Ransomware technique uses your real passwords to trick you
John Biggs is a writer, consultant, programmer, former East Coast Editor and current contributing writer for TechCrunch. He writes mainly about technology, cryptocurrency, security, gadgets, gear, wristwatches, and the internet. After spending his formative years as a programmer, he switched his profession and became a full-time entrepreneur and writer. His work has appeared in the New York Times, Laptop, PC Upgrade, Surge, Gizmodo, Menu2019s Health, InSync, Linux Journal, Popular Science, Sync, and he has written a book called Black Hat: Misfits, Criminals, and Scammers in the Internet Age.nn
He builds products, writes books, and consults with startups to help them make cool things.nn
John Biggs runs the BWL family of blogs, SlushPile.net, Audiomonger, and WristWatchReview.com. Born in 1975, he currently resides in Brooklyn, NY.nn
Disclosure: Biggs owns and maintains cryptocurrencies in a private account and has been consulting with startups regarding blockchain-based products. He also edits and writes for startup clients.”,”cbAvatar”:”https://crunchbase-production-res.cloudinary.com/image/upload/h_216,w_216,c_fit/v1485334097/mzdqnp3ig4nwf34qk8qy.png”,”twitter”:”johnbiggs”}],”author”:[{“id”:12084649,”name”:”John Biggs”,”url”:””,”description”:””,”link”:”https://techcrunch.com/author/john-biggs/”,”slug”:”john-biggs”,”avatar_urls”:{“24″:”https://secure.gravatar.com/avatar/c0a943f484a32e62ed3bc81dd0dd25da?s=24&d=identicon&r=g”,”48″:”https://secure.gravatar.com/avatar/c0a943f484a32e62ed3bc81dd0dd25da?s=48&d=identicon&r=g”,”96″:”https://secure.gravatar.com/avatar/c0a943f484a32e62ed3bc81dd0dd25da?s=96&d=identicon&r=g”},”links”:{“homepage”:”http://johnbiggsbooks.com/”,”facebook”:”http://www.facebook.com/johnbiggs”,”twitter”:”https://twitter.com/johnbiggs”,”linkedin”:”http://www.linkedin.com/in/jdbiggs”,”crunchbase”:”https://www.crunchbase.com/person/john-biggs”},”position”:”East Coast Editor”,”cbDescription”:”
John Biggs is a writer, consultant, programmer, former East Coast Editor and current contributing writer for TechCrunch. He writes mainly about technology, cryptocurrency, security, gadgets, gear, wristwatches, and the internet. After spending his formative years as a programmer, he switched his profession and became a full-time entrepreneur and writer. His work has appeared in the New York Times, Laptop, PC Upgrade, Surge, Gizmodo, Menu2019s Health, InSync, Linux Journal, Popular Science, Sync, and he has written a book called Black Hat: Misfits, Criminals, and Scammers in the Internet Age.nn
He builds products, writes books, and consults with startups to help them make cool things.nn
John Biggs runs the BWL family of blogs, SlushPile.net, Audiomonger, and WristWatchReview.com. Born in 1975, he currently resides in Brooklyn, NY.nn
Disclosure: Biggs owns and maintains cryptocurrencies in a private account and has been consulting with startups regarding blockchain-based products. He also edits and writes for startup clients.”,”cbAvatar”:”https://crunchbase-production-res.cloudinary.com/image/upload/h_216,w_216,c_fit/v1485334097/mzdqnp3ig4nwf34qk8qy.png”,”twitter”:”johnbiggs”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/tc/v1/users/12084649″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/tc/v1/users”}]}}],”wp:featuredmedia”:[{“id”:1622399,”date”:”2018-04-15T14:59:38″,”slug”:”username-and-password-written-on-a-paper-note-in-the-shape-of-a-fish-attached-to-a-hook-phishing-and-internet-security-concept”,”type”:”attachment”,”link”:”https://techcrunch.com/2018/04/16/microsoft-launches-a-phishing-attack-simulator-and-other-security-tools/username-and-password-written-on-a-paper-note-in-the-shape-of-a-fish-attached-to-a-hook-phishing-and-internet-security-concept/”,”title”:{“rendered”:”Username and password written on a paper note in the shape of a fish attached to a hook – Phishing and internet security concept”},”author”:34511731,”license”:{“source_key”:”getty images”,”person”:”CalypsoArt”},”authors”:[34511731],”caption”:{“rendered”:”
Username and password written on a paper note in the shape of a fish attached to a hook – Phishing and internet security conceptn”},”alt_text”:””,”media_type”:”image”,”mime_type”:”image/jpeg”,”media_details”:{“width”:4608,”height”:3072,”file”:”2018/04/gettyimages-916200122.jpg”,”sizes”:[],”image_meta”:{“aperture”:”0″,”credit”:”Getty Images/iStockphoto”,”camera”:””,”caption”:”Username and password written on a paper note in the shape of a fish attached to a hook – Phishing and internet security concept”,”created_timestamp”:”1518085972″,”copyright”:”This content is subject to copyright.”,”focal_length”:”0″,”iso”:”0″,”shutter_speed”:”0″,”title”:”Username and password written on a paper note in the shape of a fish attached to a hook – Phishing and internet security concept”,”orientation”:”0″,”keywords”:[“theft”,”steal”,”stolen”,”web”,”account”,”breach”,”threat”,”information”,”access”,”code”,”secret”,”cyberspace”,”fraud”,”hacker”,”hacking”,”login”,”network”,”pc”,”user”,”metaphor”,”digital”,”hacked”,”username”]}},”source_url”:”https://techcrunch.com/wp-content/uploads/2018/04/gettyimages-916200122.jpg”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/media/1622399″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/media”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/types/attachment”}],”replies”:[{“embeddable”:true,”href”:”https://techcrunch.com/wp-json/wp/v2/comments?post=1622399″}],”author”:[{“embeddable”:true,”href”:”https://techcrunch.com/wp-json/tc/v1/users/34511731″}]}}],”wp:term”:[[{“id”:449557102,”link”:”https://techcrunch.com/apps/”,”name”:”Apps”,”slug”:”apps”,”taxonomy”:”category”,”parent”:0,”rapidData”:{“pt”:””,”pct”:””},”submenu_categories”:[],”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/categories/449557102″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/categories”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/category”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?categories=449557102″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?categories=449557102″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?categories=449557102″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:20429,”link”:”https://techcrunch.com/startups/”,”name”:”Startups”,”slug”:”startups”,”taxonomy”:”category”,”parent”:0,”rapidData”:{“pt”:””,”pct”:””},”submenu_categories”:[],”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/categories/20429″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/categories”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/category”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?categories=20429″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?categories=20429″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?categories=20429″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:17396,”link”:”https://techcrunch.com/tc/”,”name”:”TC”,”slug”:”tc”,”taxonomy”:”category”,”parent”:0,”rapidData”:{“pt”:””,”pct”:””},”submenu_categories”:[],”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/categories/17396″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/categories”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/category”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?categories=17396″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?categories=17396″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?categories=17396″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}}],[{“id”:81,”link”:”https://techcrunch.com/tag/google/”,”name”:”Google”,”slug”:”google”,”taxonomy”:”post_tag”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags/81″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/post_tag”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?tags=81″},{“href”:”https://techcrunch.com/wp-json/wp/v2/battlefield-companies?tags=81″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?tags=81″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_topic?tags=81″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?tags=81″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:16146,”link”:”https://techcrunch.com/tag/identity-theft/”,”name”:”identity theft”,”slug”:”identity-theft”,”taxonomy”:”post_tag”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags/16146″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/post_tag”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?tags=16146″},{“href”:”https://techcrunch.com/wp-json/wp/v2/battlefield-companies?tags=16146″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?tags=16146″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_topic?tags=16146″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?tags=16146″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:40159,”link”:”https://techcrunch.com/tag/messenger/”,”name”:”Messenger”,”slug”:”messenger”,”taxonomy”:”post_tag”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags/40159″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/post_tag”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?tags=40159″},{“href”:”https://techcrunch.com/wp-json/wp/v2/battlefield-companies?tags=40159″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?tags=40159″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_topic?tags=40159″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?tags=40159″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:37471,”link”:”https://techcrunch.com/tag/password/”,”name”:”Password”,”slug”:”password”,”taxonomy”:”post_tag”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags/37471″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/post_tag”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?tags=37471″},{“href”:”https://techcrunch.com/wp-json/wp/v2/battlefield-companies?tags=37471″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?tags=37471″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_topic?tags=37471″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?tags=37471″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:84527,”link”:”https://techcrunch.com/tag/prevention/”,”name”:”Prevention”,”slug”:”prevention”,”taxonomy”:”post_tag”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags/84527″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/post_tag”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?tags=84527″},{“href”:”https://techcrunch.com/wp-json/wp/v2/battlefield-companies?tags=84527″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?tags=84527″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_topic?tags=84527″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?tags=84527″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:192933,”link”:”https://techcrunch.com/tag/ransomware/”,”name”:”ransomware”,”slug”:”ransomware”,”taxonomy”:”post_tag”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags/192933″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/post_tag”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?tags=192933″},{“href”:”https://techcrunch.com/wp-json/wp/v2/battlefield-companies?tags=192933″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?tags=192933″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_topic?tags=192933″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?tags=192933″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:14812,”link”:”https://techcrunch.com/tag/safety/”,”name”:”Safety”,”slug”:”safety”,”taxonomy”:”post_tag”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags/14812″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/post_tag”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?tags=14812″},{“href”:”https://techcrunch.com/wp-json/wp/v2/battlefield-companies?tags=14812″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?tags=14812″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_topic?tags=14812″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?tags=14812″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:801,”link”:”https://techcrunch.com/tag/security/”,”name”:”security”,”slug”:”security”,”taxonomy”:”post_tag”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags/801″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/post_tag”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?tags=801″},{“href”:”https://techcrunch.com/wp-json/wp/v2/battlefield-companies?tags=801″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?tags=801″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_topic?tags=801″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?tags=801″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:449556042,”link”:”https://techcrunch.com/tag/security-breaches/”,”name”:”security breaches”,”slug”:”security-breaches”,”taxonomy”:”post_tag”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags/449556042″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/post_tag”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?tags=449556042″},{“href”:”https://techcrunch.com/wp-json/wp/v2/battlefield-companies?tags=449556042″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?tags=449556042″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_topic?tags=449556042″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?tags=449556042″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}},{“id”:5497,”link”:”https://techcrunch.com/tag/web-browser/”,”name”:”web browser”,”slug”:”web-browser”,”taxonomy”:”post_tag”,”_links”:{“self”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags/5497″}],”collection”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/tags”}],”about”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/taxonomies/post_tag”}],”wp:post_type”:[{“href”:”https://techcrunch.com/wp-json/wp/v2/posts?tags=5497″},{“href”:”https://techcrunch.com/wp-json/wp/v2/battlefield-companies?tags=5497″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc-media-gallery?tags=5497″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_topic?tags=5497″},{“href”:”https://techcrunch.com/wp-json/wp/v2/tc_video?tags=5497″}],”curies”:[{“name”:”wp”,”href”:”https://api.w.org/{rel}”,”templated”:true}]}}],[],[],[]]}}],”media”:[],”events”:[],”battlefieldEvents”:[],”battlefieldCompanies”:[],”battlefieldPages”:[]},”current_posts”:[1672453],”request”:”/2018/07/12/ransomware-technique-uses-your-real-passwords-to-trick-you/”,”siteURI”:”https://techcrunch.com/”,”totalPages”:”0″,”trending”:[{“id”:”291″,”link”:”https://techcrunch.com/tag/apple/”,”name”:”Apple “,”type”:”tag”},{“id”:”2401″,”link”:”https://techcrunch.com/transportation/”,”name”:”Transportation “,”type”:”category”},{“id”:”424613844″,”link”:”https://techcrunch.com/artificial-intelligence-2/”,”name”:”Artificial Intelligence “,”type”:”category”},{“id”:”60523764″,”link”:”https://techcrunch.com/fundings-exits/”,”name”:”Fundings & Exits “,”type”:”category”},{“id”:”134650847″,”link”:”https://techcrunch.com/tag/magic-leap/”,”name”:”Magic Leap “,”type”:”tag”},{“id”:”81819″,”link”:”https://techcrunch.com/tag/facebook/”,”name”:”Facebook “,”type”:”tag”},{“id”:”1564870″,”link”:”https://techcrunch.com/events/disrupt-sf-2018/”,”name”:”Disrupt SF 2018 “,”type”:”event”},{“id”:”81″,”link”:”https://techcrunch.com/tag/google/”,”name”:”Google “,”type”:”tag”},{“id”:”6602″,”link”:”https://techcrunch.com/tag/amazon/”,”name”:”Amazon “,”type”:”tag”},{“id”:”1564870″,”link”:”https://techcrunch.com/events/disrupt-sf-2018/”,”name”:”Disrupt SF 2018 “,”type”:”event”},{“id”:”449223024″,”link”:”https://techcrunch.com/hardware/”,”name”:”Hardware “,”type”:”category”},{“id”:”15986864″,”link”:”https://techcrunch.com/government-2/”,”name”:”Government “,”type”:”category”},{“id”:”449557044″,”link”:”https://techcrunch.com/enterprise/”,”name”:”Enterprise “,”type”:”category”},{“id”:”3457″,”link”:”https://techcrunch.com/social/”,”name”:”Social “,”type”:”category”},{“id”:”449223024″,”link”:”https://techcrunch.com/hardware/”,”name”:”Hardware “,”type”:”category”},{“id”:”426637499″,”link”:”https://techcrunch.com/privacy/”,”name”:”Privacy “,”type”:”category”},{“id”:”13217″,”link”:”https://techcrunch.com/policy/”,”name”:”Policy “,”type”:”category”}],”videoPlayerIds”:{“no-ad-autostart”:”56f58bbbe4b01497527036b2″,”regular”:”56df4e9de4b0c9c31d626c18″,”regular-autostart”:”56faf851e4b0d3dcac2e081a”,”sideview-autostart”:”57e2c53fcc52c7730882bbfe”},”facebookPixelId”:”1447508128842484″,”marketoAccountId”:”270-WRY-762″,”vidibleCompanyId”:”564f313b67b6231408bc51ee”,”recaptchaPublic”:”6LeZyjwUAAAAABqkWH_Ct0efGn0B4pGU6ZLUeUvA”,”googleAnalyticsID”:”UA-991406-1″,”googleAnalyticsDomains”:[“techcrunch.com”],”tinypass”:{“scriptURL”:”https://dashboard.tinypass.com”,”apiKey”:”Fy7FpgyUxA”,”apiURL”:”https://api.tinypass.com”},”legacyPages”:[],”apiNonce”:”7d505cd4a1″,”userCan”:{“editPosts”:false,”restNonce”:null},”initialStore”:{“events”:{“eventTypeIDs”:[],”eventPostIds”:[],”featuredEventIDs”:{“event_home”:[]},”featuredPostIDs”:{},”pastEventIDs”:{“default”:[]},”pastFilters”:{},”pastLoading”:false,”upcomingEventIDs”:{“default”:null},”upcomingFilters”:{},”upcomingLoading”:false},”section”:{“allPosts”:[1672453],”contentObject”:null,”currentPage”:1,”expandedPost”:”https://techcrunch.com/2018/07/12/ransomware-technique-uses-your-real-passwords-to-trick-you/”,”expandedIsland”:””,”loading”:false,”component”:”singlePost”}}};
/* ]]> */
News source