{"id":3483,"date":"2017-04-15T08:15:18","date_gmt":"2017-04-15T12:15:18","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/?p=3483"},"modified":"2017-04-15T08:15:18","modified_gmt":"2017-04-15T12:15:18","slug":"windows-users-might-want-to-turn-off-their-computers-this-weekend-warns-security-researcher-whos-only-being-somewhat-glib","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/2017\/04\/15\/windows-users-might-want-to-turn-off-their-computers-this-weekend-warns-security-researcher-whos-only-being-somewhat-glib\/","title":{"rendered":"Windows users might want to turn off their computers this weekend, warns security researcher who&#8217;s only being &#8216;somewhat glib&#8217;"},"content":{"rendered":"<p>A hacker group by the name of Shadow Brokers has released tools that can ease the process of hacking into Windows computers and other Microsoft products. According to Business Insider\u2019s Julie Bort, the author of this article, \u201cThe hacking tools are allegedly part of the arsenal that was said to be stolen from the NSA last summer.\u201d We are starting to experience the ripple effect of what was created for spying purposes. This is the sort of things government agencies, organizations, IT Security professionals and people in general will have to deal with when the right tools fall into the wrong hands. It is odd that an agency created tools to spy; nevertheless, failed to properly protect those tools against spying. Solution? Create tools to defend as strong and effective as those created to attack.<\/p>\n<p><a href=\"http:\/\/www.businessinsider.com\/hackers-release-nsas-secret-hacking-tools-for-windows-2017-4\">http:\/\/www.businessinsider.com\/hackers-release-nsas-secret-hacking-tools-for-windows-2017-4<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A hacker group by the name of Shadow Brokers has released tools that can ease the process of hacking into Windows computers and other Microsoft products. According to Business Insider\u2019s Julie Bort, the author of this article, \u201cThe hacking tools are allegedly part of the arsenal that was said to be stolen from the NSA [&hellip;]<\/p>\n","protected":false},"author":11666,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[717225],"tags":[],"class_list":{"0":"post-3483","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-12-it-security","7":"entry"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8j0Bl-Ub","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/users\/11666"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/comments?post=3483"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3483\/revisions"}],"predecessor-version":[{"id":3484,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3483\/revisions\/3484"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/media?parent=3483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/categories?post=3483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/tags?post=3483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}