{"id":325,"date":"2003-12-30T10:52:41","date_gmt":"2003-12-30T15:52:41","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/hoanga\/2003\/12\/30\/cyber-blackmail-over-email\/"},"modified":"2006-12-15T23:33:05","modified_gmt":"2006-12-16T04:33:05","slug":"cyber-blackmail-over-email","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/hoanga\/2003\/12\/30\/cyber-blackmail-over-email\/","title":{"rendered":"Cyber Blackmail over email?"},"content":{"rendered":"<p><a name='a276'><\/a><\/p>\n<p>\nWonderful, now the black hats are just sending emails off to people and threatening to delete files thruogh a security vulnerability unless the individual pays $20.   And scarily it seems this tactic is working rather well.\n<\/p>\n<p>\nWhat sucks is that it&#8217;s such a small sum that it costs more to track down this problem for one isolated case than to just let it slide.  However, let&#8217;s do some more fun math:<br \/>\n$20 * 1000 naive people.  That&#8217;s a cool $20k I just got from convincing 1000 people via a nasty email to send money.\n<\/p>\n<p>\n <a href=\"http:\/\/www.reuters.com\/newsArticle.jhtml;jsessionid=ETYF42Q05OYKOCRBAE0CFFA?type=technologyNews&amp;storyID=4052663&amp;pageNumber=0\">Link to Story<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wonderful, now the black hats are just sending emails off to people and threatening to delete files thruogh a security vulnerability unless the individual pays $20. And scarily it seems this tactic is working rather well. What sucks is that it&#8217;s such a small sum that it costs more to track down this problem for [&hellip;]<\/p>\n","protected":false},"author":703,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[260],"tags":[],"class_list":["post-325","post","type-post","status-publish","format-standard","hentry","category-tech"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/posts\/325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/users\/703"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/posts\/325\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/categories?post=325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/tags?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}