{"id":591,"date":"2017-09-20T14:55:52","date_gmt":"2017-09-20T19:55:52","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=591"},"modified":"2017-09-20T14:55:52","modified_gmt":"2017-09-20T19:55:52","slug":"hackers-hid-malware-ccleaner-software","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/","title":{"rendered":"Hackers hid malware in CCleaner software"},"content":{"rendered":"<h2 class=\"c-page-title\" style=\"text-align: center;\">Hackers hid malware in CCleaner software<a href=\"https:\/\/www.piriform.com\/ccleaner\"><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"592\" data-permalink=\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/cc_128\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?fit=128%2C128&amp;ssl=1\" data-orig-size=\"128,128\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ccleaner\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?fit=128%2C128&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?fit=128%2C128&amp;ssl=1\" class=\"aligncenter size-full wp-image-592\" src=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?resize=128%2C128&#038;ssl=1\" alt=\"\" width=\"128\" height=\"128\" \/><\/a><\/h2>\n<p>Hackers have successfully breached CCleaner\u2019s security to inject malware into the app and distribute it to millions of users.\u00a0Security researchers at Cisco Talos discovered\u00a0that download servers used by Avast (the company that owns CCleaner) were compromised to distribute malware inside CCleaner.<\/p>\n<p>CCleaner Version 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner. \u00a0CCleaner has been downloaded more than 2 billion times according to Avast, making it a popular target for hackers.<\/p>\n<p>CCleaner is a software utility that wipes out application leftover garbage, can view the registry for entries no longer wanted, remove applications, etc. \u00a0 Piriform believes that all users are now safe but the real question is how was this even possible to happen.<\/p>\n<p>Trusted by consumers and businesses, CCleaner will lose some of the trustworthiness they have built over the years. The malware itself appears to have been designed to use infected PCs as part of a botnet.<\/p>\n<p>The hackers have proven that this could lead to other companies not securing their software. \u00a0The danger is that anyone who allows their people to not protect their workstations from the outside world can affect millions others. \u00a0Similar things have happened to Equifax and Sony, if you do not have the latest Anti-Virus software on your workstation you need to make sure you are protected today.<\/p>\n<p>A end user can remove the CCleaner application for now and run a malware check on your machine for protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers hid malware in CCleaner software Hackers have successfully breached CCleaner\u2019s security to inject malware into the app and distribute it to millions of users.\u00a0Security researchers at Cisco Talos discovered\u00a0that download servers used by Avast (the company that owns CCleaner) were compromised to distribute malware inside CCleaner. CCleaner Version 5.33 being distributed by Avast also [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[134,21,20,7,13,22,84,28,15,24],"class_list":["post-591","post","type-post","status-publish","format-standard","hentry","category-pc-tips-bits-bytes","tag-ccleaner","tag-computers","tag-delphi","tag-development","tag-embarcadero","tag-google","tag-ios","tag-mac","tag-microsoft","tag-windows-10"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers hid malware in CCleaner software - Baron Software<\/title>\n<meta name=\"description\" content=\"Hackers have successfully breached CCleaner security to inject malware into the app and distribute it to millions of users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers hid malware in CCleaner software\" \/>\n<meta property=\"og:description\" content=\"Hackers have successfully breached CCleaner security to inject malware into the app and distribute it to millions of users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-20T19:55:52+00:00\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Hackers hid malware in CCleaner software\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"Hackers hid malware in CCleaner software\",\"datePublished\":\"2017-09-20T19:55:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/\"},\"wordCount\":259,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png\",\"keywords\":[\"CCleaner\",\"computers\",\"Delphi\",\"Development\",\"Embarcadero\",\"Google\",\"iOS\",\"Mac\",\"Microsoft\",\"Windows 10\"],\"articleSection\":[\"Computer PC Tips - bits and bytes\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/\",\"url\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/\",\"name\":\"Hackers hid malware in CCleaner software - Baron Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png\",\"datePublished\":\"2017-09-20T19:55:52+00:00\",\"description\":\"Hackers have successfully breached CCleaner security to inject malware into the app and distribute it to millions of users.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?fit=128%2C128&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?fit=128%2C128&ssl=1\",\"width\":128,\"height\":128},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.baronsoftware.com\/Blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers hid malware in CCleaner software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#website\",\"url\":\"https:\/\/www.baronsoftware.com\/Blog\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\/\/www.baronsoftware.com\/Blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers hid malware in CCleaner software - Baron Software","description":"Hackers have successfully breached CCleaner security to inject malware into the app and distribute it to millions of users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/","og_locale":"en_US","og_type":"article","og_title":"Hackers hid malware in CCleaner software","og_description":"Hackers have successfully breached CCleaner security to inject malware into the app and distribute it to millions of users.","og_url":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/","og_site_name":"Baron Software","article_published_time":"2017-09-20T19:55:52+00:00","author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"Hackers hid malware in CCleaner software","twitter_image":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"Hackers hid malware in CCleaner software","datePublished":"2017-09-20T19:55:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/"},"wordCount":259,"commentCount":0,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png","keywords":["CCleaner","computers","Delphi","Development","Embarcadero","Google","iOS","Mac","Microsoft","Windows 10"],"articleSection":["Computer PC Tips - bits and bytes"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/","url":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/","name":"Hackers hid malware in CCleaner software - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#primaryimage"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png","datePublished":"2017-09-20T19:55:52+00:00","description":"Hackers have successfully breached CCleaner security to inject malware into the app and distribute it to millions of users.","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#primaryimage","url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?fit=128%2C128&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?fit=128%2C128&ssl=1","width":128,"height":128},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"Hackers hid malware in CCleaner software"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-9x","jetpack-related-posts":[{"id":887,"url":"https:\/\/www.baronsoftware.com\/Blog\/avast-claims-its-secure-browser-is-30-percent-faster-than-yours\/","url_meta":{"origin":591,"position":0},"title":"Avast claims its secure browser is 30 percent faster than yours","author":"richard@baronsoftware.com","date":"April 8, 2018","format":false,"excerpt":"Avast claims its secure browser is 30 percent faster than yours Avast\u00a0has updated its browser to give users greater control over their online privacy. According to the company, its renamed Avast Secure Browser (formerly SafeZone) is designed to plug the security gaps that result from users' misplaced protection expectations. Features\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1-300x60.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":974,"url":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/","url_meta":{"origin":591,"position":1},"title":"Importance of Cyber security","author":"richard@baronsoftware.com","date":"December 23, 2019","format":false,"excerpt":"Data Security can no longer be a requirement of the IT Department. It is vital that the entire company that are within the network be on their utmost watch. Cyber security rules and staff must be in place as of today. Data Breaches Watching current events there has been reports\u2026","rel":"","context":"In &quot;Rad Studio Delphi Development&quot;","block_context":{"text":"Rad Studio Delphi Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/rad-studio-embarcadero-delphi-development\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":501,"url":"https:\/\/www.baronsoftware.com\/Blog\/half-windows-7-machines-dont-run-av-microsoft\/","url_meta":{"origin":591,"position":2},"title":"Half of Windows 7 machines do not run AV software","author":"richard@baronsoftware.com","date":"August 24, 2017","format":false,"excerpt":"Half of Windows 7 machines do not run AV software It has been disclosed by Microsoft that Windows older desktop operating systems remains more vulnerable to malware as of today. \u00a0The majority of users are still running older versions of Windows, without necessarily using up to date security software which\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"AV","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/10\/microsofts-logo-gets-a-makeover-300x225.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":828,"url":"https:\/\/www.baronsoftware.com\/Blog\/how-to-secure-your-wordpress-blog\/","url_meta":{"origin":591,"position":3},"title":"How to Secure and increase performance on your WordPress Blog","author":"richard@baronsoftware.com","date":"March 7, 2018","format":false,"excerpt":"How to Secure and increase performance on your WordPress Blog To secure your wordpress blog it is an extremely good idea to follow some of the steps located below as well as increasing performance for your readers. SSD-Powered Storage Delivers Content Up to 20x Faster Hosting providers that include high-performance,\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":382,"url":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/","url_meta":{"origin":591,"position":4},"title":"Learning from the Yahoo hack and how to protect yourself","author":"richard@baronsoftware.com","date":"December 16, 2016","format":false,"excerpt":"Learning from the Yahoo hack and how to protect yourself How and what can you do to protect yourself or your company from being hacked from malware or virus ?\u00a0 Some of this are very simple steps that you can do on a daily basis. Safe steps to protect yourself\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"Yahoo Hack","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":865,"url":"https:\/\/www.baronsoftware.com\/Blog\/thousands-of-servers-found-leaking-750mb-worth-of-passwords-and-keys\/","url_meta":{"origin":591,"position":5},"title":"Vast amount of Servers are leaking huge amounts of passwords and keys","author":"richard@baronsoftware.com","date":"March 25, 2018","format":false,"excerpt":"Vast amount of Servers are leaking huge amounts of passwords and keys Thousands of servers operated by businesses and other organizations are openly sharing credentials that may allow anyone on the Internet to log in and read or modify potentially sensitive data stored online. In a\u00a0blog post published late last\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=591"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/591\/revisions"}],"predecessor-version":[{"id":593,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/591\/revisions\/593"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}