{"id":4981,"date":"2017-05-23T14:03:35","date_gmt":"2017-05-23T18:03:35","guid":{"rendered":"https:\/\/armchairarcade.com\/perspectives\/?p=4981"},"modified":"2017-08-08T15:03:30","modified_gmt":"2017-08-08T19:03:30","slug":"need-know-mays-cyber-attack","status":"publish","type":"post","link":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/","title":{"rendered":"What You Need to Know About May&#8217;s Cyber Attack"},"content":{"rendered":"<p>Cyber security has been a big concern for governments, businesses, and citizens worldwide in recent years. Most people and organizations use antivirus and anti-malware software on their computers and know the signs of phishing scams. However, this hasn&#8217;t prevented cyber attacks from occurring.<\/p>\n<p>The latest cyber attack, called WannaCry, attacked more than 150 countries and <a href=\"http:\/\/money.cnn.com\/2017\/05\/15\/technology\/cyberattack-dont-pay-ransom\/\" target=\"_blank\" rel=\"noopener noreferrer\">infected more than 200,000 devices<\/a>, reports Europe&#8217;s law enforcement agency Europol. These enormous numbers make it one of the largest <a href=\"http:\/\/www.zonealarm.com\/blog\/2017\/07\/ransomware-attacks-scarier-think\/\" target=\"_blank\" rel=\"noopener\">ransomware cyber attacks<\/a> in history. Here&#8217;s a closer look at what you need to know:<\/p>\n<h1>What Happened?<\/h1>\n<p>The worldwide cyber attack is a piece of malware that locks users out of their devices and encrypts their data unless they pay a $300 to $600 ransom. The attack focused on older versions of Microsoft Windows that had not been updated with the latest security patch. They believe the malware was designed to contact an <a href=\"http:\/\/money.cnn.com\/2017\/05\/13\/technology\/ransomware-attack-nsa-microsoft\/\" target=\"_blank\" rel=\"noopener noreferrer\">unregistered domain in its code<\/a>, and security research found a kill switch by simply registering the domain. However, copycat attacks and variants have already emerged.<\/p>\n<h1>What&#8217;s Being Done?<\/h1>\n<p>For now, tech experts are depending on the kill switch to stop the malware attack. They encourage you to update all of your devices as quickly as possible, but recognize this may take more time for large businesses.<\/p>\n<p>Governments worldwide are preparing for a <a href=\"https:\/\/www.nytimes.com\/2017\/05\/14\/world\/europe\/cyberattacks-hack-computers-monday.html?_r=0\" target=\"_blank\" rel=\"noopener noreferrer\">second wave of attacks<\/a>, reports The New York Times. For example, Britain&#8217;s defense minister told BBC that it&#8217;s investing about $64 million in improving cyber security for its National Health Service because it may be using outdated software and was affected by the first attack. Indonesia is taking similar precautions to get its equipment up to date. Governments and tech experts also are looking for the source of the attack by tracking Bitcoin payments and possible leaks of security vulnerabilities from sources like the NSA in the United States.<\/p>\n<h1>What Lessons Can be Learned?<\/h1>\n<p>The most important lesson you can learn from the WannaCry attack is to keep your devices up to date. You should implement automatic updates for your computer, tablet, and smartphone software. These updates have important security patches and are vital for protecting your information. Microsoft also emphasizes that you should not use pirated software because you will not have access to any updates or patches, making your device more vulnerable to attacks.<\/p>\n<p>A related lesson is to purchase new devices when the older ones are no longer supported by the manufacturer. For example, some of the devices attacked were still running Microsoft Windows XP, which the company doesn&#8217;t send automatic updates to. The same thing goes for tablet and smartphone devices.<\/p>\n<p>If you&#8217;re still using one of the first generations of the Samsung Galaxy line, for example, you may not be able to receive the latest Android updates. This means you need to buy a new smartphone, like the Samsung Galaxy S8. Not only do these have updated Android software, but newer devices also <a href=\"https:\/\/www.t-mobile.com\/cell-phones\" target=\"_blank\" rel=\"noopener noreferrer\">come with their own security programs<\/a>, such as Samsung Knox.<\/p>\n<p>If you have been affected by the WannaCry cyberattack, do not pay the ransom. This could encourage similar attacks in the future and it doesn&#8217;t guarantee you&#8217;ll get all of your information back. CNN has provided a link to an international security project, called <a href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">nomoreransom.org<\/a>, to help you unlock your computer without paying the ransom.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security has been a big concern for governments, businesses, and citizens worldwide in recent years. Most people and organizations use antivirus and anti-malware software on their computers and know the signs of phishing scams. However, this hasn&#8217;t prevented cyber attacks from occurring. The latest cyber attack, called WannaCry, attacked [&hellip;]<\/p>\n","protected":false},"author":19462,"featured_media":4984,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"What You Need to Know About May's Cyber Attack #security #cyberattack #wannacry #phishing #scam","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[15],"tags":[1248,1249,1250,91,734,1247],"class_list":["post-4981","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial","tag-cyber-attack","tag-cyberattack","tag-phishing","tag-scam","tag-security","tag-wannacry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What You Need to Know About May&#039;s Cyber Attack - Armchair Arcade<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What You Need to Know About May&#039;s Cyber Attack - Armchair Arcade\" \/>\n<meta property=\"og:description\" content=\"Cyber security has been a big concern for governments, businesses, and citizens worldwide in recent years. Most people and organizations use antivirus and anti-malware software on their computers and know the signs of phishing scams. However, this hasn&#8217;t prevented cyber attacks from occurring. The latest cyber attack, called WannaCry, attacked [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Armchair Arcade\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-23T18:03:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-08T19:03:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/banner.jpg?fit=500%2C350&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Armchair Arcade Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@armchairarcade\" \/>\n<meta name=\"twitter:site\" content=\"@armchairarcade\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Armchair Arcade Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/\"},\"author\":{\"name\":\"Armchair Arcade Staff\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/person\\\/72ba189c65dc0a47f1cbe8388fe66804\"},\"headline\":\"What You Need to Know About May&#8217;s Cyber Attack\",\"datePublished\":\"2017-05-23T18:03:35+00:00\",\"dateModified\":\"2017-08-08T19:03:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/\"},\"wordCount\":569,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/banner.jpg?fit=500%2C350&ssl=1\",\"keywords\":[\"cyber attack\",\"cyberattack\",\"phishing\",\"scam\",\"security\",\"wannacry\"],\"articleSection\":[\"Editorial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/\",\"name\":\"What You Need to Know About May's Cyber Attack - Armchair Arcade\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/banner.jpg?fit=500%2C350&ssl=1\",\"datePublished\":\"2017-05-23T18:03:35+00:00\",\"dateModified\":\"2017-08-08T19:03:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/banner.jpg?fit=500%2C350&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/banner.jpg?fit=500%2C350&ssl=1\",\"width\":500,\"height\":350,\"caption\":\"What You Need to Know About May's Cyber Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/23\\\/need-know-mays-cyber-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What You Need to Know About May&#8217;s Cyber Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#website\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\",\"name\":\"Armchair Arcade\",\"description\":\"Chronicling the complete history of videogames, computers, technology, and pop culture since 2003\",\"publisher\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\"},\"alternateName\":\"AA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\",\"name\":\"Armchair Arcade\",\"alternateName\":\"AA\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Google-250.png?fit=250%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Google-250.png?fit=250%2C250&ssl=1\",\"width\":250,\"height\":250,\"caption\":\"Armchair Arcade\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Armchair-Arcade\\\/141237783007\",\"https:\\\/\\\/x.com\\\/armchairarcade\",\"https:\\\/\\\/instagram.com\\\/bill_loguidice\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/billloguidice\",\"https:\\\/\\\/www.pinterest.com\\\/billloguidice\\\/armchair-arcade\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/BillLoguidice\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/person\\\/72ba189c65dc0a47f1cbe8388fe66804\",\"name\":\"Armchair Arcade Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Google-250.png?fit=96%2C96&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Google-250.png?fit=96%2C96&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Google-250.png?fit=96%2C96&ssl=1\",\"caption\":\"Armchair Arcade Staff\"},\"description\":\"Armchair Arcade editorial staff.\",\"sameAs\":[\"http:\\\/\\\/www.armchairarcade.com\"],\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/author\\\/armchair-arcade-staff\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What You Need to Know About May's Cyber Attack - Armchair Arcade","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/","og_locale":"en_US","og_type":"article","og_title":"What You Need to Know About May's Cyber Attack - Armchair Arcade","og_description":"Cyber security has been a big concern for governments, businesses, and citizens worldwide in recent years. Most people and organizations use antivirus and anti-malware software on their computers and know the signs of phishing scams. However, this hasn&#8217;t prevented cyber attacks from occurring. The latest cyber attack, called WannaCry, attacked [&hellip;]","og_url":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/","og_site_name":"Armchair Arcade","article_publisher":"https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007","article_published_time":"2017-05-23T18:03:35+00:00","article_modified_time":"2017-08-08T19:03:30+00:00","og_image":[{"width":500,"height":350,"url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/banner.jpg?fit=500%2C350&ssl=1","type":"image\/jpeg"}],"author":"Armchair Arcade Staff","twitter_card":"summary_large_image","twitter_creator":"@armchairarcade","twitter_site":"@armchairarcade","twitter_misc":{"Written by":"Armchair Arcade Staff","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/#article","isPartOf":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/"},"author":{"name":"Armchair Arcade Staff","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/person\/72ba189c65dc0a47f1cbe8388fe66804"},"headline":"What You Need to Know About May&#8217;s Cyber Attack","datePublished":"2017-05-23T18:03:35+00:00","dateModified":"2017-08-08T19:03:30+00:00","mainEntityOfPage":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/"},"wordCount":569,"commentCount":0,"publisher":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#organization"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/banner.jpg?fit=500%2C350&ssl=1","keywords":["cyber attack","cyberattack","phishing","scam","security","wannacry"],"articleSection":["Editorial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/","url":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/","name":"What You Need to Know About May's Cyber Attack - Armchair Arcade","isPartOf":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/#primaryimage"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/banner.jpg?fit=500%2C350&ssl=1","datePublished":"2017-05-23T18:03:35+00:00","dateModified":"2017-08-08T19:03:30+00:00","breadcrumb":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/#primaryimage","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/banner.jpg?fit=500%2C350&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/banner.jpg?fit=500%2C350&ssl=1","width":500,"height":350,"caption":"What You Need to Know About May's Cyber Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/23\/need-know-mays-cyber-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/armchairarcade.com\/perspectives\/"},{"@type":"ListItem","position":2,"name":"What You Need to Know About May&#8217;s Cyber Attack"}]},{"@type":"WebSite","@id":"https:\/\/armchairarcade.com\/perspectives\/#website","url":"https:\/\/armchairarcade.com\/perspectives\/","name":"Armchair Arcade","description":"Chronicling the complete history of videogames, computers, technology, and pop culture since 2003","publisher":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#organization"},"alternateName":"AA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/armchairarcade.com\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/armchairarcade.com\/perspectives\/#organization","name":"Armchair Arcade","alternateName":"AA","url":"https:\/\/armchairarcade.com\/perspectives\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Google-250.png?fit=250%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Google-250.png?fit=250%2C250&ssl=1","width":250,"height":250,"caption":"Armchair Arcade"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007","https:\/\/x.com\/armchairarcade","https:\/\/instagram.com\/bill_loguidice\/","https:\/\/www.linkedin.com\/in\/billloguidice","https:\/\/www.pinterest.com\/billloguidice\/armchair-arcade\/","https:\/\/www.youtube.com\/user\/BillLoguidice\/"]},{"@type":"Person","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/person\/72ba189c65dc0a47f1cbe8388fe66804","name":"Armchair Arcade Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/12\/Google-250.png?fit=96%2C96&ssl=1","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/12\/Google-250.png?fit=96%2C96&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/12\/Google-250.png?fit=96%2C96&ssl=1","caption":"Armchair Arcade Staff"},"description":"Armchair Arcade editorial staff.","sameAs":["http:\/\/www.armchairarcade.com"],"url":"https:\/\/armchairarcade.com\/perspectives\/author\/armchair-arcade-staff\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/banner.jpg?fit=500%2C350&ssl=1","jetpack-related-posts":[{"id":10116,"url":"https:\/\/armchairarcade.com\/perspectives\/2019\/09\/23\/how-to-protect-your-business-against-cyber-attacks\/","url_meta":{"origin":4981,"position":0},"title":"How To Protect Your Business Against Cyber Attacks","author":"Jane Smith","date":"September 23, 2019","format":false,"excerpt":"If you don\u2019t pay attention to cyber security, you could lose your small business. Follow these tips to protect your small business against cyber attacks.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"How To Protect Your Business Against Cyber Attacks","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/cyber_01.jpg?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/cyber_01.jpg?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/cyber_01.jpg?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/cyber_01.jpg?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/cyber_01.jpg?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":9296,"url":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/","url_meta":{"origin":4981,"position":1},"title":"Zero Trust Security: Taking your cyber security policy to the next level","author":"Andrei Kuznetsov","date":"March 14, 2019","format":false,"excerpt":"VPN services are becoming an almost omnipresent part of the modern Internet, as any assessment of contemporary VPN services - such as an Avast Secureline review - will tell you. Keeping up with all of the latest network security information can be challenging, but one approach that you should definitely\u2026","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Zero Trust Security: Taking your cyber security policy to the next level","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":185612,"url":"https:\/\/armchairarcade.com\/perspectives\/2024\/01\/24\/fortifying-the-virtual-fortress\/","url_meta":{"origin":4981,"position":2},"title":"Fortifying the Virtual Fortress: Cybersecurity, Crypto Payments, and the Shielding of Online Casino Platforms","author":"Jane Smith","date":"January 24, 2024","format":false,"excerpt":"his article delves into the evolving landscape of cyber threats, the role of cryptocurrency in online transactions, and the measures taken by online casinos to ensure a secure gaming environment.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Cryptocurrency security - Generated with AI","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":8825,"url":"https:\/\/armchairarcade.com\/perspectives\/2018\/12\/19\/what-to-love-about-vpn-connections\/","url_meta":{"origin":4981,"position":3},"title":"What to Love about VPN Connections","author":"Jonathan Adams","date":"December 19, 2018","format":false,"excerpt":"The Internet has made a lot of things more convenient for users. It has created a global village, virtually eliminating distance, and where information is readily accessible for anyone who seeks it. With U.S. mobile connectivity averaging 10.7 Mbps, imagining the things that you can do with all that power\u2026","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"What to Love about VPN Connections","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/12\/pexels-photo-926984.jpeg?fit=1200%2C748&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/12\/pexels-photo-926984.jpeg?fit=1200%2C748&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/12\/pexels-photo-926984.jpeg?fit=1200%2C748&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/12\/pexels-photo-926984.jpeg?fit=1200%2C748&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/12\/pexels-photo-926984.jpeg?fit=1200%2C748&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":9383,"url":"https:\/\/armchairarcade.com\/perspectives\/2019\/04\/15\/best-tools-and-tricks-for-your-online-safety\/","url_meta":{"origin":4981,"position":4},"title":"Best Tools And Tricks For Your Online Safety","author":"Abigail Massimo","date":"April 15, 2019","format":false,"excerpt":"With\u00a0hackers attacking every 39 seconds on average, online security is a top priority for everyone. Your personal information and physical location; your bank account data and passwords; your personal and work files: everything could be stolen or corrupted by online thieves and malicious software. As a response, the use of\u2026","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Best Tools And Tricks For Your Online Safety","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/04\/black-friday-buy-credit-card-34577.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/04\/black-friday-buy-credit-card-34577.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/04\/black-friday-buy-credit-card-34577.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/04\/black-friday-buy-credit-card-34577.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/04\/black-friday-buy-credit-card-34577.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":11017,"url":"https:\/\/armchairarcade.com\/perspectives\/2020\/02\/27\/ai-and-the-gaming-world-go-hand-in-hand-and-the-relationship-is-stronger-than-ever\/","url_meta":{"origin":4981,"position":5},"title":"AI Technology in the Gaming Industry","author":"Abigail Massimo","date":"February 27, 2020","format":false,"excerpt":"AI technology has been making strides at a rapid pace with every passing day. AI isn\u2019t merely an idea anymore, some fanciful, futuristic thing that will always be out of reach, it is all around us, we use it every day.\u00a0 AI is used in the financial sector, cyber security,\u2026","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"AI Technology in the Gaming Industry","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2020\/02\/AIGAMING.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2020\/02\/AIGAMING.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2020\/02\/AIGAMING.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2020\/02\/AIGAMING.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2020\/02\/AIGAMING.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/p5dH5R-1il","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts\/4981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/users\/19462"}],"replies":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/comments?post=4981"}],"version-history":[{"count":0,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts\/4981\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/media\/4984"}],"wp:attachment":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/media?parent=4981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/categories?post=4981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/tags?post=4981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}