{"id":33107,"date":"2012-06-05T11:09:13","date_gmt":"2012-06-05T11:09:13","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=33107"},"modified":"2012-06-05T11:09:44","modified_gmt":"2012-06-05T11:09:44","slug":"bits-from-bill-pytlovany-targeted-cyber-threats-expand","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/","title":{"rendered":"Bits from Bill Pytlovany: Targeted Cyber Threats Expand"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.billp.com\/blog\/images\/TargetedCyberThreatsArentJustforIran_121CC\/iran.gif\" alt=\"Targeted Cyber Threats Aren\u2019t Just Attacking Iran\" title=\"Targeted Cyber Threats Aren\u2019t Just Attacking Iran\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-30794\" \/><\/p>\n<p>By Bill Pytlovany<\/p>\n<h3>Targeted Cyber Threats Aren\u2019t Just Attacking Iran<\/h3>\n<p>This week the news has been focusing on the computer threats called Stuxnet and Flame. Both have actually been around a few years but were not a problem to most Windows or Mac users. These threats have gotten attention lately because of a trend towards \u201c<strong>targeted<\/strong>\u201d computer infiltrations. <\/p>\n<p><a title=\"http:\/\/en.wikipedia.org\/wiki\/Stuxnet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Stuxnet\">Stuxnet<\/a> was designed to \u201cworm\u201d its way on to Windows computers specifically in Iran and then target specific computer devices which may be used to process the nuclear fuel, Uranium. International observers indicate that Stuxnet was likely responsible for the eventual destruction of 10% of the centrifuge machines at Irans Natanz nuclear facility. Flame is a newer, larger version but may be more detectable because it seems overly ambiguous.    <\/p>\n<p>Many cyber researchers, myself included, feel that Stuxnet and other worms targeting Iran were developed in Israel and supported by the U.S. Department of Homeland Security. By reverse engineering Stuxnet subtle clues backing this theory can be found encrypted in the code. If the developers wanted to blame our government these clues would have been more obvious.     <\/p>\n<p>On June 1st, the <a title=\"http:\/\/www.nytimes.com\/2012\/06\/01\/world\/middleeast\/obama-ordered-wave-of-cyberattacks-against-iran.html\" href=\"http:\/\/www.nytimes.com\/2012\/06\/01\/world\/middleeast\/obama-ordered-wave-of-cyberattacks-against-iran.html\">New York Times reported<\/a> they had additional proof of our involvement. They claim a cyber sabotage program had been started under the George W Bush administration. During his first months as president Barak Obama ordered the expansion of the program, coded-named \u201cOlympic Games\u201d.&#160; Instead of writing more about Stuxnet and Flame like everyone else, I think it\u2019s more important to focus on targeted attacks in general.<\/p>\n<p>Targeted attacks aren\u2019t just being used against countries who are part of the axis of evil.&#160; Businesses are being targeted by competitors, <a title=\"http:\/\/gizmodo.com\/5913224\/hack-politician-and-son-arrested-for-political-hack\" href=\"http:\/\/gizmodo.com\/5913224\/hack-politician-and-son-arrested-for-political-hack\">candidates running for office are targeted by their opposition,<\/a> celebrities targeted by reporters and now we\u2019re seeing an increase in targeted attacks on individuals who are tricked into installing Rogueware also called Exhortionware or Ransomware.<\/p>\n<p> <a name=\"part2\"><\/a> <\/p>\n<p><a href=\"http:\/\/billpstudios.blogspot.com\/2012\/06\/targeted-cyber-threats-arent-just.html#part2\" target=\"_blank\">Article continued here<\/a><\/p>\n<p>This post is excerpted with Bill&#8217;s permission from his blog<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.billp.com\/blog\/images\/TargetedCyberThreatsArentJustforIran_121CC\/iran.gif\" alt=\"Targeted Cyber Threats Aren\u2019t Just Attacking Iran\" title=\"Targeted Cyber Threats Aren\u2019t Just Attacking Iran\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-30794\" \/><\/p>\n<p>This week the news has been focusing on the computer threats called Stuxnet and Flame. Both have actually been around a few years but were not a problem to most Windows or Mac users. These threats have gotten attention lately because of a trend towards \u201c<strong>targeted<\/strong>\u201d computer infiltrations. <\/p>\n","protected":false},"author":14,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[86],"tags":[4142,4141],"class_list":["post-33107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bill-pytlovany","tag-cyber-terrorism","tag-cyber-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Targeted Cyber Threats Aren\u2019t Just Attacking Iran<\/title>\n<meta name=\"description\" content=\"This week the news has been focusing on the computer threats called Stuxnet and Flame. Both have actually been around a few years but were not a problem to most Windows or Mac users. These threats have gotten attention lately because of a trend towards \u201ctargeted\u201d computer infiltrations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Targeted Cyber Threats Aren\u2019t Just Attacking Iran\" \/>\n<meta property=\"og:description\" content=\"This week the news has been focusing on the computer threats called Stuxnet and Flame. Both have actually been around a few years but were not a problem to most Windows or Mac users. These threats have gotten attention lately because of a trend towards \u201ctargeted\u201d computer infiltrations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-05T11:09:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-06-05T11:09:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bill Pytlovany\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bill Pytlovany\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/\"},\"author\":{\"name\":\"Bill Pytlovany\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/bdfb84810004329361ff982a09c6fde0\"},\"headline\":\"Bits from Bill Pytlovany: Targeted Cyber Threats Expand\",\"datePublished\":\"2012-06-05T11:09:13+00:00\",\"dateModified\":\"2012-06-05T11:09:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/\"},\"wordCount\":337,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"cyber terrorism\",\"cyber threats\"],\"articleSection\":[\"Bill Pytlovany\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/\",\"name\":\"Targeted Cyber Threats Aren\u2019t Just Attacking Iran\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2012-06-05T11:09:13+00:00\",\"dateModified\":\"2012-06-05T11:09:44+00:00\",\"description\":\"This week the news has been focusing on the computer threats called Stuxnet and Flame. Both have actually been around a few years but were not a problem to most Windows or Mac users. These threats have gotten attention lately because of a trend towards \u201ctargeted\u201d computer infiltrations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bits from Bill Pytlovany: Targeted Cyber Threats Expand\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/bdfb84810004329361ff982a09c6fde0\",\"name\":\"Bill Pytlovany\",\"description\":\"BillP Studios founder and industry insider Bill Pytlovany was at one time best known for his leading role in creating the software behind the service now called, AOL. These days Bill is better for helping to increase the performance and security of hundreds of thousand of computers - through his award winning product - Win Patrol.\",\"sameAs\":[\"http:\\\/\\\/billpstudios.blogspot.com\\\/\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/bill-p\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Targeted Cyber Threats Aren\u2019t Just Attacking Iran","description":"This week the news has been focusing on the computer threats called Stuxnet and Flame. Both have actually been around a few years but were not a problem to most Windows or Mac users. These threats have gotten attention lately because of a trend towards \u201ctargeted\u201d computer infiltrations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/","og_locale":"en_US","og_type":"article","og_title":"Targeted Cyber Threats Aren\u2019t Just Attacking Iran","og_description":"This week the news has been focusing on the computer threats called Stuxnet and Flame. Both have actually been around a few years but were not a problem to most Windows or Mac users. These threats have gotten attention lately because of a trend towards \u201ctargeted\u201d computer infiltrations.","og_url":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2012-06-05T11:09:13+00:00","article_modified_time":"2012-06-05T11:09:44+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Bill Pytlovany","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Bill Pytlovany","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/"},"author":{"name":"Bill Pytlovany","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/bdfb84810004329361ff982a09c6fde0"},"headline":"Bits from Bill Pytlovany: Targeted Cyber Threats Expand","datePublished":"2012-06-05T11:09:13+00:00","dateModified":"2012-06-05T11:09:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/"},"wordCount":337,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["cyber terrorism","cyber threats"],"articleSection":["Bill Pytlovany"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/","url":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/","name":"Targeted Cyber Threats Aren\u2019t Just Attacking Iran","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2012-06-05T11:09:13+00:00","dateModified":"2012-06-05T11:09:44+00:00","description":"This week the news has been focusing on the computer threats called Stuxnet and Flame. Both have actually been around a few years but were not a problem to most Windows or Mac users. These threats have gotten attention lately because of a trend towards \u201ctargeted\u201d computer infiltrations.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-targeted-cyber-threats-expand\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Bits from Bill Pytlovany: Targeted Cyber Threats Expand"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/bdfb84810004329361ff982a09c6fde0","name":"Bill Pytlovany","description":"BillP Studios founder and industry insider Bill Pytlovany was at one time best known for his leading role in creating the software behind the service now called, AOL. These days Bill is better for helping to increase the performance and security of hundreds of thousand of computers - through his award winning product - Win Patrol.","sameAs":["http:\/\/billpstudios.blogspot.com\/"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/bill-p\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/33107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=33107"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/33107\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=33107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=33107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=33107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}