{"id":27482,"date":"2019-06-25T11:57:02","date_gmt":"2019-06-25T11:57:02","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/"},"modified":"2019-06-25T11:57:02","modified_gmt":"2019-06-25T11:57:02","slug":"open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/","title":{"rendered":"Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/09\/25\/heart_scan.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Biometric systems could use the unique patterns from a person&#8217;s ECG reading for biometric sign-ons.<\/p>\n<p>This is <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/arxiv.org\/pdf\/1906.09181\">according to<\/a> a study (PDF) emitted this month by a trans-Atlantic pair of brains at UC Berkeley in the US and the University of Edinburgh in Scotland, who reckon electrocardiogram results are easy enough to measure, and vary enough from person to person that a reliable authentication system could be built from consumer hardware.<\/p>\n<p>&#8220;While existing research has focused on common modalities, such as fingerprints, face recognition, and iris scans, insufficient work has been done to explore novel biometrics,&#8221; said Berkeley&#8217;s Nikita Samarin and Edinburgh&#8217;s Donald Sannella.<\/p>\n<p>&#8220;Past research has demonstrated that ECG is sufficiently unique to each individual and could be used for user authentication.&#8221;<\/p>\n<p>To test whether an off-the-shelf authentication scheme would be viable, the researchers had to figure out just how well a small consumer ECG could both read and distinguish ECG patterns from person to person and from reading to reading. They enlisted a group of 49 volunteers to use a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/store.alivecor.com\/products\/kardiamobile\">mobile ECG reader (specifically, this one)<\/a> in two different sittings four months apart.<\/p>\n<p>Using the datasets, the team then analysed the wave patterns from person to person and between the two settings. What they found was that the ECG readings could match the person with an error rate of about 2.4 per cent over short durations of time (<a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Studies\/BioFinger\/BioFinger_pdf.pdf?__blob=publicationFile\">roughly the same range<\/a> as fingerprint readers), but found that over longer periods between readings, the error rate goes up to around 9 per cent.<\/p>\n<p>Still, the study concludes that an ECG authentication would be feasible and reliable enough to work in things like smartphone cases or steering wheels as another way to authenticate the owner of the device, albeit with many of the same concerns and technical hurdles present in other bioauthentication methods.<\/p>\n<p>&#8220;The introduction of low-cost sensors allows system designers to embed them into existing access control systems,&#8221; the duo concluded.<\/p>\n<p>&#8220;Nevertheless, more research needs to be done on extracting features from ECG signals obtained from consumer-grade monitors, preventing spoofing attacks and guaranteeing that ECG-based biometric systems are socially accepted by the general public.&#8221;<\/p>\n<p>The paper, <em>A Key to Your Heart: Biometric Authentication Based on ECG Signals<\/em>, is due to be presented during the &#8220;Who Are You?! Adventures in Authentication&#8221; workshop at the Symposium on Usable Privacy and Security in Silicon Valley <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.usenix.org\/conference\/soups2019\">in August<\/a>. \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/06\/25\/ecg_heart_biometric_authentication\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Heartbeat rhythms could be the next biometric authentication method Biometric systems could use the unique patterns from a person&#8217;s ECG reading for biometric sign-ons.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27483,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-27482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-25T11:57:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"1112\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs\",\"datePublished\":\"2019-06-25T11:57:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/\"},\"wordCount\":410,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/\",\"name\":\"Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs.jpg\",\"datePublished\":\"2019-06-25T11:57:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs.jpg\",\"width\":1440,\"height\":1112},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/","og_locale":"en_US","og_type":"article","og_title":"Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-25T11:57:02+00:00","og_image":[{"width":1440,"height":1112,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs","datePublished":"2019-06-25T11:57:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/"},"wordCount":410,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/","url":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/","name":"Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs.jpg","datePublished":"2019-06-25T11:57:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs.jpg","width":1440,"height":1112},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/open-heart-nerdery-boffins-suggest-identifying-and-logging-in-people-using-ecgs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Open-heart nerdery: Boffins suggest identifying and logging in people using ECGs"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27482"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27482\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27483"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}