{"id":131,"date":"2008-08-06T18:36:24","date_gmt":"2008-08-06T11:36:24","guid":{"rendered":"http:\/\/moui.net\/blog\/?p=131"},"modified":"2008-08-06T18:39:55","modified_gmt":"2008-08-06T11:39:55","slug":"what-are-10-things-the-cybercriminals-want-to-exploit","status":"publish","type":"post","link":"https:\/\/moui.net\/blog\/2008\/08\/what-are-10-things-the-cybercriminals-want-to-exploit\/","title":{"rendered":"What are 10 things the Cybercriminals Want to Exploit"},"content":{"rendered":"<p>There are as followings:-<\/p>\n<p>1. Broadband connectivity<br \/>\n2. Wi-fi networking<br \/>\n3. Removable media<br \/>\n4. The Web<br \/>\n5. E-mail and instant messaging<br \/>\n6. Unified communications<br \/>\n7. Peer-to-Peer (P2P) programs<br \/>\n8. E-commerce and online banking<br \/>\n9. Mobile computing<br \/>\n10. Universal connectivity<\/p>\n<ol><\/ol>\n<p>Thanks to <span class=\"topBHead\">Bill Detwiler for his &#8220;<\/span><a href=\"http:\/\/blogs.techrepublic.com.com\/10things\/?p=380\">10 technologies that cybercriminals love to exploit<\/a>&#8220;<\/p>\n<iframe src=\"http:\/\/www.facebook.com\/plugins\/like.php?href=https%3A%2F%2Fmoui.net%2Fblog%2F2008%2F08%2Fwhat-are-10-things-the-cybercriminals-want-to-exploit%2F&amp;layout=standard&amp;show_faces=true&amp;width=450&amp;action=like&amp;colorscheme=light&amp;height=80\" scrolling=\"no\" frameborder=\"0\" style=\"border:none; overflow:hidden; width:450px; height:80px;\" allowTransparency=\"true\"><\/iframe>","protected":false},"excerpt":{"rendered":"<p>There are as followings:- 1. Broadband connectivity 2. Wi-fi networking 3. Removable media 4. The Web 5. E-mail and instant messaging 6. Unified communications 7. Peer-to-Peer (P2P) programs 8. E-commerce and online banking 9. Mobile computing 10. Universal connectivity Thanks to Bill Detwiler for his &#8220;10 technologies that cybercriminals love to exploit&#8220;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[94],"tags":[131,130,691],"class_list":["post-131","post","type-post","status-publish","format-standard","hentry","category-security","tag-computer-crime","tag-criminal","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","blog_post_layout_featured_media_urls":{"thumbnail":"","full":""},"categories_names":{"94":{"name":"Security","link":"https:\/\/moui.net\/blog\/category\/security\/"}},"tags_names":{"131":{"name":"Computer Crime","link":"https:\/\/moui.net\/blog\/tag\/computer-crime\/"},"130":{"name":"Criminal","link":"https:\/\/moui.net\/blog\/tag\/criminal\/"},"691":{"name":"Security","link":"https:\/\/moui.net\/blog\/tag\/security\/"}},"comments_number":"0","wpmagazine_modules_lite_featured_media_urls":{"thumbnail":"","cvmm-medium":"","cvmm-medium-plus":"","cvmm-portrait":"","cvmm-medium-square":"","cvmm-large":"","cvmm-small":"","full":""},"jetpack_shortlink":"https:\/\/wp.me\/phmP7-27","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/moui.net\/blog\/wp-json\/wp\/v2\/posts\/131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/moui.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/moui.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/moui.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/moui.net\/blog\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":3,"href":"https:\/\/moui.net\/blog\/wp-json\/wp\/v2\/posts\/131\/revisions"}],"predecessor-version":[{"id":133,"href":"https:\/\/moui.net\/blog\/wp-json\/wp\/v2\/posts\/131\/revisions\/133"}],"wp:attachment":[{"href":"https:\/\/moui.net\/blog\/wp-json\/wp\/v2\/media?parent=131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/moui.net\/blog\/wp-json\/wp\/v2\/categories?post=131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/moui.net\/blog\/wp-json\/wp\/v2\/tags?post=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}