{"id":843415,"date":"2024-08-12T10:49:37","date_gmt":"2024-08-12T05:19:37","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=843415"},"modified":"2024-08-12T10:49:49","modified_gmt":"2024-08-12T05:19:49","slug":"hackers-are-using-this-dangerous-technique-to-attack-computers-running-protected-version-of-windows","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2024\/08\/12\/hackers-are-using-this-dangerous-technique-to-attack-computers-running-protected-version-of-windows\/","title":{"rendered":"Hackers are using this \u2018dangerous\u2019 technique to attack computers running protected version of Windows"},"content":{"rendered":"<p>Even if you have installed all the security updates, hackers can still break into your system and access private data such as photos and passwords, using a new \u2018dangerous\u2019 technique. A cybersecurity researcher recently claimed that there are two zero-day vulnerabilities in Microsoft&#8217;s Windows software that hackers can exploit to target users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even if you have installed all the security updates, hackers can still break into your system and access private data such as photos and passwords, using a new \u2018dangerous\u2019 technique. A cybersecurity researcher recently claimed that there are two zero-day vulnerabilities in Microsoft&#8217;s Windows software that hackers can exploit to target users.<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[87,4,11],"tags":[],"class_list":["post-843415","post","type-post","status-publish","format-standard","hentry","category-it-2-the-times-of-india","category-newspapers","category-the-times-of-india"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/843415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=843415"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/843415\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=843415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=843415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=843415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}