<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Computer Repair Blog</provider_name><provider_url>https://www.karlstechnology.com/blog</provider_url><author_name>Kristin Willis</author_name><author_url>https://www.karlstechnology.com/blog/author/kristin/</author_url><title>Hackers Exploit OS Bugs - Computer Repair Blog</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="ywSSUe9Twz"&gt;&lt;a href="https://www.karlstechnology.com/blog/hackers-exploit-os-bugs/"&gt;Hackers Exploit OS Bugs&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.karlstechnology.com/blog/hackers-exploit-os-bugs/embed/#?secret=ywSSUe9Twz" width="600" height="338" title="&#x201C;Hackers Exploit OS Bugs&#x201D; &#x2014; Computer Repair Blog" data-secret="ywSSUe9Twz" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.karlstechnology.com/blog/wp-content/uploads/2021/01/My-Post-45.png</thumbnail_url><thumbnail_width>1200</thumbnail_width><thumbnail_height>628</thumbnail_height><description>When updates become available, bugs and vulnerabilities follow behind. These, while nuisances, are usually quickly handled and fixed by the development teams. The time in between, however, is an opportunity for hackers to steal information. For example, back in August 2020&nbsp;Cyberscoop&nbsp;shared a blog post, explaining that hackers can exploit bugs: &#x201C;The bugs are in a [&hellip;]</description></oembed>
