{"id":208514,"date":"2017-02-16T18:12:38","date_gmt":"2017-02-16T23:12:38","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/dnc-hackers-are-using-apple-mac-spyware-code-from-fbi-surveillance-vendor-claims-ex-nsa-researcher-forbes.php"},"modified":"2017-02-16T18:12:38","modified_gmt":"2017-02-16T23:12:38","slug":"dnc-hackers-are-using-apple-mac-spyware-code-from-fbi-surveillance-vendor-claims-ex-nsa-researcher-forbes","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/dnc-hackers-are-using-apple-mac-spyware-code-from-fbi-surveillance-vendor-claims-ex-nsa-researcher-forbes.php","title":{"rendered":"DNC Hackers Are Using Apple Mac Spyware Code From FBI Surveillance Vendor, Claims Ex-NSA Researcher &#8211; Forbes"},"content":{"rendered":"<table border=\"0\" cellpadding=\"2\" cellspacing=\"7\" style=\"vertical-align:top;\"><tr><td width=\"80\" align=\"center\" valign=\"top\"><font style=\"font-size:85%;font-family:arial,sans-serif\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNHQdrfCve2Vb2Sgxeqlv_zQJ2f0qQ&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779383283144&amp;ei=0TGmWLC3EpGo3wGbpYGABg&amp;url=http:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/02\/16\/dnc-fancy-bear-russia-hackers-mac-malware-hacking-team-fbi-fsb\/\"><img loading=\"lazy\" decoding=\"async\" src=\"\/\/t2.gstatic.com\/images?q=tbn:ANd9GcQFC6kzNNdtX3LSwcWT9iX3S2qlbNQZko9dMwQsP8vQ4CMXXRzWNiV0OnwS83kCUIIqG1KHP1XH\" alt=\"\" border=\"1\" width=\"80\" height=\"80\" style=\"padding-left:10px; padding-right: 10px;\"><br><font size=\"-2\">Forbes<\/font><\/a><\/font><\/td><td valign=\"top\" class=\"j\"><font style=\"font-size:85%;font-family:arial,sans-serif\"><div style=\"padding-top:0.8em;\"><img alt=\"\" height=\"1\" width=\"1\" style=\"padding-left:10px; padding-right: 10px;\"><\/div><div class=\"lh\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNHQdrfCve2Vb2Sgxeqlv_zQJ2f0qQ&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779383283144&amp;ei=0TGmWLC3EpGo3wGbpYGABg&amp;url=http:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/02\/16\/dnc-fancy-bear-russia-hackers-mac-malware-hacking-team-fbi-fsb\/\"><b>DNC Hackers Are Using Apple Mac Spyware Code From FBI Surveillance Vendor, Claims Ex-<b>NSA<\/b> Researcher<\/b><\/a><br><font size=\"-1\"><b><font color=\"#6f6f6f\">Forbes<\/font><\/b><\/font><br><font size=\"-1\">Earlier this week, malware said to belong to the Russian group behind the hack of the Democratic National Committee, known as APT28 or Fancy Bear, leaked online. Though novel both for its targeting of Apple Macs and iPhone backups, the surveillance&nbsp;...<\/font><br><font size=\"-1\" class=\"p\"><\/font><br><font class=\"p\" size=\"-1\"><a class=\"p\" href=\"http:\/\/news.google.com\/news\/more?ncl=dc7iAcetQZAZ8HM&amp;authuser=0&amp;ned=us\"><nobr><b>and more&nbsp;&raquo;<\/b><\/nobr><\/a><\/font><\/div><p><\/p><\/font><\/td><\/tr><\/table><p><!-- Auto Generated --><\/p><p>See more here:<\/p><p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/02\/16\/dnc-fancy-bear-russia-hackers-mac-malware-hacking-team-fbi-fsb\/\" title=\"DNC Hackers Are Using Apple Mac Spyware Code From FBI Surveillance Vendor, Claims Ex-NSA Researcher - Forbes\">DNC Hackers Are Using Apple Mac Spyware Code From FBI Surveillance Vendor, Claims Ex-NSA Researcher - Forbes<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p> Forbes DNC Hackers Are Using Apple Mac Spyware Code From FBI Surveillance Vendor, Claims Ex- NSA Researcher Forbes Earlier this week, malware said to belong to the Russian group behind the hack of the Democratic National Committee, known as APT28 or Fancy Bear, leaked online. Though novel both for its targeting of Apple Macs and iPhone backups, the surveillance&nbsp;...  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/dnc-hackers-are-using-apple-mac-spyware-code-from-fbi-surveillance-vendor-claims-ex-nsa-researcher-forbes.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-208514","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/208514"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=208514"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/208514\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=208514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=208514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=208514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}