	{"id":10617,"date":"2013-02-12T11:10:30","date_gmt":"2013-02-12T19:10:30","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=10617"},"modified":"2013-04-03T12:04:46","modified_gmt":"2013-04-03T19:04:46","slug":"cyberwarfare-is-putting-ordinary-citizens-at-risk","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/","title":{"rendered":"Cyberwarfare is Putting Ordinary Citizens at Risk"},"content":{"rendered":"<p>There was a <a href=\"http:\/\/www.npr.org\/2013\/02\/12\/171737191\/in-cyberwar-software-flaws-are-a-hot-commodity\">recent article on NPR<\/a> about the vulnerability market that has cropped up in the last several years, where researchers can sell their findings to the highest bidder. Sometimes those bidders are governments, sometimes those bidders are cybercriminals, but there is very little way of knowing as there are no regulations.<\/p>\n<p>The fundamental problem here is that having an unregulated grey market for vulnerabilities is part and parcel of accepting the use of \u201ccyberweapons.\u201d By attacking other countries, we\u2019re essentially saying that this is acceptable behavior, which means that it\u2019s also okay for these other companies to attack us. And the <a href=\"http:\/\/security.blogs.cnn.com\/2012\/07\/26\/head-of-nations-cyber-defense-u-s-attack-preparation-poor\/\">incredibly poor state of information security readiness<\/a> of our national infrastructure could put us in a very dangerous situation sooner than later. If these sales were reported and use was licensed, it would not end sale of vulnerabilities to criminals, but it could certainly decrease them.<\/p>\n<p>On a mundane level it likely means you and I, as everyday users, are surfing around with holes that may already be known to criminals who are actively trying to steal our data. On a more universal level, it could mean we\u2019re open to some very real life-or-death problems.<\/p>\n<p>So, what can you do about it? On a certain level, surfing around with unknown holes is just a fact of life and why security people recommend layered defenses. On a political level, this article\u2019s final point is right on \u2013 regulating \u201ccyberweapons\u201d is a no-brainer and something we should request of our legislators.<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/68751915@N05\/6280512549\/\">401(K) 2013<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There was a recent article on NPR about the vulnerability market that has cropped up in the last several years, where researchers can sell their findings to the highest bidder. Sometimes those bidders are governments, sometimes those bidders are cybercriminals, but there is very little way of knowing as there are no regulations. The fundamental [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10627,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[291,293,289],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There was a recent article on NPR about the vulnerability market that has cropped up in the last several years, where researchers can sell their findings\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberwarfare is Putting Ordinary Citizens at Risk - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There was a recent article on NPR about the vulnerability market that has cropped up in the last several years, where researchers can sell their findings\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-12T19:10:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-04-03T19:04:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/money-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/money-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/money-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/\",\"name\":\"Cyberwarfare is Putting Ordinary Citizens at Risk - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#primaryimage\"},\"datePublished\":\"2013-02-12T19:10:30+00:00\",\"dateModified\":\"2013-04-03T19:04:46+00:00\",\"description\":\"There was a recent article on NPR about the vulnerability market that has cropped up in the last several years, where researchers can sell their findings\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberwarfare is Putting Ordinary Citizens at Risk\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Cyberwarfare is Putting Ordinary Citizens at Risk\",\"datePublished\":\"2013-02-12T19:10:30+00:00\",\"dateModified\":\"2013-04-03T19:04:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#webpage\"},\"wordCount\":268,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/money-thumb.jpg\",\"keywords\":[\"Cybercrime\",\"cyberwar\",\"Government\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There was a recent article on NPR about the vulnerability market that has cropped up in the last several years, where researchers can sell their findings","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/","og_locale":"en_US","og_type":"article","og_title":"Cyberwarfare is Putting Ordinary Citizens at Risk - The Mac Security Blog","og_description":"There was a recent article on NPR about the vulnerability market that has cropped up in the last several years, where researchers can sell their findings","og_url":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-02-12T19:10:30+00:00","article_modified_time":"2013-04-03T19:04:46+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/money-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/money-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/money-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/","name":"Cyberwarfare is Putting Ordinary Citizens at Risk - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#primaryimage"},"datePublished":"2013-02-12T19:10:30+00:00","dateModified":"2013-04-03T19:04:46+00:00","description":"There was a recent article on NPR about the vulnerability market that has cropped up in the last several years, where researchers can sell their findings","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Cyberwarfare is Putting Ordinary Citizens at Risk"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Cyberwarfare is Putting Ordinary Citizens at Risk","datePublished":"2013-02-12T19:10:30+00:00","dateModified":"2013-04-03T19:04:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#webpage"},"wordCount":268,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/money-thumb.jpg","keywords":["Cybercrime","cyberwar","Government"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/cyberwarfare-is-putting-ordinary-citizens-at-risk\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/money-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2Lf","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10617"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=10617"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10617\/revisions"}],"predecessor-version":[{"id":13147,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10617\/revisions\/13147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/10627"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=10617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=10617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=10617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}