Linux devices 'increasingly' under attack from hackers, warn security researchers

Linux devices 'increasingly' under attack from hackers, warn security researchers

Home Innovation Security
Linux devices 'increasingly' under attack from hackers, warn security researchers
Ransomware groups want to make as much money as possible - that means they're going after more varied targets.
Sept. 1, 2022
Image: Getty
There's been a big rise in ransomware attacks targeting Linux as cyber criminals look to expand their options and exploit an operating system that is often overlooked when businesses think about security.
According to analysis by cybersecurity researchers at Trend Micro , Linux servers are "increasingly coming under fire" from ransomware attacks , with detections up by 75% over the course of the last year as cyber criminals look to expand their attacks beyond Windows operating systems. 
Linux powers important enterprise IT infrastructure including servers, which makes it an attractive target for ransomware gangs – particularly when a perceived lack of threat to Linux systems compared with Windows means that cybersecurity teams might choose to focus on defending Windows networks against cybercrime.  
High-tech computer digital technology, global surveillance
","tags":[],"size":438466,"width":1366,"height":768,"author":{"id":"558be1a5-10d8-11e4-9732-00505685119a","username":"AlysonWindsor","email":"awindsor@redventures.com","firstName":"Alyson","middleName":null,"lastName":"Windsor","dateCreated":{"date":"2014-06-17 00:00:00","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-05 16:14:00","timezone":"UTC","timezone_type":3},"ursId":"25524844979454957457847746312360","roles":[{"name":"CMS User","role":"ROLE_CMS_USER"},{"name":"Meet the Team (US)","role":"ROLE_MEET_THE_TEAM_(US)"},{"name":"Super Admin","role":"ROLE_SUPER_ADMIN"}],"profiles":{"data":[{"id":"55932cac-10d8-11e4-9732-00505685119a","dateCreated":{"date":"2014-06-17 14:16:49","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-25 22:02:01","timezone":"UTC","timezone_type":3},"language":"en","title":"Managing Editor","byline":"Aly is a managing editor at ZDNET based in Winston-Salem, N.C.","bureau":"US","authorBio":"Aly has worn many hats since joining ZDNET in 2014. She is currently a managing editor, leading ZDNET's Advice team, and is based in Winston-Salem, North Carolina.","expertise":null,"awardsAndCredentials":null,"education":"B.A. in English, Creative Writing","authorDisclosure":"Aly does not have financial holdings that would influence how or what she covers.","typeName":"user_user_profile"}],"paging":{"total":1,"limit":15,"offset":0}},"profile":{"id":"55932cac-10d8-11e4-9732-00505685119a","dateCreated":{"date":"2014-06-17 14:16:49","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-25 22:02:01","timezone":"UTC","timezone_type":3},"language":"en","title":"Managing Editor","byline":"Aly is a managing editor at ZDNET based in Winston-Salem, N.C.","bureau":"US","authorBio":"Aly has worn many hats since joining ZDNET in 2014. She is currently a managing editor, leading ZDNET's Advice team, and is based in Winston-Salem, North Carolina.","expertise":null,"awardsAndCredentials":null,"education":"B.A. in English, Creative Writing","authorDisclosure":"Aly does not have financial holdings that would influence how or what she covers.","typeName":"user_user_profile"},"socialProfileIds":{"facebookProfile":null,"facebookPage":null,"twitter":null,"googlePlus":null,"instagram":null},"suppressProfile":false,"editions":[],"defaultTimezone":"America/New_York","cmsDisplayName":"Alyson Windsor","authorBlogs":[],"language":"en","title":"Managing Editor","byline":"Aly is a managing editor at ZDNET based in Winston-Salem, N.C.","bureau":"US","authorBio":"Aly has worn many hats since joining ZDNET in 2014. She is currently a managing editor, leading ZDNET's Advice team, and is based in Winston-Salem, North Carolina.","expertise":null,"awardsAndCredentials":null,"education":"B.A. in English, Creative Writing","authorDisclosure":"Aly does not have financial holdings that would influence how or what she covers."},"dateCreated":{"date":"2017-12-15 14:33:52","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-07-21 14:45:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image/jpeg","deleted":false,"credits":"Getty Images/iStockphoto","alt":"spy-big-brother-digital-surveillance-istock.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"label":null,"linkText":null,"linkUrl":null,"preferredProductName":null,"promoDek":"Surveillance apps are becoming more advanced. Here's what to do if you think you're being tracked.","promoTitle":null,"slug":"how-to-find-and-remove-spyware-from-your-phone","title":"How to find and remove spyware from your phone","topic":{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"ae164b3d-9f4e-461e-8353-db202258465a","deleted":false,"leaf":true,"topicPath":[{"id":"9d3e6108-0023-11e4-95d2-02911863765e","name":"Innovation","typeName":"content_topic","slug":"innovation","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"4c7171e8-08ca-11e4-9732-00505685119a","name":"Innovation","description":"Discover the best technology ideas emerging from around the globe and how they are promising to help build a better future.","language":"en","slug":"innovation","vanityUrl":null,"typeName":"content_topic_language"}]},{"id":"113c25b6-ec91-11e3-95d2-02911863765e","name":"Security","typeName":"content_topic","slug":"security","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"81e128a0-08ca-11e4-9732-00505685119a","name":"Security","description":"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.","language":"en","slug":"security","vanityUrl":null,"typeName":"content_topic_language"}]}],"descendantCount":0,"type":{"id":"31bc3a04-c7a0-4fc1-b073-372a09f0cb0c","title":"Content","description":"Content","dateUpdated":null,"typeName":"content_topic_type"},"authors":{"data":[],"paging":{"total":0,"limit":15,"offset":0}},"editions":{"data":[{"topic":"ae164b3d-9f4e-461e-8353-db202258465a","edition":{"key":"as","label":"Asia","prefix":"as/","lang":"en","translationLocale":"en_SG","locales":["fa-af","hy-am","az-az","bn-bd","dz-bt","ms-bn","zh-cn","km-kh","en-hk","zh-hk","in-id","ja-jp","kk-kz","ky-kg","lo-la","ms-my","dv-mv","mm-mn","my-mm","ne-np","kr-kp","en-pk","en-ph","en-sg","si-lk","ko-kr","tg-tj","zh-tw","th-th","pt-tl","tk-tm","uz-uz","vi-vn"],"timezone":"Asia/Singapore","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"Asia Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"031e73d9-b911-4809-8ec4-774466c92aec","typeName":"content_topic_edition"},{"topic":"ae164b3d-9f4e-461e-8353-db202258465a","edition":{"key":"in","label":"India","prefix":"in/","lang":"en","translationLocale":"en_IN","locales":["en-in"],"timezone":"Asia/Kolkata","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"India Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"2181cc70-f3e2-4021-b6e6-ab8a67ef674b","typeName":"content_topic_edition"},{"topic":"ae164b3d-9f4e-461e-8353-db202258465a","edition":{"key":"uk","label":"UK","prefix":"uk/","lang":"en","translationLocale":"en_GB","locales":["en-gb","en-ie","en-za","ka-ge","fa-ir","ar-iq","he-il","ar-jo","ar-kw","ar-lb","ar-om","ar-ps","ar-qa","ar-sa","ar-sy","ar-ae","ar-ye"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"UK Edition","currency_name":"STG","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"24a46875-e41b-4444-a278-ae0ccff93c3b","typeName":"content_topic_edition"},{"topic":"ae164b3d-9f4e-461e-8353-db202258465a","edition":{"key":"au","label":"AU","prefix":"au/","lang":"en","translationLocale":"en_AU","locales":["en-au","en-nz"],"timezone":"Australia/Sydney","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"AU Edition","currency_name":"AUD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"7a0c3d44-3af2-4f0a-a596-01547037930d","typeName":"content_topic_edition"},{"topic":"ae164b3d-9f4e-461e-8353-db202258465a","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"d778f4ad-c28d-4080-b073-703d627601a0","typeName":"content_topic_edition"},{"topic":"ae164b3d-9f4e-461e-8353-db202258465a","edition":{"key":"eu","label":"EU","prefix":"eu/","lang":"en","translationLocale":"en_GB","locales":["de-at","ar-bh","en-be","bg-bg","el-cy","cs-cz","da-dk","pt-pl","et-ee","fi-fi","fr-fr","de-de","el-gr","hu-hu","it-it","lv-lv","lt-lt","de-lu","fr-lu","en-mt","nl-nl","pl-pl","pt-pt","ro-ro","sk-sk","sl-sl","es-es","sv-se","fr-ch","de-ch","tr-tk"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"EU Edition","currency_name":"Euro","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"ec62fbfa-4bc1-4a62-8400-3d9bf06d032c","typeName":"content_topic_edition"}],"paging":{"total":6,"limit":15,"offset":0}},"languages":{"data":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"1bdd8243-8f5a-4326-a01f-18d6adf4a50a","name":"Cyber Threats","description":null,"language":"en","slug":"cyber-threats","vanityUrl":null,"typeName":"content_topic_language"}],"paging":{"total":1,"limit":15,"offset":0}},"name":"Cyber Threats","description":null,"slug":"cyber-threats","landingPage":null,"listingPage":null,"typeName":"content_topic"},"typeName":"content_article"},{"body":null,"dek":"What is the best VPN overall? Our top pick is ExpressVPN because of its performance. We researched and analyzed the top VPN services -- with a focus on the number of servers in the network, level of encryption, ability to unlock streaming services, and compatibility with phones, computers, and TVs.","description":"What is the best VPN overall? Our top pick is ExpressVPN because of its performance. We researched and analyzed the top VPN services -- with a focus on the number of servers in the network, level of encryption, ability to unlock streaming services, and compatibility with phones, computers, and TVs.","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"image":{"id":"a6a8626e-4c3c-4d87-b968-c7fdbe1019dd","title":"Best VPN service","filename":"best-vpn-service.jpg","path":"https://www.zdnet.com/a/img/2022/08/04/a6a8626e-4c3c-4d87-b968-c7fdbe1019dd/best-vpn-service.jpg","caption":"
","tags":[],"size":543205,"width":1296,"height":729,"author":{"id":"781a4b26-f4ec-4df5-84ed-c2775cdfd86f","username":"ebetters","email":"epicaro@redventures.com","firstName":"Elyse","middleName":null,"lastName":"Betters Picaro","dateCreated":{"date":"2016-06-21 00:00:00","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-05 16:27:43","timezone":"UTC","timezone_type":3},"ursId":"27051783234840286590268119258902","roles":[{"name":"CMS User","role":"ROLE_CMS_USER"},{"name":"Super Admin","role":"ROLE_SUPER_ADMIN"}],"profiles":{"data":[{"id":"84c775b4-26e4-4285-a0cb-ab642b885442","dateCreated":{"date":"2016-06-21 15:54:31","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-06-10 03:03:07","timezone":"UTC","timezone_type":3},"language":"en","title":"Senior Editor","byline":"Elyse Betters Picaro is an editor based in New York.","bureau":"US","authorBio":"Elyse Betters Picaro is a senior editor based in Upstate New York. \r\n\r\nShe currently leads a team of journalists who write buyer's guides, deals, and gift guides. She has experience editing countless advice pieces and has written over 8,000 articles -- including news, how-tos, explainers, and reviews on technology and even TV and entertainment-focused content -- for several leading online publications. \r\n\r\nPreviously, she was an editor at 9to5Mac and 9to5Google. She was also a US contributor at Pocket-lint. Before that, she worked as a beat reporter at different regional newspapers in Northeast America and freelanced for global websites such as the BBC. \r\n\r\nShe holds a Master of Fine Arts in writing from The New School in Manhattan and a Bachelor of Arts in journalism from the University of Massachusetts at Amherst.","expertise":"Consumer technology, mobile apps, TV and streaming services, mobile devices, software and services, and e-commerce","awardsAndCredentials":null,"education":"Master of Fine Arts in writing (2014) from The New School in Manhattan and a Bachelor of Arts in journalism (2011) from the University of Massachusetts at Amherst","authorDisclosure":"Elyse Betters Picaro has nothing to disclose.","typeName":"user_user_profile"}],"paging":{"total":1,"limit":15,"offset":0}},"profile":{"id":"84c775b4-26e4-4285-a0cb-ab642b885442","dateCreated":{"date":"2016-06-21 15:54:31","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-06-10 03:03:07","timezone":"UTC","timezone_type":3},"language":"en","title":"Senior Editor","byline":"Elyse Betters Picaro is an editor based in New York.","bureau":"US","authorBio":"Elyse Betters Picaro is a senior editor based in Upstate New York. \r\n\r\nShe currently leads a team of journalists who write buyer's guides, deals, and gift guides. She has experience editing countless advice pieces and has written over 8,000 articles -- including news, how-tos, explainers, and reviews on technology and even TV and entertainment-focused content -- for several leading online publications. \r\n\r\nPreviously, she was an editor at 9to5Mac and 9to5Google. She was also a US contributor at Pocket-lint. Before that, she worked as a beat reporter at different regional newspapers in Northeast America and freelanced for global websites such as the BBC. \r\n\r\nShe holds a Master of Fine Arts in writing from The New School in Manhattan and a Bachelor of Arts in journalism from the University of Massachusetts at Amherst.","expertise":"Consumer technology, mobile apps, TV and streaming services, mobile devices, software and services, and e-commerce","awardsAndCredentials":null,"education":"Master of Fine Arts in writing (2014) from The New School in Manhattan and a Bachelor of Arts in journalism (2011) from the University of Massachusetts at Amherst","authorDisclosure":"Elyse Betters Picaro has nothing to disclose.","typeName":"user_user_profile"},"socialProfileIds":{"facebookProfile":null,"facebookPage":null,"twitter":"elysebetters","googlePlus":null,"instagram":"elysebetters"},"suppressProfile":false,"editions":[],"defaultTimezone":"America/New_York","cmsDisplayName":"Elyse Betters Picaro","authorBlogs":[{"title":"Business Bargain Hunter","slug":"business-bargain-hunter"}],"language":"en","title":"Senior Editor","byline":"Elyse Betters Picaro is an editor based in New York.","bureau":"US","authorBio":"Elyse Betters Picaro is a senior editor based in Upstate New York. \r\n\r\nShe currently leads a team of journalists who write buyer's guides, deals, and gift guides. She has experience editing countless advice pieces and has written over 8,000 articles -- including news, how-tos, explainers, and reviews on technology and even TV and entertainment-focused content -- for several leading online publications. \r\n\r\nPreviously, she was an editor at 9to5Mac and 9to5Google. She was also a US contributor at Pocket-lint. Before that, she worked as a beat reporter at different regional newspapers in Northeast America and freelanced for global websites such as the BBC. \r\n\r\nShe holds a Master of Fine Arts in writing from The New School in Manhattan and a Bachelor of Arts in journalism from the University of Massachusetts at Amherst.","expertise":"Consumer technology, mobile apps, TV and streaming services, mobile devices, software and services, and e-commerce","awardsAndCredentials":null,"education":"Master of Fine Arts in writing (2014) from The New School in Manhattan and a Bachelor of Arts in journalism (2011) from the University of Massachusetts at Amherst","authorDisclosure":"Elyse Betters Picaro has nothing to disclose."},"dateCreated":{"date":"2022-08-04 19:59:08","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-04 19:59:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image/jpeg","deleted":false,"credits":"(Image: Unsplash)","alt":"Best VPN service","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"label":null,"linkText":null,"linkUrl":null,"preferredProductName":null,"promoDek":"What is the best VPN overall? Our top pick is ExpressVPN because of its performance. We researched and analyzed the top VPN services -- with a focus on the number of servers in the network, level of encryption, ability to unlock streaming services, and compatibility with phones, computers, and TVs.","promoTitle":null,"slug":"best-vpn","title":"The best VPN services: How do the top 5 compare?","topic":{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"e5be9bf6-59dd-4954-b3b3-ee691565f832","deleted":false,"leaf":true,"topicPath":[{"id":"9d3e6108-0023-11e4-95d2-02911863765e","name":"Innovation","typeName":"content_topic","slug":"innovation","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"4c7171e8-08ca-11e4-9732-00505685119a","name":"Innovation","description":"Discover the best technology ideas emerging from around the globe and how they are promising to help build a better future.","language":"en","slug":"innovation","vanityUrl":null,"typeName":"content_topic_language"}]},{"id":"113c25b6-ec91-11e3-95d2-02911863765e","name":"Security","typeName":"content_topic","slug":"security","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"81e128a0-08ca-11e4-9732-00505685119a","name":"Security","description":"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.","language":"en","slug":"security","vanityUrl":null,"typeName":"content_topic_language"}]}],"descendantCount":0,"type":{"id":"31bc3a04-c7a0-4fc1-b073-372a09f0cb0c","title":"Content","description":"Content","dateUpdated":null,"typeName":"content_topic_type"},"authors":{"data":[],"paging":{"total":0,"limit":15,"offset":0}},"editions":{"data":[{"topic":"e5be9bf6-59dd-4954-b3b3-ee691565f832","edition":{"key":"in","label":"India","prefix":"in/","lang":"en","translationLocale":"en_IN","locales":["en-in"],"timezone":"Asia/Kolkata","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"India Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"0c9a94e0-e9e7-4f3b-aef7-035ce925d60f","typeName":"content_topic_edition"},{"topic":"e5be9bf6-59dd-4954-b3b3-ee691565f832","edition":{"key":"as","label":"Asia","prefix":"as/","lang":"en","translationLocale":"en_SG","locales":["fa-af","hy-am","az-az","bn-bd","dz-bt","ms-bn","zh-cn","km-kh","en-hk","zh-hk","in-id","ja-jp","kk-kz","ky-kg","lo-la","ms-my","dv-mv","mm-mn","my-mm","ne-np","kr-kp","en-pk","en-ph","en-sg","si-lk","ko-kr","tg-tj","zh-tw","th-th","pt-tl","tk-tm","uz-uz","vi-vn"],"timezone":"Asia/Singapore","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"Asia Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"2f79772a-d51a-4d75-b4c9-64a8044bdaf6","typeName":"content_topic_edition"},{"topic":"e5be9bf6-59dd-4954-b3b3-ee691565f832","edition":{"key":"uk","label":"UK","prefix":"uk/","lang":"en","translationLocale":"en_GB","locales":["en-gb","en-ie","en-za","ka-ge","fa-ir","ar-iq","he-il","ar-jo","ar-kw","ar-lb","ar-om","ar-ps","ar-qa","ar-sa","ar-sy","ar-ae","ar-ye"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"UK Edition","currency_name":"STG","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"a2d884ae-87aa-4157-8a4f-96f2a6ab39c4","typeName":"content_topic_edition"},{"topic":"e5be9bf6-59dd-4954-b3b3-ee691565f832","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"a8227a14-763a-4cd8-a8d3-fdb50ee0edab","typeName":"content_topic_edition"},{"topic":"e5be9bf6-59dd-4954-b3b3-ee691565f832","edition":{"key":"au","label":"AU","prefix":"au/","lang":"en","translationLocale":"en_AU","locales":["en-au","en-nz"],"timezone":"Australia/Sydney","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"AU Edition","currency_name":"AUD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"af43c63e-fdc2-46eb-a079-de9d1ec0afa5","typeName":"content_topic_edition"},{"topic":"e5be9bf6-59dd-4954-b3b3-ee691565f832","edition":{"key":"eu","label":"EU","prefix":"eu/","lang":"en","translationLocale":"en_GB","locales":["de-at","ar-bh","en-be","bg-bg","el-cy","cs-cz","da-dk","pt-pl","et-ee","fi-fi","fr-fr","de-de","el-gr","hu-hu","it-it","lv-lv","lt-lt","de-lu","fr-lu","en-mt","nl-nl","pl-pl","pt-pt","ro-ro","sk-sk","sl-sl","es-es","sv-se","fr-ch","de-ch","tr-tk"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"EU Edition","currency_name":"Euro","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"d96dc21f-cf67-4fb3-b017-a21f3aa71489","typeName":"content_topic_edition"}],"paging":{"total":6,"limit":15,"offset":0}},"languages":{"data":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"4ae180c4-8117-47c0-89e5-d91b7db3e373","name":"VPN","description":null,"language":"en","slug":"vpn","vanityUrl":null,"typeName":"content_topic_language"}],"paging":{"total":1,"limit":15,"offset":0}},"name":"VPN","description":null,"slug":"vpn","landingPage":null,"listingPage":null,"typeName":"content_topic"},"typeName":"content_article"},{"body":null,"dek":"Here's a guide highlighting the tools you can use to determine if your account is at risk.","description":"Here's a guide highlighting the tools you can use to determine if your account is at risk.","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"image":{"id":"0928f1d1-0ca0-4fe9-8bb5-fcf7fb05e0f3","title":"data-breach","filename":"data-breach.jpg","path":"https://www.zdnet.com/a/img/2021/10/12/0928f1d1-0ca0-4fe9-8bb5-fcf7fb05e0f3/data-breach.jpg","caption":"
","tags":[],"size":1486243,"width":1600,"height":1069,"author":{"id":"264e2142-7b8a-49d3-9ea0-8ae5eec70c37","username":"zanerdskennedy","email":"zane.rds.kennedy@gmail.com","firstName":"Zane","middleName":"R","lastName":"Kennedy","dateCreated":{"date":"2021-05-05 00:00:00","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-05-05 18:31:15","timezone":"UTC","timezone_type":3},"ursId":"29886494492950911926330498836435","roles":[{"name":"CMS User","role":"ROLE_CMS_USER"},{"name":"Editor","role":"ROLE_EDITOR"},{"name":"Super User","role":"ROLE_SUPER_USER"}],"profiles":{"data":[{"id":"9f05cab6-8eb2-420a-bfbe-ef8c39bbffdb","dateCreated":{"date":"2021-05-05 18:31:15","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-05-05 18:31:15","timezone":"UTC","timezone_type":3},"language":"en","title":"Editor","byline":null,"bureau":null,"authorBio":null,"expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":null,"typeName":"user_user_profile"}],"paging":{"total":1,"limit":15,"offset":0}},"profile":{"id":"9f05cab6-8eb2-420a-bfbe-ef8c39bbffdb","dateCreated":{"date":"2021-05-05 18:31:15","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-05-05 18:31:15","timezone":"UTC","timezone_type":3},"language":"en","title":"Editor","byline":null,"bureau":null,"authorBio":null,"expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":null,"typeName":"user_user_profile"},"socialProfileIds":{"facebookProfile":null,"facebookPage":null,"twitter":null,"googlePlus":null,"instagram":null},"suppressProfile":false,"editions":[],"defaultTimezone":"Europe/London","cmsDisplayName":"Zane Kennedy","authorBlogs":[],"language":"en","title":"Editor","byline":null,"bureau":null,"authorBio":null,"expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":null},"dateCreated":{"date":"2021-10-12 12:35:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-08 20:51:03","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image/jpeg","deleted":false,"credits":"By Photon photo -- Shutterstock","alt":"data breach","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"label":null,"linkText":null,"linkUrl":null,"preferredProductName":null,"promoDek":"Here's a guide highlighting the tools you can use to determine if your account is at risk.","promoTitle":null,"slug":"how-to-find-out-if-you-are-involved-in-a-data-breach-and-what-to-do-next","title":"How to find out if you are involved in a data breach -- and what to do next","topic":{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"113c25b6-ec91-11e3-95d2-02911863765e","deleted":false,"leaf":false,"topicPath":[{"id":"9d3e6108-0023-11e4-95d2-02911863765e","name":"Innovation","typeName":"content_topic","slug":"innovation","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"4c7171e8-08ca-11e4-9732-00505685119a","name":"Innovation","description":"Discover the best technology ideas emerging from around the globe and how they are promising to help build a better future.","language":"en","slug":"innovation","vanityUrl":null,"typeName":"content_topic_language"}]}],"descendantCount":6,"type":{"id":"31bc3a04-c7a0-4fc1-b073-372a09f0cb0c","title":"Content","description":"Content","dateUpdated":null,"typeName":"content_topic_type"},"authors":{"data":[],"paging":{"total":0,"limit":15,"offset":0}},"editions":{"data":[{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"in","label":"India","prefix":"in/","lang":"en","translationLocale":"en_IN","locales":["en-in"],"timezone":"Asia/Kolkata","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"India Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"02f76cc8-60a7-42e3-b095-85d5fceb201e","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"eu","label":"EU","prefix":"eu/","lang":"en","translationLocale":"en_GB","locales":["de-at","ar-bh","en-be","bg-bg","el-cy","cs-cz","da-dk","pt-pl","et-ee","fi-fi","fr-fr","de-de","el-gr","hu-hu","it-it","lv-lv","lt-lt","de-lu","fr-lu","en-mt","nl-nl","pl-pl","pt-pt","ro-ro","sk-sk","sl-sl","es-es","sv-se","fr-ch","de-ch","tr-tk"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"EU Edition","currency_name":"Euro","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"177e0dd2-ef13-4119-a775-e123c25752d7","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"uk","label":"UK","prefix":"uk/","lang":"en","translationLocale":"en_GB","locales":["en-gb","en-ie","en-za","ka-ge","fa-ir","ar-iq","he-il","ar-jo","ar-kw","ar-lb","ar-om","ar-ps","ar-qa","ar-sa","ar-sy","ar-ae","ar-ye"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"UK Edition","currency_name":"STG","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"26f2f74b-8aea-4cb8-8ad7-98ea6678f72f","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"au","label":"AU","prefix":"au/","lang":"en","translationLocale":"en_AU","locales":["en-au","en-nz"],"timezone":"Australia/Sydney","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"AU Edition","currency_name":"AUD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"578b5003-5398-44c2-b340-d94262af8075","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"8231dda1-08ca-11e4-9732-00505685119a","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"as","label":"Asia","prefix":"as/","lang":"en","translationLocale":"en_SG","locales":["fa-af","hy-am","az-az","bn-bd","dz-bt","ms-bn","zh-cn","km-kh","en-hk","zh-hk","in-id","ja-jp","kk-kz","ky-kg","lo-la","ms-my","dv-mv","mm-mn","my-mm","ne-np","kr-kp","en-pk","en-ph","en-sg","si-lk","ko-kr","tg-tj","zh-tw","th-th","pt-tl","tk-tm","uz-uz","vi-vn"],"timezone":"Asia/Singapore","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"Asia Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"f84de0a6-d156-45c9-9500-543e34cc6419","typeName":"content_topic_edition"}],"paging":{"total":6,"limit":15,"offset":0}},"languages":{"data":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"81e128a0-08ca-11e4-9732-00505685119a","name":"Security","description":"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.","language":"en","slug":"security","vanityUrl":null,"typeName":"content_topic_language"}],"paging":{"total":1,"limit":15,"offset":0}},"name":"Security","description":"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.","slug":"security","landingPage":null,"listingPage":null,"typeName":"content_topic"},"typeName":"content_article"},{"body":null,"dek":"What is the best browser for privacy? Brave browser is ZDNet's top choice. We analyzed specs such as cookies stored, privacy settings, and speed of the top browsers below.","description":"What is the best browser for privacy? Brave browser is ZDNet's top choice. We analyzed specs such as cookies stored, privacy settings, and speed of the top browsers below.","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"image":{"id":"ab8d1c57-31ef-432e-b0da-06dcb9e894a1","title":"Brave","filename":"brave-best-browser-for-privacy.jpg","path":"https://www.zdnet.com/a/img/2022/05/20/ab8d1c57-31ef-432e-b0da-06dcb9e894a1/brave-best-browser-for-privacy.jpg","caption":"
","tags":[],"size":89238,"width":1024,"height":683,"author":{"id":"781a4b26-f4ec-4df5-84ed-c2775cdfd86f","username":"ebetters","email":"epicaro@redventures.com","firstName":"Elyse","middleName":null,"lastName":"Betters Picaro","dateCreated":{"date":"2016-06-21 00:00:00","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-05 16:27:43","timezone":"UTC","timezone_type":3},"ursId":"27051783234840286590268119258902","roles":[{"name":"CMS User","role":"ROLE_CMS_USER"},{"name":"Super Admin","role":"ROLE_SUPER_ADMIN"}],"profiles":{"data":[{"id":"84c775b4-26e4-4285-a0cb-ab642b885442","dateCreated":{"date":"2016-06-21 15:54:31","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-06-10 03:03:07","timezone":"UTC","timezone_type":3},"language":"en","title":"Senior Editor","byline":"Elyse Betters Picaro is an editor based in New York.","bureau":"US","authorBio":"Elyse Betters Picaro is a senior editor based in Upstate New York. \r\n\r\nShe currently leads a team of journalists who write buyer's guides, deals, and gift guides. She has experience editing countless advice pieces and has written over 8,000 articles -- including news, how-tos, explainers, and reviews on technology and even TV and entertainment-focused content -- for several leading online publications. \r\n\r\nPreviously, she was an editor at 9to5Mac and 9to5Google. She was also a US contributor at Pocket-lint. Before that, she worked as a beat reporter at different regional newspapers in Northeast America and freelanced for global websites such as the BBC. \r\n\r\nShe holds a Master of Fine Arts in writing from The New School in Manhattan and a Bachelor of Arts in journalism from the University of Massachusetts at Amherst.","expertise":"Consumer technology, mobile apps, TV and streaming services, mobile devices, software and services, and e-commerce","awardsAndCredentials":null,"education":"Master of Fine Arts in writing (2014) from The New School in Manhattan and a Bachelor of Arts in journalism (2011) from the University of Massachusetts at Amherst","authorDisclosure":"Elyse Betters Picaro has nothing to disclose.","typeName":"user_user_profile"}],"paging":{"total":1,"limit":15,"offset":0}},"profile":{"id":"84c775b4-26e4-4285-a0cb-ab642b885442","dateCreated":{"date":"2016-06-21 15:54:31","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-06-10 03:03:07","timezone":"UTC","timezone_type":3},"language":"en","title":"Senior Editor","byline":"Elyse Betters Picaro is an editor based in New York.","bureau":"US","authorBio":"Elyse Betters Picaro is a senior editor based in Upstate New York. \r\n\r\nShe currently leads a team of journalists who write buyer's guides, deals, and gift guides. She has experience editing countless advice pieces and has written over 8,000 articles -- including news, how-tos, explainers, and reviews on technology and even TV and entertainment-focused content -- for several leading online publications. \r\n\r\nPreviously, she was an editor at 9to5Mac and 9to5Google. She was also a US contributor at Pocket-lint. Before that, she worked as a beat reporter at different regional newspapers in Northeast America and freelanced for global websites such as the BBC. \r\n\r\nShe holds a Master of Fine Arts in writing from The New School in Manhattan and a Bachelor of Arts in journalism from the University of Massachusetts at Amherst.","expertise":"Consumer technology, mobile apps, TV and streaming services, mobile devices, software and services, and e-commerce","awardsAndCredentials":null,"education":"Master of Fine Arts in writing (2014) from The New School in Manhattan and a Bachelor of Arts in journalism (2011) from the University of Massachusetts at Amherst","authorDisclosure":"Elyse Betters Picaro has nothing to disclose.","typeName":"user_user_profile"},"socialProfileIds":{"facebookProfile":null,"facebookPage":null,"twitter":"elysebetters","googlePlus":null,"instagram":"elysebetters"},"suppressProfile":false,"editions":[],"defaultTimezone":"America/New_York","cmsDisplayName":"Elyse Betters Picaro","authorBlogs":[{"title":"Business Bargain Hunter","slug":"business-bargain-hunter"}],"language":"en","title":"Senior Editor","byline":"Elyse Betters Picaro is an editor based in New York.","bureau":"US","authorBio":"Elyse Betters Picaro is a senior editor based in Upstate New York. \r\n\r\nShe currently leads a team of journalists who write buyer's guides, deals, and gift guides. She has experience editing countless advice pieces and has written over 8,000 articles -- including news, how-tos, explainers, and reviews on technology and even TV and entertainment-focused content -- for several leading online publications. \r\n\r\nPreviously, she was an editor at 9to5Mac and 9to5Google. She was also a US contributor at Pocket-lint. Before that, she worked as a beat reporter at different regional newspapers in Northeast America and freelanced for global websites such as the BBC. \r\n\r\nShe holds a Master of Fine Arts in writing from The New School in Manhattan and a Bachelor of Arts in journalism from the University of Massachusetts at Amherst.","expertise":"Consumer technology, mobile apps, TV and streaming services, mobile devices, software and services, and e-commerce","awardsAndCredentials":null,"education":"Master of Fine Arts in writing (2014) from The New School in Manhattan and a Bachelor of Arts in journalism (2011) from the University of Massachusetts at Amherst","authorDisclosure":"Elyse Betters Picaro has nothing to disclose."},"dateCreated":{"date":"2022-05-20 20:16:30","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-05-20 20:16:35","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image/jpeg","deleted":false,"credits":null,"alt":"Brave","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"label":null,"linkText":null,"linkUrl":null,"preferredProductName":null,"promoDek":"What is the best browser for privacy? Brave browser is ZDNet's top choice. We analyzed specs such as cookies stored, privacy settings, and speed of the top browsers below.","promoTitle":null,"slug":"best-browser-for-privacy","title":"The 5 best browsers for privacy: Secure web browsing","topic":{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"96093490-341e-45e4-b27a-bf297aa2c5bb","deleted":false,"leaf":false,"topicPath":[{"id":"9d3e6108-0023-11e4-95d2-02911863765e","name":"Innovation","typeName":"content_topic","slug":"innovation","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"4c7171e8-08ca-11e4-9732-00505685119a","name":"Innovation","description":"Discover the best technology ideas emerging from around the globe and how they are promising to help build a better future.","language":"en","slug":"innovation","vanityUrl":null,"typeName":"content_topic_language"}]}],"descendantCount":16,"type":{"id":"31bc3a04-c7a0-4fc1-b073-372a09f0cb0c","title":"Content","description":"Content","dateUpdated":null,"typeName":"content_topic_type"},"authors":{"data":[],"paging":{"total":0,"limit":15,"offset":0}},"editions":{"data":[{"topic":"96093490-341e-45e4-b27a-bf297aa2c5bb","edition":{"key":"au","label":"AU","prefix":"au/","lang":"en","translationLocale":"en_AU","locales":["en-au","en-nz"],"timezone":"Australia/Sydney","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"AU Edition","currency_name":"AUD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"3b89b412-4197-4c0e-8efc-adc1ed34c324","typeName":"content_topic_edition"},{"topic":"96093490-341e-45e4-b27a-bf297aa2c5bb","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"439ffcd3-b1d2-4ba3-bd3e-3a8a3a14b877","typeName":"content_topic_edition"},{"topic":"96093490-341e-45e4-b27a-bf297aa2c5bb","edition":{"key":"uk","label":"UK","prefix":"uk/","lang":"en","translationLocale":"en_GB","locales":["en-gb","en-ie","en-za","ka-ge","fa-ir","ar-iq","he-il","ar-jo","ar-kw","ar-lb","ar-om","ar-ps","ar-qa","ar-sa","ar-sy","ar-ae","ar-ye"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"UK Edition","currency_name":"STG","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"7f8132dc-66e4-4f0c-9926-da32896f9819","typeName":"content_topic_edition"},{"topic":"96093490-341e-45e4-b27a-bf297aa2c5bb","edition":{"key":"as","label":"Asia","prefix":"as/","lang":"en","translationLocale":"en_SG","locales":["fa-af","hy-am","az-az","bn-bd","dz-bt","ms-bn","zh-cn","km-kh","en-hk","zh-hk","in-id","ja-jp","kk-kz","ky-kg","lo-la","ms-my","dv-mv","mm-mn","my-mm","ne-np","kr-kp","en-pk","en-ph","en-sg","si-lk","ko-kr","tg-tj","zh-tw","th-th","pt-tl","tk-tm","uz-uz","vi-vn"],"timezone":"Asia/Singapore","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"Asia Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"a7006afb-8079-4b3c-b7d9-84ef90a8050e","typeName":"content_topic_edition"},{"topic":"96093490-341e-45e4-b27a-bf297aa2c5bb","edition":{"key":"in","label":"India","prefix":"in/","lang":"en","translationLocale":"en_IN","locales":["en-in"],"timezone":"Asia/Kolkata","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"India Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"e69b578c-37aa-435b-9e42-12a533a9806d","typeName":"content_topic_edition"},{"topic":"96093490-341e-45e4-b27a-bf297aa2c5bb","edition":{"key":"eu","label":"EU","prefix":"eu/","lang":"en","translationLocale":"en_GB","locales":["de-at","ar-bh","en-be","bg-bg","el-cy","cs-cz","da-dk","pt-pl","et-ee","fi-fi","fr-fr","de-de","el-gr","hu-hu","it-it","lv-lv","lt-lt","de-lu","fr-lu","en-mt","nl-nl","pl-pl","pt-pt","ro-ro","sk-sk","sl-sl","es-es","sv-se","fr-ch","de-ch","tr-tk"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"EU Edition","currency_name":"Euro","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"f7bff5b1-8feb-436c-a042-f7539003e29d","typeName":"content_topic_edition"}],"paging":{"total":6,"limit":15,"offset":0}},"languages":{"data":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"fb83f3a1-5cf0-4fed-9d1f-62310666bbf3","name":"Services & Software","description":null,"language":"en","slug":"services-software","vanityUrl":null,"typeName":"content_topic_language"}],"paging":{"total":1,"limit":15,"offset":0}},"name":"Services & Software","description":null,"slug":"services-software","landingPage":null,"listingPage":null,"typeName":"content_topic"},"typeName":"content_article"},{"body":null,"dek":"Here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely.","description":"Here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely.","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"image":{"id":"9abd7c68-61eb-4638-ac8f-508b39e46b88","title":"831418880","filename":"istock-incognito.jpg","path":"https://www.zdnet.com/a/img/2018/06/20/9abd7c68-61eb-4638-ac8f-508b39e46b88/istock-incognito.jpg","caption":"Internet privacy, online conspiracy, private browsing, vpn, proxy server, incognito mode, anonymous web browsing concepts. Disguise mask on laptop screen. Long shadow design. Creative flat design vector illustration","tags":[],"size":80707,"width":1017,"height":691,"author":{"id":"558be1a5-10d8-11e4-9732-00505685119a","username":"AlysonWindsor","email":"awindsor@redventures.com","firstName":"Alyson","middleName":null,"lastName":"Windsor","dateCreated":{"date":"2014-06-17 00:00:00","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-05 16:14:00","timezone":"UTC","timezone_type":3},"ursId":"25524844979454957457847746312360","roles":[{"name":"CMS User","role":"ROLE_CMS_USER"},{"name":"Meet the Team (US)","role":"ROLE_MEET_THE_TEAM_(US)"},{"name":"Super Admin","role":"ROLE_SUPER_ADMIN"}],"profiles":{"data":[{"id":"55932cac-10d8-11e4-9732-00505685119a","dateCreated":{"date":"2014-06-17 14:16:49","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-25 22:02:01","timezone":"UTC","timezone_type":3},"language":"en","title":"Managing Editor","byline":"Aly is a managing editor at ZDNET based in Winston-Salem, N.C.","bureau":"US","authorBio":"Aly has worn many hats since joining ZDNET in 2014. She is currently a managing editor, leading ZDNET's Advice team, and is based in Winston-Salem, North Carolina.","expertise":null,"awardsAndCredentials":null,"education":"B.A. in English, Creative Writing","authorDisclosure":"Aly does not have financial holdings that would influence how or what she covers.","typeName":"user_user_profile"}],"paging":{"total":1,"limit":15,"offset":0}},"profile":{"id":"55932cac-10d8-11e4-9732-00505685119a","dateCreated":{"date":"2014-06-17 14:16:49","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-25 22:02:01","timezone":"UTC","timezone_type":3},"language":"en","title":"Managing Editor","byline":"Aly is a managing editor at ZDNET based in Winston-Salem, N.C.","bureau":"US","authorBio":"Aly has worn many hats since joining ZDNET in 2014. She is currently a managing editor, leading ZDNET's Advice team, and is based in Winston-Salem, North Carolina.","expertise":null,"awardsAndCredentials":null,"education":"B.A. in English, Creative Writing","authorDisclosure":"Aly does not have financial holdings that would influence how or what she covers.","typeName":"user_user_profile"},"socialProfileIds":{"facebookProfile":null,"facebookPage":null,"twitter":null,"googlePlus":null,"instagram":null},"suppressProfile":false,"editions":[],"defaultTimezone":"America/New_York","cmsDisplayName":"Alyson Windsor","authorBlogs":[],"language":"en","title":"Managing Editor","byline":"Aly is a managing editor at ZDNET based in Winston-Salem, N.C.","bureau":"US","authorBio":"Aly has worn many hats since joining ZDNET in 2014. She is currently a managing editor, leading ZDNET's Advice team, and is based in Winston-Salem, North Carolina.","expertise":null,"awardsAndCredentials":null,"education":"B.A. in English, Creative Writing","authorDisclosure":"Aly does not have financial holdings that would influence how or what she covers."},"dateCreated":{"date":"2018-06-20 16:36:50","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2018-06-20 16:36:50","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image/jpeg","deleted":false,"credits":"Getty Images/iStockphoto","alt":"istock-incognito.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"label":null,"linkText":null,"linkUrl":null,"preferredProductName":null,"promoDek":"Here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely.","promoTitle":null,"slug":"how-to-delete-yourself-from-internet-search-results-and-hide-your-identity-online","title":"How to delete yourself from search results and hide your identity online","topic":{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"113c25b6-ec91-11e3-95d2-02911863765e","deleted":false,"leaf":false,"topicPath":[{"id":"9d3e6108-0023-11e4-95d2-02911863765e","name":"Innovation","typeName":"content_topic","slug":"innovation","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"4c7171e8-08ca-11e4-9732-00505685119a","name":"Innovation","description":"Discover the best technology ideas emerging from around the globe and how they are promising to help build a better future.","language":"en","slug":"innovation","vanityUrl":null,"typeName":"content_topic_language"}]}],"descendantCount":6,"type":{"id":"31bc3a04-c7a0-4fc1-b073-372a09f0cb0c","title":"Content","description":"Content","dateUpdated":null,"typeName":"content_topic_type"},"authors":{"data":[],"paging":{"total":0,"limit":15,"offset":0}},"editions":{"data":[{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"in","label":"India","prefix":"in/","lang":"en","translationLocale":"en_IN","locales":["en-in"],"timezone":"Asia/Kolkata","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"India Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"02f76cc8-60a7-42e3-b095-85d5fceb201e","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"eu","label":"EU","prefix":"eu/","lang":"en","translationLocale":"en_GB","locales":["de-at","ar-bh","en-be","bg-bg","el-cy","cs-cz","da-dk","pt-pl","et-ee","fi-fi","fr-fr","de-de","el-gr","hu-hu","it-it","lv-lv","lt-lt","de-lu","fr-lu","en-mt","nl-nl","pl-pl","pt-pt","ro-ro","sk-sk","sl-sl","es-es","sv-se","fr-ch","de-ch","tr-tk"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"EU Edition","currency_name":"Euro","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"177e0dd2-ef13-4119-a775-e123c25752d7","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"uk","label":"UK","prefix":"uk/","lang":"en","translationLocale":"en_GB","locales":["en-gb","en-ie","en-za","ka-ge","fa-ir","ar-iq","he-il","ar-jo","ar-kw","ar-lb","ar-om","ar-ps","ar-qa","ar-sa","ar-sy","ar-ae","ar-ye"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"UK Edition","currency_name":"STG","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"26f2f74b-8aea-4cb8-8ad7-98ea6678f72f","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"au","label":"AU","prefix":"au/","lang":"en","translationLocale":"en_AU","locales":["en-au","en-nz"],"timezone":"Australia/Sydney","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"AU Edition","currency_name":"AUD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"578b5003-5398-44c2-b340-d94262af8075","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"8231dda1-08ca-11e4-9732-00505685119a","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"as","label":"Asia","prefix":"as/","lang":"en","translationLocale":"en_SG","locales":["fa-af","hy-am","az-az","bn-bd","dz-bt","ms-bn","zh-cn","km-kh","en-hk","zh-hk","in-id","ja-jp","kk-kz","ky-kg","lo-la","ms-my","dv-mv","mm-mn","my-mm","ne-np","kr-kp","en-pk","en-ph","en-sg","si-lk","ko-kr","tg-tj","zh-tw","th-th","pt-tl","tk-tm","uz-uz","vi-vn"],"timezone":"Asia/Singapore","dateFormat":"MMMM d, yyyy -- HH:mm z LOCALTIME","metadata":{"nav_label":"Asia Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"f84de0a6-d156-45c9-9500-543e34cc6419","typeName":"content_topic_edition"}],"paging":{"total":6,"limit":15,"offset":0}},"languages":{"data":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"81e128a0-08ca-11e4-9732-00505685119a","name":"Security","description":"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.","language":"en","slug":"security","vanityUrl":null,"typeName":"content_topic_language"}],"paging":{"total":1,"limit":15,"offset":0}},"name":"Security","description":"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.","slug":"security","landingPage":null,"listingPage":null,"typeName":"content_topic"},"typeName":"content_article"}],"title":"Security","view":"pinbox_text_list"}" class="c-shortcodePinbox-textList c-shortcodePinbox-textList_floating g-border-thin-light-bottom g-outer-spacing-top-medium g-outer-spacing-bottom-medium">
Security
SEE:  Ransomware: Why it's still a big threat, and where the gangs are going next
For example, LockBit is one of the most prolific and successful ransomware operations of recent times and now offers the option of a Linux-based variant  that is designed to target Linux systems and has been used to conduct attacks in the wild. 
Ransomware attackers are financially motivated and will readily follow new opportunities if they think that it can help them make more money – and it appears that encrypting Linux systems and demanding a payment for the key to unlock files and servers is becoming increasingly popular. 
Researchers suggest that this approach is only going to become more common as ransomware attackers look to make the most money possible. 
"New and emerging threat groups continue to evolve their business model, focusing their attacks with even greater precision. That's why it's essential that organizations get better at mapping, understanding, and protecting their expanding digital attack surface," said Jon Clay, VP of threat intelligence for Trend Micro. 
And it isn't just ransomware groups that are increasingly turning their attentions towards Linux – according to Trend Micro, there's been a 145% increase in Linux-based cryptocurrency-mining malware attacks, where cyber criminals secretly exploit the power of infected computers and servers to mine for cryptocurrency for themselves. 
One of the ways cyber criminals are compromising Linux systems is by exploiting unpatched vulnerabilities. According to the report, these flaws include CVE-2022-0847 – also known as Dirty Pipe – a bug that affects the Linux kernel from versions 5.8 and up, which attackers can use to escalate their privileges and run code. Researchers warn that this bug is "relatively easy to exploit". 
To protect Linux systems from ransomware and other cyberattacks, it's recommended that all security patches are applied as soon as possible to prevent cyber criminals from being able to take advantage of known exploits that have fixes available. 
It's also recommended that  multi-factor authentication  is applied across the entire ecosystem to provide an additional layer of defence against attacks and prevent ransomware hackers from being able to move around networks.

Images Powered by Shutterstock