{"id":2027,"date":"2017-10-11T10:43:55","date_gmt":"2017-10-11T09:43:55","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=2027"},"modified":"2017-10-11T10:43:55","modified_gmt":"2017-10-11T09:43:55","slug":"security-flaw-leaves-cars-vulnerable-hacked","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked","title":{"rendered":"Security flaw leaves cars vulnerable to being hacked"},"content":{"rendered":"<p>Researchers say they&#8217;ve discovered a security flaw that can affect any vehicle featuring &#8220;<em>controller area network&#8221;<\/em> systems &#8211; AKA a &#8220;CAN bus&#8221; &#8211; which is basically the network that interconnects components in a car. The &#8220;CAN bus&#8221; interconnects things like parking assist features, electric windows, and engine control units.<\/p>\n<p>Researchers say hackers can access the connection and bombard it with error messages until the system shuts down to protect its other components. An attacker can therefore theoretically switch off safety features like airbags, ABS brakes, power steering or perhaps even lock someone out of their car.<br \/>\n<!--more--><\/p>\n<h2>Car hacking worries<\/h2>\n<p>With advancing technology pushing for completely autonomous vehicles, there is a huge concern that hackers could completely take over and control all aspects of a vehicle, which is a very worrying thought.<\/p>\n<p>Newer cars boast clever features to help drivers and passengers have more efficient and smoother journeys. For certain vehicles, drivers can even create profiles which stores their favourite songs, destinations and the frequency of a specific journeys. Although the risk of having personal information stolen is present, this particular flaw reportedly doesn&#8217;t allow someone to hack into a component to take control or steal information, but rather hit it with a &#8220;denial-of-service&#8221; attack.<\/p>\n<h3>Previous and ongoing research<\/h3>\n<p>Back in 2015, researchers Chris Miller and Chris Valasek managed to remotely hack into and take complete control of a Jeep&#8217;s radio, windscreen wipers and fluid, and air conditioning. Shockingly, the duo were also able to control the vehicles steering, disable its brakes and even turn the power off.<\/p>\n<p>Thankfully, the vulnerability was easily patched up with a recall and updated software, but the design flaw is thought to still affect the &#8220;CAN bus&#8221; messaging protocol standard used in &#8220;CAN controller chips&#8221;. As such, even a recall may not be effective because the security flaw is &#8220;not specific to one vehicle model or its underlying electronics.&#8221;<\/p>\n<p>Online IT and technology news platform <em>ZDNet<\/em> say this particular flaw doesn&#8217;t attack to inject a malicious command into the network, but rather targets how the CAN system responds to error messages. When bombarded by an excessive number of error messages it disconnects and disables the device&#8217;s functionality.<\/p>\n<p>This was an intended design to stop malfunctioning devices from triggering other systems on the &#8220;CAN bus&#8221;, but is nevertheless a vulnerability attackers could abuse. It therefore seems paramount to create a layer of cybersecurity to prevent attackers from reaching the &#8220;CAN&#8221; system.<\/p>\n<h3>Intrusion detection systems required?<\/h3>\n<p>Security researcher Charlie Miller was part of the team who hacked into the Jeep warns that an intrusion-detection system is required, but noted that the system could find it difficult to <strong>distinguish between a genuine fault component and an attack on the system<\/strong>.<\/p>\n<p>Researchers are reportedly working hard to fix the problem, but note that the vulnerability is a worldwide problem, so without global compliance, security may not be effective.<\/p>\n<h3>Cyber risks and autonomous vehicles<\/h3>\n<p>The U.K. government recently gave car companies the go ahead to test a number of self-driving commercial trucks on British roads. However, the government also apparently recognises the magnitude of the task ahead; trying to stop vehicles purely controlled by software from being hacked.<\/p>\n<p>They published the &#8220;Key principles of vehicle cyber security for connected and automated vehicles&#8221;, and the principles read as follows:<\/p>\n<div class=\"well\">\n<ul>\n<li>Organisational security is owned, governed and promoted at board level<\/li>\n<li>Security risks are assessed and managed appropriately and proportionately, including those specific to the supply chain<\/li>\n<li>Organisations need product aftercare and incident response to ensure systems are secure over their lifetime<\/li>\n<li>All organisations, including sub-contractors, suppliers and potential third parties, work together to enhance the security of the system<\/li>\n<li>Systems are designed using a <em>defence-in-depth<\/em> approach<\/li>\n<li>The security of all software is managed throughout its lifetime<\/li>\n<li>The storage and transmission of data is secure and can be controlled<\/li>\n<li>The system is designed to be resilient to attacks and respond appropriately when its defences or sensors fail<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Researchers say they&#8217;ve discovered a security flaw that can affect any vehicle featuring &#8220;controller area network&#8221; systems &#8211; AKA a &#8220;CAN bus&#8221; &#8211; which is basically the network that interconnects components in a car. The &#8220;CAN bus&#8221; interconnects things like parking assist features, electric windows, and engine control units. Researchers say hackers can access the &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Security flaw leaves cars vulnerable to being hacked<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":2033,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[45,20],"class_list":["post-2027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-news","tag-car-hacking","tag-online-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Flaw Leaves Cars Vulnerable To Being Hacked<\/title>\n<meta name=\"description\" content=\"Concerns are being raised over the cybersecurity flaws in modern cars which could possibly leave them open to being hacked.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Flaw Leaves Cars Vulnerable To Being Hacked\" \/>\n<meta property=\"og:description\" content=\"Concerns are being raised over the cybersecurity flaws in modern cars which could possibly leave them open to being hacked.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-11T09:43:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-large-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-large-min.png\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\"},\"headline\":\"Security flaw leaves cars vulnerable to being hacked\",\"datePublished\":\"2017-10-11T09:43:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked\"},\"wordCount\":667,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/car-hacking-min.png\",\"keywords\":[\"car hacking\",\"online security\"],\"articleSection\":[\"Hacking News\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked\",\"name\":\"Security Flaw Leaves Cars Vulnerable To Being Hacked\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/car-hacking-min.png\",\"datePublished\":\"2017-10-11T09:43:55+00:00\",\"description\":\"Concerns are being raised over the cybersecurity flaws in modern cars which could possibly leave them open to being hacked.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/car-hacking-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/car-hacking-min.png\",\"width\":725,\"height\":250,\"caption\":\"car hacking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-flaw-leaves-cars-vulnerable-hacked#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security flaw leaves cars vulnerable to being hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/maisie\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Flaw Leaves Cars Vulnerable To Being Hacked","description":"Concerns are being raised over the cybersecurity flaws in modern cars which could possibly leave them open to being hacked.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked","og_locale":"en_GB","og_type":"article","og_title":"Security Flaw Leaves Cars Vulnerable To Being Hacked","og_description":"Concerns are being raised over the cybersecurity flaws in modern cars which could possibly leave them open to being hacked.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2017-10-11T09:43:55+00:00","og_image":[{"width":1200,"height":680,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-large-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-large-min.png","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd"},"headline":"Security flaw leaves cars vulnerable to being hacked","datePublished":"2017-10-11T09:43:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked"},"wordCount":667,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-min.png","keywords":["car hacking","online security"],"articleSection":["Hacking News"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked","name":"Security Flaw Leaves Cars Vulnerable To Being Hacked","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-min.png","datePublished":"2017-10-11T09:43:55+00:00","description":"Concerns are being raised over the cybersecurity flaws in modern cars which could possibly leave them open to being hacked.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-min.png","width":725,"height":250,"caption":"car hacking"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Security flaw leaves cars vulnerable to being hacked"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/maisie"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=2027"}],"version-history":[{"count":4,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2027\/revisions"}],"predecessor-version":[{"id":2034,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2027\/revisions\/2034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2033"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=2027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=2027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=2027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}