{"id":4795,"date":"2011-07-08T15:34:00","date_gmt":"2011-07-08T15:34:00","guid":{"rendered":"https:\/\/evssolutions.com\/washington-post-job-website-hacked\/"},"modified":"2011-07-08T15:34:00","modified_gmt":"2011-07-08T15:34:00","slug":"washington-post-job-website-hacked","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/washington-post-job-website-hacked\/","title":{"rendered":"Washington Post Job Website Hacked"},"content":{"rendered":"

The Washington
\nPost<\/a> has reported an unauthorized third party attacked their Jobs website,
\nand the result is an astounding 1.27 million user IDs and e-mail addresses were
\nimpacted. No passwords or other personal information was impacted.\n<\/p>\n

The attack happened once on June 27 and once on June 28. The
\nWashington Post is taking the attack very seriously, shutting the attack down
\nas soon as it was noticed, as well as implementing additional measures to
\nprevent against similar attacks in the future. Law enforcement has been
\ncontacted.<\/p>\n

The users whose e-mail addresses were impacted risk receiving
\nan increased amount of SPAM in their inbox. If you are among the millions of
\npeople who have applied for a position at the Washington Post, your personal
fraud prevention<\/a> measures
\nneed to be on high alert. You pose a greater risk for phishing, which will ask
\nfor personal information. Many times, phishing e-mails appear to come from a
\nreputable organization seeking
identity verification<\/a>
\ninformation, and ask for bank account information, credit card information,
\npasswords and ID numbers.<\/p>\n


<\/p>\n","protected":false},"excerpt":{"rendered":"

The Washington Post has reported an unauthorized third party attacked their Jobs website,
\nand the result is an astounding 1.27 million user IDs and e-mail addresses were
\nimpacted. No passwords or other personal information was impacted.<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37],"tags":[],"class_list":["post-4795","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4795"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4795\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}