{"id":287211,"date":"2018-02-21T11:23:12","date_gmt":"2018-02-21T17:23:12","guid":{"rendered":"http:\/\/itblog.lcisd.net\/?p=287211"},"modified":"2018-02-21T11:23:12","modified_gmt":"2018-02-21T17:23:12","slug":"malware-of-the-month","status":"publish","type":"post","link":"https:\/\/itblog.lcisd.net\/?p=287211","title":{"rendered":"Malware of the Month"},"content":{"rendered":"<h2>Be survey savvy!<\/h2>\n<p>Some scammers are using surveys to attack unsuspecting victims. Picture this: You receive an email from an unfamiliar source requesting your participation in a survey. When you click on the link that will take you to the survey, malware is installed on your computer, opening the door for attackers to watch everything you do, collecting your passwords and banking information. Attackers then use this information to make purchases on your credit card and eventually steal your identity.<\/p>\n<p>To keep yourself safe, never fill out a survey you\u2019re not expecting. If you\u2019re not sure if a survey is legitimate, steer clear. The reward you may be offered for filling it out is simply not worth the risk.<\/p>\n<p><a href=\"http:\/\/\u201cYou are cruising along, and then technology changes. You have to adapt.\u201d \u2013Marc Andreessen, co-founder of Mosaic and Netscape web browsers\" target=\"_blank\" rel=\"noopener\">Skyward Newsletter<\/a><\/p>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Be survey savvy! Some scammers are using surveys to attack unsuspecting victims. Picture this: You receive an email from an unfamiliar source requesting your participation in a survey. When you click on the link that will take you to the<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-287211","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts\/287211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=287211"}],"version-history":[{"count":5,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts\/287211\/revisions"}],"predecessor-version":[{"id":287216,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts\/287211\/revisions\/287216"}],"wp:attachment":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=287211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=287211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=287211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}