{"id":3566,"date":"2011-03-13T13:07:00","date_gmt":"2011-03-13T13:07:00","guid":{"rendered":"https:\/\/foxtongue.com\/dreampepper\/2011\/03\/13\/fascinating-security-hack\/"},"modified":"2011-03-13T13:07:00","modified_gmt":"2011-03-13T13:07:00","slug":"fascinating-security-hack","status":"publish","type":"post","link":"https:\/\/foxtongue.com\/dreampepper\/2011\/03\/13\/fascinating-security-hack\/","title":{"rendered":"fascinating security hack"},"content":{"rendered":"<p><a href=\"http:\/\/www.itworld.com\/security\/139794\/with-hacking-music-can-take-control-your-car\">Hacking can take control of a car through an infected music file<\/a>:<\/p>\n<blockquote><p>But their most interesting attack focused on the car stereo. By adding extra code to a digital music file, they were able to turn a song burned to CD into a Trojan horse. When played on the car&#8217;s stereo, this song could alter the firmware of the car&#8217;s stereo system, giving attackers an entry point to change other components on the car.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Hacking can take control of a car through an infected music file: But their most interesting attack focused on the car stereo. By adding extra code to a digital music file, they were able to turn a song burned to CD into a Trojan horse. When played on the car&#8217;s stereo, this song could alter &hellip; <a href=\"https:\/\/foxtongue.com\/dreampepper\/2011\/03\/13\/fascinating-security-hack\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;fascinating security hack&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[22,306,196],"class_list":["post-3566","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-music","tag-news-of-the-odd","tag-science"],"_links":{"self":[{"href":"https:\/\/foxtongue.com\/dreampepper\/wp-json\/wp\/v2\/posts\/3566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/foxtongue.com\/dreampepper\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/foxtongue.com\/dreampepper\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/foxtongue.com\/dreampepper\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/foxtongue.com\/dreampepper\/wp-json\/wp\/v2\/comments?post=3566"}],"version-history":[{"count":0,"href":"https:\/\/foxtongue.com\/dreampepper\/wp-json\/wp\/v2\/posts\/3566\/revisions"}],"wp:attachment":[{"href":"https:\/\/foxtongue.com\/dreampepper\/wp-json\/wp\/v2\/media?parent=3566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/foxtongue.com\/dreampepper\/wp-json\/wp\/v2\/categories?post=3566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/foxtongue.com\/dreampepper\/wp-json\/wp\/v2\/tags?post=3566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}