{"id":3563,"date":"2014-06-01T14:48:50","date_gmt":"2014-06-01T18:48:50","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3563"},"modified":"2020-02-26T18:58:39","modified_gmt":"2020-02-26T14:58:39","slug":"security-is-1","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/security-is-1\/3563\/","title":{"rendered":"The \u0421yberworld Survival Guide"},"content":{"rendered":"<p>The end of the world occurred pretty much as we had predicted- too many computers and mobile devices and not enough knowledge to deal with it. The details are trivial and pointless. The reasons, as always, purely human errors. Just one computer worm created by human hands quickly raged out of control. The Internet was overwhelmed, websites crashed. Social networks were swallowed up by fake accounts and users quickly became victims. Unprotected infrastructures crumbled under targeted attacks. Digital humanity was almost extinguished; a quiet darkness fell across the Internet, lasting many years\u2026<\/p>\n<p>Few were able to survive the devastation and reach relative safety. Those that did enclosed all the experiences and lessons they learned into a guide, <em>The \u0421yberworld Survival Guide<\/em>, which will\u00a0help us avoid a\u00a0similar fate.<\/p>\n<p><span style=\"color: #535353\">The entire series of <em>The \u0421yberworld Survival Guide<\/em>\u00a0can be found here:\u00a0<\/span><a style=\"color: #465f9b\" href=\"https:\/\/www.kaspersky.com\/blog\/tag\/securityIS\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/www.kaspersky.com\/blog\/tag\/securityIS<\/a><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23102744\/BxcBuHDklAZ0K7ZYq5URgnUwozUxlnnjNmh0KFcdu-o1-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5206\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23102920\/BxcBuHDklAZ0K7ZYq5URgnUwozUxlnnjNmh0KFcdu-o1-2-1.png\" alt=\"BxcBuHDklAZ0K7ZYq5URgnUwozUxlnnjNmh0KFcdu-o\" width=\"800\" height=\"565\"><\/a><\/p>\n<p><em><strong>Access denied: Hackers Bob and Rob didn\u2019t know that Jane\u2019s Facebook password was 64 characters long and included a quote from Twilight typed in reverse<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111307\/GOkYe2DUVKmAw3yogaLQIxzk6D5PRTqXopPfOQ9ow8k-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5235\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23102929\/GOkYe2DUVKmAw3yogaLQIxzk6D5PRTqXopPfOQ9ow8k-2-1.png\" alt=\"GOkYe2DUVKmAw3yogaLQIxzk6D5PRTqXopPfOQ9ow8k\" width=\"800\" height=\"565\"><\/a><\/p>\n<p><em><strong>\u00a0Information in leading antivirus companies\u2019 blogs are so useful that even giant mutant cats are looking at it<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111306\/g25vPVWTFHgxBKCTubWjwN2VKqJeXDAGmzoq8k5-2eI-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5232\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23102936\/g25vPVWTFHgxBKCTubWjwN2VKqJeXDAGmzoq8k5-2eI-2-1.png\" alt=\"g25vPVWTFHgxBKCTubWjwN2VKqJeXDAGmzoq8k5-2eI\" width=\"800\" height=\"565\"><\/a><\/p>\n<p><em><strong>Before entering a social network, there shouldn\u2019t be a toothless, unshaven man at the entrance<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111304\/kbefnKBf20qh2seNzoUolw9VVxwQg2x0Tuk19aZArzQ-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5221\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23102944\/kbefnKBf20qh2seNzoUolw9VVxwQg2x0Tuk19aZArzQ-2-1.png\" alt=\"kbefnKBf20qh2seNzoUolw9VVxwQg2x0Tuk19aZArzQ\" width=\"800\" height=\"565\"><\/a><\/p>\n<p><strong><em>\u00a0You should go to a public library<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111303\/OK-NJiPUKSUoAejvIDcfmjc6qLl_Cj37IaIx6xwH6p8-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5225\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23102952\/OK-NJiPUKSUoAejvIDcfmjc6qLl_Cj37IaIx6xwH6p8-2-1.png\" alt=\"OK-NJiPUKSUoAejvIDcfmjc6qLl_Cj37IaIx6xwH6p8\" width=\"800\" height=\"565\"><\/a><\/p>\n<p><strong><em>But better watch where you insert your USB stick<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111301\/q0GE7Qs6-Qf7Md_fWjVVLmcOv7CPRvjJOcYpHBp9gvk-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5214\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23103000\/q0GE7Qs6-Qf7Md_fWjVVLmcOv7CPRvjJOcYpHBp9gvk-2-1.png\" alt=\"q0GE7Qs6-Qf7Md_fWjVVLmcOv7CPRvjJOcYpHBp9gvk\" width=\"800\" height=\"565\"><\/a><\/p>\n<p><strong><em>\u201cI\u2019m not vulnerable, I\u2019m telling you!\u201d, a phrase told to a malware that didn\u2019t help Tux, the penguin, avoid an attack\u00a0<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111301\/fZnwFWlbtd8FU9xNANoYURxh3ebJZ9LrUgTb54OVIU0-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5207\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23103008\/fZnwFWlbtd8FU9xNANoYURxh3ebJZ9LrUgTb54OVIU0-2-1.png\" alt=\"fZnwFWlbtd8FU9xNANoYURxh3ebJZ9LrUgTb54OVIU0\" width=\"800\" height=\"565\"><\/a><\/p>\n<p><em><strong>What do a public pool and public Wi-Fi have in common? Too many people!<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23102846\/771RS7X3MwJVh2eL_7HkoSGX7WnpQPtheFpIMWCSShw-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5222\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23103016\/771RS7X3MwJVh2eL_7HkoSGX7WnpQPtheFpIMWCSShw-2-1.png\" alt=\"771RS7X3MwJVh2eL_7HkoSGX7WnpQPtheFpIMWCSShw\" width=\"800\" height=\"565\"><\/a> <em><strong>We all like these free gigabytes, admit it.<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23102856\/ihDWAXGuiSDlygcnJLwmxBUkh-LgE32VvS26PEXBEAo-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5208\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23103025\/ihDWAXGuiSDlygcnJLwmxBUkh-LgE32VvS26PEXBEAo-2-1.png\" alt=\"ihDWAXGuiSDlygcnJLwmxBUkh-LgE32VvS26PEXBEAo\" width=\"800\" height=\"565\"><\/a><\/p>\n<p><em><strong>\u00a0Even when they bite us.<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111334\/precious_data-1-1024x724.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5238\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23103031\/precious_data-1-1024x724-1.jpg\" alt=\"precious_data\" width=\"1754\" height=\"1240\"><\/a><\/p>\n<p><strong><em>Cell #42 unfortunately was already packed with a backup copy of the ultimate questions about life, the universe and everything else<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23102912\/SZDN4jStliUSIhQEsSM5Heohc4UT8lWCXCuUP0P6HZk1-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5321\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/23103038\/SZDN4jStliUSIhQEsSM5Heohc4UT8lWCXCuUP0P6HZk1-2-1.png\" alt=\"SZDN4jStliUSIhQEsSM5Heohc4UT8lWCXCuUP0P6HZk\" width=\"800\" height=\"565\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The entire series of The \u0421yberworld Survival Guide can be found here: http:\/\/me-en.kaspersky.com\/blog\/tag\/securityIS<\/p>\n","protected":false},"author":40,"featured_media":3566,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1485],"tags":[689],"class_list":{"0":"post-3563","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-special-projects","8":"tag-securityis"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/security-is-1\/3563\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/security-is-1\/3660\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-is-1\/4009\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-is-1\/4254\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security-is-1\/4414\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/security-is-1\/1251\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-is-1\/5204\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security-is-1\/4084\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security-is-1\/4414\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-is-1\/5204\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-is-1\/5204\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/securityis\/","name":"SecurityIS"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3563"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3563\/revisions"}],"predecessor-version":[{"id":15793,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3563\/revisions\/15793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3566"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}