{"id":7835,"date":"2015-02-24T16:11:46","date_gmt":"2015-02-24T22:11:46","guid":{"rendered":"http:\/\/news.medill.northwestern.edu\/chicago\/?p=7835"},"modified":"2015-02-24T16:11:46","modified_gmt":"2015-02-24T22:11:46","slug":"hacking-how-to-fight-back-and-protect-yourself","status":"publish","type":"post","link":"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/","title":{"rendered":"Hacking &#8211; How to fight back and protect yourself"},"content":{"rendered":"<p style=\"text-align: left\">By Zachary Vasile<\/p>\n<p style=\"text-align: left\">Like birth and death, hacking became a new form of the inevitable in 2014. Of course, it had bubbled to the surface time and again, stewing in and out of personal computers, government databases and the sci-fi imagination.<\/p>\n<p>During the last 12 months however, hacking broke through to the banner headlines and shows little sign of relinquishing the threatening power it wields in every field from engineering to electronic eavesdropping to entertainment.<!--more-->People seem familiar with the concept of this dark art. But most of us lack the technical background to challenge the netherworld that hackers invade and conquer. That needs to change.<\/p>\n<p style=\"text-align: left\">The cyber security community is emphatic in\u00a0insisting that government officials, CFOs, high school students and everyone else need to get proactive about a problem that is quickly spiraling out of control. Without the proper information \u2014and a willingness to cut through the techie jargon that often clouds any conversation about hacking\u2014 we all add to our risk.<\/p>\n<p style=\"text-align: left\"><strong>\u201cWe Can\u2019t Call the Police\u201d<\/strong><\/p>\n<p style=\"text-align: left\">The crowd of sharply dressed business leaders and innovators shuffled out of the lake-effect cold and into the posh and purple-lit Venue SIX10 on South Michigan Avenue in downtown Chicago. The sense of urgency surrounding this year\u2019s <a href=\"http:\/\/about.bgov.com\" target=\"_blank\">Bloomberg Government<\/a> technology panel, entitled \u201cDigital Trust,\u201d was palpable. What would it take to prevent the \u201cnext Sony\u201d?<\/p>\n<p style=\"text-align: left\">If the diverse panel had one message, it was that the 99 percent of law-abiding Internet users need to take ownership of protecting themselves. Any other scenario \u2014that the hackers will quit, or that the government will step up its game\u2014 is wishful thinking, panel experts said.<\/p>\n<p style=\"text-align: left\">\u201cI think with government specifically the challenge we have is just jurisdictions,\u201d said Roger Liew, senior vice president and chief technology officer at <a href=\"http:\/\/www.orbitz.com\" target=\"_blank\">Orbitz Worldwide<\/a>. \u201cIf our computers in the Chicagoland area are hacked by somebody not in the city of Chicago, which is very likely, then we can\u2019t call the police.\u201d<\/p>\n<figure id=\"attachment_7921\" aria-describedby=\"caption-attachment-7921\" style=\"width: 1078px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-2.28.00-PM.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-7921\" src=\"http:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-2.28.00-PM.png\" alt=\"Figure based on data from NCC Group.\" width=\"1078\" height=\"532\" srcset=\"https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-2.28.00-PM.png 1078w, https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-2.28.00-PM-300x148.png 300w, https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-2.28.00-PM-1024x505.png 1024w\" sizes=\"(max-width: 1078px) 100vw, 1078px\" \/><\/a><figcaption id=\"caption-attachment-7921\" class=\"wp-caption-text\">Figure based on data from NCC Group.<\/figcaption><\/figure>\n<p style=\"text-align: left\">The panel talked through a number of potential fixes for both big companies and individual Internet users, including better and more consistent encryption. But the buzziest strategy \u2014and one that has been floating around in cyber security circles for years\u2014 is two-factor authentication, which basically means relying on two identifying components rather than one. Anyone who has swiped a credit card and then entered a PIN number to verify that it is really you on the other end of that transaction is familiar with the procedure, and it could be making its way online soon. Possibilities include the use of USB stick tokens, transaction authentication numbers, and even fingerprint and iris scans.<\/p>\n<p style=\"text-align: left\">Another tool for the good guys is the much heralded \u201csmart card\u201d or \u201cchip card,\u201d a bank card with integrated circuits. Unlike the magnetic strip cards widely used today, smart cards store funds on the cards themselves, making them considerably harder to exploit. Additionally, chip circuits carrying encrypted data are extremely difficult to replicate, acting as an additional deterrent against fraud.<\/p>\n<p style=\"text-align: left\"><strong>The Toolbox<\/strong><\/p>\n<p style=\"text-align: left\">This tech world arms race is a necessary response to a growing threat. While there are literally thousands of ways for hackers to compromise a given computer system, most targets are still readily susceptible to the most basic weapons in a hacker\u2019s arsenal.<\/p>\n<p style=\"text-align: left\">\u201cMost breaches occur because the hackers were able to brute force a password or because something was easily guessed,\u201d said Ken Westin, a security researcher based in Portland, Oregon.<\/p>\n<p style=\"text-align: left\">In computer parlance, \u201cbrute forcing\u201d refers to an infiltration method in which hackers use specially written programs that try millions of potential passwords to unlock private online accounts. It\u2019s the equivalent of unlocking a safe by trying every possible combination, albeit much, much faster.<\/p>\n<p style=\"text-align: left\">Disturbingly, many hackers are able to avoid brute forcing altogether by making educated guesses about their target\u2019s passwords. <a href=\"http:\/\/www.fbi.gov\/losangeles\/press-releases\/2012\/florida-man-convicted-in-wiretapping-scheme-targeting-celebrities-sentenced-to-10-years-in-federal-prison-for-stealing-personal-data\" target=\"_blank\">Christopher Chaney<\/a>, who in 2011 gained notoriety and a 10-year jail sentence for breaking into celebrity email accounts, admitted to police that cursory research often revealed everything he needed to guess the passwords of stars like Mila Kunis and Scarlett Johansson.<\/p>\n<p>Similar vulnerabilities may have allowed hackers to target the <a href=\"http:\/\/www.apple.com\/pr\/library\/2014\/09\/02Apple-Media-Advisory.html\" target=\"_blank\">Apple iCloud<\/a> accounts of A-listers like Jennifer Lawrence, Kate Upton, Kaley Cuoco, and Ariana Grande during a massive photo leak in September. The names of pets, kids, and hometowns become frequent and predictable passwords to aid the hacker.<\/p>\n<p style=\"text-align: left\">Somewhat more sophisticated are the hacks that allowed criminals to break into the networks of retailers like <a href=\"http:\/\/www.homedepot.com\" target=\"_blank\">Home Depot<\/a> and <a href=\"http:\/\/www.target.com\" target=\"_blank\">Target<\/a>. These attacks often involve point-of-service (PoS) tampering, in which those wishing to compromise a network will infect available devices like company computers or automated registers with malware that gather sensitive data like account numbers from debit and credit cards.<\/p>\n<figure id=\"attachment_7850\" aria-describedby=\"caption-attachment-7850\" style=\"width: 781px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-18-at-9.15.58-PM.png\"><img decoding=\"async\" class=\"size-full wp-image-7850\" src=\"http:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-18-at-9.15.58-PM.png\" alt=\"Hacks, worms, distributed denial-of-service attacks, and breaches graphed by sophistication vs. impact.\" width=\"781\" height=\"577\" srcset=\"https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-18-at-9.15.58-PM.png 781w, https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-18-at-9.15.58-PM-300x222.png 300w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><\/a><figcaption id=\"caption-attachment-7850\" class=\"wp-caption-text\">Hacks, worms, distributed denial-of-service attacks, and breaches graphed by sophistication vs. impact. Graphic by Zach Vasile\/Medill<\/figcaption><\/figure>\n<p style=\"text-align: left\">Also in this league are Structured Query Language attacks \u2014also known as SQL injection attacks\u2014 which use malicious code to corrupt and exploit vulnerable software, including the programs that run magnetic stripe readers and ATMs. SQL injection was the preferred hacking technique of <a href=\"http:\/\/www.justice.gov\/opa\/pr\/alleged-international-hacker-indicted-massive-attack-us-retail-and-banking-networks\" target=\"_blank\">Albert Gonzalez<\/a>, an American criminal whose credit card theft ring amassed over 170 million stolen numbers by targeting companies like TJ Maxx and 7-Eleven.<\/p>\n<p style=\"text-align: left\"><strong>A Defining Moment<\/strong><\/p>\n<p style=\"text-align: left\">For all the emotional hurt and financial damage these cyber attacks inflict, it is doubtful that any of them were as sophisticated \u2014or as destructive\u2014 as December\u2019s <a href=\"http:\/\/www.sonypictures.com\" target=\"_blank\">Sony Pictures Entertainment<\/a> hack. The attack did not just compromise data, it <em>destroyed<\/em> data by installing a malicious storage erasing program known as Wiper. The hack hampered the release of <em>The Interview<\/em>, a Seth Rogen-helmed action comedy, ignited an impassioned national debate about free speech, and cost the multinational corporation billions of dollars and considerable prestige in the cloistered world of Hollywood.<\/p>\n<p style=\"text-align: left\">\u201cThe term \u2018systemic failure\u2019 is not out of place [to describe the Sony hack],\u201d said Stephen Cobb, a senior security researcher at technology firm <a href=\"http:\/\/www.eset.com\/int\/\" target=\"_blank\">ESET<\/a>, during a BrightTALK web seminar in January.<\/p>\n<p style=\"text-align: left\">According to Cobb, sections of Sony\u2019s network fell outside of the company\u2019s security capabilities. Once hackers were able to compromise the weakest areas of Sony\u2019s security, they wormed their way to the most sensitive data, including the now infamous personal correspondence of executives Amy Pascal and Scott Rudin.<\/p>\n<p style=\"text-align: left\">The Sony hack has inspired a security gut check in the world of American business. Compromised data is bad enough. Even worse is being left with no legal recourse or compensation when the responsible parties vanish into the cyber ether. Law enforcement agencies like the FBI can almost always check website user logs to determine the Internet Protocol (IP) address of computers connected to a victim network, but most hackers have ways of disguising their IPs through anonymous routing services like Tor. If a given IP is found to be a mask, the trail can go cold.<\/p>\n<figure id=\"attachment_7861\" aria-describedby=\"caption-attachment-7861\" style=\"width: 404px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-1.45.19-PM.png\"><img decoding=\"async\" class=\"size-full wp-image-7861\" src=\"http:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-1.45.19-PM.png\" alt=\"The error message that greeted followers of a Twitter account linked to the Islamic State of Iraq and Syria. Shortly after ISIS released a video of Jordanian pilot Moath al-Kasasbeh being burned alive, hacker collective Anonymous disabled dozens of the group's social media accounts. \" width=\"404\" height=\"207\" srcset=\"https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-1.45.19-PM.png 404w, https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-1.45.19-PM-300x154.png 300w\" sizes=\"(max-width: 404px) 100vw, 404px\" \/><\/a><figcaption id=\"caption-attachment-7861\" class=\"wp-caption-text\">The error message that greeted followers of a Twitter account linked to the Islamic State of Iraq and Syria. Shortly after ISIS released a video of Jordanian pilot Moath al-Kasasbeh being burned alive, hacker collective Anonymous disabled dozens of the group&#8217;s social media accounts.<\/figcaption><\/figure>\n<p style=\"text-align: left\"><span style=\"line-height: 1.5\">\u201cIt\u2019s very easy to make it look like North Korea hacked Sony,\u201d said Westin. \u201cIt\u2019s very difficult to place a person behind the computer.\u201d<\/span><\/p>\n<p style=\"text-align: left\">The Sony hack could very well inspire a corporate security race-to-the-top now that the American business community fully realizes what is at stake.<\/p>\n<p style=\"text-align: left\"><strong>The New Wild West<\/strong><\/p>\n<p style=\"text-align: left\">Despite our best precautions, the Internet is a difficult world for asserting the rule of law. In some ways, it resembles a digital Old West, where even the good guys resist control. As powerful and resourceful as law enforcement and the business community might be, they will often encounter highly motivated cadres of criminals and net delinquents who know the lay of the land better than they do and whose motives are difficult to rationalize.<\/p>\n<p style=\"text-align: left\">Take, for instance, the <a href=\"https:\/\/twitter.com\/hashtag\/lizardsquad\" target=\"_blank\">Lizard Squad<\/a>, a hacker collective known for temporarily bringing down PlayStation and Xbox by overwhelming them with traffic, a tactic known as a distributed denial-of-service (DDoS) attack. Unlike the Guardians of Peace (who claimed responsibility for the Sony hack) and <a href=\"https:\/\/twitter.com\/hashtag\/anonymous\" target=\"_blank\">Anonymous<\/a> (who are known for their leftist rhetoric), Lizard Squad has no politics, espouses no agenda, defends no state, and collects no money. When Lizard Squad attacked PlayStation on Christmas Day, the motives that surrounded the Sony case were strangely missing.<\/p>\n<p style=\"text-align: left\">\u201cThe DDoS Lizard Squad attack reminds us of something we in security tend to get wrong,\u201d said Cobb. \u201cA lot of what they are doing is because of the fun of it.&#8221;<\/p>\n<div id=\"featurecaption\">\n<p>Photo at top: Creative Commons, <a title=\"Yuri Samoilov\" href=\"https:\/\/www.flickr.com\/photos\/yuri_samoilov\/\">Yuri Samoilov<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>By Zachary Vasile Like birth and death, hacking became a new form of the inevitable in 2014. Of course, it had bubbled to the surface time and again, stewing in and out of personal computers, government databases and the sci-fi imagination. During the last 12 months however, hacking broke through to the banner headlines and [&hellip;]<\/p>\n","protected":false},"author":119,"featured_media":8009,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27,28,29,30,243],"tags":[342,341,343],"class_list":["post-7835","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-general-interest","category-health-and-science","category-public-affairs","category-winter-2015","tag-cyber-security","tag-hacking","tag-sony"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacking - How to fight back and protect yourself - Medill Reports Chicago<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking - How to fight back and protect yourself - Medill Reports Chicago\" \/>\n<meta property=\"og:description\" content=\"By Zachary Vasile Like birth and death, hacking became a new form of the inevitable in 2014. Of course, it had bubbled to the surface time and again, stewing in and out of personal computers, government databases and the sci-fi imagination. During the last 12 months however, hacking broke through to the banner headlines and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"Medill Reports Chicago\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-24T22:11:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-3.33.28-PM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1182\" \/>\n\t<meta property=\"og:image:height\" content=\"501\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"zacharyvasile\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zacharyvasile\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/\",\"url\":\"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/\",\"name\":\"Hacking - How to fight back and protect yourself - Medill Reports Chicago\",\"isPartOf\":{\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-3.33.28-PM.png\",\"datePublished\":\"2015-02-24T22:11:46+00:00\",\"author\":{\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/c46fb0df3709c6340fa24b1335e61d43\"},\"breadcrumb\":{\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/#primaryimage\",\"url\":\"https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-3.33.28-PM.png\",\"contentUrl\":\"https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-3.33.28-PM.png\",\"width\":1182,\"height\":501},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/news.medill.northwestern.edu\/chicago\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking &#8211; How to fight back and protect yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/#website\",\"url\":\"https:\/\/news.medill.northwestern.edu\/chicago\/\",\"name\":\"Medill Reports Chicago\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/news.medill.northwestern.edu\/chicago\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/c46fb0df3709c6340fa24b1335e61d43\",\"name\":\"zacharyvasile\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/79091dfef57940e8a7e8f7bbfb8ed02def20678d307961144d2aa3ee6d0a58d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/79091dfef57940e8a7e8f7bbfb8ed02def20678d307961144d2aa3ee6d0a58d6?s=96&d=mm&r=g\",\"caption\":\"zacharyvasile\"},\"url\":\"https:\/\/news.medill.northwestern.edu\/chicago\/author\/zacharyvasile\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking - How to fight back and protect yourself - Medill Reports Chicago","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/","og_locale":"en_US","og_type":"article","og_title":"Hacking - How to fight back and protect yourself - Medill Reports Chicago","og_description":"By Zachary Vasile Like birth and death, hacking became a new form of the inevitable in 2014. Of course, it had bubbled to the surface time and again, stewing in and out of personal computers, government databases and the sci-fi imagination. During the last 12 months however, hacking broke through to the banner headlines and [&hellip;]","og_url":"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/","og_site_name":"Medill Reports Chicago","article_published_time":"2015-02-24T22:11:46+00:00","og_image":[{"width":1182,"height":501,"url":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-3.33.28-PM.png","type":"image\/png"}],"author":"zacharyvasile","twitter_card":"summary_large_image","twitter_misc":{"Written by":"zacharyvasile","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/","url":"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/","name":"Hacking - How to fight back and protect yourself - Medill Reports Chicago","isPartOf":{"@id":"https:\/\/news.medill.northwestern.edu\/chicago\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-3.33.28-PM.png","datePublished":"2015-02-24T22:11:46+00:00","author":{"@id":"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/c46fb0df3709c6340fa24b1335e61d43"},"breadcrumb":{"@id":"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/#primaryimage","url":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-3.33.28-PM.png","contentUrl":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-content\/uploads\/sites\/3\/2015\/02\/Screen-Shot-2015-02-24-at-3.33.28-PM.png","width":1182,"height":501},{"@type":"BreadcrumbList","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/hacking-how-to-fight-back-and-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.medill.northwestern.edu\/chicago\/"},{"@type":"ListItem","position":2,"name":"Hacking &#8211; How to fight back and protect yourself"}]},{"@type":"WebSite","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/#website","url":"https:\/\/news.medill.northwestern.edu\/chicago\/","name":"Medill Reports Chicago","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.medill.northwestern.edu\/chicago\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/c46fb0df3709c6340fa24b1335e61d43","name":"zacharyvasile","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/79091dfef57940e8a7e8f7bbfb8ed02def20678d307961144d2aa3ee6d0a58d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/79091dfef57940e8a7e8f7bbfb8ed02def20678d307961144d2aa3ee6d0a58d6?s=96&d=mm&r=g","caption":"zacharyvasile"},"url":"https:\/\/news.medill.northwestern.edu\/chicago\/author\/zacharyvasile\/"}]}},"_links":{"self":[{"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/posts\/7835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/comments?post=7835"}],"version-history":[{"count":0,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/posts\/7835\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/media\/8009"}],"wp:attachment":[{"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/media?parent=7835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/categories?post=7835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/tags?post=7835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}