{"id":2546,"date":"2008-09-18T20:00:01","date_gmt":"2008-09-19T00:00:01","guid":{"rendered":"http:\/\/www.hothardware.com\/News\/How-to-Hack-a-VP-Candidates-Email"},"modified":"2008-09-18T20:00:01","modified_gmt":"2008-09-19T00:00:01","slug":"how-to-hack-a-vp-candidates-email","status":"publish","type":"post","link":"https:\/\/computerhunter.us\/?p=2546","title":{"rendered":"How to Hack a VP Candidate&#8217;s Email"},"content":{"rendered":"<p>So just how did the Yahoo! email account of Sarah Palin, John McCain&#8217;s running mate, get hacked? It wasn&#8217;t by brute force, or because the password was obvious (like if she used her own name, Palin). No, it was social engineering that done her in. According to hackers posting to the \/b\/ board (or Random board) at 4chan.org, they didn&#8217;t hack her password, they reset it. Using the Yahoo! Mail option to reset or recover one&#8217;s user name and password (above), they were able to reset her password. As she is a public<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So just how did the Yahoo! email account of Sarah Palin, John McCain&#8217;s running mate, get hacked? It wasn&#8217;t by brute force, or because the password was obvious (like if she used her own name, Palin). No, it was social engineering that done her in. According to hackers posting to the \/b\/ board (or Random board) at 4chan.org, they didn&#8217;t hack her password, they reset it. Using the Yahoo! Mail option to reset or recover one&#8217;s user name and password (above), they were able to reset her password. As she is a public <a href=\"https:\/\/computerhunter.us\/?p=2546\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-2546","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/2546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2546"}],"version-history":[{"count":0,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/2546\/revisions"}],"wp:attachment":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}