{"id":3732,"date":"2018-03-12T11:27:05","date_gmt":"2018-03-12T15:27:05","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/?p=3732"},"modified":"2018-03-12T11:27:05","modified_gmt":"2018-03-12T15:27:05","slug":"ransomware-for-robots-is-the-next-big-security-nightmare","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/2018\/03\/12\/ransomware-for-robots-is-the-next-big-security-nightmare\/","title":{"rendered":"Ransomware for robots is the next big security nightmare"},"content":{"rendered":"<p>http:\/\/www.zdnet.com\/article\/ransomware-for-robots-is-the-next-big-security-nightmare\/#ftag=RSSbaffb68<\/p>\n<p>&nbsp;<\/p>\n<p>The article title is a bit sensationalist, however the story is amusing.<\/p>\n<p>Researchers were able to create ransomware that infects humanoid robots produced by Softbank robotics. When infected, the robot ceased normal functionality and would proceed to taunt the audience and demand bitcoin as a random. While mainly a POC to demonstrate the risk and exposure present in robotics, the amusing demo should be taken as a warning. Like much of the IoTs, Robots will soon be connected online and handle varying levels of personal data. With a growing focus on the weakeness in internet connected devices, robotics should not be left out of the conversation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/www.zdnet.com\/article\/ransomware-for-robots-is-the-next-big-security-nightmare\/#ftag=RSSbaffb68 &nbsp; The article title is a bit sensationalist, however the story is amusing. Researchers were able to create ransomware that infects humanoid robots produced by Softbank robotics. When infected, the robot ceased normal functionality and would proceed to taunt the audience and demand bitcoin as a random. While mainly a POC to demonstrate the [&hellip;]<\/p>\n","protected":false},"author":9378,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715709,715997],"tags":[],"class_list":{"0":"post-3732","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-05it-strategy","7":"category-week-06-project-portfolio-management","8":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/users\/9378"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/comments?post=3732"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3732\/revisions"}],"predecessor-version":[{"id":3733,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3732\/revisions\/3733"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/media?parent=3732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/categories?post=3732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/tags?post=3732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}