{"id":6049,"date":"2012-09-11T01:05:06","date_gmt":"2012-09-11T06:05:06","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=6049"},"modified":"2012-09-11T01:05:06","modified_gmt":"2012-09-11T06:05:06","slug":"3-years-later-hackers-who-hit-google-continue-string-of-potent-attacks","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=6049","title":{"rendered":"3 years later, hackers who hit Google continue string of potent attacks"},"content":{"rendered":"<blockquote><p>The hackers who <a href=\"http:\/\/arstechnica.com\/tech-policy\/2010\/01\/furious-google-throws-down-gauntlet-to-china-over-censorship\/\">breached the defenses of Google<\/a> and at least 34 other big companies three years ago have unleashed a barrage of new attacks since then, many that exploit previously undocumented vulnerabilities in software from Microsoft and Adobe, a new report has found.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/arstechnica.com\/security\/2012\/09\/google-hackers-carry-on\/\">3 years later, hackers who hit Google continue string of potent attacks | Ars Technica<\/a>.<\/p>\n<blockquote><p>Researchers have dubbed this approach &#8220;watering hole&#8221; attacks, and say they&#8217;re &#8220;similar to a predator waiting at a watering hole in a desert. The predator knows that victims will eventually have to come to the watering hole, so rather than go hunting, he waits for his victims to come to him.&#8221;<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The hackers who breached the defenses of Google and at least 34 other big companies three years ago have unleashed a barrage of new attacks since then, many that exploit previously undocumented vulnerabilities in software from Microsoft and Adobe, a &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=6049\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[427,102,698],"class_list":["post-6049","post","type-post","status-publish","format-standard","hentry","category-technical","tag-exploit","tag-hacking","tag-security-research"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/6049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6049"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/6049\/revisions"}],"predecessor-version":[{"id":6050,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/6049\/revisions\/6050"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6049"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}