{"id":3115,"date":"2017-01-29T11:51:56","date_gmt":"2017-01-29T16:51:56","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/?p=3115"},"modified":"2017-02-04T11:07:56","modified_gmt":"2017-02-04T16:07:56","slug":"washington-dc-cctv-cameras-hacked-during-trump-inauguration","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/2017\/01\/29\/washington-dc-cctv-cameras-hacked-during-trump-inauguration\/","title":{"rendered":"Washington DC CCTV cameras hacked during Trump inauguration"},"content":{"rendered":"<p>According to the Washington Post in this article by Gizmodo, as may as 123 of 187 cctv cameras were infected with malware during the inauguration in DC. The article does not suggest as to whom is or even could be responsible for the attack. The article does point out though that the use of malware usually signifies a ransom. Hackers will often times corrupt a system with malware and demand money be handed over for the malware to be removed. This slightly eases fears as it hopefully suggests the attackers were seeking finances and not to undermine the cameras for more malicious activities.<\/p>\n<p>http:\/\/gizmodo.com\/report-cctv-system-in-washington-dc-was-hacked-before-1791734583<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the Washington Post in this article by Gizmodo, as may as 123 of 187 cctv cameras were infected with malware during the inauguration in DC. The article does not suggest as to whom is or even could be responsible for the attack. The article does point out though that the use of malware [&hellip;]<\/p>\n","protected":false},"author":1722,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[714826],"tags":[],"class_list":{"0":"post-3115","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-02-its-role-the-control-environment","7":"entry"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8j0Bl-Of","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/users\/1722"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/comments?post=3115"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3115\/revisions"}],"predecessor-version":[{"id":3116,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3115\/revisions\/3116"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/media?parent=3115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/categories?post=3115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/tags?post=3115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}