{"id":171,"date":"2019-03-11T23:35:05","date_gmt":"2019-03-11T21:35:05","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=171"},"modified":"2020-05-31T01:44:55","modified_gmt":"2020-05-30T23:44:55","slug":"us-military-and-government-websites-hacked","status":"publish","type":"post","link":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/","title":{"rendered":"US Military and Government Websites Hacked"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>US Military and Government Websites Hacked! Is Your Website Safe?<\/strong><\/p>\n<p style=\"text-align: justify;\">Today\u2019s cybercriminals are more fearless than your average criminals.<\/p>\n<p style=\"text-align: justify;\">Even the worst of villains would never attack a U.S. Military facility (unless you\u2019re watching a movie).<\/p>\n<p style=\"text-align: justify;\">Whereas in cyberspace, all targets are at risk, regardless of government or military status.<\/p>\n<p style=\"text-align: justify;\">Cybercriminals are clearly not discriminating against acts of intrusion when it comes to websites.<\/p>\n<p style=\"text-align: justify;\">Last month a California hacker was arrested for defacing numerous military, government, and business websites, including West Point\u2019s Combating Terrorism Center and the New York City Comptroller\u2019s Office.<\/p>\n<p style=\"text-align: justify;\">According to the Department of Justice, the hacker allegedly used a well-known exploit called Cross-Site Scripting (XSS) to hack over 11,000 websites!<\/p>\n<p style=\"text-align: justify;\">The FBI\u2019s Assistant Director for the New York Field Office, William F. Sweeney Jr., said, \u201cWebsite defacements can disrupt an organization\u2019s operations and damage its credibility.\u201d<\/p>\n<p style=\"text-align: justify;\">The comptroller\u2019s office ultimately paid more than $5,000 to fix the damage, while the US government paid more than $7,000 to fix West Point\u2019s site.<\/p>\n<p style=\"text-align: justify;\">It\u2019s obvious that tampering with websites is probably the most common type of hacking.<\/p>\n<p style=\"text-align: justify;\">This is the statement of Levi Gundert, a former US Secret Service special agent within the Los Angeles Electronic Crimes Task Force.<\/p>\n<p style=\"text-align: justify;\">Mr. Gundert wisely reminds us of the potential for harm when cybercriminals gain unauthorized access to web servers such as the large-scale Equifax breach last year which exposed the personal information of 145 million Americans.<\/p>\n<p style=\"text-align: justify;\">He concludes by saying \u201cOrganizations generally underestimate the damage that can be done.\u201d<\/p>\n<p style=\"text-align: justify;\">Whether large or small, it\u2019s clear all websites are at risk.<\/p>\n<p style=\"text-align: justify;\">So how much damage can you afford?<\/p>\n<p style=\"text-align: justify;\">cWatch Web can help you to never answer that question.<\/p>\n<p style=\"text-align: justify;\">As the old adage goes, \u201can ounce of prevention is worth a pound of cure.\u201d<\/p>\n<p style=\"text-align: justify;\">cWatch Web\u00a0offers you access to the best of both worlds.<\/p>\n<p style=\"text-align: justify;\">With an innovative 6-layer stacked security solution, cWatch provides comprehensive protection against the OWASP Top 10 most critical security risks, including Cross-Site Scripting (XSS).<\/p>\n<p>Don\u2019t put your organization at risk by underestimating cybercriminals.<\/p>\n<p>Start with a complimentary scan and immediately discover vulnerabilities that may be threatening your website.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>US Military and Government Websites Hacked! Is Your Website Safe? Today\u2019s cybercriminals are more fearless than your average criminals. Even the worst of villains would never attack a U.S. Military facility (unless you\u2019re watching a movie). Whereas in cyberspace, all targets are at risk, regardless of government or military status. Cybercriminals are clearly not discriminating against acts of intrusion when it comes to websites. Last month a California hacker was arrested for defacing numerous military, government, and business websites, including West Point\u2019s Combating Terrorism Center and the New York City Comptroller\u2019s Office. According to the Department of Justice, the hacker\u2026<\/p>\n","protected":false},"author":3,"featured_media":172,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-171","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":4}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>US Military and Government Websites Hacked - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"US Military and Government Websites Hacked - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"US Military and Government Websites Hacked! Is Your Website Safe? Today\u2019s cybercriminals are more fearless than your average criminals. Even the worst of villains would never attack a U.S. Military facility (unless you\u2019re watching a movie). Whereas in cyberspace, all targets are at risk, regardless of government or military status. Cybercriminals are clearly not discriminating against acts of intrusion when it comes to websites. Last month a California hacker was arrested for defacing numerous military, government, and business websites, including West Point\u2019s Combating Terrorism Center and the New York City Comptroller\u2019s Office. According to the Department of Justice, the hacker\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/hackermoz\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-11T21:35:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:44:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacking-democracy-inside-russia-social-media-war-america.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1787\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"US Military and Government Websites Hacked\",\"datePublished\":\"2019-03-11T21:35:05+00:00\",\"dateModified\":\"2020-05-30T23:44:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/\"},\"wordCount\":365,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacking-democracy-inside-russia-social-media-war-america.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/\",\"name\":\"US Military and Government Websites Hacked - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacking-democracy-inside-russia-social-media-war-america.jpg\",\"datePublished\":\"2019-03-11T21:35:05+00:00\",\"dateModified\":\"2020-05-30T23:44:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacking-democracy-inside-russia-social-media-war-america.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacking-democracy-inside-russia-social-media-war-america.jpg\",\"width\":2560,\"height\":1787},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/us-military-and-government-websites-hacked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"US Military and Government Websites Hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.com\",\"https:\\\/\\\/www.facebook.com\\\/hackermoz\\\/\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"US Military and Government Websites Hacked - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/","og_locale":"en_US","og_type":"article","og_title":"US Military and Government Websites Hacked - MozDomains Blog","og_description":"US Military and Government Websites Hacked! Is Your Website Safe? Today\u2019s cybercriminals are more fearless than your average criminals. Even the worst of villains would never attack a U.S. Military facility (unless you\u2019re watching a movie). Whereas in cyberspace, all targets are at risk, regardless of government or military status. Cybercriminals are clearly not discriminating against acts of intrusion when it comes to websites. Last month a California hacker was arrested for defacing numerous military, government, and business websites, including West Point\u2019s Combating Terrorism Center and the New York City Comptroller\u2019s Office. According to the Department of Justice, the hacker\u2026","og_url":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/","og_site_name":"MozDomains Blog","article_author":"https:\/\/www.facebook.com\/hackermoz\/","article_published_time":"2019-03-11T21:35:05+00:00","article_modified_time":"2020-05-30T23:44:55+00:00","og_image":[{"width":2560,"height":1787,"url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacking-democracy-inside-russia-social-media-war-america.jpg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"US Military and Government Websites Hacked","datePublished":"2019-03-11T21:35:05+00:00","dateModified":"2020-05-30T23:44:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/"},"wordCount":365,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacking-democracy-inside-russia-social-media-war-america.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/","url":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/","name":"US Military and Government Websites Hacked - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacking-democracy-inside-russia-social-media-war-america.jpg","datePublished":"2019-03-11T21:35:05+00:00","dateModified":"2020-05-30T23:44:55+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/#primaryimage","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacking-democracy-inside-russia-social-media-war-america.jpg","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacking-democracy-inside-russia-social-media-war-america.jpg","width":2560,"height":1787},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/us-military-and-government-websites-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"US Military and Government Websites Hacked"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#website","url":"https:\/\/www.mozdomains.com\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.com\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.com","https:\/\/www.facebook.com\/hackermoz\/","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.com\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts\/171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=171"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts\/171\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/media\/172"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}