{"id":1175,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail93-suw11-mcdlv-net\/"},"modified":"2021-12-30T11:38:54","modified_gmt":"2021-12-30T11:38:54","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail93-suw11-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail93-suw11-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail93.suw11.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>Nearly 370M IE users have just 6 weeks to upgrade<br \/>\nIn August 2014, Microsoft took Internet Explorer (IE) users by surprise when it announced that most had to be running IE11 by Jan. 12, six weeks from today.<br \/>\nAfter that date, Microsoft will support IE9 only on the barely used Windows Vista and Windows Server 2008, and IE10 only on Windows Server 2012.<br \/>\nAll others, including those with devices powered by Windows 7, Windows 8, Windows 8.1 and Windows 10, must run IE11 or Edge.<br \/>\nThe retired browsers will continue working, but Microsoft will halt technical support and stop serving security updates for the banned versions.<br \/>\nThe biggest chunk of affected IE users &#8212; an estimated 172 million &#8212; were those still running IE8, the six-year-old browser originally bundled with Windows 7 but which also ran on the now-retired Windows XP.<br \/>\nCompanies that require older editions of IE to run Web apps or services can upgrade to IE11, then rely on that browser&#8217;s Enterprise Mode to mimic the older versions&#8217; rendering engines.<br \/>\nLast week, Microsoft announced some enhancements to Enterprise Mode, including support for HTTP ports, and issued a kit that walks IT administrators through the chore of configuring Enterprise Mode.<br \/>\nThat kit can be downloaded from here.<br \/>\nAnother option for laggards who need backward compatibility with aged apps and services is to upgrade to IE11 but deploy Browsium Ion, an add-on that lets IT administrators enable legacy IE-dependent apps in IE11.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=88a46ef51b&#038;e=20056c7556<\/p>\n<p>Security Think Tank: Threat intelligence feeds not for everyone<br \/>\nBefore signing up for threat intelligence and monitoring in real time, an organisation has to have its operational security practices running as a reasonably well-oiled machine.<br \/>\nThey need to have security systems they can monitor and change control around critical pieces, as well as strong understanding of how the operational controls interact with each other.<br \/>\nSome organisations choose corrective approaches instead of detective and preventative.<br \/>\nOthers prefer to manage their risks in non-technical ways, such as through contracts, service level agreements, litigation, insurance or financial mechanisms.<br \/>\nThreat intelligence is best applied when a firm wants to apply technical controls to a certain kind of risk.<br \/>\nThe firm needs security controls to adapt, react and flex in real time to the changing technical landscape.<br \/>\nSecurity is complex and not every security control or technique makes sense for every firm.<br \/>\nIt would be a mistake to conclude: \u201cX is good; business Y does not use X, therefore business Y is not as good as it could be.\u201d<br \/>\nThreat indicators are just one tool of many that an organisation should have in place.<br \/>\nIt is important to have security processes in place beforehand to make the most of them.<br \/>\nThis includes properly trained and educated staff, a resilient network based on securely designed applications and operational readiness.<br \/>\nWithout these foundations, threat intelligence will ultimately have limited effectiveness.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3c9bbd563a&#038;e=20056c7556<\/p>\n<p>Three key areas to limit cyber attack liability, says Kemp Little<br \/>\n\u201cResponses to cyber attacks need to be organic and grow as organisations learn more,\u201d Alison Rea, intellectual property and litigation senior associate at Kemp Little, told a seminar on cyber attacks in London.<br \/>\n\u201cHowever, key to limiting liability is identifying the source of the attack, reducing the spread of stolen data and mitigating liability to third parties,\u201d she said.<br \/>\n\u201cIn the event of a cyber attack, organisations will typically be fire fighting on a number of different fronts.<br \/>\nThey are going to want halt the attack and find out who is behind it, they are going to have to deal with the regulatory authority, they are going to want to assess their liability to customers and at the same time assess the liability of their own suppliers,\u201d said Rea.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3bf3528039&#038;e=20056c7556<\/p>\n<p>Cybercrime and shipping: the facts<br \/>\nHow serious a threat to shipping is cybercrime.<br \/>\nThe aviation sector\u2019s exposure to the global cyber threat was laid bare by the recent acts of a \u2018white-hat\u2019 hacker, who apparently infiltrated a commercial aircraft\u2019s flight-management systems while it was in flight.<br \/>\nSo, the question for the maritime sector is: do we honestly believe we are better prepared, or that the security challenge is any less pronounced than with the aviation sector?<br \/>\nBoth sectors share extraordinary similarities: they are highly integrated value chains; they contribute massively to global wealth creation; and they rely upon broad-based technological integration with very high-value assets.<br \/>\nMoreover, every link of these value chains is dependent upon the third-party resilience of all members to ensure the security of the whole.<br \/>\nHowever, according to our recent analysis of 49 maritime transport companies\u2019 2014 annual reports, just 22% identified cyber-crime as a potential risk.<br \/>\nThis is despite the World Fuel theft, and the attack on the Port of Antwerp where container-release codes and port-handling capacity were compromised.<br \/>\nThrough that wider lens, the internet was seen by the IISS to add trillions of dollars to international commerce each year.<br \/>\nAnd, remarkably, the losses attributable to cybercrime were estimated at 15-20% of the value it adds.<br \/>\nTo lessen the risk of rising capital costs, maritime organisations need to start quantifying their cyber exposure, just like they do for every other category of risk.<br \/>\nThis will help them to make informed decisions about a capital-usage strategy that will strike the right balance between risk mitigation, retained and funded risk, and risk transfer.<br \/>\nThis exercise will not be simple.<br \/>\nIt will require hard, intellectual yards.<br \/>\nBut, to date, nowhere near enough maritime organisations have started the journey.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2bf3b6c56f&#038;e=20056c7556<\/p>\n<p>Cyber Risk As A Top 10 Global Risk for Businesses<br \/>\nCyber security has long become a standing issue for boardrooms, a core focus area for major corporations.<br \/>\nThe perceived risk of cyber-attacks is so great that for the first time this year, it was categorized by 1,400 business leaders worldwide as one of the top 10 risks, among economic slowdown, increasing competition and property damage, according to the AON Global Risk Management Report.<br \/>\nAccording to Stephen Cross, Chief Innovations Officer at the company, \u201cModeling of cyber risk is complex and difficult as it lacks sufficient historical data coupled with the fact that such data is captured in a sporadic and unstructured manor.<br \/>\nIt is also a very fast moving target.<br \/>\nHow do you adequately forecast for a cyber hurricane.<br \/>\nYour cyber security is a strong as the weakest link in your supply chain\u201d.<br \/>\n1- Damage to Brand\/Reputation<br \/>\n3- Regulatory\/legislative changes<br \/>\n5- Failure to attract or retain top talent<br \/>\n6- Failure to innovate\/meet customer needs<br \/>\n7- Business interruption<br \/>\n9- Cyber risk (computer crime\/hacking\/ viruses\/malicious codes)<br \/>\n10- Property damage<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=92ed9e9825&#038;e=20056c7556<\/p>\n<p>Indian firms underequipped to handle cyber threats: KPMG Read more at: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3f071eb867&#038;e=20056c7556<br \/>\nMUMBAI: The banking and financial services sector continues to be a top target for cyber attacks which continue to rise every year, a survey by consulting firm KPMG revealed.<br \/>\nYet the spends on cyber security continue to be low and also lag in priority in board rooms, it said<br \/>\nThe survey revealed that 72%of the respondents had faced some sort of cyber attack over the past year, up from 43% a year ago.<br \/>\nBesides, it also found that financial motives were a key driver for cyber crime<br \/>\n74% of the respondents felt that the banking and financial services sector was most vulnerable to the cyber risk threat.<br \/>\nBut cyber defence expenditure formed less than 5% of the total IT spends.<br \/>\nA survey by KPMG of 250 respondents across the sectors shows that 94% of the respondents felt that cybercrime was one of the major threats to their businesses.<br \/>\nHowever only 41% had it ( cyber crime related issues) as a part of their board room agenda.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d6044df13f&#038;e=20056c7556<\/p>\n<p>Here&#8217;s Air Force\u2019s $49.5M Plan to Outsource Cyberweapon and Counterhack Software<br \/>\nAn official contract for the &#8220;Offensive Cyberspace Operations Defensive Cyberspace Operations Real-Time Operations and Innovation Cyber Development Custom Software Engineering Services&#8221; program is slated for publication Jan. 29, 2016.<br \/>\nSHELTER, the nickname for the mouthful of a project title, is a 5.5-year deal that would add to the Defense Department\u2019s growing arsenal of cyberweapons.<br \/>\nTechnically referred to as &#8220;exploits,&#8221; &#8220;payloads&#8221; and &#8220;implants&#8221; in a draft contract released Monday, these sophisticated, malicious programs are not exclusive to defense company computer labs.<br \/>\nVia the Internet black market, hidden behind firewalls, anyone &#8212; including terrorists &#8212; can buy them from script kiddies, financially motivated hackers or other anonymous sources. (The Pentagon definition for exploit is &#8220;software or a sequence of commands that takes advantage of a vulnerability in order to cause unanticipated behavior to occur on computer software, hardware or something electronic, usually computerized.)<br \/>\nPrivate sector professionals are wanted for hack attack and counterhack software development efforts.<br \/>\nThe branch, for example, needs a contractor for the &#8220;development and\/or identification of capabilities&#8221; to &#8220;exploit and mitigate previously known and unknown hardware and operating system vulnerabilities.&#8221;<br \/>\nThe contractors also will build tools to neutralize malicious code found seeping through the Defensewide &#8220;global information grid&#8221; network.<br \/>\nSpeed is key to dominance in cyberspace, and professionals will be expected to &#8220;find vulnerabilities with or without source code,&#8221; in accordance with &#8220;government established timelines,\u201d the draft contract states.<br \/>\nThe price ceiling for the deal is $49.5 million and the Air Force is taking questions on the proposal until Dec. 18.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=584da48748&#038;e=20056c7556<\/p>\n<p>Akerman and Thomson Reuters Legal Managed Services Announce Collaboration On Groundbreaking U.S. Data Privacy and Security Legal Service Offering<br \/>\nCHICAGO, Dec. 1, 2015 \/PRNewswire\/ &#8212; Akerman LLP, a top 100 U.S. law firm serving clients across the Americas, today announced the advent of the Akerman Data Law Center, a dynamic, technology-driven, data privacy and security law service offering developed in collaboration with Thomson Reuters Legal Managed Services.<br \/>\nThe Akerman Data Law Center will provide tailored research, multi-jurisdictional surveys and regulatory gap analyses in a wide array of data and privacy risk areas empowering clients to quickly and cost-effectively understand and handle routine compliance matters while mitigating risks before they become crises.<br \/>\nWith Akerman&#8217;s multi-disciplinary team of regulatory compliance and data law lawyers within reach, the firm can also provide legal interpretation and day-to-day counseling specifically tailored to each client&#8217;s distinctive situation and needs.<br \/>\nAkerman also is partnering with Neota Logic.<br \/>\nThe Akerman Data Law Center will utilize Neota Logic&#8217;s advanced expert system technology platform, a form of artificial intelligence, to interpret and operationalize the legal knowledge and guide clients to counsel where counsel is needed.<br \/>\nBy combining rules, reasoning, decision management and document automation, Neota Logic applications set a new standard in delivering business solutions.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c3e096f8bd&#038;e=20056c7556<\/p>\n<p>Cybercrime demands new ways of policing, RCMP says<br \/>\nThe Mounties will outline the national police force\u2019s cybercrime strategy today.<br \/>\nRCMP Commissioner Bob Paulson told a security conference last week that police exhibit rooms are stacked with digital devices \u2013 and the trick is finding ways to extract the valuable evidence on them.<br \/>\nIn a report last year, the RCMP said cybercrime demands new ways of policing to keep pace with illicit exploitation of emerging technologies such as cloud computing, social-media platforms, anonymous online networks and virtual currency schemes.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=75550e1a41&#038;e=20056c7556<\/p>\n<p>Report: Insiders Still Top Breach Threat<br \/>\nExperian&#8217;s just released third annual Data Breach Industry Forecast report for 2016 predicts that big hacks will continue to grab the headlines but small breaches will cause &#8220;a lot more damage,&#8221; he says.<br \/>\nTo help reduce incidents involving negligence by insiders, Bruemmer strongly recommends organizations bolster their &#8220;job specific&#8221; privacy and security training.<br \/>\nThose efforts &#8220;start of the board level,&#8221; he says. &#8220;It has to be a priority and it has to cascade down not only through the covered entity organizations but also through the business associates.&#8221;<br \/>\nOne of the biggest breach prevention shortcomings among healthcare organizations and their business associates, Bruemmer says, is &#8220;not knowing where their data is within their own networks,&#8221; he notes. &#8220;There are so many interconnected systems. &#8230;<br \/>\nIn the healthcare field, you have so many connected devices that carry protected health information &#8211; that&#8217;s a real problem.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ff6191ace5&#038;e=20056c7556<\/p>\n<p>Security expert expects APTs to dwindle in 2016<br \/>\nThe prevalence and intensity of cyberattacks is expected to subside in 2016, in comparison to 2015, according to research from Kaspersky Lab.<br \/>\nSpeaking at the Cyber Security Summit in Port Dickson, Malaysia, Vitaly Kamluk, Principal Security Researcher, Global Research &#038; Analysis Team (GReAT), Kaspersky Lab, in his conference presentation entitled \u201cAPAC \u2013 Regional Threat Overview,\u201d suggested that the prevailing trend and data supports the thinking that Advanced Persistent Threats (APTs) are expected to dwindle in 2016.<br \/>\nTo date, 12 different types of APTs were detected in 2015, including Wild Neutron, Darkhotel, Naikon and Duqu 2.0.<br \/>\nEach cyberattack held varying levels of intensity in terms of damages and malicious activities executed.<br \/>\nAccording to another senior security expert, Sergey Lozhkin, Senior Security Researcher, GReAT, Kaspersky Lab, the access to hacking and networks breaching tools is still widely available, despite the exposure and shutting down of the \u201cundernet\u201d or illegal resource site otherwise known as the Dark Web.<br \/>\nIllegal hacking tools including hacking codes, data exfiltration viruses as well as Botnets are available on the Dark Web.<br \/>\nBut due to governmental and law enforcement measures, the more common or unrestricted Dark Web sites have been shut down.<br \/>\nBut Lozhkin warned, \u201cThe Dark Web is not dead.<br \/>\nIt is merely re-building\u201d.<br \/>\nIn his presentation \u201cThe Evolution of Ransomware: Dangers of Cryptolockers\u201d, he said that the Dark Web might end up becoming more secure as it is able to deliver two-factor authentication and certificates for access to resource sites.<br \/>\nBitcoin is still the currency of choice on the Dark Web, with hacking tools and botnets available for the right price.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b992c709a7&#038;e=20056c7556<\/p>\n<p>Asking DHS to hack your systems<br \/>\nBrian Krebs, author of the popular Krebs on Security blog, reported on Dec. 1 that DHS&#8217; National Cybersecurity Assessment and Technical Services (NCATS) have been &#8220;quietly launching stealthy cyberattacks against a range of private U.S. companies \u2014 mostly banks and energy firms.<br \/>\nThese digital intrusion attempts, commissioned in advance by the private sector targets themselves, are &#8230; designed to help &#8216;critical infrastructure&#8217; companies shore up their computer and network defenses against real-world adversaries.&#8221;<br \/>\nAccording to Krebs, &#8220;DHS said that in Fiscal Year 2015 NCATS provided support to 53 private sector partners.&#8221;<br \/>\nAccording to information posted on the U.S.<br \/>\nComputer Emergency Readiness Team website, &#8220;NCATS leverages existing &#8216;best in breed&#8217; cybersecurity assessment methodologies, commercial best practices and integration of threat intelligence that enable cybersecurity stakeholders with decision making\/risk management guidance and recommendations.&#8221; An assessment &#8220;can range from one day to two weeks depending on the security services required.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a13dfe9693&#038;e=20056c7556<\/p>\n<p>DDoS attacks up 53% in Q3; cloud top target: Report<br \/>\nVerisign observed a significant increase in the frequency of DDoS attacks in Q3, representing a 53 percent increase over the previous quarter.<br \/>\nIn fact, DDoS activity in Q3 increased to the highest it has been in any quarter over the last two years.<br \/>\nIn terms of size, more than one-third of attacks peaked over 5 Gbps while one in five attacks peaked over 10 Gbps.<br \/>\nFifty-nine percent of attacks peaked at more than 1 Gbps; 20 percent of attacks were greater than 10 Gbps.<br \/>\nVerisign saw the average attack size increase to 7.03 Gbps, 27 percent higher than Q2 2015.<br \/>\nFor the fourth consecutive quarter, the industry most frequently targeted by DDoS attacks was IT Services\/Cloud\/SaaS, representing 29 percent of mitigation activity in Q3.<br \/>\nMedia and Entertainment represented 26 percent of mitigations, followed by financial (15 percent), public sector (13 percent), telecom (12 percent), and e-commerce\/online advertising (5 percent).<br \/>\nContinuing the trend of the year, the most common DDoS attack types were Network Time Protocol (NTP), Domain Name System (DNS) and Simple Service Discovery Protocol (SSDP) UDP floods, which accounted for approximately 65 percent of attacks in the quarter.<br \/>\nThe balance of attacks mitigated were TCP floods (20 percent) and application layer attacks (15 percent).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ed05ce5f6d&#038;e=20056c7556<\/p>\n<p>Top malware families targeting business networks<br \/>\nCheck Point has revealed the most common malware families being used to attack organisations\u2019 networks during October 2015.<br \/>\nThey identified more than 1,500 different malware families globally active in October.<br \/>\nGlobally, three malware families (Conflicker, Sality and Cutwail) accounted for 40% of all recorded attacks, revealing a trend for attacks focusing on remote control of infected PCs, enabling them to be used for launching DDoS and spam campaigns.<br \/>\nAttacks using malware families that enable ransomware scams and theft of users\u2019 credentials also rose sharply.<br \/>\nAs well as the Neutrino ransomware exploit kit, Fareit malware, which steals users\u2019 credentials from web browsers and emails, increased dramatically, taking it from 93rd position in September up to the 10th most common malware seen during October.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=179adc7d5f&#038;e=20056c7556<\/p>\n<p>Malware, ransomware twice as likely to hit state, local networks<br \/>\nState and local governments networks are nearly twice as likely to be infected with malware or ransomware than those in small and medium businesses, according to new data released by Sentinel IPS, a cybersecurity threat management firm.<br \/>\nEducation-sector networks also suffer from high infections rates.<br \/>\nAfter evaluating over 30 million alerts from its users around the world, Sentinel IPS found that 67 percent of government networks and 72 percent of education networks triggered critical malware or ransomware alerts, compared to just 39 percent of other networks triggering similar alerts.<br \/>\nOrganizations with fewer, less-advanced cybersecurity resources &#8212; like budget-strapped government offices &#8212; are easy prey for hackers, the report suggested.<br \/>\nAdditionally, agencies trying to protect a variety of different systems with limited resources are more vulnerable to ransomware attacks, Tim Francis, cyber enterprise lead at Travelers, told DarkReading.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bf8a34b27e&#038;e=20056c7556<\/p>\n<p>Moody&#8217;s to consider data breach risk in healthcare credit ratings<br \/>\nMoody&#8217;s Investor Services will start factoring a healthcare providers&#8217; cybersecurity strength into their credit ratings, the agency said this week, as hackers continue to infiltrate the sector.<br \/>\nMoody&#8217;s says they think of cyberthreats the same way as other &#8220;extraordinary event risks&#8221; like natural disasters.<br \/>\nAny impact to the company&#8217;s credit depends on how long the attack went on and how bad it was.<br \/>\nThe greater the severity and impact to the company and consumers, the greater the chance it could impact credit.<br \/>\nThe report, &#8220;Cross Sector &#8212; Global: Cyber Risk of Growing Importance to Credit Analysis,&#8221; points out several influential factors Moody&#8217;s uses when evaluating credit impact due to a cyberattack: nature and scope of the targeted institution or assets, how long services were interrupted, and the length of time it took to restore operations to normal.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d8543b0a33&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=89e0861b25)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: Nearly 370M IE users have just 6 weeks to upgrade In August 2014, Microsoft took Internet Explorer (IE) users by surprise when it announced that most had to&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1175","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1175"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1175\/revisions"}],"predecessor-version":[{"id":3662,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1175\/revisions\/3662"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}