{"id":1388,"date":"2019-07-14T14:16:42","date_gmt":"2019-07-14T14:16:42","guid":{"rendered":"http:\/\/www.emeco.com.eg\/?page_id=1388"},"modified":"2020-09-05T14:17:46","modified_gmt":"2020-09-05T14:17:46","slug":"013-gdpr-how-hackers-operate","status":"publish","type":"page","link":"https:\/\/www.emeco.com.eg\/index.php\/013-gdpr-how-hackers-operate\/","title":{"rendered":"#013 GDPR How hackers operate ?"},"content":{"rendered":"\n<p><strong><em>How hackers operate<\/em><\/strong><\/p>\n\n\n\n<p>The motive is usually financial. For a quick win,<br>hackers often leech off credible websites or programs by manipulating them for personal gain.<br>Often, it\u2019s to add spammy links which redirect to their site, or to steal visitors\u2019 details<\/p>\n\n\n\n<p>Example:<br>you get a mail that your account is out of quota and please enter your credentials to upgrade your quota&nbsp;<\/p>\n\n\n\n<p>Here are some common ways they operate:<\/p>\n\n\n\n<ul><li>Stealing login credentials. Lots of people still use easily cracked passwords like \u2018qwerty\u2019 or \u2018admin.\u2019<br>If these are reused across accounts, hackers can use a technique called credential stuffing to take them all down.&nbsp;<\/li><li>Installing malware to steal your credentials.<br>This is a relatively new way of getting credentials, CSO reports,<br>and it\u2019s hard to detect because it doesn\u2019t change anything on the front-end of your website itself.&nbsp;<\/li><li>Exploiting out of date software or plugins.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>How hackers operate The motive is usually financial. For a quick win,hackers often leech off credible websites or programs by manipulating them for personal gain.Often, it\u2019s to add spammy links which redirect to their site, or to steal visitors\u2019 details Example:you get a mail that your account is out of quota and please enter your &hellip; <a href=\"https:\/\/www.emeco.com.eg\/index.php\/013-gdpr-how-hackers-operate\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">#013 GDPR How hackers operate ?<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.emeco.com.eg\/index.php\/wp-json\/wp\/v2\/pages\/1388"}],"collection":[{"href":"https:\/\/www.emeco.com.eg\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.emeco.com.eg\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.emeco.com.eg\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.emeco.com.eg\/index.php\/wp-json\/wp\/v2\/comments?post=1388"}],"version-history":[{"count":1,"href":"https:\/\/www.emeco.com.eg\/index.php\/wp-json\/wp\/v2\/pages\/1388\/revisions"}],"predecessor-version":[{"id":1389,"href":"https:\/\/www.emeco.com.eg\/index.php\/wp-json\/wp\/v2\/pages\/1388\/revisions\/1389"}],"wp:attachment":[{"href":"https:\/\/www.emeco.com.eg\/index.php\/wp-json\/wp\/v2\/media?parent=1388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}