624796e93e [8] => 9ca01bbda74336d839637b624796e93e [9] => 9ca01bbda74336d839637b624796e93e [10] => 9ca01bbda74336d839637b624796e93e [11] => 9ca01bbda74336d839637b624796e93e [12] => 9ca01bbda74336d839637b624796e93e [13] => 9ca01bbda74336d839637b624796e93e [14] => 9ca01bbda74336d839637b624796e93e [15] => 9ca01bbda74336d839637b624796e93e [16] => 9ca01bbda74336d839637b624796e93e [17] => 9ca01bbda74336d839637b624796e93e [18] => 9ca01bbda74336d839637b624796e93e [19] => 9ca01bbda74336d839637b624796e93e [20] => 9ca01bbda74336d839637b624796e93e [21] => 9ca01bbda74336d839637b624796e93e [22] => 9ca01bbda74336d839637b624796e93e [23] => 9ca01bbda74336d839637b624796e93e [24] => 9ca01bbda74336d839637b624796e93e [25] => 9ca01bbda74336d839637b624796e93e [26] => 9ca01bbda74336d839637b624796e93e [27] => 9ca01bbda74336d839637b624796e93e [28] => 9ca01bbda74336d839637b624796e93e [29] => 9ca01bbda74336d839637b624796e93e [30] => 9ca01bbda74336d839637b624796e93e [31] => 9ca01bbda74336d839637b624796e93e [32] => 9ca01bbda74336d839637b624796e93e [33] => 9ca01bbda74336d839637b624796e93e [34] => 9ca01bbda74336d839637b624796e93e [35] => 9ca01bbda74336d839637b624796e93e [36] => 9ca01bbda74336d839637b624796e93e [37] => 9ca01bbda74336d839637b624796e93e [38] => 9ca01bbda74336d839637b624796e93e ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => police-get-broad-phone-and-computer-hacking-powers-in-germany )

FAF deciding on filters on post to be syndicated:

Two British men arrested over Microsoft hacking plot

Array ( [post_title] => Two British men arrested over Microsoft hacking plot [post_content] => The duo has tried, time and time again, to break into Microsoft's systems to steal customer data. [post_excerpt] => The duo has tried, time and time again, to break into Microsoft's systems to steal customer data. [post_date_gmt] => 2017-06-23 10:35:00 [post_date] => 2017-06-23 11:35:00 [post_modified_gmt] => 2017-06-23 10:35:00 [post_modified] => 2017-06-23 11:35:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 80db0f83-ec2d-43e2-a3f3-a13f4548996c [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/two-british-men-arrested-over-microsoft-hacking-plot/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 0499d78a602a75a5de820cae99f49bfb [1] => 0499d78a602a75a5de820cae99f49bfb [2] => 0499d78a602a75a5de820cae99f49bfb [3] => 0499d78a602a75a5de820cae99f49bfb [4] => 0499d78a602a75a5de820cae99f49bfb [5] => 0499d78a602a75a5de820cae99f49bfb [6] => 0499d78a602a75a5de820cae99f49bfb [7] => 0499d78a602a75a5de820cae99f49bfb [8] => 0499d78a602a75a5de820cae99f49bfb [9] => 0499d78a602a75a5de820cae99f49bfb [10] => 0499d78a602a75a5de820cae99f49bfb [11] => 0499d78a602a75a5de820cae99f49bfb [12] => 0499d78a602a75a5de820cae99f49bfb [13] => 0499d78a602a75a5de820cae99f49bfb [14] => 0499d78a602a75a5de820cae99f49bfb [15] => 0499d78a602a75a5de820cae99f49bfb [16] => 0499d78a602a75a5de820cae99f49bfb [17] => 0499d78a602a75a5de820cae99f49bfb [18] => 0499d78a602a75a5de820cae99f49bfb [19] => 0499d78a602a75a5de820cae99f49bfb [20] => 0499d78a602a75a5de820cae99f49bfb [21] => 0499d78a602a75a5de820cae99f49bfb [22] => 0499d78a602a75a5de820cae99f49bfb [23] => 0499d78a602a75a5de820cae99f49bfb [24] => 0499d78a602a75a5de820cae99f49bfb [25] => 0499d78a602a75a5de820cae99f49bfb [26] => 0499d78a602a75a5de820cae99f49bfb [27] => 0499d78a602a75a5de820cae99f49bfb [28] => 0499d78a602a75a5de820cae99f49bfb [29] => 0499d78a602a75a5de820cae99f49bfb [30] => 0499d78a602a75a5de820cae99f49bfb [31] => 0499d78a602a75a5de820cae99f49bfb [32] => 0499d78a602a75a5de820cae99f49bfb [33] => 0499d78a602a75a5de820cae99f49bfb [34] => 0499d78a602a75a5de820cae99f49bfb [35] => 0499d78a602a75a5de820cae99f49bfb [36] => 0499d78a602a75a5de820cae99f49bfb [37] => 0499d78a602a75a5de820cae99f49bfb [38] => 0499d78a602a75a5de820cae99f49bfb [39] => 0499d78a602a75a5de820cae99f49bfb [40] => 0499d78a602a75a5de820cae99f49bfb ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => two-british-men-arrested-over-microsoft-hacking-plot )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/two-british-men-arrested-over-microsoft-hacking-plot/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 0499d78a602a75a5de820cae99f49bfb [1] => 0499d78a602a75a5de820cae99f49bfb [2] => 0499d78a602a75a5de820cae99f49bfb [3] => 0499d78a602a75a5de820cae99f49bfb [4] => 0499d78a602a75a5de820cae99f49bfb [5] => 0499d78a602a75a5de820cae99f49bfb [6] => 0499d78a602a75a5de820cae99f49bfb [7] => 0499d78a602a75a5de820cae99f49bfb [8] => 0499d78a602a75a5de820cae99f49bfb [9] => 0499d78a602a75a5de820cae99f49bfb [10] => 0499d78a602a75a5de820cae99f49bfb [11] => 0499d78a602a75a5de820cae99f49bfb [12] => 0499d78a602a75a5de820cae99f49bfb [13] => 0499d78a602a75a5de820cae99f49bfb [14] => 0499d78a602a75a5de820cae99f49bfb [15] => 0499d78a602a75a5de820cae99f49bfb [16] => 0499d78a602a75a5de820cae99f49bfb [17] => 0499d78a602a75a5de820cae99f49bfb [18] => 0499d78a602a75a5de820cae99f49bfb [19] => 0499d78a602a75a5de820cae99f49bfb [20] => 0499d78a602a75a5de820cae99f49bfb [21] => 0499d78a602a75a5de820cae99f49bfb [22] => 0499d78a602a75a5de820cae99f49bfb [23] => 0499d78a602a75a5de820cae99f49bfb [24] => 0499d78a602a75a5de820cae99f49bfb [25] => 0499d78a602a75a5de820cae99f49bfb [26] => 0499d78a602a75a5de820cae99f49bfb [27] => 0499d78a602a75a5de820cae99f49bfb [28] => 0499d78a602a75a5de820cae99f49bfb [29] => 0499d78a602a75a5de820cae99f49bfb [30] => 0499d78a602a75a5de820cae99f49bfb [31] => 0499d78a602a75a5de820cae99f49bfb [32] => 0499d78a602a75a5de820cae99f49bfb [33] => 0499d78a602a75a5de820cae99f49bfb [34] => 0499d78a602a75a5de820cae99f49bfb [35] => 0499d78a602a75a5de820cae99f49bfb [36] => 0499d78a602a75a5de820cae99f49bfb [37] => 0499d78a602a75a5de820cae99f49bfb [38] => 0499d78a602a75a5de820cae99f49bfb [39] => 0499d78a602a75a5de820cae99f49bfb [40] => 0499d78a602a75a5de820cae99f49bfb ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Two British men arrested over Microsoft hacking plot

Array ( [post_title] => Two British men arrested over Microsoft hacking plot [post_content] => The duo has tried, time and time again, to break into Microsoft's systems to steal customer data. [post_excerpt] => The duo has tried, time and time again, to break into Microsoft's systems to steal customer data. [post_date_gmt] => 2017-06-23 10:35:00 [post_date] => 2017-06-23 11:35:00 [post_modified_gmt] => 2017-06-23 10:35:00 [post_modified] => 2017-06-23 11:35:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 80db0f83-ec2d-43e2-a3f3-a13f4548996c [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/two-british-men-arrested-over-microsoft-hacking-plot/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 0499d78a602a75a5de820cae99f49bfb [1] => 0499d78a602a75a5de820cae99f49bfb [2] => 0499d78a602a75a5de820cae99f49bfb [3] => 0499d78a602a75a5de820cae99f49bfb [4] => 0499d78a602a75a5de820cae99f49bfb [5] => 0499d78a602a75a5de820cae99f49bfb [6] => 0499d78a602a75a5de820cae99f49bfb [7] => 0499d78a602a75a5de820cae99f49bfb [8] => 0499d78a602a75a5de820cae99f49bfb [9] => 0499d78a602a75a5de820cae99f49bfb [10] => 0499d78a602a75a5de820cae99f49bfb [11] => 0499d78a602a75a5de820cae99f49bfb [12] => 0499d78a602a75a5de820cae99f49bfb [13] => 0499d78a602a75a5de820cae99f49bfb [14] => 0499d78a602a75a5de820cae99f49bfb [15] => 0499d78a602a75a5de820cae99f49bfb [16] => 0499d78a602a75a5de820cae99f49bfb [17] => 0499d78a602a75a5de820cae99f49bfb [18] => 0499d78a602a75a5de820cae99f49bfb [19] => 0499d78a602a75a5de820cae99f49bfb [20] => 0499d78a602a75a5de820cae99f49bfb [21] => 0499d78a602a75a5de820cae99f49bfb [22] => 0499d78a602a75a5de820cae99f49bfb [23] => 0499d78a602a75a5de820cae99f49bfb [24] => 0499d78a602a75a5de820cae99f49bfb [25] => 0499d78a602a75a5de820cae99f49bfb [26] => 0499d78a602a75a5de820cae99f49bfb [27] => 0499d78a602a75a5de820cae99f49bfb [28] => 0499d78a602a75a5de820cae99f49bfb [29] => 0499d78a602a75a5de820cae99f49bfb [30] => 0499d78a602a75a5de820cae99f49bfb [31] => 0499d78a602a75a5de820cae99f49bfb [32] => 0499d78a602a75a5de820cae99f49bfb [33] => 0499d78a602a75a5de820cae99f49bfb [34] => 0499d78a602a75a5de820cae99f49bfb [35] => 0499d78a602a75a5de820cae99f49bfb [36] => 0499d78a602a75a5de820cae99f49bfb [37] => 0499d78a602a75a5de820cae99f49bfb [38] => 0499d78a602a75a5de820cae99f49bfb [39] => 0499d78a602a75a5de820cae99f49bfb [40] => 0499d78a602a75a5de820cae99f49bfb ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => two-british-men-arrested-over-microsoft-hacking-plot )

FAF deciding on filters on post to be syndicated:

Germany aims to store all users' browsing data. But court says it's breaking EU law

Array ( [post_title] => Germany aims to store all users' browsing data. But court says it's breaking EU law [post_content] => A law due to come into force in days in Germany on storing internet usage data breaks EU regs, a court rules. [post_excerpt] => A law due to come into force in days in Germany on storing internet usage data breaks EU regs, a court rules. [post_date_gmt] => 2017-06-23 10:15:00 [post_date] => 2017-06-23 11:15:00 [post_modified_gmt] => 2017-06-23 10:15:00 [post_modified] => 2017-06-23 11:15:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => e30227f3-83e5-4993-8f89-f8c1c0f147ee [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/germany-aims-to-store-all-users-browsing-data-but-court-says-its-breaking-eu-law/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => d11b696632e7346e38ac93378c569838 [1] => d11b696632e7346e38ac93378c569838 [2] => d11b696632e7346e38ac93378c569838 [3] => d11b696632e7346e38ac93378c569838 [4] => d11b696632e7346e38ac93378c569838 [5] => d11b696632e7346e38ac93378c569838 [6] => d11b696632e7346e38ac93378c569838 [7] => d11b696632e7346e38ac93378c569838 [8] => d11b696632e7346e38ac93378c569838 [9] => d11b696632e7346e38ac93378c569838 [10] => d11b696632e7346e38ac93378c569838 [11] => d11b696632e7346e38ac93378c569838 [12] => d11b696632e7346e38ac93378c569838 [13] => d11b696632e7346e38ac93378c569838 [14] => d11b696632e7346e38ac93378c569838 [15] => d11b696632e7346e38ac93378c569838 [16] => d11b696632e7346e38ac93378c569838 [17] => d11b696632e7346e38ac93378c569838 [18] => d11b696632e7346e38ac93378c569838 [19] => d11b696632e7346e38ac93378c569838 [20] => d11b696632e7346e38ac93378c569838 [21] => d11b696632e7346e38ac93378c569838 [22] => d11b696632e7346e38ac93378c569838 [23] => d11b696632e7346e38ac93378c569838 [24] => d11b696632e7346e38ac93378c569838 [25] => d11b696632e7346e38ac93378c569838 [26] => d11b696632e7346e38ac93378c569838 [27] => d11b696632e7346e38ac93378c569838 [28] => d11b696632e7346e38ac93378c569838 [29] => d11b696632e7346e38ac93378c569838 [30] => d11b696632e7346e38ac93378c569838 [31] => d11b696632e7346e38ac93378c569838 [32] => d11b696632e7346e38ac93378c569838 [33] => d11b696632e7346e38ac93378c569838 [34] => d11b696632e7346e38ac93378c569838 [35] => d11b696632e7346e38ac93378c569838 [36] => d11b696632e7346e38ac93378c569838 [37] => d11b696632e7346e38ac93378c569838 [38] => d11b696632e7346e38ac93378c569838 [39] => d11b696632e7346e38ac93378c569838 [40] => d11b696632e7346e38ac93378c569838 [41] => d11b696632e7346e38ac93378c569838 [42] => d11b696632e7346e38ac93378c569838 [43] => d11b696632e7346e38ac93378c569838 [44] => d11b696632e7346e38ac93378c569838 [45] => d11b696632e7346e38ac93378c569838 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => germany-aims-to-store-all-users-browsing-data-but-court-says-its-breaking-eu-law )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/germany-aims-to-store-all-users-browsing-data-but-court-says-its-breaking-eu-law/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => d11b696632e7346e38ac93378c569838 [1] => d11b696632e7346e38ac93378c569838 [2] => d11b696632e7346e38ac93378c569838 [3] => d11b696632e7346e38ac93378c569838 [4] => d11b696632e7346e38ac93378c569838 [5] => d11b696632e7346e38ac93378c569838 [6] => d11b696632e7346e38ac93378c569838 [7] => d11b696632e7346e38ac93378c569838 [8] => d11b696632e7346e38ac93378c569838 [9] => d11b696632e7346e38ac93378c569838 [10] => d11b696632e7346e38ac93378c569838 [11] => d11b696632e7346e38ac93378c569838 [12] => d11b696632e7346e38ac93378c569838 [13] => d11b696632e7346e38ac93378c569838 [14] => d11b696632e7346e38ac93378c569838 [15] => d11b696632e7346e38ac93378c569838 [16] => d11b696632e7346e38ac93378c569838 [17] => d11b696632e7346e38ac93378c569838 [18] => d11b696632e7346e38ac93378c569838 [19] => d11b696632e7346e38ac93378c569838 [20] => d11b696632e7346e38ac93378c569838 [21] => d11b696632e7346e38ac93378c569838 [22] => d11b696632e7346e38ac93378c569838 [23] => d11b696632e7346e38ac93378c569838 [24] => d11b696632e7346e38ac93378c569838 [25] => d11b696632e7346e38ac93378c569838 [26] => d11b696632e7346e38ac93378c569838 [27] => d11b696632e7346e38ac93378c569838 [28] => d11b696632e7346e38ac93378c569838 [29] => d11b696632e7346e38ac93378c569838 [30] => d11b696632e7346e38ac93378c569838 [31] => d11b696632e7346e38ac93378c569838 [32] => d11b696632e7346e38ac93378c569838 [33] => d11b696632e7346e38ac93378c569838 [34] => d11b696632e7346e38ac93378c569838 [35] => d11b696632e7346e38ac93378c569838 [36] => d11b696632e7346e38ac93378c569838 [37] => d11b696632e7346e38ac93378c569838 [38] => d11b696632e7346e38ac93378c569838 [39] => d11b696632e7346e38ac93378c569838 [40] => d11b696632e7346e38ac93378c569838 [41] => d11b696632e7346e38ac93378c569838 [42] => d11b696632e7346e38ac93378c569838 [43] => d11b696632e7346e38ac93378c569838 [44] => d11b696632e7346e38ac93378c569838 [45] => d11b696632e7346e38ac93378c569838 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Germany aims to store all users' browsing data. But court says it's breaking EU law

Array ( [post_title] => Germany aims to store all users' browsing data. But court says it's breaking EU law [post_content] => A law due to come into force in days in Germany on storing internet usage data breaks EU regs, a court rules. [post_excerpt] => A law due to come into force in days in Germany on storing internet usage data breaks EU regs, a court rules. [post_date_gmt] => 2017-06-23 10:15:00 [post_date] => 2017-06-23 11:15:00 [post_modified_gmt] => 2017-06-23 10:15:00 [post_modified] => 2017-06-23 11:15:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => e30227f3-83e5-4993-8f89-f8c1c0f147ee [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/germany-aims-to-store-all-users-browsing-data-but-court-says-its-breaking-eu-law/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => d11b696632e7346e38ac93378c569838 [1] => d11b696632e7346e38ac93378c569838 [2] => d11b696632e7346e38ac93378c569838 [3] => d11b696632e7346e38ac93378c569838 [4] => d11b696632e7346e38ac93378c569838 [5] => d11b696632e7346e38ac93378c569838 [6] => d11b696632e7346e38ac93378c569838 [7] => d11b696632e7346e38ac93378c569838 [8] => d11b696632e7346e38ac93378c569838 [9] => d11b696632e7346e38ac93378c569838 [10] => d11b696632e7346e38ac93378c569838 [11] => d11b696632e7346e38ac93378c569838 [12] => d11b696632e7346e38ac93378c569838 [13] => d11b696632e7346e38ac93378c569838 [14] => d11b696632e7346e38ac93378c569838 [15] => d11b696632e7346e38ac93378c569838 [16] => d11b696632e7346e38ac93378c569838 [17] => d11b696632e7346e38ac93378c569838 [18] => d11b696632e7346e38ac93378c569838 [19] => d11b696632e7346e38ac93378c569838 [20] => d11b696632e7346e38ac93378c569838 [21] => d11b696632e7346e38ac93378c569838 [22] => d11b696632e7346e38ac93378c569838 [23] => d11b696632e7346e38ac93378c569838 [24] => d11b696632e7346e38ac93378c569838 [25] => d11b696632e7346e38ac93378c569838 [26] => d11b696632e7346e38ac93378c569838 [27] => d11b696632e7346e38ac93378c569838 [28] => d11b696632e7346e38ac93378c569838 [29] => d11b696632e7346e38ac93378c569838 [30] => d11b696632e7346e38ac93378c569838 [31] => d11b696632e7346e38ac93378c569838 [32] => d11b696632e7346e38ac93378c569838 [33] => d11b696632e7346e38ac93378c569838 [34] => d11b696632e7346e38ac93378c569838 [35] => d11b696632e7346e38ac93378c569838 [36] => d11b696632e7346e38ac93378c569838 [37] => d11b696632e7346e38ac93378c569838 [38] => d11b696632e7346e38ac93378c569838 [39] => d11b696632e7346e38ac93378c569838 [40] => d11b696632e7346e38ac93378c569838 [41] => d11b696632e7346e38ac93378c569838 [42] => d11b696632e7346e38ac93378c569838 [43] => d11b696632e7346e38ac93378c569838 [44] => d11b696632e7346e38ac93378c569838 [45] => d11b696632e7346e38ac93378c569838 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => germany-aims-to-store-all-users-browsing-data-but-court-says-its-breaking-eu-law )

FAF deciding on filters on post to be syndicated:

​Cisco tackling human element of security with cyber training course

Array ( [post_title] => ​Cisco tackling human element of security with cyber training course [post_content] => Cisco has launched a cybersecurity course aimed at teaching adults how to avoid the most common threats, attacks, and vulnerabilities cyberspace presents. [post_excerpt] => Cisco has launched a cybersecurity course aimed at teaching adults how to avoid the most common threats, attacks, and vulnerabilities cyberspace presents. [post_date_gmt] => 2017-06-23 01:22:07 [post_date] => 2017-06-23 02:22:07 [post_modified_gmt] => 2017-06-23 01:22:07 [post_modified] => 2017-06-23 02:22:07 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 7fdea0b0-a6b9-414e-a4ad-f28e3dd63005 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/cisco-tackling-human-element-of-security-with-cyber-training-course/#ftag=RSSbaffb68 [syndication_item_hash] => f0735dcee44b53fef2acaefceb49abd0 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/cisco-tackling-human-element-of-security-with-cyber-training-course/#ftag=RSSbaffb68 [syndication_item_hash] => f0735dcee44b53fef2acaefceb49abd0 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :​Cisco tackling human element of security with cyber training course

Array ( [post_title] => ​Cisco tackling human element of security with cyber training course [post_content] => Cisco has launched a cybersecurity course aimed at teaching adults how to avoid the most common threats, attacks, and vulnerabilities cyberspace presents. [post_excerpt] => Cisco has launched a cybersecurity course aimed at teaching adults how to avoid the most common threats, attacks, and vulnerabilities cyberspace presents. [post_date_gmt] => 2017-06-23 01:22:07 [post_date] => 2017-06-23 02:22:07 [post_modified_gmt] => 2017-06-23 01:22:07 [post_modified] => 2017-06-23 02:22:07 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 7fdea0b0-a6b9-414e-a4ad-f28e3dd63005 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/cisco-tackling-human-element-of-security-with-cyber-training-course/#ftag=RSSbaffb68 [syndication_item_hash] => f0735dcee44b53fef2acaefceb49abd0 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

A closer look at what Windows 10 S can and can't do

Array ( [post_title] => A closer look at what Windows 10 S can and can't do [post_content] => Microsoft is being remarkably coy about its newest Windows edition, so I went digging. Here are a few details you won't find anywhere else about what you get with the locked-down configuration of Windows 10 S. [post_excerpt] => Microsoft is being remarkably coy about its newest Windows edition, so I went digging. Here are a few details you won't find anywhere else about what you get with the locked-down configuration of Windows 10 S. [post_date_gmt] => 2017-06-22 13:07:00 [post_date] => 2017-06-22 14:07:00 [post_modified_gmt] => 2017-06-22 13:07:00 [post_modified] => 2017-06-22 14:07:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => fd0087af-ebe8-4e85-ad09-738e53011f78 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/a-closer-look-at-what-windows-10-s-can-and-cant-do/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => bd71de69968f0f3549869a7ffe2ce0d8 [1] => bd71de69968f0f3549869a7ffe2ce0d8 [2] => bd71de69968f0f3549869a7ffe2ce0d8 [3] => bd71de69968f0f3549869a7ffe2ce0d8 [4] => bd71de69968f0f3549869a7ffe2ce0d8 [5] => bd71de69968f0f3549869a7ffe2ce0d8 [6] => bd71de69968f0f3549869a7ffe2ce0d8 [7] => bd71de69968f0f3549869a7ffe2ce0d8 [8] => bd71de69968f0f3549869a7ffe2ce0d8 [9] => bd71de69968f0f3549869a7ffe2ce0d8 [10] => bd71de69968f0f3549869a7ffe2ce0d8 [11] => bd71de69968f0f3549869a7ffe2ce0d8 [12] => bd71de69968f0f3549869a7ffe2ce0d8 [13] => bd71de69968f0f3549869a7ffe2ce0d8 [14] => bd71de69968f0f3549869a7ffe2ce0d8 [15] => bd71de69968f0f3549869a7ffe2ce0d8 [16] => bd71de69968f0f3549869a7ffe2ce0d8 [17] => bd71de69968f0f3549869a7ffe2ce0d8 [18] => bd71de69968f0f3549869a7ffe2ce0d8 [19] => bd71de69968f0f3549869a7ffe2ce0d8 [20] => bd71de69968f0f3549869a7ffe2ce0d8 [21] => bd71de69968f0f3549869a7ffe2ce0d8 [22] => bd71de69968f0f3549869a7ffe2ce0d8 [23] => bd71de69968f0f3549869a7ffe2ce0d8 [24] => bd71de69968f0f3549869a7ffe2ce0d8 [25] => bd71de69968f0f3549869a7ffe2ce0d8 [26] => bd71de69968f0f3549869a7ffe2ce0d8 [27] => bd71de69968f0f3549869a7ffe2ce0d8 [28] => bd71de69968f0f3549869a7ffe2ce0d8 [29] => bd71de69968f0f3549869a7ffe2ce0d8 [30] => bd71de69968f0f3549869a7ffe2ce0d8 [31] => bd71de69968f0f3549869a7ffe2ce0d8 [32] => bd71de69968f0f3549869a7ffe2ce0d8 [33] => bd71de69968f0f3549869a7ffe2ce0d8 [34] => bd71de69968f0f3549869a7ffe2ce0d8 [35] => bd71de69968f0f3549869a7ffe2ce0d8 [36] => bd71de69968f0f3549869a7ffe2ce0d8 [37] => bd71de69968f0f3549869a7ffe2ce0d8 [38] => bd71de69968f0f3549869a7ffe2ce0d8 [39] => bd71de69968f0f3549869a7ffe2ce0d8 [40] => bd71de69968f0f3549869a7ffe2ce0d8 [41] => bd71de69968f0f3549869a7ffe2ce0d8 [42] => bd71de69968f0f3549869a7ffe2ce0d8 [43] => bd71de69968f0f3549869a7ffe2ce0d8 [44] => bd71de69968f0f3549869a7ffe2ce0d8 [45] => bd71de69968f0f3549869a7ffe2ce0d8 [46] => bd71de69968f0f3549869a7ffe2ce0d8 [47] => bd71de69968f0f3549869a7ffe2ce0d8 [48] => bd71de69968f0f3549869a7ffe2ce0d8 [49] => bd71de69968f0f3549869a7ffe2ce0d8 [50] => bd71de69968f0f3549869a7ffe2ce0d8 [51] => bd71de69968f0f3549869a7ffe2ce0d8 [52] => bd71de69968f0f3549869a7ffe2ce0d8 [53] => bd71de69968f0f3549869a7ffe2ce0d8 [54] => bd71de69968f0f3549869a7ffe2ce0d8 [55] => bd71de69968f0f3549869a7ffe2ce0d8 [56] => bd71de69968f0f3549869a7ffe2ce0d8 [57] => bd71de69968f0f3549869a7ffe2ce0d8 [58] => bd71de69968f0f3549869a7ffe2ce0d8 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => a-closer-look-at-what-windows-10-s-can-and-cant-do )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/a-closer-look-at-what-windows-10-s-can-and-cant-do/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => bd71de69968f0f3549869a7ffe2ce0d8 [1] => bd71de69968f0f3549869a7ffe2ce0d8 [2] => bd71de69968f0f3549869a7ffe2ce0d8 [3] => bd71de69968f0f3549869a7ffe2ce0d8 [4] => bd71de69968f0f3549869a7ffe2ce0d8 [5] => bd71de69968f0f3549869a7ffe2ce0d8 [6] => bd71de69968f0f3549869a7ffe2ce0d8 [7] => bd71de69968f0f3549869a7ffe2ce0d8 [8] => bd71de69968f0f3549869a7ffe2ce0d8 [9] => bd71de69968f0f3549869a7ffe2ce0d8 [10] => bd71de69968f0f3549869a7ffe2ce0d8 [11] => bd71de69968f0f3549869a7ffe2ce0d8 [12] => bd71de69968f0f3549869a7ffe2ce0d8 [13] => bd71de69968f0f3549869a7ffe2ce0d8 [14] => bd71de69968f0f3549869a7ffe2ce0d8 [15] => bd71de69968f0f3549869a7ffe2ce0d8 [16] => bd71de69968f0f3549869a7ffe2ce0d8 [17] => bd71de69968f0f3549869a7ffe2ce0d8 [18] => bd71de69968f0f3549869a7ffe2ce0d8 [19] => bd71de69968f0f3549869a7ffe2ce0d8 [20] => bd71de69968f0f3549869a7ffe2ce0d8 [21] => bd71de69968f0f3549869a7ffe2ce0d8 [22] => bd71de69968f0f3549869a7ffe2ce0d8 [23] => bd71de69968f0f3549869a7ffe2ce0d8 [24] => bd71de69968f0f3549869a7ffe2ce0d8 [25] => bd71de69968f0f3549869a7ffe2ce0d8 [26] => bd71de69968f0f3549869a7ffe2ce0d8 [27] => bd71de69968f0f3549869a7ffe2ce0d8 [28] => bd71de69968f0f3549869a7ffe2ce0d8 [29] => bd71de69968f0f3549869a7ffe2ce0d8 [30] => bd71de69968f0f3549869a7ffe2ce0d8 [31] => bd71de69968f0f3549869a7ffe2ce0d8 [32] => bd71de69968f0f3549869a7ffe2ce0d8 [33] => bd71de69968f0f3549869a7ffe2ce0d8 [34] => bd71de69968f0f3549869a7ffe2ce0d8 [35] => bd71de69968f0f3549869a7ffe2ce0d8 [36] => bd71de69968f0f3549869a7ffe2ce0d8 [37] => bd71de69968f0f3549869a7ffe2ce0d8 [38] => bd71de69968f0f3549869a7ffe2ce0d8 [39] => bd71de69968f0f3549869a7ffe2ce0d8 [40] => bd71de69968f0f3549869a7ffe2ce0d8 [41] => bd71de69968f0f3549869a7ffe2ce0d8 [42] => bd71de69968f0f3549869a7ffe2ce0d8 [43] => bd71de69968f0f3549869a7ffe2ce0d8 [44] => bd71de69968f0f3549869a7ffe2ce0d8 [45] => bd71de69968f0f3549869a7ffe2ce0d8 [46] => bd71de69968f0f3549869a7ffe2ce0d8 [47] => bd71de69968f0f3549869a7ffe2ce0d8 [48] => bd71de69968f0f3549869a7ffe2ce0d8 [49] => bd71de69968f0f3549869a7ffe2ce0d8 [50] => bd71de69968f0f3549869a7ffe2ce0d8 [51] => bd71de69968f0f3549869a7ffe2ce0d8 [52] => bd71de69968f0f3549869a7ffe2ce0d8 [53] => bd71de69968f0f3549869a7ffe2ce0d8 [54] => bd71de69968f0f3549869a7ffe2ce0d8 [55] => bd71de69968f0f3549869a7ffe2ce0d8 [56] => bd71de69968f0f3549869a7ffe2ce0d8 [57] => bd71de69968f0f3549869a7ffe2ce0d8 [58] => bd71de69968f0f3549869a7ffe2ce0d8 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :A closer look at what Windows 10 S can and can't do

Array ( [post_title] => A closer look at what Windows 10 S can and can't do [post_content] => Microsoft is being remarkably coy about its newest Windows edition, so I went digging. Here are a few details you won't find anywhere else about what you get with the locked-down configuration of Windows 10 S. [post_excerpt] => Microsoft is being remarkably coy about its newest Windows edition, so I went digging. Here are a few details you won't find anywhere else about what you get with the locked-down configuration of Windows 10 S. [post_date_gmt] => 2017-06-22 13:07:00 [post_date] => 2017-06-22 14:07:00 [post_modified_gmt] => 2017-06-22 13:07:00 [post_modified] => 2017-06-22 14:07:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => fd0087af-ebe8-4e85-ad09-738e53011f78 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/a-closer-look-at-what-windows-10-s-can-and-cant-do/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => bd71de69968f0f3549869a7ffe2ce0d8 [1] => bd71de69968f0f3549869a7ffe2ce0d8 [2] => bd71de69968f0f3549869a7ffe2ce0d8 [3] => bd71de69968f0f3549869a7ffe2ce0d8 [4] => bd71de69968f0f3549869a7ffe2ce0d8 [5] => bd71de69968f0f3549869a7ffe2ce0d8 [6] => bd71de69968f0f3549869a7ffe2ce0d8 [7] => bd71de69968f0f3549869a7ffe2ce0d8 [8] => bd71de69968f0f3549869a7ffe2ce0d8 [9] => bd71de69968f0f3549869a7ffe2ce0d8 [10] => bd71de69968f0f3549869a7ffe2ce0d8 [11] => bd71de69968f0f3549869a7ffe2ce0d8 [12] => bd71de69968f0f3549869a7ffe2ce0d8 [13] => bd71de69968f0f3549869a7ffe2ce0d8 [14] => bd71de69968f0f3549869a7ffe2ce0d8 [15] => bd71de69968f0f3549869a7ffe2ce0d8 [16] => bd71de69968f0f3549869a7ffe2ce0d8 [17] => bd71de69968f0f3549869a7ffe2ce0d8 [18] => bd71de69968f0f3549869a7ffe2ce0d8 [19] => bd71de69968f0f3549869a7ffe2ce0d8 [20] => bd71de69968f0f3549869a7ffe2ce0d8 [21] => bd71de69968f0f3549869a7ffe2ce0d8 [22] => bd71de69968f0f3549869a7ffe2ce0d8 [23] => bd71de69968f0f3549869a7ffe2ce0d8 [24] => bd71de69968f0f3549869a7ffe2ce0d8 [25] => bd71de69968f0f3549869a7ffe2ce0d8 [26] => bd71de69968f0f3549869a7ffe2ce0d8 [27] => bd71de69968f0f3549869a7ffe2ce0d8 [28] => bd71de69968f0f3549869a7ffe2ce0d8 [29] => bd71de69968f0f3549869a7ffe2ce0d8 [30] => bd71de69968f0f3549869a7ffe2ce0d8 [31] => bd71de69968f0f3549869a7ffe2ce0d8 [32] => bd71de69968f0f3549869a7ffe2ce0d8 [33] => bd71de69968f0f3549869a7ffe2ce0d8 [34] => bd71de69968f0f3549869a7ffe2ce0d8 [35] => bd71de69968f0f3549869a7ffe2ce0d8 [36] => bd71de69968f0f3549869a7ffe2ce0d8 [37] => bd71de69968f0f3549869a7ffe2ce0d8 [38] => bd71de69968f0f3549869a7ffe2ce0d8 [39] => bd71de69968f0f3549869a7ffe2ce0d8 [40] => bd71de69968f0f3549869a7ffe2ce0d8 [41] => bd71de69968f0f3549869a7ffe2ce0d8 [42] => bd71de69968f0f3549869a7ffe2ce0d8 [43] => bd71de69968f0f3549869a7ffe2ce0d8 [44] => bd71de69968f0f3549869a7ffe2ce0d8 [45] => bd71de69968f0f3549869a7ffe2ce0d8 [46] => bd71de69968f0f3549869a7ffe2ce0d8 [47] => bd71de69968f0f3549869a7ffe2ce0d8 [48] => bd71de69968f0f3549869a7ffe2ce0d8 [49] => bd71de69968f0f3549869a7ffe2ce0d8 [50] => bd71de69968f0f3549869a7ffe2ce0d8 [51] => bd71de69968f0f3549869a7ffe2ce0d8 [52] => bd71de69968f0f3549869a7ffe2ce0d8 [53] => bd71de69968f0f3549869a7ffe2ce0d8 [54] => bd71de69968f0f3549869a7ffe2ce0d8 [55] => bd71de69968f0f3549869a7ffe2ce0d8 [56] => bd71de69968f0f3549869a7ffe2ce0d8 [57] => bd71de69968f0f3549869a7ffe2ce0d8 [58] => bd71de69968f0f3549869a7ffe2ce0d8 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => a-closer-look-at-what-windows-10-s-can-and-cant-do )

FAF deciding on filters on post to be syndicated:

Microsoft claims Fireball malware enterprise threat 'overblown'

Array ( [post_title] => Microsoft claims Fireball malware enterprise threat 'overblown' [post_content] => Microsoft has cast doubt on Check Point's claims that Fireball has a hold in one-in-five corporate networks. [post_excerpt] => Microsoft has cast doubt on Check Point's claims that Fireball has a hold in one-in-five corporate networks. [post_date_gmt] => 2017-06-22 13:00:00 [post_date] => 2017-06-22 14:00:00 [post_modified_gmt] => 2017-06-22 13:00:00 [post_modified] => 2017-06-22 14:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 39342e46-ad81-4f21-aa0d-48bc8b34ad56 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/microsoft-chips-in-on-overblown-fireball-cyberthreat/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 52f63f98ebc3cf29adacb1ddda61db7d [1] => 7473a81faaaf419ba50a77fb93d08ea5 [2] => 7473a81faaaf419ba50a77fb93d08ea5 [3] => 7473a81faaaf419ba50a77fb93d08ea5 [4] => 7473a81faaaf419ba50a77fb93d08ea5 [5] => 7473a81faaaf419ba50a77fb93d08ea5 [6] => 7473a81faaaf419ba50a77fb93d08ea5 [7] => 7473a81faaaf419ba50a77fb93d08ea5 [8] => 7473a81faaaf419ba50a77fb93d08ea5 [9] => 7473a81faaaf419ba50a77fb93d08ea5 [10] => 7473a81faaaf419ba50a77fb93d08ea5 [11] => 7473a81faaaf419ba50a77fb93d08ea5 [12] => 7473a81faaaf419ba50a77fb93d08ea5 [13] => 7473a81faaaf419ba50a77fb93d08ea5 [14] => 7473a81faaaf419ba50a77fb93d08ea5 [15] => 7473a81faaaf419ba50a77fb93d08ea5 [16] => 7473a81faaaf419ba50a77fb93d08ea5 [17] => 7473a81faaaf419ba50a77fb93d08ea5 [18] => 7473a81faaaf419ba50a77fb93d08ea5 [19] => 7473a81faaaf419ba50a77fb93d08ea5 [20] => 7473a81faaaf419ba50a77fb93d08ea5 [21] => 7473a81faaaf419ba50a77fb93d08ea5 [22] => 7473a81faaaf419ba50a77fb93d08ea5 [23] => 7473a81faaaf419ba50a77fb93d08ea5 [24] => 7473a81faaaf419ba50a77fb93d08ea5 [25] => 7473a81faaaf419ba50a77fb93d08ea5 [26] => 7473a81faaaf419ba50a77fb93d08ea5 [27] => 7473a81faaaf419ba50a77fb93d08ea5 [28] => 7473a81faaaf419ba50a77fb93d08ea5 [29] => 7473a81faaaf419ba50a77fb93d08ea5 [30] => 7473a81faaaf419ba50a77fb93d08ea5 [31] => 7473a81faaaf419ba50a77fb93d08ea5 [32] => 7473a81faaaf419ba50a77fb93d08ea5 [33] => 7473a81faaaf419ba50a77fb93d08ea5 [34] => 7473a81faaaf419ba50a77fb93d08ea5 [35] => 7473a81faaaf419ba50a77fb93d08ea5 [36] => 7473a81faaaf419ba50a77fb93d08ea5 [37] => 7473a81faaaf419ba50a77fb93d08ea5 [38] => 7473a81faaaf419ba50a77fb93d08ea5 [39] => 7473a81faaaf419ba50a77fb93d08ea5 [40] => 7473a81faaaf419ba50a77fb93d08ea5 [41] => 7473a81faaaf419ba50a77fb93d08ea5 [42] => 7473a81faaaf419ba50a77fb93d08ea5 [43] => 7473a81faaaf419ba50a77fb93d08ea5 [44] => 7473a81faaaf419ba50a77fb93d08ea5 [45] => 7473a81faaaf419ba50a77fb93d08ea5 [46] => 7473a81faaaf419ba50a77fb93d08ea5 [47] => 7473a81faaaf419ba50a77fb93d08ea5 [48] => 7473a81faaaf419ba50a77fb93d08ea5 [49] => 7473a81faaaf419ba50a77fb93d08ea5 [50] => 7473a81faaaf419ba50a77fb93d08ea5 [51] => 7473a81faaaf419ba50a77fb93d08ea5 [52] => 7473a81faaaf419ba50a77fb93d08ea5 [53] => 7473a81faaaf419ba50a77fb93d08ea5 [54] => 7473a81faaaf419ba50a77fb93d08ea5 [55] => 7473a81faaaf419ba50a77fb93d08ea5 [56] => 7473a81faaaf419ba50a77fb93d08ea5 [57] => 7473a81faaaf419ba50a77fb93d08ea5 [58] => 7473a81faaaf419ba50a77fb93d08ea5 [59] => 7473a81faaaf419ba50a77fb93d08ea5 [60] => 7473a81faaaf419ba50a77fb93d08ea5 [61] => 7473a81faaaf419ba50a77fb93d08ea5 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => microsoft-claims-fireball-malware-enterprise-threat-overblown )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/microsoft-chips-in-on-overblown-fireball-cyberthreat/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 52f63f98ebc3cf29adacb1ddda61db7d [1] => 7473a81faaaf419ba50a77fb93d08ea5 [2] => 7473a81faaaf419ba50a77fb93d08ea5 [3] => 7473a81faaaf419ba50a77fb93d08ea5 [4] => 7473a81faaaf419ba50a77fb93d08ea5 [5] => 7473a81faaaf419ba50a77fb93d08ea5 [6] => 7473a81faaaf419ba50a77fb93d08ea5 [7] => 7473a81faaaf419ba50a77fb93d08ea5 [8] => 7473a81faaaf419ba50a77fb93d08ea5 [9] => 7473a81faaaf419ba50a77fb93d08ea5 [10] => 7473a81faaaf419ba50a77fb93d08ea5 [11] => 7473a81faaaf419ba50a77fb93d08ea5 [12] => 7473a81faaaf419ba50a77fb93d08ea5 [13] => 7473a81faaaf419ba50a77fb93d08ea5 [14] => 7473a81faaaf419ba50a77fb93d08ea5 [15] => 7473a81faaaf419ba50a77fb93d08ea5 [16] => 7473a81faaaf419ba50a77fb93d08ea5 [17] => 7473a81faaaf419ba50a77fb93d08ea5 [18] => 7473a81faaaf419ba50a77fb93d08ea5 [19] => 7473a81faaaf419ba50a77fb93d08ea5 [20] => 7473a81faaaf419ba50a77fb93d08ea5 [21] => 7473a81faaaf419ba50a77fb93d08ea5 [22] => 7473a81faaaf419ba50a77fb93d08ea5 [23] => 7473a81faaaf419ba50a77fb93d08ea5 [24] => 7473a81faaaf419ba50a77fb93d08ea5 [25] => 7473a81faaaf419ba50a77fb93d08ea5 [26] => 7473a81faaaf419ba50a77fb93d08ea5 [27] => 7473a81faaaf419ba50a77fb93d08ea5 [28] => 7473a81faaaf419ba50a77fb93d08ea5 [29] => 7473a81faaaf419ba50a77fb93d08ea5 [30] => 7473a81faaaf419ba50a77fb93d08ea5 [31] => 7473a81faaaf419ba50a77fb93d08ea5 [32] => 7473a81faaaf419ba50a77fb93d08ea5 [33] => 7473a81faaaf419ba50a77fb93d08ea5 [34] => 7473a81faaaf419ba50a77fb93d08ea5 [35] => 7473a81faaaf419ba50a77fb93d08ea5 [36] => 7473a81faaaf419ba50a77fb93d08ea5 [37] => 7473a81faaaf419ba50a77fb93d08ea5 [38] => 7473a81faaaf419ba50a77fb93d08ea5 [39] => 7473a81faaaf419ba50a77fb93d08ea5 [40] => 7473a81faaaf419ba50a77fb93d08ea5 [41] => 7473a81faaaf419ba50a77fb93d08ea5 [42] => 7473a81faaaf419ba50a77fb93d08ea5 [43] => 7473a81faaaf419ba50a77fb93d08ea5 [44] => 7473a81faaaf419ba50a77fb93d08ea5 [45] => 7473a81faaaf419ba50a77fb93d08ea5 [46] => 7473a81faaaf419ba50a77fb93d08ea5 [47] => 7473a81faaaf419ba50a77fb93d08ea5 [48] => 7473a81faaaf419ba50a77fb93d08ea5 [49] => 7473a81faaaf419ba50a77fb93d08ea5 [50] => 7473a81faaaf419ba50a77fb93d08ea5 [51] => 7473a81faaaf419ba50a77fb93d08ea5 [52] => 7473a81faaaf419ba50a77fb93d08ea5 [53] => 7473a81faaaf419ba50a77fb93d08ea5 [54] => 7473a81faaaf419ba50a77fb93d08ea5 [55] => 7473a81faaaf419ba50a77fb93d08ea5 [56] => 7473a81faaaf419ba50a77fb93d08ea5 [57] => 7473a81faaaf419ba50a77fb93d08ea5 [58] => 7473a81faaaf419ba50a77fb93d08ea5 [59] => 7473a81faaaf419ba50a77fb93d08ea5 [60] => 7473a81faaaf419ba50a77fb93d08ea5 [61] => 7473a81faaaf419ba50a77fb93d08ea5 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Microsoft claims Fireball malware enterprise threat 'overblown'

Array ( [post_title] => Microsoft claims Fireball malware enterprise threat 'overblown' [post_content] => Microsoft has cast doubt on Check Point's claims that Fireball has a hold in one-in-five corporate networks. [post_excerpt] => Microsoft has cast doubt on Check Point's claims that Fireball has a hold in one-in-five corporate networks. [post_date_gmt] => 2017-06-22 13:00:00 [post_date] => 2017-06-22 14:00:00 [post_modified_gmt] => 2017-06-22 13:00:00 [post_modified] => 2017-06-22 14:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 39342e46-ad81-4f21-aa0d-48bc8b34ad56 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/microsoft-chips-in-on-overblown-fireball-cyberthreat/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 52f63f98ebc3cf29adacb1ddda61db7d [1] => 7473a81faaaf419ba50a77fb93d08ea5 [2] => 7473a81faaaf419ba50a77fb93d08ea5 [3] => 7473a81faaaf419ba50a77fb93d08ea5 [4] => 7473a81faaaf419ba50a77fb93d08ea5 [5] => 7473a81faaaf419ba50a77fb93d08ea5 [6] => 7473a81faaaf419ba50a77fb93d08ea5 [7] => 7473a81faaaf419ba50a77fb93d08ea5 [8] => 7473a81faaaf419ba50a77fb93d08ea5 [9] => 7473a81faaaf419ba50a77fb93d08ea5 [10] => 7473a81faaaf419ba50a77fb93d08ea5 [11] => 7473a81faaaf419ba50a77fb93d08ea5 [12] => 7473a81faaaf419ba50a77fb93d08ea5 [13] => 7473a81faaaf419ba50a77fb93d08ea5 [14] => 7473a81faaaf419ba50a77fb93d08ea5 [15] => 7473a81faaaf419ba50a77fb93d08ea5 [16] => 7473a81faaaf419ba50a77fb93d08ea5 [17] => 7473a81faaaf419ba50a77fb93d08ea5 [18] => 7473a81faaaf419ba50a77fb93d08ea5 [19] => 7473a81faaaf419ba50a77fb93d08ea5 [20] => 7473a81faaaf419ba50a77fb93d08ea5 [21] => 7473a81faaaf419ba50a77fb93d08ea5 [22] => 7473a81faaaf419ba50a77fb93d08ea5 [23] => 7473a81faaaf419ba50a77fb93d08ea5 [24] => 7473a81faaaf419ba50a77fb93d08ea5 [25] => 7473a81faaaf419ba50a77fb93d08ea5 [26] => 7473a81faaaf419ba50a77fb93d08ea5 [27] => 7473a81faaaf419ba50a77fb93d08ea5 [28] => 7473a81faaaf419ba50a77fb93d08ea5 [29] => 7473a81faaaf419ba50a77fb93d08ea5 [30] => 7473a81faaaf419ba50a77fb93d08ea5 [31] => 7473a81faaaf419ba50a77fb93d08ea5 [32] => 7473a81faaaf419ba50a77fb93d08ea5 [33] => 7473a81faaaf419ba50a77fb93d08ea5 [34] => 7473a81faaaf419ba50a77fb93d08ea5 [35] => 7473a81faaaf419ba50a77fb93d08ea5 [36] => 7473a81faaaf419ba50a77fb93d08ea5 [37] => 7473a81faaaf419ba50a77fb93d08ea5 [38] => 7473a81faaaf419ba50a77fb93d08ea5 [39] => 7473a81faaaf419ba50a77fb93d08ea5 [40] => 7473a81faaaf419ba50a77fb93d08ea5 [41] => 7473a81faaaf419ba50a77fb93d08ea5 [42] => 7473a81faaaf419ba50a77fb93d08ea5 [43] => 7473a81faaaf419ba50a77fb93d08ea5 [44] => 7473a81faaaf419ba50a77fb93d08ea5 [45] => 7473a81faaaf419ba50a77fb93d08ea5 [46] => 7473a81faaaf419ba50a77fb93d08ea5 [47] => 7473a81faaaf419ba50a77fb93d08ea5 [48] => 7473a81faaaf419ba50a77fb93d08ea5 [49] => 7473a81faaaf419ba50a77fb93d08ea5 [50] => 7473a81faaaf419ba50a77fb93d08ea5 [51] => 7473a81faaaf419ba50a77fb93d08ea5 [52] => 7473a81faaaf419ba50a77fb93d08ea5 [53] => 7473a81faaaf419ba50a77fb93d08ea5 [54] => 7473a81faaaf419ba50a77fb93d08ea5 [55] => 7473a81faaaf419ba50a77fb93d08ea5 [56] => 7473a81faaaf419ba50a77fb93d08ea5 [57] => 7473a81faaaf419ba50a77fb93d08ea5 [58] => 7473a81faaaf419ba50a77fb93d08ea5 [59] => 7473a81faaaf419ba50a77fb93d08ea5 [60] => 7473a81faaaf419ba50a77fb93d08ea5 [61] => 7473a81faaaf419ba50a77fb93d08ea5 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => microsoft-claims-fireball-malware-enterprise-threat-overblown )

FAF deciding on filters on post to be syndicated:

NSA's use of 'traffic shaping' allows unrestrained spying on Americans

Array ( [post_title] => NSA's use of 'traffic shaping' allows unrestrained spying on Americans [post_content] => By using a "traffic shaping" technique, the National Security Agency sidestepped legal restrictions imposed by lawmakers and the surveillance courts. [post_excerpt] => By using a "traffic shaping" technique, the National Security Agency sidestepped legal restrictions imposed by lawmakers and the surveillance courts. [post_date_gmt] => 2017-06-22 13:00:00 [post_date] => 2017-06-22 14:00:00 [post_modified_gmt] => 2017-06-22 13:00:00 [post_modified] => 2017-06-22 14:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => b7271d1a-e825-4a34-852d-3139187078b3 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/legal-loopholes-unrestrained-nsa-surveillance-on-americans/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 0382505ce02f9afdad3b4efe3c52f572 [1] => 0382505ce02f9afdad3b4efe3c52f572 [2] => 0382505ce02f9afdad3b4efe3c52f572 [3] => 0382505ce02f9afdad3b4efe3c52f572 [4] => 0d75b2679c1d60d2e2b3affdc4208f4d [5] => 0d75b2679c1d60d2e2b3affdc4208f4d [6] => 0d75b2679c1d60d2e2b3affdc4208f4d [7] => 0d75b2679c1d60d2e2b3affdc4208f4d [8] => 0d75b2679c1d60d2e2b3affdc4208f4d [9] => 0d75b2679c1d60d2e2b3affdc4208f4d [10] => 0d75b2679c1d60d2e2b3affdc4208f4d [11] => 0d75b2679c1d60d2e2b3affdc4208f4d [12] => 0d75b2679c1d60d2e2b3affdc4208f4d [13] => 0d75b2679c1d60d2e2b3affdc4208f4d [14] => 0d75b2679c1d60d2e2b3affdc4208f4d [15] => 0d75b2679c1d60d2e2b3affdc4208f4d [16] => 0d75b2679c1d60d2e2b3affdc4208f4d [17] => 0d75b2679c1d60d2e2b3affdc4208f4d [18] => 0d75b2679c1d60d2e2b3affdc4208f4d [19] => 0d75b2679c1d60d2e2b3affdc4208f4d [20] => 0d75b2679c1d60d2e2b3affdc4208f4d [21] => 0d75b2679c1d60d2e2b3affdc4208f4d [22] => 0d75b2679c1d60d2e2b3affdc4208f4d [23] => 0d75b2679c1d60d2e2b3affdc4208f4d [24] => 0d75b2679c1d60d2e2b3affdc4208f4d [25] => 0d75b2679c1d60d2e2b3affdc4208f4d [26] => 0d75b2679c1d60d2e2b3affdc4208f4d [27] => 0d75b2679c1d60d2e2b3affdc4208f4d [28] => 0d75b2679c1d60d2e2b3affdc4208f4d [29] => 0d75b2679c1d60d2e2b3affdc4208f4d [30] => 0d75b2679c1d60d2e2b3affdc4208f4d [31] => 0d75b2679c1d60d2e2b3affdc4208f4d [32] => 0d75b2679c1d60d2e2b3affdc4208f4d [33] => 0d75b2679c1d60d2e2b3affdc4208f4d [34] => 0d75b2679c1d60d2e2b3affdc4208f4d [35] => 0d75b2679c1d60d2e2b3affdc4208f4d [36] => 0d75b2679c1d60d2e2b3affdc4208f4d [37] => 0d75b2679c1d60d2e2b3affdc4208f4d [38] => 0d75b2679c1d60d2e2b3affdc4208f4d [39] => 0d75b2679c1d60d2e2b3affdc4208f4d [40] => 0d75b2679c1d60d2e2b3affdc4208f4d [41] => 0d75b2679c1d60d2e2b3affdc4208f4d [42] => 0d75b2679c1d60d2e2b3affdc4208f4d [43] => 0d75b2679c1d60d2e2b3affdc4208f4d [44] => 0d75b2679c1d60d2e2b3affdc4208f4d [45] => 0d75b2679c1d60d2e2b3affdc4208f4d [46] => 0d75b2679c1d60d2e2b3affdc4208f4d [47] => 0d75b2679c1d60d2e2b3affdc4208f4d [48] => 0d75b2679c1d60d2e2b3affdc4208f4d [49] => 0d75b2679c1d60d2e2b3affdc4208f4d [50] => 0d75b2679c1d60d2e2b3affdc4208f4d [51] => 0d75b2679c1d60d2e2b3affdc4208f4d [52] => 0d75b2679c1d60d2e2b3affdc4208f4d [53] => 0d75b2679c1d60d2e2b3affdc4208f4d [54] => 0d75b2679c1d60d2e2b3affdc4208f4d [55] => 0d75b2679c1d60d2e2b3affdc4208f4d [56] => 0d75b2679c1d60d2e2b3affdc4208f4d [57] => 0d75b2679c1d60d2e2b3affdc4208f4d [58] => 0d75b2679c1d60d2e2b3affdc4208f4d [59] => 0d75b2679c1d60d2e2b3affdc4208f4d [60] => 0d75b2679c1d60d2e2b3affdc4208f4d [61] => 0d75b2679c1d60d2e2b3affdc4208f4d [62] => 0d75b2679c1d60d2e2b3affdc4208f4d [63] => 0d75b2679c1d60d2e2b3affdc4208f4d ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => nsas-use-of-traffic-shaping-allows-unrestrained-spying-on-americans )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/legal-loopholes-unrestrained-nsa-surveillance-on-americans/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 0382505ce02f9afdad3b4efe3c52f572 [1] => 0382505ce02f9afdad3b4efe3c52f572 [2] => 0382505ce02f9afdad3b4efe3c52f572 [3] => 0382505ce02f9afdad3b4efe3c52f572 [4] => 0d75b2679c1d60d2e2b3affdc4208f4d [5] => 0d75b2679c1d60d2e2b3affdc4208f4d [6] => 0d75b2679c1d60d2e2b3affdc4208f4d [7] => 0d75b2679c1d60d2e2b3affdc4208f4d [8] => 0d75b2679c1d60d2e2b3affdc4208f4d [9] => 0d75b2679c1d60d2e2b3affdc4208f4d [10] => 0d75b2679c1d60d2e2b3affdc4208f4d [11] => 0d75b2679c1d60d2e2b3affdc4208f4d [12] => 0d75b2679c1d60d2e2b3affdc4208f4d [13] => 0d75b2679c1d60d2e2b3affdc4208f4d [14] => 0d75b2679c1d60d2e2b3affdc4208f4d [15] => 0d75b2679c1d60d2e2b3affdc4208f4d [16] => 0d75b2679c1d60d2e2b3affdc4208f4d [17] => 0d75b2679c1d60d2e2b3affdc4208f4d [18] => 0d75b2679c1d60d2e2b3affdc4208f4d [19] => 0d75b2679c1d60d2e2b3affdc4208f4d [20] => 0d75b2679c1d60d2e2b3affdc4208f4d [21] => 0d75b2679c1d60d2e2b3affdc4208f4d [22] => 0d75b2679c1d60d2e2b3affdc4208f4d [23] => 0d75b2679c1d60d2e2b3affdc4208f4d [24] => 0d75b2679c1d60d2e2b3affdc4208f4d [25] => 0d75b2679c1d60d2e2b3affdc4208f4d [26] => 0d75b2679c1d60d2e2b3affdc4208f4d [27] => 0d75b2679c1d60d2e2b3affdc4208f4d [28] => 0d75b2679c1d60d2e2b3affdc4208f4d [29] => 0d75b2679c1d60d2e2b3affdc4208f4d [30] => 0d75b2679c1d60d2e2b3affdc4208f4d [31] => 0d75b2679c1d60d2e2b3affdc4208f4d [32] => 0d75b2679c1d60d2e2b3affdc4208f4d [33] => 0d75b2679c1d60d2e2b3affdc4208f4d [34] => 0d75b2679c1d60d2e2b3affdc4208f4d [35] => 0d75b2679c1d60d2e2b3affdc4208f4d [36] => 0d75b2679c1d60d2e2b3affdc4208f4d [37] => 0d75b2679c1d60d2e2b3affdc4208f4d [38] => 0d75b2679c1d60d2e2b3affdc4208f4d [39] => 0d75b2679c1d60d2e2b3affdc4208f4d [40] => 0d75b2679c1d60d2e2b3affdc4208f4d [41] => 0d75b2679c1d60d2e2b3affdc4208f4d [42] => 0d75b2679c1d60d2e2b3affdc4208f4d [43] => 0d75b2679c1d60d2e2b3affdc4208f4d [44] => 0d75b2679c1d60d2e2b3affdc4208f4d [45] => 0d75b2679c1d60d2e2b3affdc4208f4d [46] => 0d75b2679c1d60d2e2b3affdc4208f4d [47] => 0d75b2679c1d60d2e2b3affdc4208f4d [48] => 0d75b2679c1d60d2e2b3affdc4208f4d [49] => 0d75b2679c1d60d2e2b3affdc4208f4d [50] => 0d75b2679c1d60d2e2b3affdc4208f4d [51] => 0d75b2679c1d60d2e2b3affdc4208f4d [52] => 0d75b2679c1d60d2e2b3affdc4208f4d [53] => 0d75b2679c1d60d2e2b3affdc4208f4d [54] => 0d75b2679c1d60d2e2b3affdc4208f4d [55] => 0d75b2679c1d60d2e2b3affdc4208f4d [56] => 0d75b2679c1d60d2e2b3affdc4208f4d [57] => 0d75b2679c1d60d2e2b3affdc4208f4d [58] => 0d75b2679c1d60d2e2b3affdc4208f4d [59] => 0d75b2679c1d60d2e2b3affdc4208f4d [60] => 0d75b2679c1d60d2e2b3affdc4208f4d [61] => 0d75b2679c1d60d2e2b3affdc4208f4d [62] => 0d75b2679c1d60d2e2b3affdc4208f4d [63] => 0d75b2679c1d60d2e2b3affdc4208f4d ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :NSA's use of 'traffic shaping' allows unrestrained spying on Americans

Array ( [post_title] => NSA's use of 'traffic shaping' allows unrestrained spying on Americans [post_content] => By using a "traffic shaping" technique, the National Security Agency sidestepped legal restrictions imposed by lawmakers and the surveillance courts. [post_excerpt] => By using a "traffic shaping" technique, the National Security Agency sidestepped legal restrictions imposed by lawmakers and the surveillance courts. [post_date_gmt] => 2017-06-22 13:00:00 [post_date] => 2017-06-22 14:00:00 [post_modified_gmt] => 2017-06-22 13:00:00 [post_modified] => 2017-06-22 14:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => b7271d1a-e825-4a34-852d-3139187078b3 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/legal-loopholes-unrestrained-nsa-surveillance-on-americans/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 0382505ce02f9afdad3b4efe3c52f572 [1] => 0382505ce02f9afdad3b4efe3c52f572 [2] => 0382505ce02f9afdad3b4efe3c52f572 [3] => 0382505ce02f9afdad3b4efe3c52f572 [4] => 0d75b2679c1d60d2e2b3affdc4208f4d [5] => 0d75b2679c1d60d2e2b3affdc4208f4d [6] => 0d75b2679c1d60d2e2b3affdc4208f4d [7] => 0d75b2679c1d60d2e2b3affdc4208f4d [8] => 0d75b2679c1d60d2e2b3affdc4208f4d [9] => 0d75b2679c1d60d2e2b3affdc4208f4d [10] => 0d75b2679c1d60d2e2b3affdc4208f4d [11] => 0d75b2679c1d60d2e2b3affdc4208f4d [12] => 0d75b2679c1d60d2e2b3affdc4208f4d [13] => 0d75b2679c1d60d2e2b3affdc4208f4d [14] => 0d75b2679c1d60d2e2b3affdc4208f4d [15] => 0d75b2679c1d60d2e2b3affdc4208f4d [16] => 0d75b2679c1d60d2e2b3affdc4208f4d [17] => 0d75b2679c1d60d2e2b3affdc4208f4d [18] => 0d75b2679c1d60d2e2b3affdc4208f4d [19] => 0d75b2679c1d60d2e2b3affdc4208f4d [20] => 0d75b2679c1d60d2e2b3affdc4208f4d [21] => 0d75b2679c1d60d2e2b3affdc4208f4d [22] => 0d75b2679c1d60d2e2b3affdc4208f4d [23] => 0d75b2679c1d60d2e2b3affdc4208f4d [24] => 0d75b2679c1d60d2e2b3affdc4208f4d [25] => 0d75b2679c1d60d2e2b3affdc4208f4d [26] => 0d75b2679c1d60d2e2b3affdc4208f4d [27] => 0d75b2679c1d60d2e2b3affdc4208f4d [28] => 0d75b2679c1d60d2e2b3affdc4208f4d [29] => 0d75b2679c1d60d2e2b3affdc4208f4d [30] => 0d75b2679c1d60d2e2b3affdc4208f4d [31] => 0d75b2679c1d60d2e2b3affdc4208f4d [32] => 0d75b2679c1d60d2e2b3affdc4208f4d [33] => 0d75b2679c1d60d2e2b3affdc4208f4d [34] => 0d75b2679c1d60d2e2b3affdc4208f4d [35] => 0d75b2679c1d60d2e2b3affdc4208f4d [36] => 0d75b2679c1d60d2e2b3affdc4208f4d [37] => 0d75b2679c1d60d2e2b3affdc4208f4d [38] => 0d75b2679c1d60d2e2b3affdc4208f4d [39] => 0d75b2679c1d60d2e2b3affdc4208f4d [40] => 0d75b2679c1d60d2e2b3affdc4208f4d [41] => 0d75b2679c1d60d2e2b3affdc4208f4d [42] => 0d75b2679c1d60d2e2b3affdc4208f4d [43] => 0d75b2679c1d60d2e2b3affdc4208f4d [44] => 0d75b2679c1d60d2e2b3affdc4208f4d [45] => 0d75b2679c1d60d2e2b3affdc4208f4d [46] => 0d75b2679c1d60d2e2b3affdc4208f4d [47] => 0d75b2679c1d60d2e2b3affdc4208f4d [48] => 0d75b2679c1d60d2e2b3affdc4208f4d [49] => 0d75b2679c1d60d2e2b3affdc4208f4d [50] => 0d75b2679c1d60d2e2b3affdc4208f4d [51] => 0d75b2679c1d60d2e2b3affdc4208f4d [52] => 0d75b2679c1d60d2e2b3affdc4208f4d [53] => 0d75b2679c1d60d2e2b3affdc4208f4d [54] => 0d75b2679c1d60d2e2b3affdc4208f4d [55] => 0d75b2679c1d60d2e2b3affdc4208f4d [56] => 0d75b2679c1d60d2e2b3affdc4208f4d [57] => 0d75b2679c1d60d2e2b3affdc4208f4d [58] => 0d75b2679c1d60d2e2b3affdc4208f4d [59] => 0d75b2679c1d60d2e2b3affdc4208f4d [60] => 0d75b2679c1d60d2e2b3affdc4208f4d [61] => 0d75b2679c1d60d2e2b3affdc4208f4d [62] => 0d75b2679c1d60d2e2b3affdc4208f4d [63] => 0d75b2679c1d60d2e2b3affdc4208f4d ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => nsas-use-of-traffic-shaping-allows-unrestrained-spying-on-americans )

FAF deciding on filters on post to be syndicated:

OpenVPN taken to task after audit ignores remote code execution flaws

Array ( [post_title] => OpenVPN taken to task after audit ignores remote code execution flaws [post_content] => Serious security bugs have been exposed, some of which can lead to remote code execution. [post_excerpt] => Serious security bugs have been exposed, some of which can lead to remote code execution. [post_date_gmt] => 2017-06-22 09:18:00 [post_date] => 2017-06-22 10:18:00 [post_modified_gmt] => 2017-06-22 09:18:00 [post_modified] => 2017-06-22 10:18:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 15b0e3c6-6434-43a5-9f07-afe6c3833cb3 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/openvpn-audit-misses-serious-rce-flaws-researcher-takes-firm-to-task/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 71f4a076b8e90ce6dd27c755e0e7eb67 [1] => 71f4a076b8e90ce6dd27c755e0e7eb67 [2] => 71f4a076b8e90ce6dd27c755e0e7eb67 [3] => 71f4a076b8e90ce6dd27c755e0e7eb67 [4] => 71f4a076b8e90ce6dd27c755e0e7eb67 [5] => 71f4a076b8e90ce6dd27c755e0e7eb67 [6] => 71f4a076b8e90ce6dd27c755e0e7eb67 [7] => 71f4a076b8e90ce6dd27c755e0e7eb67 [8] => 71f4a076b8e90ce6dd27c755e0e7eb67 [9] => 71f4a076b8e90ce6dd27c755e0e7eb67 [10] => 71f4a076b8e90ce6dd27c755e0e7eb67 [11] => 71f4a076b8e90ce6dd27c755e0e7eb67 [12] => 71f4a076b8e90ce6dd27c755e0e7eb67 [13] => 71f4a076b8e90ce6dd27c755e0e7eb67 [14] => 71f4a076b8e90ce6dd27c755e0e7eb67 [15] => 71f4a076b8e90ce6dd27c755e0e7eb67 [16] => 71f4a076b8e90ce6dd27c755e0e7eb67 [17] => 71f4a076b8e90ce6dd27c755e0e7eb67 [18] => 71f4a076b8e90ce6dd27c755e0e7eb67 [19] => 71f4a076b8e90ce6dd27c755e0e7eb67 [20] => 71f4a076b8e90ce6dd27c755e0e7eb67 [21] => 71f4a076b8e90ce6dd27c755e0e7eb67 [22] => 71f4a076b8e90ce6dd27c755e0e7eb67 [23] => 71f4a076b8e90ce6dd27c755e0e7eb67 [24] => 71f4a076b8e90ce6dd27c755e0e7eb67 [25] => 71f4a076b8e90ce6dd27c755e0e7eb67 [26] => 71f4a076b8e90ce6dd27c755e0e7eb67 [27] => 71f4a076b8e90ce6dd27c755e0e7eb67 [28] => 71f4a076b8e90ce6dd27c755e0e7eb67 [29] => 71f4a076b8e90ce6dd27c755e0e7eb67 [30] => 71f4a076b8e90ce6dd27c755e0e7eb67 [31] => 71f4a076b8e90ce6dd27c755e0e7eb67 [32] => 71f4a076b8e90ce6dd27c755e0e7eb67 [33] => 71f4a076b8e90ce6dd27c755e0e7eb67 [34] => 71f4a076b8e90ce6dd27c755e0e7eb67 [35] => 71f4a076b8e90ce6dd27c755e0e7eb67 [36] => 71f4a076b8e90ce6dd27c755e0e7eb67 [37] => 71f4a076b8e90ce6dd27c755e0e7eb67 [38] => 71f4a076b8e90ce6dd27c755e0e7eb67 [39] => 71f4a076b8e90ce6dd27c755e0e7eb67 [40] => 71f4a076b8e90ce6dd27c755e0e7eb67 [41] => 71f4a076b8e90ce6dd27c755e0e7eb67 [42] => 71f4a076b8e90ce6dd27c755e0e7eb67 [43] => 71f4a076b8e90ce6dd27c755e0e7eb67 [44] => 71f4a076b8e90ce6dd27c755e0e7eb67 [45] => 71f4a076b8e90ce6dd27c755e0e7eb67 [46] => 71f4a076b8e90ce6dd27c755e0e7eb67 [47] => 71f4a076b8e90ce6dd27c755e0e7eb67 [48] => 71f4a076b8e90ce6dd27c755e0e7eb67 [49] => 71f4a076b8e90ce6dd27c755e0e7eb67 [50] => 71f4a076b8e90ce6dd27c755e0e7eb67 [51] => 71f4a076b8e90ce6dd27c755e0e7eb67 [52] => 71f4a076b8e90ce6dd27c755e0e7eb67 [53] => 71f4a076b8e90ce6dd27c755e0e7eb67 [54] => 71f4a076b8e90ce6dd27c755e0e7eb67 [55] => 71f4a076b8e90ce6dd27c755e0e7eb67 [56] => 71f4a076b8e90ce6dd27c755e0e7eb67 [57] => 71f4a076b8e90ce6dd27c755e0e7eb67 [58] => 71f4a076b8e90ce6dd27c755e0e7eb67 [59] => 71f4a076b8e90ce6dd27c755e0e7eb67 [60] => 71f4a076b8e90ce6dd27c755e0e7eb67 [61] => 71f4a076b8e90ce6dd27c755e0e7eb67 [62] => 71f4a076b8e90ce6dd27c755e0e7eb67 [63] => 71f4a076b8e90ce6dd27c755e0e7eb67 [64] => 71f4a076b8e90ce6dd27c755e0e7eb67 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => openvpn-taken-to-task-after-audit-ignores-remote-code-execution-flaws )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/openvpn-audit-misses-serious-rce-flaws-researcher-takes-firm-to-task/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 71f4a076b8e90ce6dd27c755e0e7eb67 [1] => 71f4a076b8e90ce6dd27c755e0e7eb67 [2] => 71f4a076b8e90ce6dd27c755e0e7eb67 [3] => 71f4a076b8e90ce6dd27c755e0e7eb67 [4] => 71f4a076b8e90ce6dd27c755e0e7eb67 [5] => 71f4a076b8e90ce6dd27c755e0e7eb67 [6] => 71f4a076b8e90ce6dd27c755e0e7eb67 [7] => 71f4a076b8e90ce6dd27c755e0e7eb67 [8] => 71f4a076b8e90ce6dd27c755e0e7eb67 [9] => 71f4a076b8e90ce6dd27c755e0e7eb67 [10] => 71f4a076b8e90ce6dd27c755e0e7eb67 [11] => 71f4a076b8e90ce6dd27c755e0e7eb67 [12] => 71f4a076b8e90ce6dd27c755e0e7eb67 [13] => 71f4a076b8e90ce6dd27c755e0e7eb67 [14] => 71f4a076b8e90ce6dd27c755e0e7eb67 [15] => 71f4a076b8e90ce6dd27c755e0e7eb67 [16] => 71f4a076b8e90ce6dd27c755e0e7eb67 [17] => 71f4a076b8e90ce6dd27c755e0e7eb67 [18] => 71f4a076b8e90ce6dd27c755e0e7eb67 [19] => 71f4a076b8e90ce6dd27c755e0e7eb67 [20] => 71f4a076b8e90ce6dd27c755e0e7eb67 [21] => 71f4a076b8e90ce6dd27c755e0e7eb67 [22] => 71f4a076b8e90ce6dd27c755e0e7eb67 [23] => 71f4a076b8e90ce6dd27c755e0e7eb67 [24] => 71f4a076b8e90ce6dd27c755e0e7eb67 [25] => 71f4a076b8e90ce6dd27c755e0e7eb67 [26] => 71f4a076b8e90ce6dd27c755e0e7eb67 [27] => 71f4a076b8e90ce6dd27c755e0e7eb67 [28] => 71f4a076b8e90ce6dd27c755e0e7eb67 [29] => 71f4a076b8e90ce6dd27c755e0e7eb67 [30] => 71f4a076b8e90ce6dd27c755e0e7eb67 [31] => 71f4a076b8e90ce6dd27c755e0e7eb67 [32] => 71f4a076b8e90ce6dd27c755e0e7eb67 [33] => 71f4a076b8e90ce6dd27c755e0e7eb67 [34] => 71f4a076b8e90ce6dd27c755e0e7eb67 [35] => 71f4a076b8e90ce6dd27c755e0e7eb67 [36] => 71f4a076b8e90ce6dd27c755e0e7eb67 [37] => 71f4a076b8e90ce6dd27c755e0e7eb67 [38] => 71f4a076b8e90ce6dd27c755e0e7eb67 [39] => 71f4a076b8e90ce6dd27c755e0e7eb67 [40] => 71f4a076b8e90ce6dd27c755e0e7eb67 [41] => 71f4a076b8e90ce6dd27c755e0e7eb67 [42] => 71f4a076b8e90ce6dd27c755e0e7eb67 [43] => 71f4a076b8e90ce6dd27c755e0e7eb67 [44] => 71f4a076b8e90ce6dd27c755e0e7eb67 [45] => 71f4a076b8e90ce6dd27c755e0e7eb67 [46] => 71f4a076b8e90ce6dd27c755e0e7eb67 [47] => 71f4a076b8e90ce6dd27c755e0e7eb67 [48] => 71f4a076b8e90ce6dd27c755e0e7eb67 [49] => 71f4a076b8e90ce6dd27c755e0e7eb67 [50] => 71f4a076b8e90ce6dd27c755e0e7eb67 [51] => 71f4a076b8e90ce6dd27c755e0e7eb67 [52] => 71f4a076b8e90ce6dd27c755e0e7eb67 [53] => 71f4a076b8e90ce6dd27c755e0e7eb67 [54] => 71f4a076b8e90ce6dd27c755e0e7eb67 [55] => 71f4a076b8e90ce6dd27c755e0e7eb67 [56] => 71f4a076b8e90ce6dd27c755e0e7eb67 [57] => 71f4a076b8e90ce6dd27c755e0e7eb67 [58] => 71f4a076b8e90ce6dd27c755e0e7eb67 [59] => 71f4a076b8e90ce6dd27c755e0e7eb67 [60] => 71f4a076b8e90ce6dd27c755e0e7eb67 [61] => 71f4a076b8e90ce6dd27c755e0e7eb67 [62] => 71f4a076b8e90ce6dd27c755e0e7eb67 [63] => 71f4a076b8e90ce6dd27c755e0e7eb67 [64] => 71f4a076b8e90ce6dd27c755e0e7eb67 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :OpenVPN taken to task after audit ignores remote code execution flaws

Array ( [post_title] => OpenVPN taken to task after audit ignores remote code execution flaws [post_content] => Serious security bugs have been exposed, some of which can lead to remote code execution. [post_excerpt] => Serious security bugs have been exposed, some of which can lead to remote code execution. [post_date_gmt] => 2017-06-22 09:18:00 [post_date] => 2017-06-22 10:18:00 [post_modified_gmt] => 2017-06-22 09:18:00 [post_modified] => 2017-06-22 10:18:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 15b0e3c6-6434-43a5-9f07-afe6c3833cb3 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/openvpn-audit-misses-serious-rce-flaws-researcher-takes-firm-to-task/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 71f4a076b8e90ce6dd27c755e0e7eb67 [1] => 71f4a076b8e90ce6dd27c755e0e7eb67 [2] => 71f4a076b8e90ce6dd27c755e0e7eb67 [3] => 71f4a076b8e90ce6dd27c755e0e7eb67 [4] => 71f4a076b8e90ce6dd27c755e0e7eb67 [5] => 71f4a076b8e90ce6dd27c755e0e7eb67 [6] => 71f4a076b8e90ce6dd27c755e0e7eb67 [7] => 71f4a076b8e90ce6dd27c755e0e7eb67 [8] => 71f4a076b8e90ce6dd27c755e0e7eb67 [9] => 71f4a076b8e90ce6dd27c755e0e7eb67 [10] => 71f4a076b8e90ce6dd27c755e0e7eb67 [11] => 71f4a076b8e90ce6dd27c755e0e7eb67 [12] => 71f4a076b8e90ce6dd27c755e0e7eb67 [13] => 71f4a076b8e90ce6dd27c755e0e7eb67 [14] => 71f4a076b8e90ce6dd27c755e0e7eb67 [15] => 71f4a076b8e90ce6dd27c755e0e7eb67 [16] => 71f4a076b8e90ce6dd27c755e0e7eb67 [17] => 71f4a076b8e90ce6dd27c755e0e7eb67 [18] => 71f4a076b8e90ce6dd27c755e0e7eb67 [19] => 71f4a076b8e90ce6dd27c755e0e7eb67 [20] => 71f4a076b8e90ce6dd27c755e0e7eb67 [21] => 71f4a076b8e90ce6dd27c755e0e7eb67 [22] => 71f4a076b8e90ce6dd27c755e0e7eb67 [23] => 71f4a076b8e90ce6dd27c755e0e7eb67 [24] => 71f4a076b8e90ce6dd27c755e0e7eb67 [25] => 71f4a076b8e90ce6dd27c755e0e7eb67 [26] => 71f4a076b8e90ce6dd27c755e0e7eb67 [27] => 71f4a076b8e90ce6dd27c755e0e7eb67 [28] => 71f4a076b8e90ce6dd27c755e0e7eb67 [29] => 71f4a076b8e90ce6dd27c755e0e7eb67 [30] => 71f4a076b8e90ce6dd27c755e0e7eb67 [31] => 71f4a076b8e90ce6dd27c755e0e7eb67 [32] => 71f4a076b8e90ce6dd27c755e0e7eb67 [33] => 71f4a076b8e90ce6dd27c755e0e7eb67 [34] => 71f4a076b8e90ce6dd27c755e0e7eb67 [35] => 71f4a076b8e90ce6dd27c755e0e7eb67 [36] => 71f4a076b8e90ce6dd27c755e0e7eb67 [37] => 71f4a076b8e90ce6dd27c755e0e7eb67 [38] => 71f4a076b8e90ce6dd27c755e0e7eb67 [39] => 71f4a076b8e90ce6dd27c755e0e7eb67 [40] => 71f4a076b8e90ce6dd27c755e0e7eb67 [41] => 71f4a076b8e90ce6dd27c755e0e7eb67 [42] => 71f4a076b8e90ce6dd27c755e0e7eb67 [43] => 71f4a076b8e90ce6dd27c755e0e7eb67 [44] => 71f4a076b8e90ce6dd27c755e0e7eb67 [45] => 71f4a076b8e90ce6dd27c755e0e7eb67 [46] => 71f4a076b8e90ce6dd27c755e0e7eb67 [47] => 71f4a076b8e90ce6dd27c755e0e7eb67 [48] => 71f4a076b8e90ce6dd27c755e0e7eb67 [49] => 71f4a076b8e90ce6dd27c755e0e7eb67 [50] => 71f4a076b8e90ce6dd27c755e0e7eb67 [51] => 71f4a076b8e90ce6dd27c755e0e7eb67 [52] => 71f4a076b8e90ce6dd27c755e0e7eb67 [53] => 71f4a076b8e90ce6dd27c755e0e7eb67 [54] => 71f4a076b8e90ce6dd27c755e0e7eb67 [55] => 71f4a076b8e90ce6dd27c755e0e7eb67 [56] => 71f4a076b8e90ce6dd27c755e0e7eb67 [57] => 71f4a076b8e90ce6dd27c755e0e7eb67 [58] => 71f4a076b8e90ce6dd27c755e0e7eb67 [59] => 71f4a076b8e90ce6dd27c755e0e7eb67 [60] => 71f4a076b8e90ce6dd27c755e0e7eb67 [61] => 71f4a076b8e90ce6dd27c755e0e7eb67 [62] => 71f4a076b8e90ce6dd27c755e0e7eb67 [63] => 71f4a076b8e90ce6dd27c755e0e7eb67 [64] => 71f4a076b8e90ce6dd27c755e0e7eb67 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => openvpn-taken-to-task-after-audit-ignores-remote-code-execution-flaws )

FAF deciding on filters on post to be syndicated:

Symantec patches Messaging Gateway remote code execution bugs

Array ( [post_title] => Symantec patches Messaging Gateway remote code execution bugs [post_content] => The three vulnerabilities allow attackers to disarm the platform and execute code. [post_excerpt] => The three vulnerabilities allow attackers to disarm the platform and execute code. [post_date_gmt] => 2017-06-22 08:14:00 [post_date] => 2017-06-22 09:14:00 [post_modified_gmt] => 2017-06-22 08:14:00 [post_modified] => 2017-06-22 09:14:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => b22bef20-52a4-4156-b64a-e45ea34515d2 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/symantec-patches-messaging-gateway-remote-code-execution-bugs/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 381db14f6a733182f6b83e0423f9c636 [1] => 381db14f6a733182f6b83e0423f9c636 [2] => 381db14f6a733182f6b83e0423f9c636 [3] => 381db14f6a733182f6b83e0423f9c636 [4] => 381db14f6a733182f6b83e0423f9c636 [5] => 381db14f6a733182f6b83e0423f9c636 [6] => 381db14f6a733182f6b83e0423f9c636 [7] => 381db14f6a733182f6b83e0423f9c636 [8] => 381db14f6a733182f6b83e0423f9c636 [9] => 381db14f6a733182f6b83e0423f9c636 [10] => 381db14f6a733182f6b83e0423f9c636 [11] => 381db14f6a733182f6b83e0423f9c636 [12] => 381db14f6a733182f6b83e0423f9c636 [13] => 381db14f6a733182f6b83e0423f9c636 [14] => 381db14f6a733182f6b83e0423f9c636 [15] => 381db14f6a733182f6b83e0423f9c636 [16] => 381db14f6a733182f6b83e0423f9c636 [17] => 381db14f6a733182f6b83e0423f9c636 [18] => 381db14f6a733182f6b83e0423f9c636 [19] => 381db14f6a733182f6b83e0423f9c636 [20] => 381db14f6a733182f6b83e0423f9c636 [21] => 381db14f6a733182f6b83e0423f9c636 [22] => 381db14f6a733182f6b83e0423f9c636 [23] => 381db14f6a733182f6b83e0423f9c636 [24] => 381db14f6a733182f6b83e0423f9c636 [25] => 381db14f6a733182f6b83e0423f9c636 [26] => 381db14f6a733182f6b83e0423f9c636 [27] => 381db14f6a733182f6b83e0423f9c636 [28] => 381db14f6a733182f6b83e0423f9c636 [29] => 381db14f6a733182f6b83e0423f9c636 [30] => 381db14f6a733182f6b83e0423f9c636 [31] => 381db14f6a733182f6b83e0423f9c636 [32] => 381db14f6a733182f6b83e0423f9c636 [33] => 381db14f6a733182f6b83e0423f9c636 [34] => 381db14f6a733182f6b83e0423f9c636 [35] => 381db14f6a733182f6b83e0423f9c636 [36] => 381db14f6a733182f6b83e0423f9c636 [37] => 381db14f6a733182f6b83e0423f9c636 [38] => 381db14f6a733182f6b83e0423f9c636 [39] => 381db14f6a733182f6b83e0423f9c636 [40] => 381db14f6a733182f6b83e0423f9c636 [41] => 381db14f6a733182f6b83e0423f9c636 [42] => 381db14f6a733182f6b83e0423f9c636 [43] => 381db14f6a733182f6b83e0423f9c636 [44] => 381db14f6a733182f6b83e0423f9c636 [45] => 381db14f6a733182f6b83e0423f9c636 [46] => 381db14f6a733182f6b83e0423f9c636 [47] => 381db14f6a733182f6b83e0423f9c636 [48] => 381db14f6a733182f6b83e0423f9c636 [49] => 381db14f6a733182f6b83e0423f9c636 [50] => 381db14f6a733182f6b83e0423f9c636 [51] => 381db14f6a733182f6b83e0423f9c636 [52] => 381db14f6a733182f6b83e0423f9c636 [53] => 381db14f6a733182f6b83e0423f9c636 [54] => 381db14f6a733182f6b83e0423f9c636 [55] => 381db14f6a733182f6b83e0423f9c636 [56] => 381db14f6a733182f6b83e0423f9c636 [57] => 381db14f6a733182f6b83e0423f9c636 [58] => 381db14f6a733182f6b83e0423f9c636 [59] => 381db14f6a733182f6b83e0423f9c636 [60] => 381db14f6a733182f6b83e0423f9c636 [61] => 381db14f6a733182f6b83e0423f9c636 [62] => 381db14f6a733182f6b83e0423f9c636 [63] => 381db14f6a733182f6b83e0423f9c636 [64] => 381db14f6a733182f6b83e0423f9c636 [65] => 381db14f6a733182f6b83e0423f9c636 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => symantec-patches-messaging-gateway-remote-code-execution-bugs )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/symantec-patches-messaging-gateway-remote-code-execution-bugs/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 381db14f6a733182f6b83e0423f9c636 [1] => 381db14f6a733182f6b83e0423f9c636 [2] => 381db14f6a733182f6b83e0423f9c636 [3] => 381db14f6a733182f6b83e0423f9c636 [4] => 381db14f6a733182f6b83e0423f9c636 [5] => 381db14f6a733182f6b83e0423f9c636 [6] => 381db14f6a733182f6b83e0423f9c636 [7] => 381db14f6a733182f6b83e0423f9c636 [8] => 381db14f6a733182f6b83e0423f9c636 [9] => 381db14f6a733182f6b83e0423f9c636 [10] => 381db14f6a733182f6b83e0423f9c636 [11] => 381db14f6a733182f6b83e0423f9c636 [12] => 381db14f6a733182f6b83e0423f9c636 [13] => 381db14f6a733182f6b83e0423f9c636 [14] => 381db14f6a733182f6b83e0423f9c636 [15] => 381db14f6a733182f6b83e0423f9c636 [16] => 381db14f6a733182f6b83e0423f9c636 [17] => 381db14f6a733182f6b83e0423f9c636 [18] => 381db14f6a733182f6b83e0423f9c636 [19] => 381db14f6a733182f6b83e0423f9c636 [20] => 381db14f6a733182f6b83e0423f9c636 [21] => 381db14f6a733182f6b83e0423f9c636 [22] => 381db14f6a733182f6b83e0423f9c636 [23] => 381db14f6a733182f6b83e0423f9c636 [24] => 381db14f6a733182f6b83e0423f9c636 [25] => 381db14f6a733182f6b83e0423f9c636 [26] => 381db14f6a733182f6b83e0423f9c636 [27] => 381db14f6a733182f6b83e0423f9c636 [28] => 381db14f6a733182f6b83e0423f9c636 [29] => 381db14f6a733182f6b83e0423f9c636 [30] => 381db14f6a733182f6b83e0423f9c636 [31] => 381db14f6a733182f6b83e0423f9c636 [32] => 381db14f6a733182f6b83e0423f9c636 [33] => 381db14f6a733182f6b83e0423f9c636 [34] => 381db14f6a733182f6b83e0423f9c636 [35] => 381db14f6a733182f6b83e0423f9c636 [36] => 381db14f6a733182f6b83e0423f9c636 [37] => 381db14f6a733182f6b83e0423f9c636 [38] => 381db14f6a733182f6b83e0423f9c636 [39] => 381db14f6a733182f6b83e0423f9c636 [40] => 381db14f6a733182f6b83e0423f9c636 [41] => 381db14f6a733182f6b83e0423f9c636 [42] => 381db14f6a733182f6b83e0423f9c636 [43] => 381db14f6a733182f6b83e0423f9c636 [44] => 381db14f6a733182f6b83e0423f9c636 [45] => 381db14f6a733182f6b83e0423f9c636 [46] => 381db14f6a733182f6b83e0423f9c636 [47] => 381db14f6a733182f6b83e0423f9c636 [48] => 381db14f6a733182f6b83e0423f9c636 [49] => 381db14f6a733182f6b83e0423f9c636 [50] => 381db14f6a733182f6b83e0423f9c636 [51] => 381db14f6a733182f6b83e0423f9c636 [52] => 381db14f6a733182f6b83e0423f9c636 [53] => 381db14f6a733182f6b83e0423f9c636 [54] => 381db14f6a733182f6b83e0423f9c636 [55] => 381db14f6a733182f6b83e0423f9c636 [56] => 381db14f6a733182f6b83e0423f9c636 [57] => 381db14f6a733182f6b83e0423f9c636 [58] => 381db14f6a733182f6b83e0423f9c636 [59] => 381db14f6a733182f6b83e0423f9c636 [60] => 381db14f6a733182f6b83e0423f9c636 [61] => 381db14f6a733182f6b83e0423f9c636 [62] => 381db14f6a733182f6b83e0423f9c636 [63] => 381db14f6a733182f6b83e0423f9c636 [64] => 381db14f6a733182f6b83e0423f9c636 [65] => 381db14f6a733182f6b83e0423f9c636 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Symantec patches Messaging Gateway remote code execution bugs

Array ( [post_title] => Symantec patches Messaging Gateway remote code execution bugs [post_content] => The three vulnerabilities allow attackers to disarm the platform and execute code. [post_excerpt] => The three vulnerabilities allow attackers to disarm the platform and execute code. [post_date_gmt] => 2017-06-22 08:14:00 [post_date] => 2017-06-22 09:14:00 [post_modified_gmt] => 2017-06-22 08:14:00 [post_modified] => 2017-06-22 09:14:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => b22bef20-52a4-4156-b64a-e45ea34515d2 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/symantec-patches-messaging-gateway-remote-code-execution-bugs/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 381db14f6a733182f6b83e0423f9c636 [1] => 381db14f6a733182f6b83e0423f9c636 [2] => 381db14f6a733182f6b83e0423f9c636 [3] => 381db14f6a733182f6b83e0423f9c636 [4] => 381db14f6a733182f6b83e0423f9c636 [5] => 381db14f6a733182f6b83e0423f9c636 [6] => 381db14f6a733182f6b83e0423f9c636 [7] => 381db14f6a733182f6b83e0423f9c636 [8] => 381db14f6a733182f6b83e0423f9c636 [9] => 381db14f6a733182f6b83e0423f9c636 [10] => 381db14f6a733182f6b83e0423f9c636 [11] => 381db14f6a733182f6b83e0423f9c636 [12] => 381db14f6a733182f6b83e0423f9c636 [13] => 381db14f6a733182f6b83e0423f9c636 [14] => 381db14f6a733182f6b83e0423f9c636 [15] => 381db14f6a733182f6b83e0423f9c636 [16] => 381db14f6a733182f6b83e0423f9c636 [17] => 381db14f6a733182f6b83e0423f9c636 [18] => 381db14f6a733182f6b83e0423f9c636 [19] => 381db14f6a733182f6b83e0423f9c636 [20] => 381db14f6a733182f6b83e0423f9c636 [21] => 381db14f6a733182f6b83e0423f9c636 [22] => 381db14f6a733182f6b83e0423f9c636 [23] => 381db14f6a733182f6b83e0423f9c636 [24] => 381db14f6a733182f6b83e0423f9c636 [25] => 381db14f6a733182f6b83e0423f9c636 [26] => 381db14f6a733182f6b83e0423f9c636 [27] => 381db14f6a733182f6b83e0423f9c636 [28] => 381db14f6a733182f6b83e0423f9c636 [29] => 381db14f6a733182f6b83e0423f9c636 [30] => 381db14f6a733182f6b83e0423f9c636 [31] => 381db14f6a733182f6b83e0423f9c636 [32] => 381db14f6a733182f6b83e0423f9c636 [33] => 381db14f6a733182f6b83e0423f9c636 [34] => 381db14f6a733182f6b83e0423f9c636 [35] => 381db14f6a733182f6b83e0423f9c636 [36] => 381db14f6a733182f6b83e0423f9c636 [37] => 381db14f6a733182f6b83e0423f9c636 [38] => 381db14f6a733182f6b83e0423f9c636 [39] => 381db14f6a733182f6b83e0423f9c636 [40] => 381db14f6a733182f6b83e0423f9c636 [41] => 381db14f6a733182f6b83e0423f9c636 [42] => 381db14f6a733182f6b83e0423f9c636 [43] => 381db14f6a733182f6b83e0423f9c636 [44] => 381db14f6a733182f6b83e0423f9c636 [45] => 381db14f6a733182f6b83e0423f9c636 [46] => 381db14f6a733182f6b83e0423f9c636 [47] => 381db14f6a733182f6b83e0423f9c636 [48] => 381db14f6a733182f6b83e0423f9c636 [49] => 381db14f6a733182f6b83e0423f9c636 [50] => 381db14f6a733182f6b83e0423f9c636 [51] => 381db14f6a733182f6b83e0423f9c636 [52] => 381db14f6a733182f6b83e0423f9c636 [53] => 381db14f6a733182f6b83e0423f9c636 [54] => 381db14f6a733182f6b83e0423f9c636 [55] => 381db14f6a733182f6b83e0423f9c636 [56] => 381db14f6a733182f6b83e0423f9c636 [57] => 381db14f6a733182f6b83e0423f9c636 [58] => 381db14f6a733182f6b83e0423f9c636 [59] => 381db14f6a733182f6b83e0423f9c636 [60] => 381db14f6a733182f6b83e0423f9c636 [61] => 381db14f6a733182f6b83e0423f9c636 [62] => 381db14f6a733182f6b83e0423f9c636 [63] => 381db14f6a733182f6b83e0423f9c636 [64] => 381db14f6a733182f6b83e0423f9c636 [65] => 381db14f6a733182f6b83e0423f9c636 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => symantec-patches-messaging-gateway-remote-code-execution-bugs )

1

Attach Id ( 959790 ) not integer for post_thumbnail 835201

1

Attach Id ( 856794 ) not integer for post_thumbnail 761607

1

Attach Id ( 856801 ) not integer for post_thumbnail 734000

1

Attach Id ( 856800 ) not integer for post_thumbnail 734000

1

Attach Id ( 856806 ) not integer for post_thumbnail 725032

1

Attach Id ( 1035932 ) not integer for post_thumbnail 1030349

1

Attach Id ( 1097605 ) not integer for post_thumbnail 1021772

1

Attach Id ( 1070445 ) not integer for post_thumbnail 1031592

1

Attach Id ( 1088817 ) not integer for post_thumbnail 1084937

1

Attach Id ( 1097146 ) not integer for post_thumbnail 1034023

1

Attach Id ( 1097756 ) not integer for post_thumbnail 1081891

1

Attach Id ( 1366067 ) not integer for post_thumbnail 1064018

1

Attach Id ( 1114278 ) not integer for post_thumbnail 1112807

1

Attach Id ( 1120202 ) not integer for post_thumbnail 1110638

1

Attach Id ( 1130484 ) not integer for post_thumbnail 1128829

1

Attach Id ( 1130811 ) not integer for post_thumbnail 1070037

1

Attach Id ( 1131627 ) not integer for post_thumbnail 1037929

1

Attach Id ( 1138547 ) not integer for post_thumbnail 1066943

1

Attach Id ( 1155230 ) not integer for post_thumbnail 1037716

1

Attach Id ( 1298248 ) not integer for post_thumbnail 1046394

1

Attach Id ( 1164146 ) not integer for post_thumbnail 1054729

1

Attach Id ( 1188679 ) not integer for post_thumbnail 1062534

1

Attach Id ( 1204758 ) not integer for post_thumbnail 1042440

1

Attach Id ( 1246234 ) not integer for post_thumbnail 1037938

1

Attach Id ( 1247909 ) not integer for post_thumbnail 1063879

1

Attach Id ( 1248171 ) not integer for post_thumbnail 1229545

1

Attach Id ( 1249414 ) not integer for post_thumbnail 1188979

1

Attach Id ( 1257328 ) not integer for post_thumbnail 1120206

1

Attach Id ( 1297465 ) not integer for post_thumbnail 1157604

1

Attach Id ( 1301705 ) not integer for post_thumbnail 1060130

1

Attach Id ( 1323365 ) not integer for post_thumbnail 1204453

1

Attach Id ( 1334069 ) not integer for post_thumbnail 1050182

1

Attach Id ( 1368162 ) not integer for post_thumbnail 1368169

1

Attach Id ( 1368198 ) not integer for post_thumbnail 1368199

1

Attach Id ( 1368203 ) not integer for post_thumbnail 1368204

1

Attach Id ( 1368211 ) not integer for post_thumbnail 1368212

1

Attach Id ( 1368214 ) not integer for post_thumbnail 1368215

1

Attach Id ( 1368366 ) not integer for post_thumbnail 1368367

1

Attach Id ( 1368479 ) not integer for post_thumbnail 1368480

1

Attach Id ( 1368482 ) not integer for post_thumbnail 1368483

1

Attach Id ( 1368641 ) not integer for post_thumbnail 1368642

1

Attach Id ( 1368652 ) not integer for post_thumbnail 1368653

1

Attach Id ( 1368658 ) not integer for post_thumbnail 1368659

1

Attach Id ( 1368673 ) not integer for post_thumbnail 1368678

1

Attach Id ( 1368882 ) not integer for post_thumbnail 1368883

1

Attach Id ( 1368910 ) not integer for post_thumbnail 1368915

1

Attach Id ( 1368949 ) not integer for post_thumbnail 1368951

1

Attach Id ( 1368992 ) not integer for post_thumbnail 1368993

1

Attach Id ( 1368995 ) not integer for post_thumbnail 1368996

1

Attach Id ( 1369043 ) not integer for post_thumbnail 1369044

1

Attach Id ( 1369072 ) not integer for post_thumbnail 1369081

1

Attach Id ( 1369087 ) not integer for post_thumbnail 1369094

1

Attach Id ( 1369258 ) not integer for post_thumbnail 1369260

1

Attach Id ( 1369270 ) not integer for post_thumbnail 1369271

1

Attach Id ( 1369382 ) not integer for post_thumbnail 1369383

1

Attach Id ( 1369385 ) not integer for post_thumbnail 1369386

1

Attach Id ( 1369388 ) not integer for post_thumbnail 1369389

1

Attach Id ( 1369408 ) not integer for post_thumbnail 1369412

1

Attach Id ( 1369403 ) not integer for post_thumbnail 1369414

1

Attach Id ( 1369416 ) not integer for post_thumbnail 1369417

1

Attach Id ( 1369421 ) not integer for post_thumbnail 1369422

1

Attach Id ( 1369618 ) not integer for post_thumbnail 1369620

1

Attach Id ( 1369623 ) not integer for post_thumbnail 1369624

1

Attach Id ( 1369759 ) not integer for post_thumbnail 1369760

1

Attach Id ( 1369772 ) not integer for post_thumbnail 1369774

1

Attach Id ( 1369814 ) not integer for post_thumbnail 1369815

1

Attach Id ( 1369820 ) not integer for post_thumbnail 1369821

1

Attach Id ( 1369824 ) not integer for post_thumbnail 1369825

1

Attach Id ( 1369958 ) not integer for post_thumbnail 1369959

1

Attach Id ( 1369969 ) not integer for post_thumbnail 1369970

1

Attach Id ( 1369972 ) not integer for post_thumbnail 1369973

1

Attach Id ( 1370098 ) not integer for post_thumbnail 1370099

1

Attach Id ( 1371497 ) not integer for post_thumbnail 1371498

1

Attach Id ( 1371625 ) not integer for post_thumbnail 1371626

1

Attach Id ( 1371723 ) not integer for post_thumbnail 1371724

1

Attach Id ( 1371736 ) not integer for post_thumbnail 1371737

1

Attach Id ( 1371755 ) not integer for post_thumbnail 1371756

1

Attach Id ( 1372619 ) not integer for post_thumbnail 1371839

1

Attach Id ( 1371908 ) not integer for post_thumbnail 1371909

1

Attach Id ( 1372006 ) not integer for post_thumbnail 1372014

1

Attach Id ( 1372112 ) not integer for post_thumbnail 1372113

1

Attach Id ( 1372121 ) not integer for post_thumbnail 1372123

1

Attach Id ( 1372125 ) not integer for post_thumbnail 1372127

1

Attach Id ( 1372130 ) not integer for post_thumbnail 1372131

1

Attach Id ( 1372176 ) not integer for post_thumbnail 1372180

1

Attach Id ( 1372183 ) not integer for post_thumbnail 1372184

1

Attach Id ( 1372207 ) not integer for post_thumbnail 1372208

1

Attach Id ( 1372210 ) not integer for post_thumbnail 1372211

1

Attach Id ( 1372213 ) not integer for post_thumbnail 1372214

1

Attach Id ( 1372216 ) not integer for post_thumbnail 1372217

1

Attach Id ( 1372275 ) not integer for post_thumbnail 1372276

1

Attach Id ( 1372454 ) not integer for post_thumbnail 1372458

1

Attach Id ( 1372460 ) not integer for post_thumbnail 1372464

1

Attach Id ( 1372524 ) not integer for post_thumbnail 1372525

1

Attach Id ( 1372527 ) not integer for post_thumbnail 1372528

1

Attach Id ( 1372613 ) not integer for post_thumbnail 1372614

1

Attach Id ( 1372616 ) not integer for post_thumbnail 1372617

1

Attach Id ( 1372666 ) not integer for post_thumbnail 1372667

1

Attach Id ( 1372669 ) not integer for post_thumbnail 1372670

1

Attach Id ( 1372672 ) not integer for post_thumbnail 1372673

1

Attach Id ( 1372737 ) not integer for post_thumbnail 1372738

1

Attach Id ( 1372804 ) not integer for post_thumbnail 1372805

1

Attach Id ( 1373257 ) not integer for post_thumbnail 1373258

1

Attach Id ( 1373389 ) not integer for post_thumbnail 1373393

1

Attach Id ( 1375016 ) not integer for post_thumbnail 1375017

1

Attach Id ( 1375019 ) not integer for post_thumbnail 1375021

1

Attach Id ( 1375147 ) not integer for post_thumbnail 1375148

1

Attach Id ( 1376382 ) not integer for post_thumbnail 1376383