{"id":10234,"date":"2013-05-21T20:28:59","date_gmt":"2013-05-22T01:28:59","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=10234"},"modified":"2013-05-21T20:29:28","modified_gmt":"2013-05-22T01:29:28","slug":"reporters-use-google-find-breach-get-branded-as-hackers","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=10234","title":{"rendered":"Reporters use Google, find breach, get branded as \u201chackers\u201d"},"content":{"rendered":"<blockquote><p><span style=\"font-size: 14px; line-height: 19px;\">Call it security through absurdity: a pair of telecom firms have branded reporters for Scripps News as &#8220;hackers&#8221; after they <\/span><a style=\"font-size: 14px; line-height: 19px;\" href=\"http:\/\/www.newsnet5.com\/dpp\/news\/local_news\/special_reports\/Privacy-on-the-Line-Security-lapse-exposes-some-Lifeline-phone-customers-to-ID-theft-risk\">discovered the personal data of over 170,000 customers<\/a><span style=\"font-size: 14px; line-height: 19px;\">\u2014including social security numbers and other identifying data that could be used for identity theft\u2014sitting on a publicly accessible server. While the reporters claim to have discovered the data with a simple Google search, the firms&#8217; lawyer claims they used &#8220;automated&#8221; means to gain access to the company&#8217;s confidential data and that in doing so the reporters violated the Computer Fraud and Abuse Act with their leet hacker skills.<\/span><\/p><\/blockquote>\n<p>via <a href=\"http:\/\/arstechnica.com\/security\/2013\/05\/reporters-use-google-find-breach-get-branded-as-hackers\/\">Reporters use Google, find breach, get branded as \u201chackers\u201d | Ars Technica<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Call it security through absurdity: a pair of telecom firms have branded reporters for Scripps News as &#8220;hackers&#8221; after they discovered the personal data of over 170,000 customers\u2014including social security numbers and other identifying data that could be used for &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=10234\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1121],"tags":[718,102,188,1142],"class_list":["post-10234","post","type-post","status-publish","format-standard","hentry","category-current-events","tag-data-security","tag-hacking","tag-privacy","tag-wget"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/10234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10234"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/10234\/revisions"}],"predecessor-version":[{"id":10235,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/10234\/revisions\/10235"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10234"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}