
{"id":2890,"date":"2017-12-28T23:54:44","date_gmt":"2017-12-28T23:54:44","guid":{"rendered":"http:\/\/blogs.plymouth.ac.uk\/dcss\/?p=2890"},"modified":"2017-12-28T23:56:06","modified_gmt":"2017-12-28T23:56:06","slug":"cyberattack-targets-safety-system-at-saudi-aramco","status":"publish","type":"post","link":"https:\/\/blogs.plymouth.ac.uk\/dcss\/2017\/12\/28\/cyberattack-targets-safety-system-at-saudi-aramco\/","title":{"rendered":"CYBERATTACK TARGETS SAFETY SYSTEM AT SAUDI ARAMCO"},"content":{"rendered":"<p><a href=\"http:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-513\" src=\"http:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-1024x670.jpg\" alt=\"\" width=\"560\" height=\"366\" srcset=\"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-1024x670.jpg 1024w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-300x196.jpg 300w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-560x366.jpg 560w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-260x170.jpg 260w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-160x105.jpg 160w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY.jpg 1835w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p>Sourced : Foreign Policy<\/p>\n<p>By Elias Groll<\/p>\n<p>Malicious software attacked a safety system in August at Saudi Aramco, the world\u2019s largest oil company, in what is the first-ever example of malware targeting the computer systems designed to prevent a disaster at an industrial facility.<\/p>\n<p>The attack was first described by the computer security firm FireEye in a blog post last week, which did not name the victim of the attack. But a confidential report obtained by Foreign Policy and authored by Area 1 Security, a computer security firm founded by veterans of the U.S. National Security Agency, identifies Aramco as the victim of the attack.<\/p>\n<p>Read more at : http:\/\/foreignpolicy.com\/2017\/12\/21\/cyber-attack-targets-safety-system-at-saudi-aramco\/?utm_content=bufferf4ee1&amp;utm_medium=social&amp;utm_source=facebook.com&amp;utm_campaign=buffer<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sourced : Foreign Policy By Elias Groll Malicious software attacked a safety system in August at Saudi Aramco, the world\u2019s largest oil company, in what is the first-ever example of malware targeting the computer systems designed to prevent a disaster at an industrial facility. The attack was first described by the computer security firm FireEye&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.plymouth.ac.uk\/dcss\/2017\/12\/28\/cyberattack-targets-safety-system-at-saudi-aramco\/\">Continue reading <span class=\"screen-reader-text\">CYBERATTACK TARGETS SAFETY SYSTEM AT SAUDI ARAMCO<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":513,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[1749,1750],"class_list":["post-2890","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-and-strategy","tag-aramco","tag-fireeye","entry"],"_links":{"self":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/2890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/comments?post=2890"}],"version-history":[{"count":2,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/2890\/revisions"}],"predecessor-version":[{"id":2893,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/2890\/revisions\/2893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/media\/513"}],"wp:attachment":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/media?parent=2890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/categories?post=2890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/tags?post=2890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}