{"id":5204,"date":"2014-06-01T12:30:08","date_gmt":"2014-06-01T16:30:08","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=5204"},"modified":"2020-02-26T10:51:01","modified_gmt":"2020-02-26T15:51:01","slug":"security-is-1","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/security-is-1\/5204\/","title":{"rendered":"The \u0421yberworld Survival Guide"},"content":{"rendered":"<p>The end of the world occurred pretty much as we had predicted- too many computers and mobile devices and not enough knowledge to deal with it. The details are trivial and pointless. The reasons, as always, purely human errors. Just one computer worm created by human hands quickly raged out of control. The Internet was overwhelmed, websites crashed. Social networks were swallowed up by fake accounts and users quickly became victims. Unprotected infrastructures crumbled under targeted attacks. Digital humanity was almost extinguished; a quiet darkness fell across the Internet, lasting many years\u2026<\/p>\n<p>Few were able to survive the devastation and reach relative safety. Those that did enclosed all the experiences and lessons they learned into a guide, <em>The \u0421yberworld Survival Guide<\/em>, which will\u00a0help us avoid a\u00a0similar fate.<\/p>\n<p><span style=\"color: #535353\">The entire series of <em>The \u0421yberworld Survival Guide<\/em>\u00a0can be found here:\u00a0<\/span><a style=\"color: #465f9b\" href=\"https:\/\/www.kaspersky.com\/blog\/tag\/securityIS\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/www.kaspersky.com\/blog\/tag\/securityIS<\/a><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/06\/06043237\/BxcBuHDklAZ0K7ZYq5URgnUwozUxlnnjNmh0KFcdu-o1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-5206\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/06\/06043237\/BxcBuHDklAZ0K7ZYq5URgnUwozUxlnnjNmh0KFcdu-o1.png\" alt=\"BxcBuHDklAZ0K7ZYq5URgnUwozUxlnnjNmh0KFcdu-o\" width=\"800\" height=\"565\"><\/a><\/p>\n<p><em><strong>Access denied: Hackers Bob and Rob didn\u2019t know that Jane\u2019s Facebook password was 64 characters long and included a quote from Twilight typed in reverse<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The entire series of The \u0421yberworld Survival Guide can be found here: http:\/\/www.kaspersky.com\/blog\/tag\/securityIS<\/p>\n","protected":false},"author":40,"featured_media":5205,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2684],"tags":[721],"class_list":{"0":"post-5204","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-special-projects","8":"tag-securityis"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-is-1\/5204\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/security-is-1\/3660\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/security-is-1\/3563\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-is-1\/4009\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-is-1\/4254\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security-is-1\/4414\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/security-is-1\/1251\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security-is-1\/4084\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security-is-1\/4414\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-is-1\/5204\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-is-1\/5204\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/securityis\/","name":"SecurityIS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5204"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5204\/revisions"}],"predecessor-version":[{"id":33156,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5204\/revisions\/33156"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5205"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}