{"id":187,"date":"2008-03-07T16:04:52","date_gmt":"2008-03-08T00:04:52","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/03\/07\/the-newton-virus-spreads-joy-and-hopefully-nothing-else\/"},"modified":"2008-03-07T16:08:43","modified_gmt":"2008-03-08T00:08:43","slug":"the-newton-virus-spreads-joy-and-hopefully-nothing-else","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/07\/the-newton-virus-spreads-joy-and-hopefully-nothing-else\/","title":{"rendered":"The Newton Virus spreads joy&#8230; and hopefully nothing else"},"content":{"rendered":"<p>The Newton Virus is a &#8220;harmless&#8221; virus that comes on a cute USB flash drive which copies itself onto the computer to which is attached (works for Mac only) and for only one time, it makes your desktop fall apart&#8230; Eventually the Newton Virus exits and goes away leaving no trace on your computer.<\/p>\n<p>While the Newton Virus is harmless, a program like this could be used to spread harmful code, as a <em>real <\/em>virus would. If a real virus disguised itself as a harmless joke, it could spread rampantly as co-workers, children and friends &#8220;infect&#8221; computers for comical value&#8230;<\/p>\n<p>Regardless the Newton Virus is quite hilarious, I strongly suggest that you watch the video in the original article <a href=\"http:\/\/www.engadget.com\/2008\/03\/07\/the-newton-virus-spreads-joy\/\" title=\"here\">here.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Newton Virus is a &#8220;harmless&#8221; virus that comes on a cute USB flash drive which copies itself onto the computer to which is attached (works for Mac only) and for only one time, it makes your desktop fall apart&#8230; &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/07\/the-newton-virus-spreads-joy-and-hopefully-nothing-else\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-187","post","type-post","status-publish","format-standard","hentry","category-current-events"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=187"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/187\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}