{"id":1871,"date":"2013-05-20T11:36:28","date_gmt":"2013-05-20T15:36:28","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=1871"},"modified":"2017-09-24T16:35:21","modified_gmt":"2017-09-24T14:35:21","slug":"threats-q1-2013","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/threats-q1-2013\/1871\/","title":{"rendered":"Threats of the Digital World Q1 2013"},"content":{"rendered":"<p>We want you to be fully aware of the latest changes in the threat landscape. Our friends at <a href=\"http:\/\/www.securelist.com\" target=\"_blank\" rel=\"noopener nofollow\">securelist<\/a> have compiled a quarterly report of digital threats and we\u2019ve included their most important findings here.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/05\/06050827\/ig-threats-1q13-en.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1872\" alt=\"q1 threats\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/05\/06050827\/ig-threats-1q13-en.jpg\" width=\"1353\" height=\"6617\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We want you to be fully aware of the latest changes in the threat landscape. Our friends at securelist have compiled a quarterly report of digital threats and we\u2019ve included<\/p>\n","protected":false},"author":32,"featured_media":1873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2671],"tags":[271,195],"class_list":{"0":"post-1871","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"tag-infographic","10":"tag-security-threat"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/threats-q1-2013\/1871\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/threats-q1-2013\/1871\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/threats-q1-2013\/1871\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/threats-q1-2013\/1871\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/threats-q1-2013\/1871\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/threats-q1-2013\/1871\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/threats-q1-2013\/995\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/threats-q1-2013\/1871\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/infographic\/","name":"infographic"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=1871"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1871\/revisions"}],"predecessor-version":[{"id":18281,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1871\/revisions\/18281"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/1873"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=1871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=1871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=1871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}