{"id":1227,"date":"2017-09-18T05:00:48","date_gmt":"2017-09-18T03:00:48","guid":{"rendered":"https:\/\/staging.blogs.yokogawa.de\/chemical-pharma\/uncategorized\/malware-disguised-as-a-trojan-horse\/"},"modified":"2022-06-17T09:28:06","modified_gmt":"2022-06-17T07:28:06","slug":"malware-disguised-as-a-trojan-horse","status":"publish","type":"post","link":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/","title":{"rendered":"Malware disguised as a Trojan horse"},"content":{"rendered":"<h2><strong>Infiltration of malware via removable media and external hardware<\/strong><\/h2>\n<p>Viruses and malware have a lot in common with the Trojan horse in Greek mythology.<\/p>\n<p><em>\u201cThe Greeks constructed a huge wooden horse and hid a select force of men inside. The Greeks pretended to sail away, and the Trojans pulled the horse into their city as a victory trophy. That night the Greek force crept out of the horse and opened the gates for the rest of the Greek army, which had sailed back under cover of night. <\/em><em>The Greeks entered and destroyed the city of Troy, ending the war<\/em><em>.\u201d (<\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Trojan_Horse\"><em>Wikipedia<\/em><\/a><em>)<\/em><\/p>\n<p>In my blog the Trojan horse stands for removable media and external hardware. An USB stick, for instance, which can often be inserted into a PC or \u2013 far more serious \u2013 an engineering station at the heart of the automation technology at any time, rashly and without thinking. No-one checks whether only the data which is supposed to be copied the PC really does get copied. In the worst case, the USB stick could be infected with malware \u2013 the soldiers hidden inside the Trojan horse \u2013 and we all know what the outcome of that story was\u2026.<\/p>\n<p>What I\u2019m getting at here is that every user who claims they \u201cjust want to import the presentation or load that little file\u201d needs to be fully aware of the consequences which \u201cjust\u201d doing something can have. That four-letter word \u201cjust\u201d doesn\u2019t automatically have to spell disaster, of course. But what if your USB stick has already been hit by a virus? Without you knowing? Or \u2013 an even more intimidating scenario \u2013 what if an attacker is attempting to introduce malware into your systems maliciously?<\/p>\n<h2><strong>Be alert<\/strong><\/h2>\n<p>According to the <a href=\"https:\/\/www.bsi.bund.de\/DE\/Home\/home_node.html\">BSI<\/a>, the German Federal Office for Information Security, the infiltration of malware ranks number 2 among the Top 10 threats.<br \/>\nIt comes second only to social engineering and phishing (<a href=\"https:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_\/downloads\/BSI-CS_005.pdf?__blob=publicationFile&amp;v=4#download=1\">BSI<\/a>); click here to read my blog post on this subject.<\/p>\n<p>It is vital for all employees to develop an awareness of, and an alertness to, the do\u2019s and don\u2019ts of removable media and external hardware. These rules should be embedded in the corporate culture and actively practised. One seemingly innocuous act of carelessness can have devastating effects. Once a malware has found its way onto your PC (and especially if your virus scanner fails to sound the alarm \u2013 in that case, you\u2019re facing an even bigger problem!), it will spread quickly throughout your enterprise network and you\u2019ll be forced to call in an expert to isolate and remove it.<\/p>\n<h2><strong>Take stock of the situation<\/strong><\/h2>\n<p>Yokogawa offers <a href=\"http:\/\/www.yokogawa.com\/de\/loesungen\/it-sicherheit.htm?nid=megadlist\">various security services and preventive measures<\/a> to pre-empt this kind of \u201cTrojan war\u201d scenario.<\/p>\n<ul>\n<li>USB padlocks as an effective visible deterrent,<\/li>\n<li>Virus scan PCs and reports for all removable media,<\/li>\n<li>Hardware locks,<\/li>\n<li>Whitelists and antivirus software,<\/li>\n<\/ul>\n<p>\u2026 and much more besides.<\/p>\n<p>Picture: Security services<\/p>\n<p>However, the first step is always a <strong>security assessment<\/strong>! We get together with you in order to understand your networks and structures, take stock of the present situation by evaluating the measures already in place, and form an overall picture of meaningful and possible actions. We follow this assessment up with an action plan which is tailored to fit your business. We show you ways to prevent malware from infiltrating your company via external hardware.<\/p>\n<h2><strong>It all has to click<\/strong><\/h2>\n<p>Security is important. For each individual enterprise and each individual person. In the end, it\u2019s up to individual businesses to decide just how much security they want for their plants. Yokogawa can provide suitable measures and experts to support your decision and implement the action plan that best fits you and your plant. However, it\u2019s putting those security measures into practice in your day-to-day work (as well as in your private life, of course) and getting your employees on board that\u2019s the real challenge \u2013 and no-one else can do that job for you, though we\u2019d naturally be delighted to help.<\/p>\n<p>If you have any questions on this subject, please don\u2019t hesitate to ask. We\u2019d welcome the opportunity to discuss any particularly burning issues with you. Feel free to write a comment. I look forward to reading your opinion.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Viruses and malware have a lot in common with the Trojan horse in Greek mythology. Learn more about the dangers and similarities. <\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/\"> <span class=\"screen-reader-text\">Malware disguised as a Trojan horse<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":99,"featured_media":1228,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","footnotes":""},"categories":[60,57],"tags":[175,152,176,177,178,165,179,180,181,182,183,184],"coauthors":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware disguised as a Trojan horse - Chemical Pharma Blog<\/title>\n<meta name=\"description\" content=\"Viruses and malware have a lot in common with the Trojan horse in Greek mythology. Learn more about the dangers and similarities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware disguised as a Trojan horse\" \/>\n<meta property=\"og:description\" content=\"Viruses and malware have a lot in common with the Trojan horse in Greek mythology. Learn more about the dangers and similarities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/\" \/>\n<meta property=\"og:site_name\" content=\"Chemical Pharma Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-18T03:00:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-17T07:28:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/shutterstock_397755184_kl.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1137\" \/>\n\t<meta property=\"og:image:height\" content=\"743\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cathrin Janssen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/\"},\"author\":{\"name\":\"Cathrin Janssen\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/55a53cce8acf08f0c996fa26b0fa9226\"},\"headline\":\"Malware disguised as a Trojan horse\",\"datePublished\":\"2017-09-18T03:00:48+00:00\",\"dateModified\":\"2022-06-17T07:28:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/\"},\"wordCount\":707,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization\"},\"keywords\":[\"Assessment\",\"automatiom security\",\"external hardware\",\"German Federal Office for Information Security\",\"infiltration\",\"IT security\",\"Malware\",\"removable media\",\"Social Engineering\",\"Software\",\"Trojan Horse\",\"Viruses\"],\"articleSection\":[\"Security\",\"Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/\",\"name\":\"Malware disguised as a Trojan horse - Chemical Pharma Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website\"},\"datePublished\":\"2017-09-18T03:00:48+00:00\",\"dateModified\":\"2022-06-17T07:28:06+00:00\",\"description\":\"Viruses and malware have a lot in common with the Trojan horse in Greek mythology. Learn more about the dangers and similarities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware disguised as a Trojan horse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/\",\"name\":\"Chemical Pharma Blog\",\"description\":\"Yokogawa&#039;s Chemical &amp; Pharma Blog\",\"publisher\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization\",\"name\":\"Chemical Pharma Blog\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png\",\"contentUrl\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png\",\"width\":302,\"height\":89,\"caption\":\"Chemical Pharma Blog\"},\"image\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/55a53cce8acf08f0c996fa26b0fa9226\",\"name\":\"Cathrin Janssen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/image\/2eddb93a074fc2c9c8e31cd315030128\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4bc4bb593a91d6bcb71ca22b64db86fb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4bc4bb593a91d6bcb71ca22b64db86fb?s=96&d=mm&r=g\",\"caption\":\"Cathrin Janssen\"},\"description\":\"responsible for Marketing Advanced Solutions, expert for VigilantPlant Solutions, employed by Yokogawa since 2011\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/author\/cathrin-janssen\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware disguised as a Trojan horse - Chemical Pharma Blog","description":"Viruses and malware have a lot in common with the Trojan horse in Greek mythology. Learn more about the dangers and similarities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/","og_locale":"en_US","og_type":"article","og_title":"Malware disguised as a Trojan horse","og_description":"Viruses and malware have a lot in common with the Trojan horse in Greek mythology. Learn more about the dangers and similarities.","og_url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/","og_site_name":"Chemical Pharma Blog","article_published_time":"2017-09-18T03:00:48+00:00","article_modified_time":"2022-06-17T07:28:06+00:00","og_image":[{"width":1137,"height":743,"url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/shutterstock_397755184_kl.jpg","type":"image\/jpeg"}],"author":"Cathrin Janssen","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/#article","isPartOf":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/"},"author":{"name":"Cathrin Janssen","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/55a53cce8acf08f0c996fa26b0fa9226"},"headline":"Malware disguised as a Trojan horse","datePublished":"2017-09-18T03:00:48+00:00","dateModified":"2022-06-17T07:28:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/"},"wordCount":707,"commentCount":0,"publisher":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization"},"keywords":["Assessment","automatiom security","external hardware","German Federal Office for Information Security","infiltration","IT security","Malware","removable media","Social Engineering","Software","Trojan Horse","Viruses"],"articleSection":["Security","Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/","url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/","name":"Malware disguised as a Trojan horse - Chemical Pharma Blog","isPartOf":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website"},"datePublished":"2017-09-18T03:00:48+00:00","dateModified":"2022-06-17T07:28:06+00:00","description":"Viruses and malware have a lot in common with the Trojan horse in Greek mythology. Learn more about the dangers and similarities.","breadcrumb":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/malware-disguised-as-a-trojan-horse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/"},{"@type":"ListItem","position":2,"name":"Malware disguised as a Trojan horse"}]},{"@type":"WebSite","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website","url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/","name":"Chemical Pharma Blog","description":"Yokogawa&#039;s Chemical &amp; Pharma Blog","publisher":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization","name":"Chemical Pharma Blog","url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png","contentUrl":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png","width":302,"height":89,"caption":"Chemical Pharma Blog"},"image":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/55a53cce8acf08f0c996fa26b0fa9226","name":"Cathrin Janssen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/image\/2eddb93a074fc2c9c8e31cd315030128","url":"https:\/\/secure.gravatar.com\/avatar\/4bc4bb593a91d6bcb71ca22b64db86fb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4bc4bb593a91d6bcb71ca22b64db86fb?s=96&d=mm&r=g","caption":"Cathrin Janssen"},"description":"responsible for Marketing Advanced Solutions, expert for VigilantPlant Solutions, employed by Yokogawa since 2011","url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/author\/cathrin-janssen\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/shutterstock_397755184_kl.jpg",1137,743,false],"thumbnail":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/shutterstock_397755184_kl-150x150.jpg",150,150,true],"medium":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/shutterstock_397755184_kl-300x196.jpg",300,196,true],"medium_large":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/shutterstock_397755184_kl-768x502.jpg",768,502,true],"large":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/shutterstock_397755184_kl-1024x669.jpg",1024,669,true],"1536x1536":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/shutterstock_397755184_kl.jpg",1137,743,false],"2048x2048":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/shutterstock_397755184_kl.jpg",1137,743,false],"post-thumbnail":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/shutterstock_397755184_kl-356x200.jpg",356,200,true]},"uagb_author_info":{"display_name":"Cathrin Janssen","author_link":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/author\/cathrin-janssen\/"},"uagb_comment_info":0,"uagb_excerpt":"Viruses and malware have a lot in common with the Trojan horse in Greek mythology. Learn more about the dangers and similarities. Malware disguised as a Trojan horse Read More &raquo;","_links":{"self":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts\/1227"}],"collection":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/users\/99"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/comments?post=1227"}],"version-history":[{"count":1,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts\/1227\/revisions"}],"predecessor-version":[{"id":11063,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts\/1227\/revisions\/11063"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/media\/1228"}],"wp:attachment":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/media?parent=1227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/categories?post=1227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/tags?post=1227"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/coauthors?post=1227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}