{"id":3933,"date":"2016-11-07T13:41:17","date_gmt":"2016-11-07T18:41:17","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3933"},"modified":"2016-11-07T13:41:30","modified_gmt":"2016-11-07T18:41:30","slug":"fbi-new-malware-to-spur-more-large-scale-cyber-attacks","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/11\/07\/fbi-new-malware-to-spur-more-large-scale-cyber-attacks\/","title":{"rendered":"FBI: New Malware to Spur More Large-Scale Cyber Attacks"},"content":{"rendered":"<p>This article discusses how the IoTs have been being used in botnets created by malware to attack companies. \u00a0The FBI warns that new attacks may occur, different from the Mirai attacks that took place last month. \u00a0Since most IoTs were not designed to withstand attacks, it is hard to prevent these attacks from occurring.<\/p>\n<p>Article:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Mk2X0axtaz\"><p><a href=\"https:\/\/freebeacon.com\/national-security\/fbi-new-malware-spur-large-scale-cyber-attacks\/\">FBI: New Malware to Spur More Large-Scale Cyber Attacks<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;FBI: New Malware to Spur More Large-Scale Cyber Attacks&#8221; &#8212; \" src=\"https:\/\/freebeacon.com\/national-security\/fbi-new-malware-spur-large-scale-cyber-attacks\/embed\/#?secret=Mk2X0axtaz\" data-secret=\"Mk2X0axtaz\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article discusses how the IoTs have been being used in botnets created by malware to attack companies. \u00a0The FBI warns that new attacks may occur, different from the Mirai attacks that took place last month. \u00a0Since most IoTs were not designed to withstand attacks, it is hard to prevent these attacks from occurring. Article: [&hellip;]<\/p>\n","protected":false},"author":3363,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[716936],"tags":[],"class_list":{"0":"post-3933","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-11-it-risk","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/3363"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3933"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3933\/revisions"}],"predecessor-version":[{"id":3934,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3933\/revisions\/3934"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}