{"id":45766,"date":"2022-10-11T17:48:08","date_gmt":"2022-10-11T21:48:08","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=45766"},"modified":"2022-10-11T17:48:57","modified_gmt":"2022-10-11T21:48:57","slug":"outdated-technologies-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/outdated-technologies-cybersecurity\/45766\/","title":{"rendered":"Retro technology and information security"},"content":{"rendered":"<p>In August 2022, Japanese Minister of Digital Affairs, Taro Kono, \u201c<a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/08\/japan-declares-war-on-floppy-disks-for-government-use\/\" target=\"_blank\" rel=\"nofollow noopener\">declared war<\/a>\u201d on old storage media such as floppy disks. The <a href=\"https:\/\/www.digital.go.jp\/assets\/contents\/node\/basic_page\/field_ref_resources\/f0c4ebf4-bd96-49f3-bd84-cb0653629b25\/54d6b1b4\/20220830_meeting_administrative_research_working_group_outline_01.pdf\" target=\"_blank\" rel=\"nofollow noopener\">original<\/a> Japanese-language document provides a simple analysis of Japanese legislation, which to this day still has nearly 1900 references to outdated storage media, most of which belong in a museum. They include ordinary floppy disks, optical recording media, common definitions like \u201cmagneto-optical drive\u201d and even \u201cmagnetic tape\u201d. This means that, in some cases, organizations or individuals need to file certain information on an old medium, which is, to say the least, inconvenient. Diskettes are not mandatory in all cases, but judging by certain statements made by Taro Kono, a relatively recently appointed to his post, retro technology is still used more often in Japan than it should be.<\/p>\n<p>Is using outdated technology a problem? Try to imagine yourself as someone who suddenly needs to file an official document on a floppy disk, with no other option given at all. Could you find at least one floppy disk at home? And how about a floppy-disk drive to put it in? The author of this article has both, so this is being written from the position of unconditional love for retro technology. But it\u2019s important to remember that obsolete tech is simply inconvenient for critical tasks \u2014 and sometimes even unsafe. Let\u2019s try and analyze some of the most well-known cases when old devices turn out to be needed years or decades after they were made.<\/p>\n<h2>Diskettes<\/h2>\n<p><strong>What are they?<\/strong> Among the first data carriers for PCs.<\/p>\n<p>Eight inches in diameter, the first floppy disks were developed in the 1960s. In 1976, smaller 5.25-inch floppy disks were invented. This size was inherited by later optical media such as Blu-Ray disks. In the early 1980s, Sony developed more effective 3.5-inch diskettes, and for most of the 1990s they were the most popular form of data exchange among computer users. The maximum amount of data that fits onto a single 3.5-inch floppy disk is 1.44\u00a0MB. Okay, sometimes you could write more, but now we\u2019re talking about the most compatible version that could be read in the floppy drive of any personal computer 25 years ago.<\/p>\n<div id=\"attachment_45768\" style=\"width: 2570px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/11173945\/outdated-technologies-cybersecurity-floppy.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-45768\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/11173945\/outdated-technologies-cybersecurity-floppy.jpg\" alt=\"Three floppy disk versions: 8-inch, 5.25-inch, and 3.5-inch.\" width=\"2560\" height=\"1243\" class=\"size-full wp-image-45768\"><\/a><p id=\"caption-attachment-45768\" class=\"wp-caption-text\">Three floppy disk versions: 8-inch, 5.25-inch, and 3.5-inch. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Floppy_disk\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a>.<\/p><\/div>\n<p>Floppy disks were so universal for computers in the 1980\u201390s that all other attempts to create something either more reliable or with increased capacity failed to catch on \u2014 until CD-R and CD-RW optical media became available. Even in the early 2000s, a disk drive came as standard on most desktop PCs.<\/p>\n<p>Early attempts to retire floppy disks were made back in the late 1990s: with their revolutionary design, Apple iMacs came with an optical drive only and no disk drive. It was only later \u2014 some 15 years ago \u2014 \u00a0when floppy disks finally did become obsolete. Many Microsoft Word documents couldn\u2019t even fit onto a disk, so it was much easier to save files onto a flash drive or CD. There was also the matter of reliability: floppy disks were known to suddenly lose data when you needed it most.<\/p>\n<p>However, thanks to their long lifespan, floppy disks are still available today. Floppy drives are too. Connected via USB, they are even supported in the latest versions of operating systems. Nevertheless, diskettes today should only be used for exercises in nostalgia. It takes about a minute to save just a megabyte of data to one: embarrassingly slow.<\/p>\n<p>Yet there are times when you <em>have<\/em> to use floppy disks. In 2016, the U.S. issued a rather dull <a href=\"https:\/\/www.gao.gov\/assets\/gao-16-696t.pdf\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a> on a topic familiar to us: on the use of old technology in government institutions, and the need to combat this phenomenon. Certain media outlets extracted a remarkable fact from it. The American nuclear arsenal control system was still using floppy disks, and not the later ones, but the original eight-inch type.<\/p>\n<div id=\"attachment_45769\" style=\"width: 2058px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/11174111\/outdated-technologies-cybersecurity-8-inch.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-45769\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/11174111\/outdated-technologies-cybersecurity-8-inch.jpg\" alt=\"8-inch floppy disks were, until recently, used to control the U.S. nuclear arsenal.\" width=\"2048\" height=\"1365\" class=\"size-full wp-image-45769\"><\/a><p id=\"caption-attachment-45769\" class=\"wp-caption-text\">8-inch floppy disks were, until recently, used to control the U.S. nuclear arsenal. <a href=\"https:\/\/www.nytimes.com\/2019\/10\/24\/us\/nuclear-weapons-floppy-disks.html\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a>.<\/p><\/div>\n<p>In 2019, those <a href=\"https:\/\/www.nytimes.com\/2019\/10\/24\/us\/nuclear-weapons-floppy-disks.html\" target=\"_blank\" rel=\"nofollow noopener\">floppy disks were replaced with more contemporary technology<\/a>, but the system itself, based on an <a href=\"https:\/\/en.wikipedia.org\/wiki\/IBM_Series\/1\" target=\"_blank\" rel=\"nofollow noopener\">IBM Series\/1<\/a> computer from the 1970s, is still in operation. This is a good example why old media is still used. It\u2019s not out of love for antiquity, but because there\u2019s no other option. Specialized computer systems built decades ago are very expensive to replace or modernize, so, as long as an antique does what it needs to do and can be repaired if required, it remains in operation.<\/p>\n<p>Here\u2019s another example. In 2020, Pen Test Partners <a href=\"https:\/\/www.theregister.com\/2020\/08\/10\/boeing_747_floppy_drive_updates_walkthrough\/\" target=\"_blank\" rel=\"nofollow noopener\">examined<\/a> a decommissioned Boeing 747 and found that a floppy drive that was used to update the navigation system. While that was a surprise to safety professionals, for those in aircraft maintenance, it\u2019s all in a day\u2019s work. You can read more about this <a href=\"https:\/\/lx-photos.livejournal.com\/201071.html\" target=\"_blank\" rel=\"nofollow noopener\">here<\/a>, for example.<\/p>\n<div id=\"attachment_45770\" style=\"width: 834px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/11174220\/outdated-technologies-cybersecurity-boeing.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-45770\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/11174220\/outdated-technologies-cybersecurity-boeing.jpg\" alt=\"Boeing 747s still get critical updates via floppy disks.\" width=\"824\" height=\"460\" class=\"size-full wp-image-45770\"><\/a><p id=\"caption-attachment-45770\" class=\"wp-caption-text\">Boeing 747s still get critical updates via floppy disks. <a href=\"https:\/\/www.theverge.com\/2020\/8\/11\/21363122\/boeing-747s-floppy-disc-updates-critical-software\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a>.<\/p><\/div>\n<p>Why does this happen? An airplane has a very long service life \u2014 decades. At the same time, aviation has some of the most stringent safety requirements. During an aircraft\u2019s lifetime, its engines and even parts of its fuselage can be replaced multiple times. But the electronics generally remain intact. Of course, newer aircraft versions no longer use floppy disks. But in older, still reliable and well-maintained aircraft, the computer systems that help pilots usually remain unchanged. Upgrading those computer systems is more difficult because every change requires numerous safety tests. And it doesn\u2019t stop there. Pilots are specifically trained to use avionics of a particular modification. Maintenance specialists at airports and technical centers are trained likewise around the world. So you can\u2019t just update those systems when it takes your fancy. Which means it\u2019s often easier to buy a new aircraft when the time comes to renew the fleet.<\/p>\n<h2>Fax, aka facsimile communication<\/h2>\n<p><strong>What is it?<\/strong> Basically, technology for transmitting copies of documents using a phone line.<\/p>\n<p>Fax machines are a direct descendant of the telegraph \u2014 a method of sending text messages through wires. Both technologies originated in the 19<sup>th<\/sup> century, and by the beginning of the 20th century, the means of sending not just individual letters, but free-form handwritten notes and even photographs, was reasonably well perfected. Commercial use of faxes began about half a century ago. Any consumer or company could then receive and send photocopies of documents over telephone wires.<\/p>\n<div id=\"attachment_45771\" style=\"width: 1363px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/11174304\/outdated-technologies-cybersecurity-fax.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-45771\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/11174304\/outdated-technologies-cybersecurity-fax.jpg\" alt=\"A typical fax machine from the early 1990s.\" width=\"1353\" height=\"888\" class=\"size-full wp-image-45771\"><\/a><p id=\"caption-attachment-45771\" class=\"wp-caption-text\">A typical fax machine from the early 1990s. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fax\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a>.<\/p><\/div>\n<p>Fax evolved in parallel with modems, and many of the later technologies of both these devices had much in common. The fundamental difference was that modems required a computer, but a fax was a self-sufficient machine. Many modems, with a special program on a PC, could act as a fax machine. In today\u2019s terms, a fax machine contained a document scanner, a printer, and a modem. If you needed to send a document, you scanned it, entered the recipient\u2019s phone number, and a digital copy (in rather average quality, usually monochrome) was wired.<\/p>\n<p>Before the arrival of the internet, this was quite a reliable way of document sharing over distances. Potential clients could get a price list, or a copy of a contract, and it could be sent back signed and stamped. Curiously, still today in some countries a signed document sent by fax is considered legally <a href=\"https:\/\/www.efax.com\/uk\/blog\/why-fax-is-legally-binding\" target=\"_blank\" rel=\"nofollow noopener\">binding<\/a>, whereas that same document, signed, scanned and sent by e-mail, may not be counted as evidence in court, for example.<\/p>\n<p>There\u2019s not a single reason to use a fax machine in the 21<sup>st<\/sup> century. It\u2019s easier to send a document by e-mail or take a photo and share it in a messenger. If you need to verify the identity of a document\u2019s creator, there\u2019s electronic digital signature technology. Nevertheless, faxes are still used rather a lot in some regions, including in Japan. There, employees not having a fax at home ran into work communication <a href=\"https:\/\/mainichi.jp\/english\/articles\/20200426\/p2g\/00m\/0na\/040000c\" target=\"_blank\" rel=\"nofollow noopener\">issues<\/a> during the covid-19 pandemic. It turned out that for many it\u2019s difficult to change established communication processes with clients or colleagues, without losing necessary contacts; it\u2019s easier to continue using outdated technology. In addition, the age factor plays a role for fax machines: the older people get, the harder it is for them to master new computer systems; while the old ones \u201cwork just fine\u201d.<\/p>\n<p>The fax machine in our top-4 is probably the simplest retro-technology of all four. If for some reason you need to use one, you can have a real machine in the office. But you can also fully emulate a fax on a virtual server. It\u2019s connected to a virtual phone line, and is in fact a simple data transmission channel over the internet. So, unlike with aircraft, it\u2019s possible to place legacy tech on a modern track, where it works with no trouble.<\/p>\n<h2>Typewriter<\/h2>\n<p><strong>What is it?<\/strong> Essentially, an ancient text processor: a way of creating typewritten manuscripts, and one of the oldest technologies that seriously influenced the evolution of computers.<\/p>\n<p>The typewriter is a great technological achievement, and was almost fully formed at the end of the 19<sup>th<\/sup> century. Every computer has vestiges of this earlier development. The typical QWERTY layout was standardized in the 1890s. The <em>shift<\/em> key gets its name from a mechanical function in a typewriter, where the whole set of bits that print characters on paper through an ink ribbon is shifted upward to type capital letters. Typing was the first thing that personal computers made more convenient in the 1970s and 1980s. On some electronic typewriters, you could enter and edit a single line of text on a small character display, if required. A computer allows you to create an entire multi-page document before printing it off. It can contain characters from different alphabets. And not just letters, but graphics, and even images. You don\u2019t even have to print the document on a printer: you can send it to an editor, boss or client electronically. On a floppy disk, for example!<\/p>\n<div id=\"attachment_45772\" style=\"width: 1510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/11174354\/outdated-technologies-cybersecurity-typewriter.jpeg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-45772\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/11174354\/outdated-technologies-cybersecurity-typewriter.jpeg\" alt=\"A typical mechanical typewriter from the 1970s.\" width=\"1500\" height=\"879\" class=\"size-full wp-image-45772\"><\/a><p id=\"caption-attachment-45772\" class=\"wp-caption-text\">A typical mechanical typewriter from the 1970s. <a href=\"https:\/\/habr.com\/ru\/company\/kaspersky\/blog\/574026\/\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a>.<\/p><\/div>\n<p>Still, mechanical typewriters do have important advantages: they can be operated without electricity, they cannot be infected with a virus, and their data storage device won\u2019t fail. However, documents are more likely to be damaged by fire, flood or small rodents. After numerous scandals related to cyber-espionage, some media reported that certain state authorities of different countries (for example, <a href=\"https:\/\/www.theguardian.com\/world\/2013\/jul\/11\/russia-reverts-paper-nsa-leaks\" target=\"_blank\" rel=\"nofollow noopener\">Russia<\/a> and <a href=\"https:\/\/www.theguardian.com\/world\/2014\/jul\/15\/germany-typewriters-espionage-nsa-spying-surveillance\" target=\"_blank\" rel=\"nofollow noopener\">Germany<\/a>) were buying typewriters to handle the most sensitive information.<\/p>\n<p>Indeed, you could say that the most secure computer is no computer at all. And in some cases, this level of information protection is probably entirely justified. But for mere mortals, the typewriter has long been an artifact from the past, used for entertainment or creating a special atmosphere of creativity. You cannot be distracted by pictures from social networks if your \u201cword processor\u201d can\u2019t connect to the internet.<\/p>\n<p>A notable fact is that a typewriter may be safe from a cyberattack, but it does not ensure anonymity. In the event of an investigation, it\u2019s easy enough to match a document to a particular typewriter based on minor defects in the typed characters, or even by the way a particular person hits the keys.<\/p>\n<h2>Old computers<\/h2>\n<p>Outside specialized systems, outdated government procedures and the like, most retro technologies need to be used for the two reasons already described above; that is, either moving over to new hardware is very expensive, or just inconvenient as everyone is set in their ways.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/6LxPEz9x2fs?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Last year, a YouTuber <a href=\"https:\/\/www.pcgamer.com\/dutch-legend-has-been-running-his-campsite-since-1986-using-an-atari-st\/\" target=\"_blank\" rel=\"nofollow noopener\">described<\/a> how an elderly campsite owner still uses an Atari ST from 1986 to run his business. Frans Bos, from the Netherlands, wrote his own software to keep track of visitors, bookkeeping, and other things. And still today (or at least in 2021 when the video was shot) he still uses his ancient software, because \u201cit does the job\u201d.<\/p>\n<p>There are more complicated, more common, and considerably less romantic examples. A machine-tool controlled by software written for MS-DOS and thus only working with a corresponding PC, for example. Also, this is extremely common when it comes to servicing relatively old cars. They have a built-in computer, but the software to communicate with it requires Windows 98 or Windows XP, and preferably with hardware from twenty years ago. Even large car manufacturers are forced to keep ancient PCs in stock, just in case a customer comes to them with a repair request.<\/p>\n<p>Legacy technology is used plenty in industry, where computerized devices cost millions or tens of millions of dollars and last for decades. At the other end of the spectrum, you will often find a laptop from the early 2000s running long-unsupported diagnostic programs at your nearest car service center. Often hidden from sight, ancient technology is at work in organizations. Somewhere in a dusty closet, a system administrator\u2019s PC from the 1990s is doing its thing with software written by someone who has long since retired. And only when it gets accidentally unplugged does it become clear that a company\u2019s profits are bound to this museum piece.<\/p>\n<h2>Advanced protection of junk<\/h2>\n<p>Let\u2019s look at all these artifacts from a security perspective. Is it possible to transmit a malicious file on a floppy disk? Yes, easily, and that\u2019s actually how viruses started to spread \u2014 even before the internet era. Yet modern malicious code might not fit onto a floppy disk, as some malware now takes up dozens of megabytes. Ancient malware, on the contrary, may not run on modern operating systems.<\/p>\n<p>Perhaps the greatest danger is posed by \u201csimply old computers\u201d, especially if they\u2019re connected to a company\u2019s local network or even the internet. Older operating systems, like Windows XP, have not received updates for many years. On the other hand, vulnerabilities in them are well known. Yes, a would-be hacker would likely have to bone up on the equipment to hack such an ancient PC. But it wouldn\u2019t take long. And there are plenty of ready-made tools to exploit the numerous holes in the software.<\/p>\n<p>Thus, it\u2019s easy to imagine how a hacker could gain access to an entire enterprise network using an outdated and vulnerable computer, even if the rest of the infrastructure is up to date. Perhaps the greatest danger from such a scenario is posed for medical institutions. Reliable and still current devices for diagnosing patients, monitoring pulse, temperature and blood pressure, and regulating medication, all run on outdated software. Maliciously disabling such systems, for example in order to demand a ransom, could cost someone\u2019s life. So, floppy disks are not the problem. They\u2019re just inconvenient to handle. The real problem is that floppy disks usually come with an outdated computer.<\/p>\n<p>If the use of such old systems is vital, then it\u2019s imperative to isolate them from the rest of the network so that they\u2019re not the Achilles heel of the entire IT infrastructure. It\u2019s desirable to use a security solution that can at least scan archived data carriers and is able to neutralize malware of the appropriate age. <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky solutions<\/a> do an excellent job of this, most often identifying viruses of the past through behavioral analysis.<\/p>\n<p>It can be difficult to part with familiar work tools you\u2019ve had years. But sometimes it\u2019s simply necessary when an old solution, by definition, no longer provides the necessary level of security. Despite the fact that modern software and services are taking up more disk space over time and requiring ever more powerful hardware, they also provide increased reliability in most cases. For example, it might be a simple data backup, unattainable in the case of a paper archive of typewritten documents. Finally, we have some useful advice. If the authorities in your country require you to use floppy disks, keep them away from smartphones \u2014 especially the latest iPhone models. The powerful magnets hidden in a phone case can accidentally wipe all the data stored on an old disk!\u2026<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-top3\">\n","protected":false},"excerpt":{"rendered":"<p>The top-4 technologies in use today that long belong in a museum.<\/p>\n","protected":false},"author":665,"featured_media":45767,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,3052],"tags":[36,321,154],"class_list":{"0":"post-45766","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-malware-2","11":"tag-technology","12":"tag-viruses"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/outdated-technologies-cybersecurity\/45766\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/outdated-technologies-cybersecurity\/24755\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/outdated-technologies-cybersecurity\/20233\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/outdated-technologies-cybersecurity\/27230\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/outdated-technologies-cybersecurity\/25083\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/outdated-technologies-cybersecurity\/25434\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/outdated-technologies-cybersecurity\/27982\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/outdated-technologies-cybersecurity\/34098\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/outdated-technologies-cybersecurity\/11107\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/outdated-technologies-cybersecurity\/19626\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/outdated-technologies-cybersecurity\/20198\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/outdated-technologies-cybersecurity\/29418\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/outdated-technologies-cybersecurity\/32725\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/outdated-technologies-cybersecurity\/25515\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/outdated-technologies-cybersecurity\/31130\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/outdated-technologies-cybersecurity\/30820\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/technology\/","name":"Technology"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/45766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=45766"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/45766\/revisions"}],"predecessor-version":[{"id":45774,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/45766\/revisions\/45774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/45767"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=45766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=45766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=45766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}