{"id":58,"date":"2014-04-23T10:04:59","date_gmt":"2014-04-23T14:04:59","guid":{"rendered":"http:\/\/blogs.bu.edu\/best\/?p=58"},"modified":"2014-06-03T10:14:54","modified_gmt":"2014-06-03T14:14:54","slug":"on-social-engineering","status":"publish","type":"post","link":"https:\/\/blogs.bu.edu\/best\/?p=58","title":{"rendered":"On Social Engineering"},"content":{"rendered":"<p>I never thought that the Boston Globe will quote me on &#8220;Social Engineering&#8221; &#8212; but that&#8217;s what they decided to pick out of a long interview for their article\u00a0\u201c<a href=\"http:\/\/www.bostonglobe.com\/lifestyle\/2014\/04\/22\/even-more-personal-data-stolen-online-password-fatigue-grows\/i9tsZCA6CR60WqWnzodNCI\/story.html\">Around Internet, password fatigue setting in\u00a0Protection becomes a not-so-secret frustration<\/a>\u201d&#8230;<\/p>\n<blockquote><p>E-mail access in particular is a gateway to other sites because it contains so much personal information, and hackers can exploit a that weak link to work their way into a more lucrative target, such as a bank account, said Azer Bestavros, a professor of computer science at Boston University.<\/p>\n<p>\u201cIt\u2019s called \u2018social engineering,\u2019 \u201d he said. \u201cYou could be part of a bigger plot. They use you as a step in a bigger scheme. This is why a person who would appear to be totally average could be useful to a hacker.\u201d<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>I never thought that the Boston Globe will quote me on &#8220;Social Engineering&#8221; &#8212; but that&#8217;s what they decided to pick out of a long interview for their article\u00a0\u201cAround Internet, password fatigue setting in\u00a0Protection becomes a not-so-secret frustration\u201d&#8230; E-mail access in particular is a gateway to other sites because it contains so much personal information, [&hellip;]<\/p>\n","protected":false},"author":2093,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/posts\/58"}],"collection":[{"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/users\/2093"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=58"}],"version-history":[{"count":2,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/posts\/58\/revisions"}],"predecessor-version":[{"id":64,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=\/wp\/v2\/posts\/58\/revisions\/64"}],"wp:attachment":[{"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=58"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.bu.edu\/best\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}