{"id":3463,"date":"2011-08-04T12:28:07","date_gmt":"2011-08-04T05:28:07","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/2011\/08\/04\/hacker-%e2%80%98armageddon%e2%80%99-forces-symantec-mcafee-to-search-for-fixes\/"},"modified":"2011-08-04T12:28:07","modified_gmt":"2011-08-04T05:28:07","slug":"hacker-%e2%80%98armageddon%e2%80%99-forces-symantec-mcafee-to-search-for-fixes","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2011\/08\/hacker-%e2%80%98armageddon%e2%80%99-forces-symantec-mcafee-to-search-for-fixes\/","title":{"rendered":"Hacker \u2018Armageddon\u2019 Forces Symantec, McAfee to Search for Fixes"},"content":{"rendered":"<p>A surge in high-profile hacker attacks this year is demonstrating the limits of an older generation of security software from Symantec Corp. (SYMC) and McAfee Inc., putting pressure on them to revamp their product lines.<\/p>\n<p>See the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/rds.yahoo.com\/_ylt=A2KJ3CYwCTtOMwIAFa__wgt.;_ylu=X3oDMTBzdmRpc2loBHBvcwMxMARzZWMDc3IEY29sbwNhYzQEdnRpZAM-\/SIG=13ufm574h\/EXP=1312520624\/**http:\/\/www.bloomberg.com\/news\/2011-08-04\/hacker-armageddon-forces-symantec-mcafee-to-search-for-fixes.html\" title=\"Hacker \u2018Armageddon\u2019 Forces Symantec, McAfee to Search for Fixes\">Hacker \u2018Armageddon\u2019 Forces Symantec, McAfee to Search for Fixes<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A surge in high-profile hacker attacks this year is demonstrating the limits of an older generation of security software from Symantec Corp. (SYMC) and McAfee Inc., putting pressure on them to revamp their product lines.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3,35],"tags":[1118,1113,2866],"class_list":["post-3463","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-hacker-attacks","tag-limits","tag-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-TR","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/3463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=3463"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/3463\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=3463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=3463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=3463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}