{"id":1252,"date":"2026-01-10T15:36:39","date_gmt":"2026-01-10T20:36:39","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=1252"},"modified":"2026-01-10T15:36:42","modified_gmt":"2026-01-10T20:36:42","slug":"malwarebytes-instagram","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/","title":{"rendered":"Malwarebytes reports Instagram security breach"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png?ssl=1\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" width=\"389\" height=\"129\" data-attachment-id=\"1253\" data-permalink=\"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/instagram\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png?fit=389%2C129&amp;ssl=1\" data-orig-size=\"389,129\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Instagram\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png?fit=389%2C129&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png?resize=389%2C129&#038;ssl=1\" alt=\"\" class=\"wp-image-1253\" srcset=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png?w=389&amp;ssl=1 389w, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png?resize=300%2C99&amp;ssl=1 300w\" sizes=\"(max-width: 389px) 100vw, 389px\" \/><\/a><\/figure>\n\n\n\n<p>This week, Malwarebytes discovered that hackers stole the sensitive information of 17.5 million Instagram accounts. This data includes usernames, physical addresses, phone numbers, and email addresses.  Cybercriminals can abuse this information to impersonate trusted brands. They can trick users and steal their passwords.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Critically, this data is already being offered on the dark web. Individual users are also receiving legitimate password reset notifications from Instagram.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>What to do:<\/strong><\/td><\/tr><tr><td>Be cautious of emails and messages that claim to come from Instagram. They are from malicious hackers. These hackers try to trick you into handing over your password. If you\u2019re concerned, sign into your Instagram account and reset your password to a new, strong, unique password.<\/td><\/tr><tr><td><strong>Check if you were exposed by using Malwarebytes or Windows Defender<\/strong><\/td><\/tr><tr><td><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Malwarebytes<\/a> vs <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/microsoft-defender-for-individuals\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender<\/a><br>After testing both antivirus solutions, Malwarebytes to be the more effective overall. It supports a broader range of devices and offers basic and advanced security features that give more comprehensive protection. Microsoft Defender was not too far behind. It is free and delivers solid results in lab tests. It also covers all the essential security needs.<br><br>Either way protect your computer by daily scanning to be safe.<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>This week, Malwarebytes discovered that hackers stole the sensitive information of 17.5 million Instagram accounts. This data includes usernames, physical addresses, phone numbers, and email addresses. Cybercriminals can abuse this information to impersonate trusted brands. They can trick users and steal their passwords. Critically, this data is already being offered on the dark web. Individual [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[291],"tags":[],"class_list":["post-1252","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malwarebytes reports Instagram security breach - Baron Software<\/title>\n<meta name=\"description\" content=\"This week, Malwarebytes discovered that hackers stole the sensitive information of 17.5 million Instagram accounts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malwarebytes reports Instagram security breach - Baron Software\" \/>\n<meta property=\"og:description\" content=\"This week, Malwarebytes discovered that hackers stole the sensitive information of 17.5 million Instagram accounts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-10T20:36:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-10T20:36:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"Malwarebytes reports Instagram security breach\",\"datePublished\":\"2026-01-10T20:36:39+00:00\",\"dateModified\":\"2026-01-10T20:36:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/\"},\"wordCount\":201,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Instagram.png\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/\",\"name\":\"Malwarebytes reports Instagram security breach - Baron Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Instagram.png\",\"datePublished\":\"2026-01-10T20:36:39+00:00\",\"dateModified\":\"2026-01-10T20:36:42+00:00\",\"description\":\"This week, Malwarebytes discovered that hackers stole the sensitive information of 17.5 million Instagram accounts.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Instagram.png?fit=389%2C129&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Instagram.png?fit=389%2C129&ssl=1\",\"width\":389,\"height\":129},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/malwarebytes-instagram\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malwarebytes reports Instagram security breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malwarebytes reports Instagram security breach - Baron Software","description":"This week, Malwarebytes discovered that hackers stole the sensitive information of 17.5 million Instagram accounts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/","og_locale":"en_US","og_type":"article","og_title":"Malwarebytes reports Instagram security breach - Baron Software","og_description":"This week, Malwarebytes discovered that hackers stole the sensitive information of 17.5 million Instagram accounts.","og_url":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/","og_site_name":"Baron Software","article_published_time":"2026-01-10T20:36:39+00:00","article_modified_time":"2026-01-10T20:36:42+00:00","og_image":[{"url":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png","type":"","width":"","height":""}],"author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"Malwarebytes reports Instagram security breach","datePublished":"2026-01-10T20:36:39+00:00","dateModified":"2026-01-10T20:36:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/"},"wordCount":201,"commentCount":0,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/","url":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/","name":"Malwarebytes reports Instagram security breach - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/#primaryimage"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png","datePublished":"2026-01-10T20:36:39+00:00","dateModified":"2026-01-10T20:36:42+00:00","description":"This week, Malwarebytes discovered that hackers stole the sensitive information of 17.5 million Instagram accounts.","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/#primaryimage","url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png?fit=389%2C129&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png?fit=389%2C129&ssl=1","width":389,"height":129},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"Malwarebytes reports Instagram security breach"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-kc","jetpack-related-posts":[{"id":501,"url":"https:\/\/www.baronsoftware.com\/Blog\/half-windows-7-machines-dont-run-av-microsoft\/","url_meta":{"origin":1252,"position":0},"title":"Half of Windows 7 machines do not run AV software","author":"richard@baronsoftware.com","date":"August 24, 2017","format":false,"excerpt":"Half of Windows 7 machines do not run AV software It has been disclosed by Microsoft that Windows older desktop operating systems remains more vulnerable to malware as of today. \u00a0The majority of users are still running older versions of Windows, without necessarily using up to date security software which\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"AV","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/10\/microsofts-logo-gets-a-makeover-300x225.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1205,"url":"https:\/\/www.baronsoftware.com\/Blog\/cybersecure-cyberdefense-securityhub-protectonline-cyberguard\/","url_meta":{"origin":1252,"position":1},"title":"Essential Cybersecurity Tips to Protect Your Personal Information","author":"richard@baronsoftware.com","date":"December 24, 2024","format":false,"excerpt":"It is one thing to lose your credit card but having information stolen from your electronic devise is worse. Stolen personal information can be used for financial fraud, identity theft, and cause privacy issues. If you suspect that your payment card details have been stolen, these are the recommended actions:\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":874,"url":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-patch-opened-bigger-security-hole-on-windows-7\/","url_meta":{"origin":1252,"position":2},"title":"Meltdown Patch Opened Bigger Security Hole on Windows 7","author":"richard@baronsoftware.com","date":"April 1, 2018","format":false,"excerpt":"Meltdown Patch Opened Bigger Security Hole on Windows 7 Microsoft's Meltdown patch has opened an even bigger security hole on Windows 7, allowing any user-level application to read content from the operating system's kernel, and even write data to kernel memory. Swedish IT security expert Ulf Frisk made the discovery\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1005,"url":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/","url_meta":{"origin":1252,"position":3},"title":"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses","author":"richard@baronsoftware.com","date":"April 20, 2020","format":false,"excerpt":"Cyber threats are real. Everyone is being attacked on a daily basis from outside agents. These agents for the most part have criminal intent on using the Covid-19 fear. You must be on guard against emails that have attachments. User email accounts, contact information or even companies are used to\u2026","rel":"","context":"In &quot;Rad Studio Delphi Development&quot;","block_context":{"text":"Rad Studio Delphi Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/rad-studio-embarcadero-delphi-development\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":893,"url":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/","url_meta":{"origin":1252,"position":4},"title":"One-Third of Internal User Accounts Are &#8216;Ghost Users&#8217;","author":"richard@baronsoftware.com","date":"April 10, 2018","format":false,"excerpt":"One-Third of Internal User Accounts Are 'Ghost Users' Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content. \u00a0Meager access controls on folders and file systems are leaving organizations wide open to the lateral movement of attackers and malware, according\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1-300x60.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":876,"url":"https:\/\/www.baronsoftware.com\/Blog\/15-percent-or-less-are-fully-confident-of-recovering-data-in-a-disaster\/","url_meta":{"origin":1252,"position":5},"title":"15 percent or less are fully confident of recovering data in a disaster","author":"richard@baronsoftware.com","date":"April 3, 2018","format":false,"excerpt":"15 percent or less are fully confident of recovering data in a disaster In a new survey data protection specialist\u00a0Arcserve reveals that while downtime is a top concern, many businesses lack confidence in their ability to recover data. The study indicates that IT decision makers across America, Europe and Japan,\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/1252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=1252"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/1252\/revisions"}],"predecessor-version":[{"id":1254,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/1252\/revisions\/1254"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=1252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=1252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=1252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}