{"id":61035,"date":"2015-03-13T15:44:35","date_gmt":"2015-03-13T19:44:35","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/human-firewall-in-countering-cyber-attacks\/"},"modified":"2015-03-13T15:44:35","modified_gmt":"2015-03-13T19:44:35","slug":"human-firewall-in-countering-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/post-human\/human-firewall-in-countering-cyber-attacks\/","title":{"rendered":"Human firewall in countering cyber attacks"},"content":{"rendered":"<p><p>    David Freer  <\/p>\n<p>    The Jakarta Post  <\/p>\n<p>    Publication Date : 13-03-2015  <\/p>\n<\/p>\n<p>    Indonesias Central Statistics Agency records over 80 million    internet users within the country, which is the sixth largest    amount of users globally. Unfortunately, the high internet    penetration is also accompanied by low awareness of looming    security threats.  <\/p>\n<p>    According to Indonesias communications and information    ministry, there have been 36.6 million cyber-attacks in    Indonesia in the past three years. Most of the recorded attacks    are attempts at data theft.  <\/p>\n<p>    Not only are corporations and government institutions affected,    but every other Indonesian is also susceptible to this type of    attack on a daily basis.  <\/p>\n<p>    You may have encountered an SMS malware circulating with the    following message: Congratulations you won a prize! Please    call us to claim your prize! accompanied by an illegitimate    phone number getting people to transfer money, or an email that    prompts internet users to install an app which actually leads    them to download malware. These types of threats may happen to    the best of us, and they share one common theme  exploiting    the human subconscious.  <\/p>\n<p>    Many people may be familiar with renowned psychologist Robert    Cialdinis Six Principles of Influence. In its most basic    form, Cialdini offers a step-by-step psychological guide to    getting people to say yes. Very effective in the workplace or    that crucial sales meeting, but these principles arent    necessarily confined to the noble quest of better business.    In fact, cybercriminals are now swotting the latest social    psychology tactics in order to get their hands on your data.  <\/p>\n<p>    The prevalence of social engineering in many publicly disclosed    cyber-attacks demonstrates either an inherent weakness in the    acumen of victims to identify malicious communications, or that    cyber criminals are using more complex methods to bypass the    human firewall.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/asianewsnetwork.feedsportal.com\/c\/33359\/f\/566601\/s\/4457efeb\/sc\/30\/l\/0L0Sasianewsnet0Bnet0Cnews0E727710Bhtml\/story01.htm\/RK=0\/RS=nE6wiw_Ve9uSAN9pLIA2C18qS0I-\" title=\"Human firewall in countering cyber attacks\">Human firewall in countering cyber attacks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> David Freer The Jakarta Post Publication Date : 13-03-2015 Indonesias Central Statistics Agency records over 80 million internet users within the country, which is the sixth largest amount of users globally. Unfortunately, the high internet penetration is also accompanied by low awareness of looming security threats. According to Indonesias communications and information ministry, there have been 36.6 million cyber-attacks in Indonesia in the past three years.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/post-human\/human-firewall-in-countering-cyber-attacks\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-61035","post","type-post","status-publish","format-standard","hentry","category-post-human"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/61035"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=61035"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/61035\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=61035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=61035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=61035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}