{"id":87,"date":"2017-11-07T19:19:38","date_gmt":"2017-11-07T19:19:38","guid":{"rendered":"http:\/\/lucidtechnology.net\/web\/?p=87"},"modified":"2017-11-07T19:23:19","modified_gmt":"2017-11-07T19:23:19","slug":"why-are-hackers-always-trying-to-break-into-your-network","status":"publish","type":"post","link":"http:\/\/lucidtechnology.net\/web\/news\/why-are-hackers-always-trying-to-break-into-your-network\/","title":{"rendered":"Hacker Motivations"},"content":{"rendered":"<p><a href=\"http:\/\/voices.washingtonpost.com\/securityfix\/2009\/05\/the_scrap_value_of_a_hacked_pc.html\">Computer users often dismiss Internet security best practices because they find them inconvenient, or because they think the rules don&#8217;t apply to them. Many cling to the misguided belief that because they don&#8217;t bank or shop online, that bad guys won&#8217;t target them. The next time you hear this claim, please refer the misguided person to this blog post, which attempts to examine some of the more common &#8212; yet often overlooked &#8212; ways that cyber crooks can put your PC to criminal use.<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer users often dismiss Internet security best practices because they find them inconvenient, or because they think the rules don&#8217;t apply to them. Many cling to the misguided belief that because they don&#8217;t bank or shop online, that bad guys won&#8217;t target them. The next time you hear this claim, please refer the misguided person&hellip;<\/p>\n<p class=\"more-link\"><a href=\"http:\/\/lucidtechnology.net\/web\/news\/why-are-hackers-always-trying-to-break-into-your-network\/\" class=\"themebutton2\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[10],"_links":{"self":[{"href":"http:\/\/lucidtechnology.net\/web\/wp-json\/wp\/v2\/posts\/87"}],"collection":[{"href":"http:\/\/lucidtechnology.net\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/lucidtechnology.net\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/lucidtechnology.net\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/lucidtechnology.net\/web\/wp-json\/wp\/v2\/comments?post=87"}],"version-history":[{"count":6,"href":"http:\/\/lucidtechnology.net\/web\/wp-json\/wp\/v2\/posts\/87\/revisions"}],"predecessor-version":[{"id":93,"href":"http:\/\/lucidtechnology.net\/web\/wp-json\/wp\/v2\/posts\/87\/revisions\/93"}],"wp:attachment":[{"href":"http:\/\/lucidtechnology.net\/web\/wp-json\/wp\/v2\/media?parent=87"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/lucidtechnology.net\/web\/wp-json\/wp\/v2\/categories?post=87"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/lucidtechnology.net\/web\/wp-json\/wp\/v2\/tags?post=87"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}