{"id":1504,"date":"2014-10-30T22:18:35","date_gmt":"2014-10-30T22:18:35","guid":{"rendered":"http:\/\/shuyuanmaryho.com\/?p=1504"},"modified":"2014-10-30T22:18:35","modified_gmt":"2014-10-30T22:18:35","slug":"cybersecurity-threats-are-about-to-get-much-much-worse","status":"publish","type":"post","link":"https:\/\/shuyuanmaryho.com\/?p=1504","title":{"rendered":"Cybersecurity Threats Are About to Get Much, Much Worse!"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?p=1504\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><p>Up until now, many people think that cyberattacks just amount to <a href=\"http:\/\/gizmodo.com\/target-confirms-up-to-40-million-credit-and-debit-cards-1486419257\">stolen credit card numbers<\/a> or <a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2014\/10\/cybersign.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1505 alignright\" src=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2014\/10\/cybersign.jpg\" alt=\"cybersign\" width=\"229\" height=\"235\" \/><\/a><a href=\"http:\/\/gizmodo.com\/heres-an-illustrated-guide-to-the-worlds-worst-computer-1606566207\">computer viruses<\/a> or something. That&#8217;s not really the case. While your Mastercard and MacBook are valuable things to protect, the technology that relies on the industrial internet are much more valuable. That includes things like high-speed trains, water treatment facilities, and nuclear power plants. The list goes <a href=\"http:\/\/gizmodo.com\/is-the-internet-more-vulnerable-to-physical-attacks-tha-1492204429\">on and on<\/a>.<\/p>\n<p>The scary truth of all this is that the list is about to grow exponentially, as new internet-connected technology comes into play. <a href=\"http:\/\/gizmodo.com\/internet-of-things-devices-are-a-hackers-dream-come-t-1615038906\">The reality of the internet of things<\/a> is that connecting more things to the internet means creating more vulnerabilities. &#8220;Current threats include economic transactions, power grid, and air traffic control,&#8221; Mark Nall, a program manager for NASA, told Pew. &#8220;This will expand to include others such as self-driving cars, unmanned aerial vehicles<em>, <\/em>and building infrastructure<em>.&#8221;<\/em><\/p>\n<p>More from Gizmodo.com <a href=\"http:\/\/gizmodo.com\/cybersecurity-threats-are-about-to-get-much-much-worse-1652889589\" target=\"_blank\">by clicking here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Up until now, many people think that cyberattacks just amount to stolen credit card numbers or computer viruses or something. That&#8217;s not really the case. While your Mastercard and MacBook are valuable things to protect, the technology that relies on &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?p=1504\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1504","post","type-post","status-publish","format-standard","hentry","category-the-latest-news-ideas-problems-strategies-and-tactics-in-securing-cyberspace-and-virtual-organizations-discussed-by-experts-in-industries-as-well-as-academia"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1504"}],"version-history":[{"count":1,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1504\/revisions"}],"predecessor-version":[{"id":1506,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1504\/revisions\/1506"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}