{"id":4795,"date":"2011-07-08T15:34:00","date_gmt":"2011-07-08T15:34:00","guid":{"rendered":"https:\/\/evssolutions.com\/washington-post-job-website-hacked\/"},"modified":"2011-07-08T15:34:00","modified_gmt":"2011-07-08T15:34:00","slug":"washington-post-job-website-hacked","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/washington-post-job-website-hacked\/","title":{"rendered":"Washington Post Job Website Hacked"},"content":{"rendered":"
The Washington The attack happened once on June 27 and once on June 28. The The users whose e-mail addresses were impacted risk receiving The Washington Post has reported an unauthorized third party attacked their Jobs website,
\nPost<\/a> has reported an unauthorized third party attacked their Jobs website,
\nand the result is an astounding 1.27 million user IDs and e-mail addresses were
\nimpacted. No passwords or other personal information was impacted.\n<\/p>\n
\nWashington Post is taking the attack very seriously, shutting the attack down
\nas soon as it was noticed, as well as implementing additional measures to
\nprevent against similar attacks in the future. Law enforcement has been
\ncontacted.<\/p>\n
\nan increased amount of SPAM in their inbox. If you are among the millions of
\npeople who have applied for a position at the Washington Post, your personal fraud prevention<\/a> measures
\nneed to be on high alert. You pose a greater risk for phishing, which will ask
\nfor personal information. Many times, phishing e-mails appear to come from a
\nreputable organization seeking identity verification<\/a>
\ninformation, and ask for bank account information, credit card information,
\npasswords and ID numbers.<\/p>\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
\nand the result is an astounding 1.27 million user IDs and e-mail addresses were
\nimpacted. No passwords or other personal information was impacted.<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37],"tags":[],"class_list":["post-4795","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4795"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4795\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}