{"id":6629,"date":"2016-12-21T00:35:15","date_gmt":"2016-12-21T05:35:15","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/?p=6629"},"modified":"2017-09-24T20:07:21","modified_gmt":"2017-09-24T14:37:21","slug":"quiz-can-you-tell-a-cyberthreat-from-biological-one","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/quiz-can-you-tell-a-cyberthreat-from-biological-one\/6629\/","title":{"rendered":"Quiz: Can you tell a cyberthreat from biological one?"},"content":{"rendered":"<p>Some physical viruses and parasites behave a lot like electronic viruses \u2014 or is it the other way around? Viruses take control of their hosts and use them to reproduce and to infect other victims. Physicians and cybersecurity experts can differentiate their behavior patterns. Can you?<\/p>\n<div data-opinionstage-embed-url=\"https:\/\/www.opinionstage.com\/api\/v1\/widgets\/kasperskysm\/virus-or-virus-can-you-tell-a-cyber-threat-from-biological-one\/code.json?width=\" style=\"display: none; visibility: hidden;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Some physical viruses and parasites behave a lot like electronic viruses \u2014 or is it the other way around? Viruses take control of their hosts and use them to reproduce<\/p>\n","protected":false},"author":522,"featured_media":6630,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2195],"tags":[282,36,1939,606,527],"class_list":{"0":"post-6629","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-special-projects","8":"tag-cybersecurity","9":"tag-malware-2","10":"tag-quizz","11":"tag-tests","12":"tag-threats"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/quiz-can-you-tell-a-cyberthreat-from-biological-one\/6629\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/6629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=6629"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/6629\/revisions"}],"predecessor-version":[{"id":11344,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/6629\/revisions\/11344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/6630"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=6629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=6629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=6629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}