{"id":28859,"date":"2016-08-11T23:18:59","date_gmt":"2016-08-12T06:18:59","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/08\/lock-picking-your-way-to-cybersecurity-at-def-con"},"modified":"2017-04-25T19:52:57","modified_gmt":"2017-04-26T02:52:57","slug":"lock-picking-your-way-to-cybersecurity-at-def-con","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/08\/lock-picking-your-way-to-cybersecurity-at-def-con","title":{"rendered":"Lock picking your way to cybersecurity at Def Con"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"http:\/\/ww3.hdnux.com\/photos\/50\/76\/34\/10741546\/3\/rawImage.jpg\"><img decoding=\"async\" class=\"aligncenter\" src=\"\"><\/a><\/p>\n<p>New method on how to attend Def Con.<\/p>\n<hr>\n<p>LAS VEGAS (AP) \u2014 Lock picking might seem ridiculously old-fashioned at a cybersecurity gathering \u2014 but learning it can actually help people protect machines from digital threats.<\/p>\n<p>As security improves to block remote attacks over the internet, hackers look for ways to deliver malicious software physically instead \u2014 for instance, by breaking into a company\u2019s data centers. Like cracking a digital system, picking locks involves solving puzzles, along with a certain amount of finesse and skill.<\/p>\n<p>And for the good guys, knowing how to pick locks is important for learning how to defend against it.<\/p>\n<p><!-- Link: <a href=\"http:\/\/www.seattlepi.com\/business\/technology\/article\/Lock-picking-your-way-to-cybersecurity-at-Def-Con-9136619.php\">http:\/\/www.seattlepi.com\/business\/technology\/article\/Lock-pi...136619.php<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New method on how to attend Def Con. LAS VEGAS (AP) \u2014 Lock picking might seem ridiculously old-fashioned at a cybersecurity gathering \u2014 but learning it can actually help people protect machines from digital threats. As security improves to block remote attacks over the internet, hackers look for ways to deliver malicious software physically instead [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418],"tags":[],"class_list":["post-28859","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/28859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=28859"}],"version-history":[{"count":1,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/28859\/revisions"}],"predecessor-version":[{"id":40184,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/28859\/revisions\/40184"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=28859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=28859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=28859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}