{"id":454,"date":"2011-06-30T00:11:22","date_gmt":"2011-06-30T04:11:22","guid":{"rendered":"http:\/\/techtonictimes.com\/?p=454"},"modified":"2015-07-26T11:52:49","modified_gmt":"2015-07-26T11:52:49","slug":"hackers-wear-manolos-too","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/","title":{"rendered":"Hackers Wear Manolos Too"},"content":{"rendered":"<p style=\"text-align: left;\"><a href=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/manolo-blahnik-nyc.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft size-medium wp-image-505\" title=\"manolo-blahnik-nyc\" src=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/manolo-blahnik-nyc-235x300.jpg\" alt=\"\" width=\"235\" height=\"300\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/manolo-blahnik-nyc-235x300.jpg 235w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/manolo-blahnik-nyc.jpg 373w\" sizes=\"(max-width: 235px) 100vw, 235px\" \/><\/a>I am not really a brand name kind of girl. I have always believed it is not what you wear but <em>how <\/em>you wear it. So you wouldn&#8217;t necessarily find me at Elle Tahari or Saks Fifth Avenue.<\/p>\n<p>But I have an eye for quality. And certainly for style.<\/p>\n<p>Manolos are some great looking shoes.<\/p>\n<p>I&#8217;d say that hackers also have an eye for style, quality, and great &#8216;investments.&#8217; And they will shop from dusk &#8217;til dawn to ensure a great catch.<\/p>\n<p>Consider their recent acquisitions.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/news.cnet.com\/8301-17938_105-20068449-1\/six-tips-for-surviving-the-sony-breach\/\">Sony<\/a>, <a href=\"http:\/\/www.infoworld.com\/t\/phishing\/epsilons-epic-fail-the-numbers-dont-add-177\">Epsilon,<\/a> <a title=\"Sniper\" href=\"http:\/\/www.abrahamsconsulting.com\/blog\/sniper\/\" target=\"_blank\">Nasdaq<\/a>, <a href=\"http:\/\/online.wsj.com\/article\/SB10001424052702303654804576350083016866022.html\">Lockheed Martin<\/a>, Sony again.<\/p>\n<h4 style=\"text-align: center;\"><strong>Breached.<\/strong><\/h4>\n<p style=\"text-align: left;\">I forgot to mention\u00a0<a href=\"http:\/\/blogs.forbes.com\/ilanagreene\/2011\/06\/13\/citigroup-data-breach-a-lesson-and-warning-for-all\/\"> Citigroup<\/a>.<\/p>\n<p>Sure there are scores more. But I am making an exception. I am following the <em>hackers<\/em> lead.<\/p>\n<h3 style=\"text-align: center;\">Focus is on the the\u00a0 brand names.<\/h3>\n<p>And what&#8217;s more, they have a well defined strategy. How else could they have managed such massive, high profile takeovers?<\/p>\n<h3>Here are the top 3 reasons why hackers choose their pedigree:<\/h3>\n<p><em><strong>Celebrity Status<\/strong>. <\/em>If we are honest with ourselves, most of us crave a little fame. Wouldn&#8217;t you jump at the opportunity to get a mention of your name on the Oprah Show? How about if Lady Gaga gave you a shout out? Hackers seize this opportunity every time.<\/p>\n<p><em><strong>Financial Independence<\/strong>. <\/em>Unless you&#8217;re\u00a0 like Heath Ledger in his\u00a0 movie, &#8216;Dark Knight,&#8217; where all he wanted was, just to see the world burn, then money is a great motivator. Taking down the likes of Citigroup, is the gift that keeps on giving.<\/p>\n<p><em><strong>A Legacy<\/strong>. <\/em>At the core of our being, we desire to leave our heir with an inheritance. <em>W<\/em>e would prefer to leave our next of kin with a Will instead of a bill.<\/p>\n<p>Of course, unlike the hackers most of us believe that it is our responsibility to earn our way into our<em> desired <\/em>station in life. It is also our responsibility more than ever to <em>protect <\/em>our investments from these predators, otherwise, not only will they continue revel in an attitude of entitlement to our blood, sweat and tears but their children will be wearing Manolos too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am not really a brand name kind of girl. I have always believed it is not what you wear but how you wear it. So you wouldn&#8217;t necessarily find me at Elle Tahari or Saks Fifth Avenue. But I have an eye for quality. And certainly for style. Manolos are some great looking shoes. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":458,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,26,41,58,65,68],"class_list":["post-454","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techtonic-times","tag-breach","tag-citigroup","tag-epsilon","tag-lockheed-martin","tag-manolo","tag-nasdaq"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers are only human, they have needs.<\/title>\n<meta name=\"description\" content=\"Exploring the psychology of hackers. Understanding their drivers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers are only human, they have needs.\" \/>\n<meta property=\"og:description\" content=\"Exploring the psychology of hackers. Understanding their drivers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2011-06-30T04:11:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-26T11:52:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/mismatched_shoes_jpg13279.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"79\" \/>\n\t<meta property=\"og:image:height\" content=\"120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Hackers Wear Manolos Too\",\"datePublished\":\"2011-06-30T04:11:22+00:00\",\"dateModified\":\"2015-07-26T11:52:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/\"},\"wordCount\":350,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/mismatched_shoes_jpg13279.jpg\",\"keywords\":[\"breach\",\"Citigroup\",\"Epsilon\",\"Lockheed Martin\",\"Manolo\",\"Nasdaq\"],\"articleSection\":[\"Techtonic Times\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/\",\"name\":\"Hackers are only human, they have needs.\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/mismatched_shoes_jpg13279.jpg\",\"datePublished\":\"2011-06-30T04:11:22+00:00\",\"dateModified\":\"2015-07-26T11:52:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Exploring the psychology of hackers. Understanding their drivers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/mismatched_shoes_jpg13279.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/mismatched_shoes_jpg13279.jpg\",\"width\":79,\"height\":120},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Wear Manolos Too\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers are only human, they have needs.","description":"Exploring the psychology of hackers. Understanding their drivers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/","og_locale":"en_US","og_type":"article","og_title":"Hackers are only human, they have needs.","og_description":"Exploring the psychology of hackers. Understanding their drivers.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/","og_site_name":"TechTonic Times","article_published_time":"2011-06-30T04:11:22+00:00","article_modified_time":"2015-07-26T11:52:49+00:00","og_image":[{"width":79,"height":120,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/mismatched_shoes_jpg13279.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Hackers Wear Manolos Too","datePublished":"2011-06-30T04:11:22+00:00","dateModified":"2015-07-26T11:52:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/"},"wordCount":350,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/mismatched_shoes_jpg13279.jpg","keywords":["breach","Citigroup","Epsilon","Lockheed Martin","Manolo","Nasdaq"],"articleSection":["Techtonic Times"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/","name":"Hackers are only human, they have needs.","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/mismatched_shoes_jpg13279.jpg","datePublished":"2011-06-30T04:11:22+00:00","dateModified":"2015-07-26T11:52:49+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Exploring the psychology of hackers. Understanding their drivers.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/mismatched_shoes_jpg13279.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/06\/mismatched_shoes_jpg13279.jpg","width":79,"height":120},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Wear Manolos Too"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=454"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/454\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/458"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}