{"id":13251,"date":"2022-01-16T14:00:12","date_gmt":"2022-01-16T14:00:12","guid":{"rendered":"https:\/\/igotoffer.com\/blog\/?p=13251"},"modified":"2023-11-16T03:53:02","modified_gmt":"2023-11-16T03:53:02","slug":"log4j-vulnerability-the-ultimate-backdoor-in-your-devices","status":"publish","type":"post","link":"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices","title":{"rendered":"Log4J Vulnerability &#8211; the Ultimate Backdoor in Your Devices"},"content":{"rendered":"<h2>CISA director: The LOG4J security flaw is the &#8216;most serious&#8217; she&#8217;s seen in her career [Video]<\/h2>\n<div class=\"ytb\">\n<p style=\"text-align: center;\"><iframe title=\"CISA director: The LOG4J security flaw is the &#039;most serious&#039; she&#039;s seen in her career\" width=\"620\" height=\"349\" src=\"https:\/\/www.youtube.com\/embed\/XC3Oqn_yADk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/p>\n<\/div>\n<p style=\"text-align:center\">Video uploaded by <a class=\"yt-simple-endpoint style-scope yt-formatted-string\" rel=\"noopener noreferrer\" href=\"https:\/\/www.youtube.com\/@CNBCtelevision\" target=\"_blank\">CNBC Television<\/a> on <strong class=\"watch-time-text\">December 20, 2021<\/strong><\/p>\n<h2>The potential ultimate backdoor in your devices: keep your eyes open for the Log4J vulnerability<\/h2>\n<p>Yes, it\u2019s the same old &#8211; and seemingly never-ending &#8211; story again: our gadgets are under yet another threat again, and this one seems to be an extreme one indeed, even taking into account the inescapable hype element involved in any news of this sort.<\/p>\n<p>After all, it\u2019s not often that all the cybersecurity experts of every notable player, British and American alike, from Checkpoint and Sophos to UK\u2019s National Cyber Security Centre and Microsoft (and without a single jab at the latter, mind), in unanimous agreement, stress the seriousness of the danger and intensity of the assaults by hackers trying to exploit the weakness in question (and 100+ attacks per minute is a truly scary piece of statistics, if you ask us). It looks like the \u201copening\u201d created when the Javascript loads the Apache Log4J error messages library exceedingly appeals to all sorts of the Internet predators\u2026 and for a good (or rather bad) reason.<\/p>\n<div id=\"attachment_13268\" style=\"width: 830px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-13268\" loading=\"lazy\" class=\"size-full wp-image-13268\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-pic.png\" alt=\"It looks like the \u201copening\u201d created when the Javascript loads the Apache Log4J error messages library exceedingly appeals to all sorts of the Internet predators\u2026 and for a good (or rather bad) reason.\" width=\"820\" height=\"500\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-pic.png 820w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-pic-300x183.png 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-pic-620x378.png 620w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-pic-246x150.png 246w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-pic-600x366.png 600w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/><p id=\"caption-attachment-13268\" class=\"wp-caption-text\">It looks like the \u201copening\u201d created when the Javascript loads the Apache Log4J error messages library exceedingly appeals to all sorts of the Internet predators\u2026 and for a good (or rather bad) reason.<\/p><\/div>\n<p>Because it appears to all but invite the unbidden guests to your data kept in any online applications you work with, as long as it has anything to do with the above library. And it is used by a lot of them, from cloud storage to email. Simply (and shortly) put, this particular flaw (which is also called \u201cLog4Shell\u201d) can remove even the already-not-impenetrable login\/password barrier between the Web user and the Net fraudsters. There is no need for them to guess, deduce or buy your access information, because the subject flaw can allow them to get in anonymously. That\u2019s something of a first, we must agree: the system itself, instead of just giving you not too adequate protection (to which most of us are used by now), actually works for the opposing team, so to speak. No wonder the said team is so eager to utilize this unexpected gift, first discovered this month: with it, they may get pretty much everything from unsuspecting users, from bank data to their very identities\u2026 and give them a lot of unwanted stuff instead. Can you say \u201cmalware galore\u201d? And your computer becoming someone else\u2019s crypto mining station is one of the less terrifying prospects of those beginning to emerge under the present circumstances. (Even though this is the most popular goal of the exploiters so far, according to the latest news on the matter).<\/p>\n<p>Plus (as if all of the above were not enough), many of the service providers &#8211; the actual companies managing the storages and applications under attack &#8211; are not even aware of the problem at the moment. And there are virtually all the big guns among those being, well, gunned for: Amazon, CCisco, JetBrains and Oracles are just a few of this long list.<\/p>\n<div id=\"attachment_13269\" style=\"width: 830px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-13269\" loading=\"lazy\" class=\"size-full wp-image-13269\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-all.jpg\" alt=\"And no, there is no gadget type that is safe from this particular threat.\" width=\"820\" height=\"500\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-all.jpg 820w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-all-300x183.jpg 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-all-620x378.jpg 620w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-all-246x150.jpg 246w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-all-600x366.jpg 600w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/><p id=\"caption-attachment-13269\" class=\"wp-caption-text\">And no, there is no gadget type that is safe from this particular threat.<\/p><\/div>\n<p>And no, there is no gadget type that is safe from this particular threat, no matter how new and well-equipped: as long as it is online (which means pretty much \u201cevery single device\u201d these days) and uses Apache Software Foundation\u2019s products, it is potentially welcoming the intruders to your private details.<\/p>\n<p>So what can you personally do about it, if even the large corporations and top experts (such as cyber-intelligence head at CheckPoint Lotem Finkelstein) sound rather fazed and perplexed at the time? Well, actually, not as little as you might think. As it often happens, the grassroot initiative is proving more effective &#8211; at least at present &#8211; than any large-scale strategy (if only because there is not much of that in sight so far: there are some urgently-issued protection software from Oracle, but mostly we just hear the announcements of firms \u201cworking on the problem\u201d).<\/p>\n<p>And your first course of action should be upgrading your threatened (that is, Apache-running) notebooks, phones and tablets to the 2.15.0 &#8211; or higher &#8211; version of the Log4J. Identify the offending software on every gizmo you have &#8211; which has now been made easier to do by the Netherland\u2019s Cyber Security Center, where the list of such programs are stored &#8211; and go for it. If, however, something will prevent the update, you still can set the \u201clog4j2.formatMSGNoLookups\u201d value to \u201ctrue\u201d.<\/p>\n<div id=\"attachment_13270\" style=\"width: 830px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-13270\" loading=\"lazy\" class=\"size-full wp-image-13270\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-upgrade.png\" alt=\"And your first course of action should be upgrading your threatened (that is, Apache-running) notebooks, phones and tablets to the 2.15.0 - or higher - version of the Log4J.\" width=\"820\" height=\"500\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-upgrade.png 820w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-upgrade-300x183.png 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-upgrade-620x378.png 620w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-upgrade-246x150.png 246w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices-upgrade-600x366.png 600w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/><p id=\"caption-attachment-13270\" class=\"wp-caption-text\">And your first course of action should be upgrading your threatened (that is, Apache-running) notebooks, phones and tablets to the 2.15.0 &#8211; or higher &#8211; version of the Log4J.<\/p><\/div>\n<p>Then you have to make sure that the aforesaid alerts get through to the SOC (security operations center). And to strengthen your defenses, the CISA (Cybersecurity and Infrastructure Security Agency) suggests that you\u2019ll also go for a web application firewall (WAF), with a special instruction to concentrate on, you guessed it, Log4J. (Though if you\u2019ll go for the AWS\u2019 WAF, this might not be necessary, for this company has already included this instruction in its latest version of the firewall, and the same goes for their CloudFront, ALB, AppSync and API Gateway).<\/p>\n<p>Not that even all of the above will remove the threat completely, of course (and you\u2019ll still have to activate attacks and access attempts alert on all of the aforementioned devices), but it will complicate the matters for the bot makers and senders hunting for your info and access to your gadgets considerably, and make them more vulnerable to discovery as well. And, if anything, this is a step in the right &#8211; and safe &#8211; direction.<\/p>\n<h2>Links<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.xda-developers.com\/log4j-security-vulnerability-minecraft-apple\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dangerous \u201cLog4j\u201d security vulnerability affects everything from Apple to Minecraft<\/a> &#8211; XDA Developers<\/li>\n<li><a href=\"https:\/\/igotoffer.com\" target=\"_blank\" rel=\"noreferrer noopener\">Sell your pre-owned device online<\/a> &#8211; iGotOffer<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>CISA director: The LOG4J security flaw is the &#8216;most serious&#8217; she&#8217;s seen in her career [Video] Video uploaded by CNBC Television on December 20, 2021 The potential ultimate backdoor in your devices: keep your eyes open for the Log4J vulnerability Yes, it\u2019s the same old &#8211; and seemingly never-ending &#8211; story again: our gadgets are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13266,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[461,460],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Log4J Vulnerability - the Ultimate Backdoor in Your Devices | iGotOffer<\/title>\n<meta name=\"description\" content=\"Yes, it\u2019s the same old - and never-ending - story: our gadgets are under another threat, and this one, Log4J, seems to be an extreme one.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log4J Vulnerability - the Ultimate Backdoor in Your Devices | iGotOffer\" \/>\n<meta property=\"og:description\" content=\"Yes, it\u2019s the same old - and never-ending - story: our gadgets are under another threat, and this one, Log4J, seems to be an extreme one.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices\" \/>\n<meta property=\"og:site_name\" content=\"iGotOffer Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iGotOffer\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/svetlana.ustinova2\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-16T14:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-16T03:53:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices.png\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:site\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\",\"url\":\"https:\/\/igotoffer.com\/blog\/\",\"name\":\"iGotOffer Blog\",\"description\":\"News and reviews about electronics &amp; apps\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/igotoffer.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices#primaryimage\",\"url\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices.png\",\"contentUrl\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices.png\",\"width\":820,\"height\":500,\"caption\":\"Log4J Vulnerability - the Ultimate Backdoor in Your Devices\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices#webpage\",\"url\":\"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices\",\"name\":\"Log4J Vulnerability - the Ultimate Backdoor in Your Devices | iGotOffer\",\"isPartOf\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices#primaryimage\"},\"datePublished\":\"2022-01-16T14:00:12+00:00\",\"dateModified\":\"2023-11-16T03:53:02+00:00\",\"author\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\"},\"description\":\"Yes, it\u2019s the same old - and never-ending - story: our gadgets are under another threat, and this one, Log4J, seems to be an extreme one.\",\"breadcrumb\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/igotoffer.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Log4J Vulnerability &#8211; the Ultimate Backdoor in Your Devices\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\",\"name\":\"Steve\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"caption\":\"Steve\"},\"sameAs\":[\"https:\/\/igotoffer.com\/\",\"https:\/\/www.facebook.com\/svetlana.ustinova2\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Log4J Vulnerability - the Ultimate Backdoor in Your Devices | iGotOffer","description":"Yes, it\u2019s the same old - and never-ending - story: our gadgets are under another threat, and this one, Log4J, seems to be an extreme one.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices","og_locale":"en_US","og_type":"article","og_title":"Log4J Vulnerability - the Ultimate Backdoor in Your Devices | iGotOffer","og_description":"Yes, it\u2019s the same old - and never-ending - story: our gadgets are under another threat, and this one, Log4J, seems to be an extreme one.","og_url":"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices","og_site_name":"iGotOffer Blog","article_publisher":"https:\/\/www.facebook.com\/iGotOffer","article_author":"https:\/\/www.facebook.com\/svetlana.ustinova2","article_published_time":"2022-01-16T14:00:12+00:00","article_modified_time":"2023-11-16T03:53:02+00:00","og_image":[{"width":820,"height":500,"url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@iGotOffer","twitter_site":"@iGotOffer","twitter_misc":{"Written by":"Steve","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/igotoffer.com\/blog\/#website","url":"https:\/\/igotoffer.com\/blog\/","name":"iGotOffer Blog","description":"News and reviews about electronics &amp; apps","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/igotoffer.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices#primaryimage","url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices.png","contentUrl":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2021\/12\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices.png","width":820,"height":500,"caption":"Log4J Vulnerability - the Ultimate Backdoor in Your Devices"},{"@type":"WebPage","@id":"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices#webpage","url":"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices","name":"Log4J Vulnerability - the Ultimate Backdoor in Your Devices | iGotOffer","isPartOf":{"@id":"https:\/\/igotoffer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices#primaryimage"},"datePublished":"2022-01-16T14:00:12+00:00","dateModified":"2023-11-16T03:53:02+00:00","author":{"@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16"},"description":"Yes, it\u2019s the same old - and never-ending - story: our gadgets are under another threat, and this one, Log4J, seems to be an extreme one.","breadcrumb":{"@id":"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/igotoffer.com\/blog\/log4j-vulnerability-the-ultimate-backdoor-in-your-devices#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/igotoffer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Log4J Vulnerability &#8211; the Ultimate Backdoor in Your Devices"}]},{"@type":"Person","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16","name":"Steve","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","caption":"Steve"},"sameAs":["https:\/\/igotoffer.com\/","https:\/\/www.facebook.com\/svetlana.ustinova2"]}]}},"_links":{"self":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/13251"}],"collection":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/comments?post=13251"}],"version-history":[{"count":6,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/13251\/revisions"}],"predecessor-version":[{"id":14605,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/13251\/revisions\/14605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media\/13266"}],"wp:attachment":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media?parent=13251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/categories?post=13251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/tags?post=13251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}