Submitted URL: https://mailing.eb.emediausa.com/t/4020372/100707135/8641406/0/?e5e2987d=NDAyMDM3Mg%3d%3d&amp
Effective URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2...
Submission: On December 13 via api from US

Summary

This website contacted 56 IPs in 5 countries across 44 domains to perform 145 HTTP transactions. The main IP is 151.101.1.171, located in San Francisco, United States and belongs to FASTLY - Fastly, US. The main domain is www.businessinsider.com.
TLS certificate: Issued by GlobalSign Organization Validation CA... on August 30th 2018. Valid for: 2 years.
This is the only time www.businessinsider.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 13.56.86.245 16509 (AMAZON-02)
1 1 2.19.45.224 20940 (AKAMAI-ASN1)
1 15 151.101.1.171 54113 (FASTLY)
2 2 151.101.1.176 54113 (FASTLY)
1 151.101.2.217 54113 (FASTLY)
21 184.30.221.111 20940 (AKAMAI-ASN1)
1 52.222.149.62 16509 (AMAZON-02)
1 23.67.129.200 20940 (AKAMAI-ASN1)
2 151.101.0.175 54113 (FASTLY)
2 52.222.147.236 16509 (AMAZON-02)
2 7 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700:30:... 13335 (CLOUDFLAR...)
5 104.16.76.51 13335 (CLOUDFLAR...)
2 2a03:2880:f01... 32934 (FACEBOOK)
1 54.171.224.12 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 151.101.1.2 54113 (FASTLY)
5 52.222.149.168 16509 (AMAZON-02)
3 3 2a00:1450:400... 15169 (GOOGLE)
3 3 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
1 151.101.192.175 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.86.72.168 14618 (AMAZON-AES)
2 6 23.43.115.95 20940 (AKAMAI-ASN1)
1 2600:9000:204... 16509 (AMAZON-02)
17 151.101.2.2 54113 (FASTLY)
1 151.101.0.64 54113 (FASTLY)
1 159.180.84.2 33047 (INSTART)
3 94.31.29.248 33438 (HIGHWINDS2)
1 23.211.10.44 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 172.217.21.194 15169 (GOOGLE)
1 108.161.188.128 33438 (HIGHWINDS2)
2 2a03:2880:f11... 32934 (FACEBOOK)
1 2 2600:9000:204... 16509 (AMAZON-02)
4 34.254.137.88 16509 (AMAZON-02)
1 52.19.159.96 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:204... 16509 (AMAZON-02)
2 52.222.149.188 16509 (AMAZON-02)
5 2606:2800:233... 15133 (EDGECAST)
1 3 2600:9000:204... 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
1 2606:2800:133... 15133 (EDGECAST)
1 2600:9000:204... 16509 (AMAZON-02)
3 34.201.230.67 14618 (AMAZON-AES)
2 151.101.1.181 54113 (FASTLY)
1 1 2600:9000:204... 16509 (AMAZON-02)
3 2a04:4e42:1d:... 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
2 52.204.114.148 14618 (AMAZON-AES)
1 151.101.2.110 54113 (FASTLY)
1 46.137.176.25 16509 (AMAZON-02)
1 52.216.16.3 16509 (AMAZON-02)
2 52.3.12.137 14618 (AMAZON-AES)
1 162.247.242.20 23467 (NEWRELIC-...)
1 34.206.12.124 14618 (AMAZON-AES)
1 52.31.203.27 16509 (AMAZON-02)
145 56
Apex Domain
Subdomains
Transfer
37 businessinsider.com
www.businessinsider.com
media.businessinsider.com
amp.businessinsider.com
geoip.businessinsider.com
analytics.businessinsider.com
920 KB
16 taboola.com
cdn.taboola.com
trc.taboola.com
images.taboola.com
233 KB
8 imrworldwide.com
cdn-gl.imrworldwide.com
seccdn-gl.imrworldwide.com
secure-dcr.imrworldwide.com
80 KB
7 google-analytics.com
www.google-analytics.com
39 KB
6 scorecardresearch.com
sb.scorecardresearch.com
4 KB
5 piano.io
api-esp.piano.io
13 KB
5 jwplayer.com
cdn.jwplayer.com
entitlements.jwplayer.com
2 KB
5 jwpcdn.com
ssl.p.jwpcdn.com
194 KB
5 tinypass.com
experience.tinypass.com
cdn.tinypass.com
buy.tinypass.com
id.tinypass.com
112 KB
4 axelspringer.com
oil.axelspringer.com
32 KB
4 pagefair.com
asset.pagefair.com
stats.pagefair.com
6 KB
4 google.de
www.google.de
adservice.google.de
817 B
4 google.com
www.google.com
adservice.google.com
1 KB
4 doubleclick.net
stats.g.doubleclick.net
securepubads.g.doubleclick.net
64 KB
4 krxd.net
cdn.krxd.net
consumer.krxd.net
beacon.krxd.net
87 KB
3 jwpsrv.com
assets-jpcust.jwpsrv.com
g.jwpsrv.com
57 KB
3 flipboard.com
cdn.flipboard.com
fpn.flipboard.com
5 KB
3 googleapis.com
ajax.googleapis.com
imasdk.googleapis.com
108 KB
2 jwpltx.com
jwpltx.com
206 B
2 perfectmarket.com
widget.perfectmarket.com
33 KB
2 facebook.com
www.facebook.com
297 B
2 outbrain.com
widgets.outbrain.com
traffic.outbrain.com
2 KB
2 quora.com
a.quora.com
q.quora.com
6 KB
2 facebook.net
connect.facebook.net
59 KB
2 amazon-adsystem.com
c.amazon-adsystem.com
22 KB
2 businessinsider.de
www.businessinsider.de
748 B
2 emediausa.com
mailing.eb.emediausa.com
a.eb.emediausa.com
1 KB
1 chartbeat.net
ping.chartbeat.net
168 B
1 nr-data.net
bam.nr-data.net
261 B
1 amazonaws.com
s3.amazonaws.com
35 KB
1 newrelic.com
js-agent.newrelic.com
9 KB
1 2mdn.net
s0.2mdn.net
11 KB
1 consensu.org
vendorlist.consensu.org
14 KB
1 jwplatform.com
content.jwplatform.com
36 KB
1 googlesyndication.com
pagead2.googlesyndication.com
64 KB
1 pagefair.net
asset.pagefair.net
539 B
1 digitru.st
cdn.digitru.st
1 googletagservices.com
www.googletagservices.com
10 KB
1 ml314.com
ml314.com
12 KB
1 npttech.com
www.npttech.com
3 KB
1 googletagmanager.com
www.googletagmanager.com
54 KB
1 rubiconproject.com
ads.rubiconproject.com
57 KB
1 adsafeprotected.com
cdn.adsafeprotected.com
3 KB
1 speedcurve.com
cdn.speedcurve.com
5 KB
145 44
Domain Requested by
21 media.businessinsider.com www.businessinsider.com
www.npttech.com
10 amp.businessinsider.com www.businessinsider.com
7 trc.taboola.com cdn.taboola.com
www.businessinsider.com
7 www.google-analytics.com 2 redirects www.businessinsider.com
www.google-analytics.com
6 sb.scorecardresearch.com 2 redirects media.businessinsider.com
www.businessinsider.com
cdn.taboola.com
5 api-esp.piano.io cdn.tinypass.com
www.businessinsider.com
5 ssl.p.jwpcdn.com content.jwplatform.com
5 cdn.taboola.com media.businessinsider.com
cdn.taboola.com
5 cdn-gl.imrworldwide.com www.businessinsider.com
cdn-gl.imrworldwide.com
seccdn-gl.imrworldwide.com
4 images.taboola.com www.businessinsider.com
4 cdn.jwplayer.com 2 redirects www.businessinsider.com
4 oil.axelspringer.com media.businessinsider.com
oil.axelspringer.com
3 asset.pagefair.com www.businessinsider.com
asset.pagefair.com
3 www.google.de www.businessinsider.com
3 www.google.com 3 redirects
3 stats.g.doubleclick.net 3 redirects
3 www.businessinsider.com 1 redirects www.businessinsider.com
2 jwpltx.com
2 assets-jpcust.jwpsrv.com www.businessinsider.com
2 widget.perfectmarket.com cdn.taboola.com
widget.perfectmarket.com
2 imasdk.googleapis.com content.jwplatform.com
imasdk.googleapis.com
2 seccdn-gl.imrworldwide.com content.jwplatform.com
seccdn-gl.imrworldwide.com
2 fpn.flipboard.com 1 redirects www.businessinsider.com
2 www.facebook.com www.businessinsider.com
connect.facebook.net
2 geoip.businessinsider.com www.businessinsider.com
2 connect.facebook.net www.businessinsider.com
connect.facebook.net
2 experience.tinypass.com www.businessinsider.com
2 c.amazon-adsystem.com www.businessinsider.com
2 cdn.krxd.net www.businessinsider.com
cdn.krxd.net
2 www.businessinsider.de 2 redirects
1 secure-dcr.imrworldwide.com
1 ping.chartbeat.net
1 bam.nr-data.net js-agent.newrelic.com
1 traffic.outbrain.com
1 s3.amazonaws.com media.businessinsider.com
1 beacon.krxd.net cdn.krxd.net
1 js-agent.newrelic.com www.businessinsider.com
1 g.jwpsrv.com ssl.p.jwpcdn.com
1 s0.2mdn.net imasdk.googleapis.com
1 vendorlist.consensu.org www.businessinsider.com
1 entitlements.jwplayer.com www.businessinsider.com
1 content.jwplatform.com media.businessinsider.com
1 pagead2.googlesyndication.com securepubads.g.doubleclick.net
1 stats.pagefair.com www.businessinsider.com
1 id.tinypass.com cdn.tinypass.com
1 buy.tinypass.com cdn.tinypass.com
1 asset.pagefair.net www.businessinsider.com
1 securepubads.g.doubleclick.net www.googletagservices.com
1 adservice.google.com www.googletagservices.com
1 adservice.google.de www.googletagservices.com
1 widgets.outbrain.com www.googletagmanager.com
1 cdn.digitru.st ads.rubiconproject.com
1 analytics.businessinsider.com www.businessinsider.com
1 cdn.flipboard.com media.businessinsider.com
1 q.quora.com www.businessinsider.com
1 www.googletagservices.com www.businessinsider.com
1 consumer.krxd.net cdn.krxd.net
1 a.quora.com www.businessinsider.com
1 ajax.googleapis.com www.businessinsider.com
1 ml314.com www.businessinsider.com
1 cdn.tinypass.com experience.tinypass.com
1 www.npttech.com www.businessinsider.com
1 www.googletagmanager.com www.businessinsider.com
1 ads.rubiconproject.com www.businessinsider.com
1 cdn.adsafeprotected.com www.businessinsider.com
1 cdn.speedcurve.com www.businessinsider.com
1 a.eb.emediausa.com 1 redirects
1 mailing.eb.emediausa.com 1 redirects
145 68
Subject Issuer Validity Valid
f.ssl.fastly.net
GlobalSign Organization Validation CA - SHA256 - G2
2018-08-30 -
2020-12-02
2 years crt.sh
a3.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-12-13 -
2019-10-13
10 months crt.sh
*.businessinsider.com
DigiCert SHA2 Secure Server CA
2018-03-14 -
2019-03-14
a year crt.sh
*.adsafeprotected.com
COMODO RSA Domain Validation Secure Server CA
2018-08-20 -
2020-09-17
2 years crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2016-01-12 -
2019-03-01
3 years crt.sh
*.c.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-10-09 -
2019-09-27
a year crt.sh
c.amazon-adsystem.com
Amazon
2018-03-12 -
2019-03-12
a year crt.sh
*.google-analytics.com
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
sni101653.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-12-10 -
2019-06-18
6 months crt.sh
*.tinypass.com
DigiCert SHA2 Secure Server CA
2018-01-02 -
2019-02-20
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2017-12-15 -
2019-03-22
a year crt.sh
*.ml314.com
Amazon
2018-04-14 -
2019-05-14
a year crt.sh
*.googleapis.com
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
*.quora.com
DigiCert SHA2 Secure Server CA
2018-08-15 -
2019-11-26
a year crt.sh
*.imrworldwide.com
DigiCert SHA2 Secure Server CA
2018-02-15 -
2019-07-11
a year crt.sh
www.google.de
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.flipboard.com
DigiCert SHA2 High Assurance Server CA
2017-10-19 -
2019-11-06
2 years crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-12-03 -
2019-09-07
9 months crt.sh
cdn.digitru.st
DigiCert SHA2 Secure Server CA
2018-05-17 -
2019-05-22
a year crt.sh
asset.pagefair.com
Let's Encrypt Authority X3
2018-12-10 -
2019-03-10
3 months crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-02-12 -
2019-02-12
a year crt.sh
*.google.com
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
asset.pagefair.net
Let's Encrypt Authority X3
2018-11-26 -
2019-02-24
3 months crt.sh
oil.axelspringer.com
GeoTrust TLS RSA CA G1
2018-02-13 -
2020-02-13
2 years crt.sh
*.pagefair.com
Gandi Standard SSL CA 2
2018-11-19 -
2020-11-21
2 years crt.sh
jwplayer.com
Amazon
2018-02-05 -
2019-03-05
a year crt.sh
*.longtailvideo.com
DigiCert SHA2 Secure Server CA
2017-10-21 -
2020-10-28
3 years crt.sh
s2.wpc.edgecastcdn.net
DigiCert SHA2 Secure Server CA
2018-08-31 -
2020-04-23
2 years crt.sh
vendorlist.consensu.org
Amazon
2018-04-04 -
2019-05-04
a year crt.sh
*.piano.io
COMODO RSA Domain Validation Secure Server CA
2018-10-16 -
2020-10-15
2 years crt.sh
p.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-12-05 -
2021-02-22
2 years crt.sh
*.doubleclick.net
Google Internet Authority G3
2018-11-07 -
2019-01-30
3 months crt.sh
f4.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-12-06 -
2019-04-14
4 months crt.sh
*.krxd.net
Go Daddy Secure Certificate Authority - G2
2017-06-12 -
2019-07-11
2 years crt.sh
s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2018-12-03 -
2019-10-25
a year crt.sh
jwpltx.com
Amazon
2018-07-24 -
2019-08-24
a year crt.sh
*.nr-data.net
GeoTrust RSA CA 2018
2018-01-11 -
2020-03-17
2 years crt.sh
*.chartbeat.net
Thawte RSA CA 2018
2018-01-02 -
2019-01-02
a year crt.sh

This page contains 7 frames:

Primary Page: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Frame ID: F65CE4B83199ABFF23E8E950E574C4D7
Requests: 139 HTTP requests in this frame

Frame: https://cdn.digitru.st/prod/1.5.15/dt.html
Frame ID: 74D884C86CAE0C61BCC4B832C7871B51
Requests: 1 HTTP requests in this frame

Frame: https://cdn-gl.imrworldwide.com/novms/html/ls.html
Frame ID: 38763FAB884031B27EBEB0373C29CD42
Requests: 1 HTTP requests in this frame

Frame: https://oil.axelspringer.com/release/1.1.2/hub.html
Frame ID: 912D77E755BE1D33B0C2F05259730C00
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 67447B3D918FA7CD364A5156F6797CCD
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.264.0_en.html
Frame ID: 1CCE4C449B412135ABB0587838C8958D
Requests: 1 HTTP requests in this frame

Frame: https://g.jwpsrv.com/g/gcid-0.1.0.html?aid=2F5aFuowEeagCwY3v_uBow&id=dFhVfyKR&emi=1p19akio7h76&pli=ltjh2i1mskqz&pv=8.6.3&tv=3.5.6
Frame ID: DD5867520ACC6F041E66E0AF176ED1B6
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://mailing.eb.emediausa.com/t/4020372/100707135/8641406/0/?e5e2987d=NDAyMDM3Mg%3d%3d&amp HTTP 302
    https://a.eb.emediausa.com/core/click/?acct=b2b-email&direct=true&rt=https%3a%2f%2fwww.businessinsider.... HTTP 303
    https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hac... HTTP 302
    http://www.businessinsider.de/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hac... HTTP 301
    https://www.businessinsider.de/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hac... HTTP 302
    https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hac... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers via /.*Varnish/i

Overall confidence: 100%
Detected patterns
  • env /^Handlebars$/i

Overall confidence: 100%
Detected patterns
  • env /pbjs/i

Overall confidence: 100%
Detected patterns
  • env /^_sf_(?:endpt|async_config)$/i

Overall confidence: 100%
Detected patterns
  • script /2mdn\.net/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • script /2mdn\.net/i
  • env /^google_ad_/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i
  • env /^google_tag_manager$/i

Overall confidence: 100%
Detected patterns
  • env /^NREUM/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • env /^_?COMSCORE$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

145
Requests

99 %
HTTPS

39 %
IPv6

44
Domains

68
Subdomains

56
IPs

5
Countries

2389 kB
Transfer

6851 kB
Size

15
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://mailing.eb.emediausa.com/t/4020372/100707135/8641406/0/?e5e2987d=NDAyMDM3Mg%3d%3d&amp HTTP 302
    https://a.eb.emediausa.com/core/click/?acct=b2b-email&direct=true&rt=https%3a%2f%2fwww.businessinsider.com%2fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&mailing_id=4020372&list=&member_id=100707135&engine_id=1 HTTP 303
    https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11 HTTP 302
    http://www.businessinsider.de/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?r=US&IR=T HTTP 301
    https://www.businessinsider.de/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?r=US&IR=T HTTP 302
    https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 40
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j72&tid=UA-2241657-6&cid=1974187570.1544711054&jid=2004655085&gjid=162216684&_gid=880845344.1544711054&_u=6GDAgUADQ~&z=973831049 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=2004655085&_v=j72&z=973831049 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=2004655085&_v=j72&z=973831049&slf_rd=1&random=3949909947
Request Chain 65
  • https://www.google-analytics.com/r/collect?v=1&_v=j72&a=45720967&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&dp=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&ul=en-us&de=UTF-8&dt=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=Piano&ea=Adblock&el=false&_u=6HDACUADR~&jid=938876417&gjid=830352835&cid=1974187570.1544711054&tid=UA-2241657-6&_gid=880845344.1544711054&_r=1&gtm=2wgbc0NS64GV&cg1=video&cg2=staff&cg3=Video%7CTI%20Original%20Video%7CBI%20Original%20Video%7CHackers%7CHacking%7CTech%7CCisco%7CPhone%7CCybersecurity%7CRed%20Balloon%20Security%7CAng%20Cui%7CMatthew%20Stuart%7Chacker%7CDonald%20Trump&cg4=video&cd1=video&cd2=video&cd3=staff&cd4=Chris%20Snyder&cd5=Jennifer%20Ortakales&cd6=Video%7CTI%20Original%20Video%7CBI%20Original%20Video%7CHackers%7CHacking%7CTech%7CCisco%7CPhone%7CCybersecurity%7CRed%20Balloon%20Security%7CAng%20Cui%7CMatthew%20Stuart%7Chacker%7CDonald%20Trump&cd7=&cd9=hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&cd10=5a12f7713dbef430008b7200&cd11=2018-10-25&cd14=Business%20Insider&cd25=&cd26=2017-11-20&cd27=A%20cybersecurity%20expert%20showed%20us%20how%20hackers%20can%20tap%20into%20an%20office%20phone%20and%20listen%20to%20everything%20you%27re%20saying&cd28=Chris%20Snyder&cd30=0&cd31=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&cd32=841&cd33=BIRTA&cd35=video&cd34=1974187570.1544711054&z=1981329168 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-2241657-6&cid=1974187570.1544711054&jid=938876417&_gid=880845344.1544711054&gjid=830352835&_v=j72&z=1981329168 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=938876417&_v=j72&z=1981329168 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=938876417&_v=j72&z=1981329168&slf_rd=1&random=85958534
Request Chain 70
  • https://sb.scorecardresearch.com/b?c1=2&c2=9900186&comscorekw%20=%20video&ns__t=1544711054577&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&c7=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=9900186&comscorekw%20=%20video&ns__t=1544711054577&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&c7=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&c9=
Request Chain 77
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT HTTP 307
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.businessinsider.com%25252Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%25253FIR%25253DT&rh=https%253A%252F%252Fwww.businessinsider.com%252Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%253FIR%253DT
Request Chain 86
  • https://www.google-analytics.com/r/collect?v=1&_v=j72&a=45720967&t=event&ni=0&_s=1&dl=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&dp=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&ul=en-us&de=UTF-8&dt=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=OptInLayer&ea=Modal&el=ModalDisplayed&_u=6HDACUADR~&jid=832213609&gjid=770242077&cid=500831122.1544711055&tid=UA-2241657-6&_gid=419174690.1544711055&_r=1&gtm=2wgbc0NS64GV&cg1=video&cg2=staff&cg3=Video%7CTI%20Original%20Video%7CBI%20Original%20Video%7CHackers%7CHacking%7CTech%7CCisco%7CPhone%7CCybersecurity%7CRed%20Balloon%20Security%7CAng%20Cui%7CMatthew%20Stuart%7Chacker%7CDonald%20Trump&cg4=video&cd1=video&cd2=video&cd3=staff&cd4=Chris%20Snyder&cd5=Jennifer%20Ortakales&cd6=Video%7CTI%20Original%20Video%7CBI%20Original%20Video%7CHackers%7CHacking%7CTech%7CCisco%7CPhone%7CCybersecurity%7CRed%20Balloon%20Security%7CAng%20Cui%7CMatthew%20Stuart%7Chacker%7CDonald%20Trump&cd7=&cd9=hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&cd10=5a12f7713dbef430008b7200&cd11=2018-10-25&cd14=Business%20Insider&cd25=&cd26=2017-11-20&cd27=A%20cybersecurity%20expert%20showed%20us%20how%20hackers%20can%20tap%20into%20an%20office%20phone%20and%20listen%20to%20everything%20you%27re%20saying&cd28=Chris%20Snyder&cd30=0&cd31=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&cd32=841&cd33=BIRTA&cd35=video&cd34=500831122.1544711055&z=744930975 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-2241657-6&cid=500831122.1544711055&jid=832213609&_gid=419174690.1544711055&gjid=770242077&_v=j72&z=744930975 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=500831122.1544711055&jid=832213609&_v=j72&z=744930975 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=500831122.1544711055&jid=832213609&_v=j72&z=744930975&slf_rd=1&random=3054484497
Request Chain 104
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1544711055402&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&c7=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1544711055402&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&c7=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&c9=
Request Chain 108
  • https://cdn.jwplayer.com/strips/dFhVfyKR-120.vtt HTTP 301
  • https://assets-jpcust.jwpsrv.com/strips/dFhVfyKR-120.vtt
Request Chain 109
  • https://cdn.jwplayer.com/thumbs/dFhVfyKR-720.jpg HTTP 302
  • https://assets-jpcust.jwpsrv.com/thumbnails/ty0wax1n-720.jpg

145 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11
www.businessinsider.com/
Redirect Chain
  • https://mailing.eb.emediausa.com/t/4020372/100707135/8641406/0/?e5e2987d=NDAyMDM3Mg%3d%3d&amp
  • https://a.eb.emediausa.com/core/click/?acct=b2b-email&direct=true&rt=https%3a%2f%2fwww.businessinsider.com%2fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spyi...
  • https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11
  • http://www.businessinsider.de/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?r=US&IR=T
  • https://www.businessinsider.de/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?r=US&IR=T
  • https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
200 KB
42 KB
Document
General
Full URL
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.11.13 / PHP/7.0.14
Resource Hash
47465eb3c6bbd0f9b4426886cfea7d6e4acaa43747c2e42d0fdd1cc490e3442a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

:method
GET
:authority
www.businessinsider.com
:scheme
https
:path
/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
content-type
text/html; charset=UTF-8
set-cookie
AWSALB=m5wfqzJTbh5PK6CZYVRhkOZLEv1P2wKiMzrcDuwlO7tRgkGYtwbIWfbscIkx9f4sVOjBnhZo6cOPa82xTwGkvoO95REWAOg3dBJEoAULpaqaCYMqIGNJqDl11mRB; Expires=Thu, 20 Dec 2018 11:07:31 GMT; Path=/
server
nginx/1.11.13
x-powered-by
PHP/7.0.14
cache-control
no-cache, private
x-real-ip
148.64.10.121
x-country-code
US
x-birta-served
true
x-birta-cache-post
false
content-encoding
gzip
accept-ranges
bytes
date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
11802
x-served-by
cache-fra19142-FRA
x-cache
HIT
x-cache-hits
1
x-timer
S1544711054.764363,VS0,VE3
vary
Accept-Encoding, Fastly-SSL, X-TBI-Served, X-Birta-Served, X-Device, X-UA-Device, X-Tbi-User, X-Birta-User
strict-transport-security
max-age=31536000
content-length
43037

Redirect headers

status
302
server
Varnish
retry-after
0
location
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
accept-ranges
bytes bytes
date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
x-served-by
cache-fra19151-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1544711054.619777,VS0,VE135
strict-transport-security
max-age=31536000
content-length
0
lux.js
cdn.speedcurve.com/js/
14 KB
5 KB
Script
General
Full URL
https://cdn.speedcurve.com/js/lux.js?id=38383524
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.217 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache /
Resource Hash
2e7c3de3b7b139a02ba310ff114665caa7c9716a26b3d7afa247466ea4c9a064
Security Headers
Name Value
Strict-Transport-Security max-age=15768000

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=15768000
content-encoding
gzip
age
64436
x-cache
HIT
status
200
x-cache-hits
1122
content-length
4569
via
1.1 varnish
x-served-by
cache-fra19143-FRA
last-modified
Wed, 12 Dec 2018 20:30:17 GMT
server
Apache
x-timer
S1544711054.832674,VS0,VE0
date
Thu, 13 Dec 2018 14:24:13 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 19 Dec 2018 20:30:17 GMT
core.css
media.businessinsider.com/public/styles/
203 KB
35 KB
Stylesheet
General
Full URL
https://media.businessinsider.com/public/styles/core.css
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
4f84ae320fc6323f749faed282f139dc318e469bfe92c315964a0ba23a435bf2
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/styles/core.css
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
content-encoding
gzip
last-modified
Mon, 10 Dec 2018 17:44:01 GMT
server
AmazonS3
x-amz-request-id
2ACC413387F16F2B
etag
"56fa89b9e30005bd997862d0b39dc27c"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=7200
strict-transport-security
max-age=86400
accept-ranges
bytes
access-control-allow-origin
*
content-length
34996
x-amz-id-2
vTe1NspJ1o7jbeW2W7RwEOBVzozahq+GiHIUqxCQRvh0KVW8CWXaeHhe1pZqhthXnSFSePlIQvM=
iasPET.1.js
cdn.adsafeprotected.com/
7 KB
3 KB
Script
General
Full URL
https://cdn.adsafeprotected.com/iasPET.1.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.62 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-62.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d1b936aab8259755a156b7e9c343e9413621d6c5c5dceb06521dc5b639eb14b8

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 12 Dec 2018 17:35:28 GMT
Content-Encoding
gzip
Last-Modified
Mon, 10 Dec 2018 17:35:17 GMT
Server
AmazonS3
Age
74935
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 ac27d939fa02703c4b28926f53f95083.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
btEJnlnGJnmTTjWHAXUUM0G6Pj-AKrCSnX9IGDlBL4WxoLDq8_YlYw==
10306.js
ads.rubiconproject.com/prebid/
210 KB
57 KB
Script
General
Full URL
https://ads.rubiconproject.com/prebid/10306.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.67.129.200 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-67-129-200.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b61f41b5d6d685f48b7d9b7fa7d24eb2ee9130c54473853f0376ef52ed96bd4d

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:13 GMT
Content-Encoding
gzip
Last-Modified
Mon, 10 Dec 2018 15:50:02 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=9132
Access-Control-Allow-Credentials
true
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
58438
Expires
Thu, 13 Dec 2018 16:56:25 GMT
I2I9M2yx.js
cdn.krxd.net/controltag/
35 KB
7 KB
Script
General
Full URL
https://cdn.krxd.net/controltag/I2I9M2yx.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.175 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
801d343df97043e857cce7e0cd863284d402d569591abbe1fc63a55a73455311

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-CDN-Backend
4FrRTvEr9h480D4BywjehZ--F_Config_Service_V3
Date
Thu, 13 Dec 2018 14:24:13 GMT
Content-Encoding
gzip
Age
644
X-Cache
MISS, HIT, HIT
X-Request-Backend
krux_scala_config_webservice
X-App-Cache
HIT
Connection
keep-alive
Content-Length
6882
X-Served-By
config-service-a006.krxd.net, cache-iad2136-IAD, cache-fra19122-FRA
X-Response-Time
0
Accept-Ranges
bytes
X-Do-Esi
esi
X-Timer
S1544711054.801749,VS0,VE0
ETag
"686c843ad2609bcf40fb4cd873941a430d52155f"
Vary
Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 varnish, 1.1 varnish
Cache-Control
public, max-age=1200
X-Age
0
X-Cache-Hits
0, 1, 14
apstag.js
c.amazon-adsystem.com/aax2/
64 KB
19 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.147.236 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-147-236.fra53.r.cloudfront.net
Software
Server /
Resource Hash
e9ce46e8ee41d0f52c72c6e33af7b559667a79e1c77725e1a796066c92014671

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 12 Dec 2018 16:37:15 GMT
Content-Encoding
gzip
Server
Server
Age
78418
ETag
c54a6aa3815631c393c0f3372010e2c1
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 a56a2e7149e67774870adaf614e87aa1.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
X-Amz-Cf-Id
K7Hd7YW-0NjxsymcMIAXpFMVCHQHL5FnDmldcpuWH--x2cP-RX4hvw==
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:817::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
b688a3bcd1297cc0fe08e6e52fea14ba9108ee4b9a2052c03e7bac6e19347255
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 05 Nov 2018 21:10:09 GMT
server
Golfe2
age
1250
date
Thu, 13 Dec 2018 14:03:23 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
17404
expires
Thu, 13 Dec 2018 16:03:23 GMT
gtm.js
www.googletagmanager.com/
217 KB
54 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NS64GV
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81b::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager (scaffolding) /
Resource Hash
993409c889fea8d66868e0af454237d3aef4913e228925e02380e8095b7ea353
Security Headers
Name Value
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
content-encoding
gzip
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
server
Google Tag Manager (scaffolding)
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
54708
x-xss-protection
1; mode=block
expires
Thu, 13 Dec 2018 14:24:13 GMT
LabGrotesque-Regular.woff2
media.businessinsider.com/public/fonts/
33 KB
33 KB
Font
General
Full URL
https://media.businessinsider.com/public/fonts/LabGrotesque-Regular.woff2
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3d7e57b784dcdd68b9bf6c57c797d42c45666125c55b9a7149cd572692b04d3c
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/fonts/LabGrotesque-Regular.woff2
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
2880D3D219D775B4
etag
"b8fd6a13d9344e6131120e0cb6d3beba"
strict-transport-security
max-age=86400
content-type
binary/octet-stream
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
33784
x-amz-id-2
SYDx9GNuxYw3mPJ5M7E23IoQb0ADNjkwSx6HLh+ITLM8horM+Stx3eGnqRhT03OoqUJkg3oRfWk=
LabGrotesque-Italic.woff2
media.businessinsider.com/public/fonts/
24 KB
24 KB
Font
General
Full URL
https://media.businessinsider.com/public/fonts/LabGrotesque-Italic.woff2
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3fa2612c73f3e2ecf63f2824114b2bc4011ef2b496c3dc210a823adaa5d5ac6f
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/fonts/LabGrotesque-Italic.woff2
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
3CA1C66F417C42F5
etag
"e07e2ced74bca2ad6f9470f6de80def4"
strict-transport-security
max-age=86400
content-type
binary/octet-stream
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
24384
x-amz-id-2
R4XSnd6kMLF+3DR0j72oaSdsumAiXedADRarqbWfC31KPyLWx/vTAiMOlLUphCcWsqaKoORstgY=
LabGrotesque-Black.woff2
media.businessinsider.com/public/fonts/
22 KB
22 KB
Font
General
Full URL
https://media.businessinsider.com/public/fonts/LabGrotesque-Black.woff2
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
171601888bce2312dfa29d7e3b256e411b9af98bb9d20976ef399568cb88fcc8
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/fonts/LabGrotesque-Black.woff2
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
AA0A17FAF524B239
etag
"5800e59c648440f26f7a4a78e71ea705"
strict-transport-security
max-age=86400
content-type
binary/octet-stream
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
22596
x-amz-id-2
hE83Dh5QDsLBQucw3kHMBCM/ZfqkMp4HbnoEr9XMeUXLlqRdCyTvJPxdwbn1E8h2gQ5b8zcy1mE=
LabGrotesque-BlackItalic.woff2
media.businessinsider.com/public/fonts/
23 KB
24 KB
Font
General
Full URL
https://media.businessinsider.com/public/fonts/LabGrotesque-BlackItalic.woff2
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
586a0b31fa3e499d79ced85d786eb93229422f0534eca5c6546dd84e2c152191
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/fonts/LabGrotesque-BlackItalic.woff2
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
CF858B1B2B21F620
etag
"6c7146b87f978f3a88fbdb3f501d6365"
strict-transport-security
max-age=86400
content-type
binary/octet-stream
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
23944
x-amz-id-2
FjrUvxAK2+NK8jmVrNoTz8/ijg+hESbR/3CP+WKmcs9+FJUyESXKEFj8HNGvK0MV4q+zVwy3Qb4=
TiemposTextWeb-Regular.woff2
media.businessinsider.com/public/fonts/
55 KB
55 KB
Font
General
Full URL
https://media.businessinsider.com/public/fonts/TiemposTextWeb-Regular.woff2
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2341b50c0204d5e1ac9ce4aa97c786b97b4896ab015143e8f501f7ca159e0feb
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/fonts/TiemposTextWeb-Regular.woff2
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
278CD6091BCC371C
etag
"e7378685e19653450a60babca1a63589"
strict-transport-security
max-age=86400
content-type
binary/octet-stream
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
56155
x-amz-id-2
fHT+fY6IRoHHm0Vk+VLR82GMBuMdYYlO9G01KNLWOIOSwoad8Yp90bmePFiN83XyjhqI5qwmkLc=
TiemposTextWeb-RegularItalic.woff2
media.businessinsider.com/public/fonts/
56 KB
57 KB
Font
General
Full URL
https://media.businessinsider.com/public/fonts/TiemposTextWeb-RegularItalic.woff2
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c3f34f380e3430c22b05a63626a48b0cf5c8e77289329195c81cf4d357bd3c4c
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/fonts/TiemposTextWeb-RegularItalic.woff2
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
F3B5B9ADBF9EE4E8
etag
"77333564c33b6b4a41abefa293a20002"
strict-transport-security
max-age=86400
content-type
binary/octet-stream
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
57809
x-amz-id-2
P1AWgFCZpcYV3d6xTBaDifW9jvvXGXn2xVFoA9uKziGU3Nbv8A2Q0Yf8j60eulFhyOpvjRk9lik=
TiemposTextWeb-Bold.woff2
media.businessinsider.com/public/fonts/
55 KB
56 KB
Font
General
Full URL
https://media.businessinsider.com/public/fonts/TiemposTextWeb-Bold.woff2
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
070932e7007b5e642b52e428a7d82bafffe193c0b7095f2e34f256ddd8df0402
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/fonts/TiemposTextWeb-Bold.woff2
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
A37CFF535AF90C4A
etag
"3fcec0afb6d9f1e2fbfa35df5e264b6f"
strict-transport-security
max-age=86400
content-type
binary/octet-stream
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
56705
x-amz-id-2
wAt2v6LGm3AbXe3NHfWsI90pjaGVKZAhgNqjp0pYtIDqgBdZBlRoDpvHZniEHXlxi28Od2M+F6Q=
TiemposTextWeb-BoldItalic.woff2
media.businessinsider.com/public/fonts/
57 KB
58 KB
Font
General
Full URL
https://media.businessinsider.com/public/fonts/TiemposTextWeb-BoldItalic.woff2
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
42e8fed503af287ede2ecfbdc0ec7db59989bf70cbe9b3eb1517897c1c7c4b5f
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/fonts/TiemposTextWeb-BoldItalic.woff2
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
5218825EA9BC9A95
etag
"625cb175571e15d63eb6abff4b338fb0"
strict-transport-security
max-age=86400
content-type
binary/octet-stream
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
58708
x-amz-id-2
MboiDjmy/EK2LYV1FnK/FJiNl6bl0bVFqbYoIk8KF91J3sPf7vNF2BuPHqhrjF8+NsZ9yVizYBE=
advertising.js
www.npttech.com/
8 KB
3 KB
Script
General
Full URL
https://www.npttech.com/advertising.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700:30::681f:432f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6592f442a434004b6f673ac3e2953f8fbb6e9f709e01e1b6881e6a0b6ce2c645

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
content-encoding
br
cf-cache-status
HIT
x-amz-request-id
F6C5FE39478E8623
cf-ray
488917d65f08bed0-FRA
status
200
x-amz-id-2
gCFZ9dhZ7I6mfFR5LjKwxdTa1ltEF2z/iwbDfzJ0qBBplbEcbu8ePWj+OzoKtnYUut1GMZmsHu0=
last-modified
Tue, 11 Dec 2018 16:54:10 GMT
server
cloudflare
etag
W/"d1a184d262e7616f318c8efe8ce6a967"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-amz-version-id
Cj1eI3y7cWWc8z8d5lG1GfJ28GJL7l9P
cache-control
public, max-age=28800
content-type
application/javascript
expires
Thu, 13 Dec 2018 22:24:13 GMT
load
experience.tinypass.com/xbuilder/experience/
4 KB
2 KB
Script
General
Full URL
https://experience.tinypass.com/xbuilder/experience/load?aid=B6sIXKLiin
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.16.76.51 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
fa1f9c56c2c10cfd57872758216df80898c0e3b10c7a6672262054e4c9daad3a

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
content-encoding
br
cf-cache-status
HIT
wn
prod-exp-10-0-2-218
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
p3p
CP="NON DSP COR OUR IND"
status
200
cache-control
public, max-age=1800
cf-ray
488917d69d1a2360-FRA
content-type
application/javascript;charset=utf-8
x-request-id
CwrhojpHhoD
expires
Thu, 13 Dec 2018 14:54:13 GMT
5c01705e5d58ed1c817f1839-320-240.jpg
amp.businessinsider.com/images/
16 KB
17 KB
Image
General
Full URL
https://amp.businessinsider.com/images/5c01705e5d58ed1c817f1839-320-240.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
d7526cc1bff5a4f34638db0adcc3a1f6b73cf841c9e1fa690b3c1da5f36508c9

Request headers

:path
/images/5c01705e5d58ed1c817f1839-320-240.jpg
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
amp.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
64461
x-amz-meta-x-image-width
320
status
200
x-amz-meta-x-image-alternate
5c01705e5d58ed1c817f1839
x-amz-meta-surrogate-control
max-age=604800
x-amz-meta-surrogate-key
5c01705e5d58ed1c817f1839 grp:image
x-cache
HIT
x-amz-request-id
CE1E2DE4C2702578
x-amz-id-2
hn9OSENNWtrxYFbWODCZE5nJh/OohsZTn4tVi9Rw+vNvn2peS/wCVfMEpeopL/9aZtOWQKqy7SA=
x-served-by
cache-fra19142-FRA
accept-ranges
bytes
x-amz-meta-x-image-height
240
last-modified
Fri, 30 Nov 2018 17:16:22 GMT
server
AmazonS3
x-timer
S1544711054.855391,VS0,VE1
etag
"51d8514fc53b8c099ffc9c3851c5ae30"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
content-length
16690
x-cache-hits
1
592eedbd79474cbd1b8b55cf-320-240.jpg
amp.businessinsider.com/images/
14 KB
15 KB
Image
General
Full URL
https://amp.businessinsider.com/images/592eedbd79474cbd1b8b55cf-320-240.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c0ea77987082cd8255dbf033927791cd5d8394cad482d0ca59c4afc8a2151e90

Request headers

:path
/images/592eedbd79474cbd1b8b55cf-320-240.jpg
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
amp.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
64461
x-amz-meta-x-image-width
320
status
200
x-amz-meta-x-image-alternate
592eedbd79474cbd1b8b55cf
x-amz-meta-surrogate-control
max-age=604800
x-amz-meta-surrogate-key
592eedbd79474cbd1b8b55cf grp:image
x-cache
HIT
x-amz-request-id
0207A6A625357A8A
x-amz-id-2
gL4qzOr/Z6cxNR8vYibr/jIru3BOD2klCehMwd4UyAkQi80kY3pKZ682ahkwjvei84ID4CZ8XTc=
x-served-by
cache-fra19142-FRA
accept-ranges
bytes
x-amz-meta-x-image-height
240
last-modified
Sun, 04 Jun 2017 04:00:56 GMT
server
AmazonS3
x-timer
S1544711054.855551,VS0,VE0
etag
"e0ce2e27a8afd1cd61d2cfe90389d43a"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
content-length
14448
x-cache-hits
1
59c9418d25acc21d008b5925-320-240.jpg
amp.businessinsider.com/images/
19 KB
19 KB
Image
General
Full URL
https://amp.businessinsider.com/images/59c9418d25acc21d008b5925-320-240.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a6fe1d88957203018d5595a92fbeadfdc8c8647a19870849e3eddb70b577dac8

Request headers

:path
/images/59c9418d25acc21d008b5925-320-240.jpg
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
amp.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
64460
x-amz-meta-x-image-width
320
status
200
x-amz-meta-x-image-alternate
59c9418d25acc21d008b5925
x-amz-meta-surrogate-control
max-age=604800
x-amz-meta-surrogate-key
59c9418d25acc21d008b5925 grp:image
x-cache
HIT
x-amz-request-id
38C187EBA726E2AB
x-amz-id-2
V9qqREJO4y38IyV7rUk0lkTIY3vuN/9d8uYN25X0E0OhSsYhh/tYGqEKOAw8KBAnNty9o5NMFs0=
x-served-by
cache-fra19142-FRA
accept-ranges
bytes
x-amz-meta-x-image-height
240
last-modified
Mon, 25 Sep 2017 17:49:10 GMT
server
AmazonS3
x-timer
S1544711054.855405,VS0,VE1
etag
"7543fe8a845aca2fe082e43c1b94f654"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
content-length
19029
x-cache-hits
1
56f9478b9037f7137805ebbb-320-240.jpg
amp.businessinsider.com/images/
12 KB
12 KB
Image
General
Full URL
https://amp.businessinsider.com/images/56f9478b9037f7137805ebbb-320-240.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
947e966ea38d35b45f6f8a86866dc251f3065432f32b1673d197d8181c0a30a5

Request headers

:path
/images/56f9478b9037f7137805ebbb-320-240.jpg
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
amp.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
64460
x-amz-meta-x-image-width
320
status
200
x-amz-meta-x-image-alternate
56f9478b9037f7137805ebbb
x-amz-meta-surrogate-control
max-age=604800
x-amz-meta-surrogate-key
56f9478b9037f7137805ebbb grp:image
x-cache
HIT
x-amz-request-id
C185602BC49F0DCD
x-amz-id-2
YkwPpYhFfN2ndLWJkK97UK3gnKoksDBlmP2KlVbjGBFQouRQ0o70s86OoGizXDE06Ol6pC5RRAo=
x-served-by
cache-fra19142-FRA
accept-ranges
bytes
x-amz-meta-x-image-height
240
last-modified
Thu, 25 May 2017 01:40:14 GMT
server
AmazonS3
x-timer
S1544711054.855425,VS0,VE0
etag
"2e43a9b6dcf0bc6024b92ae4012b7282"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
content-length
11857
x-cache-hits
1
582cb80aba6eb634008b4b18-320-240.png
amp.businessinsider.com/images/
177 KB
178 KB
Image
General
Full URL
https://amp.businessinsider.com/images/582cb80aba6eb634008b4b18-320-240.png
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a1e439b34f68f1d13616840549b04dc767c9dd94501238f6c842d1ab2b59378e

Request headers

:path
/images/582cb80aba6eb634008b4b18-320-240.png
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
amp.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
64460
x-amz-meta-x-image-width
320
status
200
x-amz-meta-x-image-alternate
582cb80aba6eb634008b4b18
x-amz-meta-surrogate-control
max-age=604800
x-amz-meta-surrogate-key
582cb80aba6eb634008b4b18 grp:image
x-cache
HIT
x-amz-request-id
B4AE8CD33B6D9FFB
x-amz-id-2
COct7clQl7D/ryW+Atye0wK5EE4yPap8xumPz/UWD8j+ZdSJpYK9cAu49uXnQ4JjP5fVnFEWZUg=
x-served-by
cache-fra19142-FRA
accept-ranges
bytes
x-amz-meta-x-image-height
240
last-modified
Mon, 05 Jun 2017 23:00:12 GMT
server
AmazonS3
x-timer
S1544711054.854957,VS0,VE1
etag
"c68da6194f7ac7e715f3f21f6934e561"
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=604800
content-length
181643
x-cache-hits
1
5beda201d1e8442ebf5d7618-320-240.jpg
amp.businessinsider.com/images/
18 KB
18 KB
Image
General
Full URL
https://amp.businessinsider.com/images/5beda201d1e8442ebf5d7618-320-240.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
05b2e92f0c0cde56c48ab16ccccd9612017c7214312a83a0dad13cd79627f0dc

Request headers

:path
/images/5beda201d1e8442ebf5d7618-320-240.jpg
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
amp.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
66980
x-amz-meta-x-image-width
320
status
200
x-amz-meta-x-image-alternate
5beda201d1e8442ebf5d7618
x-amz-meta-surrogate-control
max-age=604800
x-amz-meta-surrogate-key
5beda201d1e8442ebf5d7618 grp:image
x-cache
HIT
x-amz-request-id
879DE36C39366C53
x-amz-id-2
0fQqcVNrjT3E1Oo2tcEh+WvtIlX6NanPx+ZeH8Dnps+nMylJOTAzeYOVCJBhAdTzVx8h0hoXW7c=
x-served-by
cache-fra19142-FRA
accept-ranges
bytes
x-amz-meta-x-image-height
240
last-modified
Thu, 15 Nov 2018 16:46:19 GMT
server
AmazonS3
x-timer
S1544711054.880727,VS0,VE0
etag
"ec42c4543fdcab0a687edb544257e480"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
content-length
17975
x-cache-hits
6
5be30a5fe4218a4edf43e0e3-320-240.jpg
amp.businessinsider.com/images/
16 KB
16 KB
Image
General
Full URL
https://amp.businessinsider.com/images/5be30a5fe4218a4edf43e0e3-320-240.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5620f28546788399d4f04dfd5e42546640bc6555fcca71a8dbb5bbc65118730f

Request headers

:path
/images/5be30a5fe4218a4edf43e0e3-320-240.jpg
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
amp.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
69701
x-amz-meta-x-image-width
320
status
200
x-amz-meta-x-image-alternate
5be30a5fe4218a4edf43e0e3
x-amz-meta-surrogate-control
max-age=604800
x-amz-meta-surrogate-key
5be30a5fe4218a4edf43e0e3 grp:image
x-cache
HIT
x-amz-request-id
F8946D1DBF3CCFFD
x-amz-id-2
eTTyIb9Qm1nOaSDbElSSDzUq4b3clc3TAt3lxIUz9U/74+Z94cVKTEs10vMMjht3y3/ho9IqbWM=
x-served-by
cache-fra19142-FRA
accept-ranges
bytes
x-amz-meta-x-image-height
240
last-modified
Wed, 07 Nov 2018 15:53:08 GMT
server
AmazonS3
x-timer
S1544711054.881766,VS0,VE1
etag
"b10cc4e39942995d45de4dbbb46df8ed"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
content-length
16535
x-cache-hits
1
5b99307a80eb3534008b5ddc-320-240.jpg
amp.businessinsider.com/images/
28 KB
28 KB
Image
General
Full URL
https://amp.businessinsider.com/images/5b99307a80eb3534008b5ddc-320-240.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
565436f852b49a3b8c2bb6fc14cb964c38c6883401ebb24689dfdabc195ea183

Request headers

:path
/images/5b99307a80eb3534008b5ddc-320-240.jpg
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
amp.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
62173
x-amz-meta-x-image-width
320
status
200
x-amz-meta-x-image-alternate
5b99307a80eb3534008b5ddc
x-amz-meta-surrogate-control
max-age=604800
x-amz-meta-surrogate-key
5b99307a80eb3534008b5ddc grp:image
x-cache
HIT
x-amz-request-id
76585F853892E6FD
x-amz-id-2
j1Eguj+UM4c5ynmkLMZ/Q6M3oKq4aSKqKFvVWZVOUPEcmHeFucP4NwS0iakMaFAHglGO0zu6+dI=
x-served-by
cache-fra19142-FRA
accept-ranges
bytes
x-amz-meta-x-image-height
240
last-modified
Wed, 12 Sep 2018 15:28:06 GMT
server
AmazonS3
x-timer
S1544711054.881851,VS0,VE0
etag
"c02b705ad4b178289da9309860859a0a"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
content-length
28383
x-cache-hits
1
5c1008e867666b1a4e121b97-320-240.jpg
amp.businessinsider.com/images/
14 KB
14 KB
Image
General
Full URL
https://amp.businessinsider.com/images/5c1008e867666b1a4e121b97-320-240.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b504ec8ac5c64f1e31a78d5cff958169aa70229f86e55cf70615405ed3f6641e

Request headers

:path
/images/5c1008e867666b1a4e121b97-320-240.jpg
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
amp.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
154744
x-amz-meta-x-image-width
320
status
200
x-amz-meta-x-image-alternate
5c1008e867666b1a4e121b97
x-amz-meta-surrogate-control
max-age=604800
x-amz-meta-surrogate-key
5c1008e867666b1a4e121b97 grp:image
x-cache
HIT
x-amz-request-id
135D66FC5AF0697E
x-amz-id-2
gfl02xSWeIH20I7OKA84G8P4MeKBb/6cO3+w24OVloGEiwq3iQFY+j72d0RlpVfLJf+EUQKhLAM=
x-served-by
cache-fra19142-FRA
accept-ranges
bytes
x-amz-meta-x-image-height
240
last-modified
Tue, 11 Dec 2018 19:03:45 GMT
server
AmazonS3
x-timer
S1544711054.882208,VS0,VE1
etag
"41ac497eb2e193506ab901ae79d26d2b"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
content-length
13937
x-cache-hits
1
5c1038412ae63b2037025975-320-240.jpg
amp.businessinsider.com/images/
19 KB
19 KB
Image
General
Full URL
https://amp.businessinsider.com/images/5c1038412ae63b2037025975-320-240.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1c36d06ef4f4ffa2bffbb90c66b63f81e11d1e87a862eb9a3b4a65056ae52e91

Request headers

:path
/images/5c1038412ae63b2037025975-320-240.jpg
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
amp.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
via
1.1 varnish
age
119735
x-amz-meta-x-image-width
320
status
200
x-amz-meta-x-image-alternate
5c1038412ae63b2037025975
x-amz-meta-surrogate-control
max-age=604800
x-amz-meta-surrogate-key
5c1038412ae63b2037025975 grp:image
x-cache
HIT
x-amz-request-id
FF6551B0E5AAE000
x-amz-id-2
8M+DBWGfCsXXGH5ZCq+XzNVnC5H1pHMYgJJGFBPiox2XFsB5dYuUoUyHweLAg20SzGKJvHaW2P4=
x-served-by
cache-fra19142-FRA
accept-ranges
bytes
x-amz-meta-x-image-height
240
last-modified
Tue, 11 Dec 2018 22:30:16 GMT
server
AmazonS3
x-timer
S1544711054.882240,VS0,VE0
etag
"cc50ecc1607302f3ed33c81819a51e70"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
content-length
18978
x-cache-hits
1
vendor.js
media.businessinsider.com/public/scripts/
390 KB
107 KB
Script
General
Full URL
https://media.businessinsider.com/public/scripts/vendor.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
612b47d0f53961a4fd7df1fce4283719b52ec45785a795711fbf5205b3610136
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/scripts/vendor.js
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
content-encoding
gzip
last-modified
Mon, 10 Dec 2018 17:44:01 GMT
server
AmazonS3
x-amz-request-id
15614D29FA8E7E82
etag
"1ae52fbdce0a23ef1d4ea34d3365152d"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=7200
strict-transport-security
max-age=86400
accept-ranges
bytes
access-control-allow-origin
*
x-amz-id-2
4IVsH0UtBS0PrVyHgdBv8b9bKct/uBf26WMjdypO7y+4er3iUDgmOebk1w0Mqoz9uccx1JPX+pY=
foot.js
media.businessinsider.com/public/scripts/
110 KB
33 KB
Script
General
Full URL
https://media.businessinsider.com/public/scripts/foot.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
accd669e0397ef8ac38cbbae78532e2fec743f12d62b875e972c32046425e7a4
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/scripts/foot.js
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
content-encoding
gzip
last-modified
Mon, 10 Dec 2018 17:44:01 GMT
server
AmazonS3
x-amz-request-id
584719F1016675C6
etag
"774b31e2c96be34f98746eee10a55d8f"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=7200
strict-transport-security
max-age=86400
accept-ranges
bytes
access-control-allow-origin
*
content-length
33018
x-amz-id-2
27/2ebfgQ4ZMJyAbL19JMRSpqcnl3F0XlGeV/NweY4Oy16V8TsCYOgp/4ynQhlW3ktmELKMf7IA=
controltag.js.c18d2ea515480e99b9a7056becfa6a91
cdn.krxd.net/ctjs/
246 KB
79 KB
Script
General
Full URL
https://cdn.krxd.net/ctjs/controltag.js.c18d2ea515480e99b9a7056becfa6a91
Requested by
Host: cdn.krxd.net
URL: https://cdn.krxd.net/controltag/I2I9M2yx.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.175 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
c84bd1e0ebf8ef7bfc78e362b378ad08ed353c55b665ef86ba8ae1a46b899f9b

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-CDN-Backend
4FrRTvEr9h480D4BywjehZ--F_Controltag_S3
Date
Thu, 13 Dec 2018 14:24:13 GMT
Content-Encoding
gzip
Age
3001600
X-Cache
HIT
Connection
keep-alive
Content-Length
80299
X-Served-By
cache-fra19122-FRA
Last-Modified
Wed, 07 Nov 2018 21:15:28 GMT
X-Timer
S1544711054.940691,VS0,VE0
ETag
"c18d2ea515480e99b9a7056becfa6a91"
Content-Type
application/javascript
Via
1.1 varnish
Expires
Sat, 04 Nov 2028 21:15:27 GMT
Cache-Control
public, max-age=315360000
Accept-Ranges
bytes
X-Cache-Hits
166788
js
www.google-analytics.com/gtm/
54 KB
21 KB
Script
General
Full URL
https://www.google-analytics.com/gtm/js?id=GTM-PW3NXV3&cid=1974187570.1544711054
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:817::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager (scaffolding) /
Resource Hash
0731230b1f1a43e00d9f69d6719a4ae13e6ebe2f5c6bd139bf5f37ab9f4f05fc
Security Headers
Name Value
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:13 GMT
content-encoding
gzip
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
server
Google Tag Manager (scaffolding)
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
21666
x-xss-protection
1; mode=block
expires
Thu, 13 Dec 2018 14:24:13 GMT
tinypass.min.js
cdn.tinypass.com/api/
329 KB
105 KB
Script
General
Full URL
https://cdn.tinypass.com/api/tinypass.min.js
Requested by
Host: experience.tinypass.com
URL: https://experience.tinypass.com/xbuilder/experience/load?aid=B6sIXKLiin
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.16.76.51 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b78ff321cff27279d7546c92b6fce0b9344e85796db674d7517791b605701196

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
content-encoding
br
cf-cache-status
HIT
wn
prod-dash-10-0-1-46
server
cloudflare
etag
W/"336624-1544658842000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
p3p
CP="NON DSP COR OUR IND"
status
200
cache-control
public, max-age=3600
last-modified
Wed, 12 Dec 2018 23:54:02 GMT
cf-ray
488917d7cdb32360-FRA
content-type
text/javascript
expires
Thu, 13 Dec 2018 15:24:14 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.147.236 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-147-236.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6d6f482982f8f1a1814e279ff50df4ccc301533ca9655e4d080d6b90ec69d69e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

Date
Wed, 12 Dec 2018 17:25:32 GMT
Content-Encoding
gzip
Vary
Accept-Encoding,Origin
Age
78662
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Fri, 24 Aug 2018 07:13:51 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Via
1.1 bc9bd2c59aa48e2932432099ba36a25b.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
X-Amz-Cf-Id
U71NKAnDOJns6hCijN3k27SrOIjPOps1_YGa1qcJP-7feC3PyzyXcQ==
fbevents.js
connect.facebook.net/en_US/
51 KB
15 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
3f82740e9a6c6d623745fee6d7c653f984223a87287eb2dc739c665687dcca20
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
14853
x-xss-protection
0
pragma
public
x-fb-debug
ZXshVhVC0Jl7K7qt9eotWbIPhzJ2fcWOO6KCGSXS5LcN7FqHnAq1KzoBOHKv/LJgKASEMWRRFVBpuqd2vGu6DA==
date
Thu, 13 Dec 2018 14:24:14 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
tag.aspx
ml314.com/
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?13112018
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
0540bb8ed200548c9ebd32a109f45213dd47da5d5d9962d4b86f57b00ebef600

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:14 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Dec 2018 13:03:07 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=81532
Connection
keep-alive
Content-Length
11822
Expires
Fri, 14 Dec 2018 13:03:07 GMT
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.1.4/
82 KB
29 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/2.1.4/jquery.min.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:806::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
22642f202577f0ba2f22cbe56b6cf291a09374487567cd3563e0d2a29f75c0c5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 12 Dec 2018 11:16:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
97694
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
29725
x-xss-protection
1; mode=block
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 12 Dec 2019 11:16:00 GMT
qevents.js
a.quora.com/
17 KB
6 KB
Script
General
Full URL
https://a.quora.com/qevents.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3f37d74095d27ff0f96a5db6eb5136c477109a18e09d9dc6b94bd9cb5f45fba2

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
YCV7VuLi1FWNdCoW3lEJrFWrz1GWe8vX
content-encoding
gzip
age
4355
x-cache
HIT
status
200
date
Thu, 13 Dec 2018 14:24:14 GMT
content-length
5544
x-amz-id-2
tKBXvR9LifgsCH/3JG3WNwDvSxvlgDWtbGdRIdpE8rKNbh8ATJukpgUo7oI0mSWlDQsAJsJefuI=
x-served-by
cache-fra19140-FRA
last-modified
Thu, 17 May 2018 01:54:45 GMT
server
AmazonS3
x-timer
S1544711054.234364,VS0,VE0
etag
"ff1694b5052cad982a64fab43387cf6d"
vary
Accept-Encoding
x-amz-request-id
C142A22B058D89E8
via
1.1 varnish
cache-control
max-age=7200
accept-ranges
bytes
content-type
text/plain; charset=us-ascii
x-cache-hits
3522
PF0863AE4-16F7-453B-A349-CA13E26ED811.js
cdn-gl.imrworldwide.com/conf/
28 KB
7 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/conf/PF0863AE4-16F7-453B-A349-CA13E26ED811.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.168 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-168.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
460c102f0ff7b265b6ca6ed0a26efd5477a14035f52b2aa0ce2ec595c465ef97

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 12:25:04 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Dec 2018 11:34:02 GMT
Server
AmazonS3
Age
3549
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
cINk95T9O0W7fnQWVVLZcSsGelNuWi73
Via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
QhqlH3G7bQfaBKfT7QoBaHnpyZQnj5btjsUIzSn_TlUsgK4AH4m7Zg==
collect
www.google-analytics.com/
35 B
121 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j72&a=45720967&t=pageview&_s=1&dl=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&dp=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&ul=en-us&de=UTF-8&dt=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=6GDAgUADQ~&jid=2004655085&gjid=162216684&cid=1974187570.1544711054&tid=UA-2241657-6&_gid=880845344.1544711054&gtm=2wgbc0NS64GV&cg1=video&cg2=staff&cg3=Video%7CTI%20Original%20Video%7CBI%20Original%20Video%7CHackers%7CHacking%7CTech%7CCisco%7CPhone%7CCybersecurity%7CRed%20Balloon%20Security%7CAng%20Cui%7CMatthew%20Stuart%7Chacker%7CDonald%20Trump&cg4=video&cd1=video&cd2=video&cd3=staff&cd4=Chris%20Snyder&cd5=Jennifer%20Ortakales&cd6=Video%7CTI%20Original%20Video%7CBI%20Original%20Video%7CHackers%7CHacking%7CTech%7CCisco%7CPhone%7CCybersecurity%7CRed%20Balloon%20Security%7CAng%20Cui%7CMatthew%20Stuart%7Chacker%7CDonald%20Trump&cd7=&cd9=hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&cd10=5a12f7713dbef430008b7200&cd11=2018-10-25&cd14=Business%20Insider&cd25=&cd26=2017-11-20&cd27=A%20cybersecurity%20expert%20showed%20us%20how%20hackers%20can%20tap%20into%20an%20office%20phone%20and%20listen%20to%20everything%20you%27re%20saying&cd28=Chris%20Snyder&cd30=0&cd31=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&cd32=841&cd33=BIRTA&cd35=video&cm2=1&cd34=1974187570.1544711054&z=487257837
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:817::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 12 Dec 2018 02:32:04 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
129130
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j72&tid=UA-2241657-6&cid=1974187570.1544711054&jid=2004655085&gjid=162216684&_gid=880845344.1544711054&_u=6GDAgUADQ~&z=973831049
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=2004655085&_v=j72&z=973831049
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=2004655085&_v=j72&z=973831049&slf_rd=1&random=3949909947
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=2004655085&_v=j72&z=973831049&slf_rd=1&random=3949909947
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:14 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:14 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=2004655085&_v=j72&z=973831049&slf_rd=1&random=3949909947
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
BI-logo-white-opt.svg
media.businessinsider.com/public/assets/BI/US/logos/
3 KB
3 KB
Image
General
Full URL
https://media.businessinsider.com/public/assets/BI/US/logos/BI-logo-white-opt.svg
Requested by
Host: www.npttech.com
URL: https://www.npttech.com/advertising.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
fb232ac30112e7b58b982fe9209af63497475c0abf0d07825d255fa2e0cfc1d2
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/assets/BI/US/logos/BI-logo-white-opt.svg
pragma
no-cache
cookie
_ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; _dc_gtm_UA-2241657-6=1
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://media.businessinsider.com/public/styles/core.css
:scheme
https
:method
GET
Referer
https://media.businessinsider.com/public/styles/core.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Thu, 29 Nov 2018 20:27:02 GMT
server
AmazonS3
x-amz-request-id
A617B6718D19BC77
etag
"071b114a40704ecfc26ff8e17e0bb41b"
strict-transport-security
max-age=86400
content-type
image/svg+xml
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
2565
x-amz-id-2
CFZCPvw69Bt7+95LCIptxuRdCuK6VWrkgeLQd3+JFo5SgUMmDDZVf9yAT/atAHNQHYlaOjTMoNg=
8px-square-bullet-BI.svg
media.businessinsider.com/public/assets/BI/US/
133 B
415 B
Image
General
Full URL
https://media.businessinsider.com/public/assets/BI/US/8px-square-bullet-BI.svg
Requested by
Host: www.npttech.com
URL: https://www.npttech.com/advertising.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d2dddc061df52579458feb09d30b015f14ec31964d89d1d27f5f775bd2c684a4
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/assets/BI/US/8px-square-bullet-BI.svg
pragma
no-cache
cookie
_ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; _dc_gtm_UA-2241657-6=1
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://media.businessinsider.com/public/styles/core.css
:scheme
https
:method
GET
Referer
https://media.businessinsider.com/public/styles/core.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Thu, 29 Nov 2018 20:27:02 GMT
server
AmazonS3
x-amz-request-id
27020167E069C188
etag
"cc871fff766bdbed3368d90f6551a3b7"
strict-transport-security
max-age=86400
content-type
image/svg+xml
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
133
x-amz-id-2
8Qzq3vMS8dugj0T3GCT/jEK26VrzeaLkSg1F6YDWM+rAUNl+Gi4xKaXlLsPIC5FTewHyclqj4+Y=
play-icon.svg
media.businessinsider.com/public/assets/BI/US/
312 B
592 B
Image
General
Full URL
https://media.businessinsider.com/public/assets/BI/US/play-icon.svg
Requested by
Host: www.npttech.com
URL: https://www.npttech.com/advertising.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
b341e35b71f9cb718e0b8c3a7fc23ac4a1e183cf64d5b9b99f08b358ddc373a0
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/assets/BI/US/play-icon.svg
pragma
no-cache
cookie
_ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; _dc_gtm_UA-2241657-6=1
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://media.businessinsider.com/public/styles/core.css
:scheme
https
:method
GET
Referer
https://media.businessinsider.com/public/styles/core.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Thu, 29 Nov 2018 20:27:02 GMT
server
AmazonS3
x-amz-request-id
30DA25B342495839
etag
"550cf8823ab02fbc7546294faa3de88b"
strict-transport-security
max-age=86400
content-type
image/svg+xml
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
312
x-amz-id-2
lKHVj/Heg5w+cKGnm1I84NVO3UFOi0aFN/TBLKc2N3YcB3Gj8JOiVwYRFocLUIFVNJO0WKmCw4A=
BI-logo-dark-opt.svg
media.businessinsider.com/public/assets/BI/US/logos/
3 KB
3 KB
Image
General
Full URL
https://media.businessinsider.com/public/assets/BI/US/logos/BI-logo-dark-opt.svg
Requested by
Host: www.npttech.com
URL: https://www.npttech.com/advertising.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d4731cbae8bf5cc4496d1e6bf45a970ae178fab4e2504c77885ebe13c59d097c
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/assets/BI/US/logos/BI-logo-dark-opt.svg
pragma
no-cache
cookie
_ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; _dc_gtm_UA-2241657-6=1
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://media.businessinsider.com/public/styles/core.css
:scheme
https
:method
GET
Referer
https://media.businessinsider.com/public/styles/core.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Thu, 29 Nov 2018 20:27:02 GMT
server
AmazonS3
x-amz-request-id
8C61F02F1B8995E9
etag
"84bede9278788d8b2c9cecc2ec2a5de4"
strict-transport-security
max-age=86400
content-type
image/svg+xml
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
3067
x-amz-id-2
194+iVde8TCE4zzu4yanSZYnWtx3EZ4n1ws3lg7WIujIkckccz1484hZZAJODLEGsKDMfX1eei8=
app-store-badge.svg
media.businessinsider.com/public/assets/badges/
9 KB
9 KB
Image
General
Full URL
https://media.businessinsider.com/public/assets/badges/app-store-badge.svg
Requested by
Host: www.npttech.com
URL: https://www.npttech.com/advertising.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f876e8c89430e7e84d49a1aa62ccc92ff930a0b64ad4e1a138540b4e569d2f8d
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/assets/badges/app-store-badge.svg
pragma
no-cache
cookie
_ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; _dc_gtm_UA-2241657-6=1
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://media.businessinsider.com/public/styles/core.css
:scheme
https
:method
GET
Referer
https://media.businessinsider.com/public/styles/core.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
F36AB98965963299
etag
"4c7135ef758b617f0f6100ff78d41614"
strict-transport-security
max-age=86400
content-type
image/svg+xml
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
8970
x-amz-id-2
rUjygWt1tEYgjLvGZ1wiIOxiz/+IiSScqU4eh72yrIE1KD2bscv06zzfLFgOMgGgrzVYMY5hdrQ=
google-play-badge.svg
media.businessinsider.com/public/assets/badges/
5 KB
5 KB
Image
General
Full URL
https://media.businessinsider.com/public/assets/badges/google-play-badge.svg
Requested by
Host: www.npttech.com
URL: https://www.npttech.com/advertising.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
9671a1e59c1b2410247b92dff30ec4ae5c87da856b52b2c5a5be748d84b93b72
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/assets/badges/google-play-badge.svg
pragma
no-cache
cookie
_ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; _dc_gtm_UA-2241657-6=1
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://media.businessinsider.com/public/styles/core.css
:scheme
https
:method
GET
Referer
https://media.businessinsider.com/public/styles/core.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
BB3E5DBA2B7F7F4C
etag
"7addbc26099de59b468fdf846845aea7"
strict-transport-security
max-age=86400
content-type
image/svg+xml
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
5220
x-amz-id-2
ECkMgnBcdtS8pIu5xBOkJ1+oMcH9lNotFWLmYl1RkO96uj4+3QFvA3Pk7teMbcdOZ0ILztyfWAU=
Insider-logo-dark-opt.svg
media.businessinsider.com/public/assets/INSIDER/US/logos/
1 KB
1 KB
Image
General
Full URL
https://media.businessinsider.com/public/assets/INSIDER/US/logos/Insider-logo-dark-opt.svg
Requested by
Host: www.npttech.com
URL: https://www.npttech.com/advertising.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ef6afea8b38ff3b8fdaff3a5199f8e643b07831d9137985391bd4bacddf909bf
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/assets/INSIDER/US/logos/Insider-logo-dark-opt.svg
pragma
no-cache
cookie
_ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; _dc_gtm_UA-2241657-6=1
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://media.businessinsider.com/public/styles/core.css
:scheme
https
:method
GET
Referer
https://media.businessinsider.com/public/styles/core.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Thu, 29 Nov 2018 20:27:02 GMT
server
AmazonS3
x-amz-request-id
8AB59CBB66572EF6
etag
"d8741d09e6492af2bdd364daa2618ec0"
strict-transport-security
max-age=86400
content-type
image/svg+xml
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
1179
x-amz-id-2
mamgaxqpayATcjm0zOFlgRTEqugbQprbxt5gcoWr19VlX9DVRa3H5cRdMr20VBaLGLjx1jIlSLE=
MI-logo-dark-opt.svg
media.businessinsider.com/public/assets/MI/logos/
3 KB
3 KB
Image
General
Full URL
https://media.businessinsider.com/public/assets/MI/logos/MI-logo-dark-opt.svg
Requested by
Host: www.npttech.com
URL: https://www.npttech.com/advertising.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
79b6c122184b7e233deeb07f788aa075604d4a939e4e55390aa55889fa0ff978
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/assets/MI/logos/MI-logo-dark-opt.svg
pragma
no-cache
cookie
_ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; _dc_gtm_UA-2241657-6=1
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://media.businessinsider.com/public/styles/core.css
:scheme
https
:method
GET
Referer
https://media.businessinsider.com/public/styles/core.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Thu, 29 Nov 2018 20:27:02 GMT
server
AmazonS3
x-amz-request-id
2998B4AEA6C4D767
etag
"9c8c9eaac96e7f2932fba839e23334f6"
strict-transport-security
max-age=86400
content-type
image/svg+xml
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
3039
x-amz-id-2
CBOLZ+OJQdJ3x+Jh6W0dEv1qdBxTQwfH/v9V7iL3bJB69qP3zOv0VmnpkU4owTajYQnxLZS7b2s=
BII-logo-dark-opt.svg
media.businessinsider.com/public/assets/BII/logos/
2 KB
2 KB
Image
General
Full URL
https://media.businessinsider.com/public/assets/BII/logos/BII-logo-dark-opt.svg
Requested by
Host: www.npttech.com
URL: https://www.npttech.com/advertising.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
234f4cb75aa65bebb902ee0532149ccd6b0042070cb834056c1b525f949c08ce
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/assets/BII/logos/BII-logo-dark-opt.svg
pragma
no-cache
cookie
_ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; _dc_gtm_UA-2241657-6=1
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://media.businessinsider.com/public/styles/core.css
:scheme
https
:method
GET
Referer
https://media.businessinsider.com/public/styles/core.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Thu, 29 Nov 2018 20:27:02 GMT
server
AmazonS3
x-amz-request-id
B6ACA209D3816746
etag
"791678a99b7d39ad29eaf2fd174d0487"
strict-transport-security
max-age=86400
content-type
image/svg+xml
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
1656
x-amz-id-2
Q3Egrk5zqNTf8sPuSRvKNrzpIk3EQz+epJsocl0m9Thzmkuio94mFEsLcBFdx8T2Br93fdhjro8=
icon-set.woff2
media.businessinsider.com/public/fonts/
9 KB
9 KB
Font
General
Full URL
https://media.businessinsider.com/public/fonts/icon-set.woff2
Requested by
Host: www.npttech.com
URL: https://www.npttech.com/advertising.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.111 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-111.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c6c55b11eb64c1c820bb5e4c168ad90b7cb023c8e3c8f273388c42b9aedda779
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

:path
/public/fonts/icon-set.woff2
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
media.businessinsider.com
referer
https://media.businessinsider.com/public/styles/core.css
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://media.businessinsider.com/public/styles/core.css
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Thu, 29 Nov 2018 20:27:03 GMT
server
AmazonS3
x-amz-request-id
8BF100A27E724D6E
etag
"9086475a6eb1bfafbb6fc59651559363"
strict-transport-security
max-age=86400
content-type
binary/octet-stream
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
access-control-allow-origin
*
content-length
9104
x-amz-id-2
WZsIQVyDb/F1n1Ih9/3aK1sgB2+Va7cy92ZR2BUQlE1upGOBD67nKngBoM9ChE8Z0Jdck6sZ5Ts=
08ea07b8-908f-4d41-b3b3-2af0d93a5984
consumer.krxd.net/consent/get/
243 B
666 B
Script
General
Full URL
https://consumer.krxd.net/consent/get/08ea07b8-908f-4d41-b3b3-2af0d93a5984?idt=device&dt=kxcookie&callback=Krux.ns.businessinsider.kxjsonp_consent_get_0
Requested by
Host: cdn.krxd.net
URL: https://cdn.krxd.net/ctjs/controltag.js.c18d2ea515480e99b9a7056becfa6a91
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.175 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
b94b552c689476d9a1316a75a86a6d1bc28807582c7e85cd97b7771e5c818cc5

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:14 GMT
Content-Encoding
gzip
Age
0
X-Cache
MISS, MISS
X-Request-Backend
krux_scala_consumer_webservice
Connection
keep-alive
Content-Length
194
X-Served-By
consumer-a003-dub.krxd.net, cache-fra19136-FRA
Accept-Ranges
bytes
X-Timer
S1544711054.314423,VS0,VE27
Vary
Accept-Encoding
Content-Type
text/javascript; charset=UTF-8
Via
1.1 varnish
Cache-Control
max-age=1800
X-Age
0
X-Cache-Hits
0, 0
gpt.js
www.googletagservices.com/tag/js/
28 KB
10 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
1ef8b98ff0d7aa163ff6843dc7e7c3565c5e9055a7ad17965f5c0c5b0d3f3147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"19 / 918 of 1000 / last-modified: 1544647778"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
9685
x-xss-protection
1; mode=block
expires
Thu, 13 Dec 2018 14:24:14 GMT
1988166924554892
connect.facebook.net/signals/config/
181 KB
44 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1988166924554892?v=2.8.34&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
c647dc8929daaebda5636196d7ee541971b567e34dda836efabae5454738d7dd
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
44151
x-xss-protection
0
pragma
public
x-fb-debug
Cnh2tqpfT9ylRNv8WjZhuzLPkzJ4qdUmIeXwwm/gp3pvoXMo40nTCxSPFC99/x41boTGJFqktcGjyezFeGPX0A==
date
Thu, 13 Dec 2018 14:24:14 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
nlsSDK600.bundle.min.js
cdn-gl.imrworldwide.com/novms/js/2/
149 KB
44 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/conf/PF0863AE4-16F7-453B-A349-CA13E26ED811.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.168 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-168.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
1b0444818330c3a584261448523bb809287e5b1f417353a3e98c075132160d09

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
1Lyh3a8MIOcUhY3E9RRSwPivIJB4fkgA
Content-Encoding
gzip
Last-Modified
Thu, 06 Dec 2018 14:16:48 GMT
Server
AmazonS3
Age
429
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
vq4KWzikB-krkWv1g5H3SabggI09kTEUuy9xI2XRpmOAZXZYYA8fpQ==
Date
Thu, 13 Dec 2018 14:17:07 GMT
pixel
q.quora.com/_/ad/7dcfe5994dfa465286315e1e7c77d319/
43 B
312 B
Image
General
Full URL
https://q.quora.com/_/ad/7dcfe5994dfa465286315e1e7c77d319/pixel?j=1&u=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&tag=ViewContent&ts=1544711054380
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.72.168 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-86-72-168.compute-1.amazonaws.com
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:14 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: media.businessinsider.com
URL: https://media.businessinsider.com/public/scripts/foot.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.43.115.95 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-43-115-95.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:14 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Fri, 14 Dec 2018 14:24:14 GMT
flbuttons.min.js
cdn.flipboard.com/web/buttons/js/
7 KB
4 KB
Script
General
Full URL
https://cdn.flipboard.com/web/buttons/js/flbuttons.min.js?_=1544711054430
Requested by
Host: media.businessinsider.com
URL: https://media.businessinsider.com/public/scripts/vendor.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:7a00:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8e7ad8de87781f6ad65b36a7d3243b44d80dc182df6af076484a2bec85051550

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 13:10:46 GMT
content-encoding
gzip
last-modified
Wed, 11 Oct 2017 00:24:00 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:502/gname:staff/uname:alee/gid:20/mode:33188/mtime:1507680760/atime:1507680783/md5:ec6e4306e5e274d25c4f9afde663da81/ctime:1507680760
age
51353
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
aij8xVieDDqtsXa633OCn4iicUerZfNeOnXvgMTBeBV6MLzBEOjtXQ==
via
1.1 9edca61f65102033971d096a9351690a.cloudfront.net (CloudFront)
/
geoip.businessinsider.com/
105 B
219 B
XHR
General
Full URL
https://geoip.businessinsider.com/
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
ecb3502ffa088a26c91cb0c899f1080fc642ab32381c7a253ffcd5118eadadf2

Request headers

:path
/
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
geoip.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Accept
*/*
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Thu, 13 Dec 2018 14:24:14 GMT
via
1.1 varnish
server
Varnish
access-control-allow-origin
https://www.businessinsider.com
content-length
105
content-type
application/json; charset=utf-8
/
geoip.businessinsider.com/
105 B
135 B
XHR
General
Full URL
https://geoip.businessinsider.com/
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
ecb3502ffa088a26c91cb0c899f1080fc642ab32381c7a253ffcd5118eadadf2

Request headers

:path
/
pragma
no-cache
origin
https://www.businessinsider.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
geoip.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Accept
*/*
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Thu, 13 Dec 2018 14:24:14 GMT
via
1.1 varnish
server
Varnish
access-control-allow-origin
https://www.businessinsider.com
content-length
105
content-type
application/json; charset=utf-8
loader.js
cdn.taboola.com/libtrc/businessinsider/
912 KB
59 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/businessinsider/loader.js?_=1544711054431
Requested by
Host: media.businessinsider.com
URL: https://media.businessinsider.com/public/scripts/vendor.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9da5bbc7d3bc7f383e55c80e0d414a87d3218a7b60e9514913ea0fd95cc00302

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
0rhrebzAYVXgIGKhZ7lqc5ErvYCqxCko
content-encoding
gzip
age
1
x-cache
MISS
status
200
date
Thu, 13 Dec 2018 14:24:15 GMT
x-amz-replication-status
COMPLETED
content-length
60393
x-amz-id-2
Pj7dvylYLy6BUGohTsqX9efR2tMbN5mbmibMM7YsG8XHQh9ajUzh9h2I4MrzH0R/GKEotXH5MFk=
x-served-by
cache-fra19143-FRA
last-modified
Wed, 12 Dec 2018 14:13:38 GMT
server
AmazonS3
x-timer
S1544711055.545256,VS0,VE706
etag
"37f4f5e5fd9ee0610904dc219f8b12f9"
vary
Accept-Encoding
x-amz-request-id
455CE8326B43198D
via
1.1 varnish
cache-control
private,max-age=14401
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
86
x-cache-hits
0
track.gif
www.businessinsider.com/
43 B
394 B
Image
General
Full URL
https://www.businessinsider.com/track.gif?vertical=sai&post_id=5a12f7713dbef430008b7200&post_author=Chris%20Snyder&post_type=post&post_author_ids=&rand=0.612309304560612&location=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.171 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache/2.4.10 (Debian) / PHP/5.6.36
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

:path
/track.gif?vertical=sai&post_id=5a12f7713dbef430008b7200&post_author=Chris%20Snyder&post_type=post&post_author_ids=&rand=0.612309304560612&location=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT
pragma
no-cache
cookie
AWSALB=m5wfqzJTbh5PK6CZYVRhkOZLEv1P2wKiMzrcDuwlO7tRgkGYtwbIWfbscIkx9f4sVOjBnhZo6cOPa82xTwGkvoO95REWAOg3dBJEoAULpaqaCYMqIGNJqDl11mRB; _ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; __adblocker=false; lux_uid=154471105401853357; _dc_gtm_UA-2241657-6=1; landingPageCookie=https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T; kxbusinessinsider_visits=1; iad=1
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
www.businessinsider.com
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
:scheme
https
:method
GET
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
via
1.1 varnish
vary
Fastly-SSL
x-real-ip
148.251.45.254
x-got-non-ke-cookie
true
x-powered-by
PHP/5.6.36
x-cache
MISS
status
200
content-length
43
x-served-by
cache-fra19142-FRA
server
Apache/2.4.10 (Debian)
x-timer
S1544711054.499550,VS0,VE144
strict-transport-security
max-age=31536000
content-type
image/gif
set-cookie
um=1; expires=Tue, 01-Jan-2019 05:00:00 GMT; Max-Age=1607746 ud=1; expires=Fri, 14-Dec-2018 05:00:00 GMT; Max-Age=52546 uh=1; expires=Thu, 13-Dec-2018 15:00:00 GMT; Max-Age=2146
accept-ranges
bytes
x-country-code
DE
x-cache-hits
0
Cookie set t.gif
analytics.businessinsider.com/
0
345 B
Image
General
Full URL
https://analytics.businessinsider.com/t.gif?ev=view&loc=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&ref=&dest=
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.64 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, br
Host
analytics.businessinsider.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Cookie
_ga=GA1.2.1974187570.1544711054; _gid=GA1.2.880845344.1544711054; _dc_gtm_UA-2241657-6=1
Connection
keep-alive
Cache-Control
no-cache
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 13 Dec 2018 14:24:14 GMT
Via
1.1 varnish
Server
Varnish
Set-Cookie
__a=1.6T2TS15a.1544711055.1544711055; Expires=Sat, 12 Dec 2020 14:24:14 +0000; Domain=analytics.businessinsider.com; Path=/; Secure
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
Expires
0
dt.html
cdn.digitru.st/prod/1.5.15/ Frame 74D8
0
0
Document
General
Full URL
https://cdn.digitru.st/prod/1.5.15/dt.html
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/prebid/10306.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
159.180.84.2 , United States, ASN33047 (INSTART - Instart Logic, Inc, US),
Reverse DNS
Software
DTOrigin /
Resource Hash

Request headers

:method
GET
:authority
cdn.digitru.st
:scheme
https
:path
/prod/1.5.15/dt.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T

Response headers

status
200
content-type
text/html
content-length
930
cache-control
max-age=86400
last-modified
Wed, 24 Oct 2018 22:36:14 GMT
date
Thu, 13 Dec 2018 09:12:49 GMT
content-encoding
gzip
expires
Fri, 14 Dec 2018 09:12:49 GMT
accept-ranges
bytes
access-control-allow-origin
*
age
18685
server
DTOrigin
etag
"58577f84548d0fec3d630c26ed6ff36f"
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
x-instart-cache-id
18:2243482906083420679::1544692368
x-instart-request-id
12480082556378756355:SEN01-CPVNPPRY14:1544711054:0
measure.min.js
asset.pagefair.com/
11 KB
4 KB
Script
General
Full URL
https://asset.pagefair.com/measure.min.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
6ac72fa11e76ea6fdbb1b310f67b3b9b24c11da94774a89323b71930ae544eee

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
content-encoding
gzip
last-modified
Mon, 11 Jun 2018 11:42:29 GMT
server
NetDNA-cache/2.2
x-amz-request-id
61FB4621AC47B983
etag
W/"5631e8df5abfee420cd07a2737665a78"
x-cache
HIT
content-type
application/x-javascript
status
200
cache-control
max-age=86400
x-amz-id-2
W+mTMPTI46CxRTrRdS2pEVWic7HeLIFIo9XLlCEfNd6hJczPQj9tTOzaKyeL7ZGfBq+csxAurso=
expires
Fri, 14 Dec 2018 14:24:14 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j72&a=45720967&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurit...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-2241657-6&cid=1974187570.1544711054&jid=938876417&_gid=880845344.1544711054&gjid=830352835&_v=j72&z=1981329168
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=938876417&_v=j72&z=1981329168
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=938876417&_v=j72&z=1981329168&slf_rd=1&random=85958534
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=938876417&_v=j72&z=1981329168&slf_rd=1&random=85958534
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:14 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:14 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=1974187570.1544711054&jid=938876417&_v=j72&z=1981329168&slf_rd=1&random=85958534
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
obtp.js
widgets.outbrain.com/
2 KB
1 KB
Script
General
Full URL
https://widgets.outbrain.com/obtp.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NS64GV
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.10.44 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-10-44.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
29434f6be685d17f080bb9daa637a52e24f743e011113f7fa73c291c99d9ba24

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:14 GMT
Content-Encoding
gzip
Last-Modified
Tue, 04 Dec 2018 11:41:16 GMT
Server
Apache
ETag
"84fda6062427f508f599353d38f48673:1543923676"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
907
integrator.js
adservice.google.de/adsid/
109 B
490 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.businessinsider.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/
109 B
490 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.businessinsider.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
pubads_impl_285.js
securepubads.g.doubleclick.net/gpt/
185 KB
63 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_285.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.21.194 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s12-in-f2.1e100.net
Software
sffe /
Resource Hash
1ac9fa9872f44a78a1ce3148d2e3b1c108514e8b3d27ab078463be54a1a5506f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 10 Dec 2018 19:48:19 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
64605
x-xss-protection
1; mode=block
expires
Thu, 13 Dec 2018 14:24:14 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=9900186&comscorekw%20=%20video&ns__t=1544711054577&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Busines...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=9900186&comscorekw%20=%20video&ns__t=1544711054577&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Busine...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=9900186&comscorekw%20=%20video&ns__t=1544711054577&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&c7=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&c9=
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.43.115.95 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-43-115-95.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 13 Dec 2018 14:24:14 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=9900186&comscorekw%20=%20video&ns__t=1544711054577&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&c7=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&c9=
Pragma
no-cache
Date
Thu, 13 Dec 2018 14:24:14 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
adsense.js
asset.pagefair.com/adimages/
0
377 B
Script
General
Full URL
https://asset.pagefair.com/adimages/adsense.js
Requested by
Host: asset.pagefair.com
URL: https://asset.pagefair.com/measure.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:01 GMT
server
NetDNA-cache/2.2
x-amz-request-id
2242EA5A44076534
etag
"8193452d6ae440ec23eff2e1559d5461"
x-cache
HIT
content-type
application/x-javascript
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
31
x-amz-id-2
tGtLxn35fxQAKfClposBvLzr/W/xgM1xywMMynVrbcN9b+TlKrybP7/IKRIYUzMidhqzeampTfs=
expires
Fri, 14 Dec 2018 14:24:14 GMT
textlink-ads.jpg
asset.pagefair.net/adimages/
518 B
539 B
Image
General
Full URL
https://asset.pagefair.net/adimages/textlink-ads.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.161.188.128 Los Angeles, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
A29E15512C2084BC
etag
"262857636d8f02be18171bed8e10c82b"
x-cache
HIT
content-type
image/jpeg
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
229
x-amz-id-2
/981xl+12IVcMgGAyQQSuqJf/4tCKgu2e0f+9DNUQ9qiwE4+yo6z90CFWdR+s/v72rwioKXD2Hc=
textlink-ads.jpg
asset.pagefair.com/adimages/
518 B
567 B
Image
General
Full URL
https://asset.pagefair.com/adimages/textlink-ads.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
1FA523C0A05829A8
etag
"262857636d8f02be18171bed8e10c82b"
x-cache
HIT
content-type
image/jpeg
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
229
x-amz-id-2
yfJ+ep+j3hrHf30rzRdr4gm0AqcNfQ6mLSQWegGPREB/inW9sSTK7l//52mm8yeZyd/JNQsDcEg=
expires
Fri, 14 Dec 2018 14:24:14 GMT
check
buy.tinypass.com/api/v3/access/
252 B
262 B
Script
General
Full URL
https://buy.tinypass.com/api/v3/access/check?rid=RK195MO&aid=B6sIXKLiin&user_provider=piano_id&user_token=&callback=jQuery171042866735092292463_1544711054621&_=1544711054745
Requested by
Host: cdn.tinypass.com
URL: https://cdn.tinypass.com/api/tinypass.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.16.76.51 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9ba2ebe744e5ad7ceb4b1bf7add53758fc9bc343be0b9169315f23ecec09cf15

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:14 GMT
content-encoding
br
wn
prod-dash-10-0-1-209
server
cloudflare
p3p
CP="NON DSP COR OUR IND"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
application/json
status
200
cache-control
no-cache, no-store, must-revalidate
cf-ray
488917dc6fe82360-FRA
expires
0
/
www.facebook.com/tr/
44 B
297 B
Image
General
Full URL
https://www.facebook.com/tr/?id=1988166924554892&ev=PageView&dl=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&rl=&if=false&ts=1544711054764&sw=1600&sh=1200&v=2.8.34&r=stable&ec=0&o=30&fbp=fb.1.1544711054763.1806218191&it=1544711054374&coo=false
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:14 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Thu, 13 Dec 2018 14:24:14 GMT
ls.html
cdn-gl.imrworldwide.com/novms/html/ Frame 3876
0
0
Document
General
Full URL
https://cdn-gl.imrworldwide.com/novms/html/ls.html
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.168 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-168.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Host
cdn-gl.imrworldwide.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Last-Modified
Thu, 06 Dec 2018 14:16:45 GMT
x-amz-server-side-encryption
AES256
x-amz-version-id
LUZTPrYoKSyDNuhp_CA2XU_SQ6O2UVyj
Server
AmazonS3
Content-Encoding
gzip
Date
Thu, 13 Dec 2018 14:17:08 GMT
Cache-Control
max-age=86400
Vary
Accept-Encoding
Age
428
X-Cache
Hit from cloudfront
Via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
X-Amz-Cf-Id
4qXos0aekHAAzUrycjq9kLKwthoTCzfvTrLWwrI5G8iOEdKbSFSLZQ==
__fpn.gif
fpn.flipboard.com/tr/
Redirect Chain
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FI...
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.businessinsider.com%25252Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-...
35 B
341 B
Image
General
Full URL
https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.businessinsider.com%25252Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%25253FIR%25253DT&rh=https%253A%252F%252Fwww.businessinsider.com%252Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%253FIR%253DT
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:4800:14:85db:2b40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 12 Dec 2018 15:16:03 GMT
via
1.1 1015c68f2d8c45924ae7198c984dcdde.cloudfront.net (CloudFront)
last-modified
Thu, 12 Oct 2017 18:19:12 GMT
server
AmazonS3
age
83379
etag
"28d6814f309ea289f847c69cf91194c6"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
accept-ranges
bytes
content-length
35
x-amz-cf-id
Vdn4WQ6M7uDlOX0M0uVGC1-3NOnIrS-MQ-cFTLBYXGof6D-1XNRaeA==

Redirect headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:14 GMT
via
1.1 1015c68f2d8c45924ae7198c984dcdde.cloudfront.net (CloudFront)
server
CloudFront
location
/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.businessinsider.com%25252Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%25253FIR%25253DT&rh=https%253A%252F%252Fwww.businessinsider.com%252Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%253FIR%253DT
x-cache
LambdaGeneratedResponse from cloudfront
status
307
cache-control
no-cache, no-store, must-revalidate
content-length
0
x-amz-cf-id
XIXC8LTBB_3ktfsH0zIla7RaSC1XeHVxERJITO4-SnCXuJvwfi1cLw==
expires
Thu, 01 Dec 1994 16:00:00 GMT
oil.1.1.2-RELEASE.min.js
oil.axelspringer.com/release/1.1.2/
63 KB
20 KB
Script
General
Full URL
https://oil.axelspringer.com/release/1.1.2/oil.1.1.2-RELEASE.min.js
Requested by
Host: media.businessinsider.com
URL: https://media.businessinsider.com/public/scripts/vendor.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.254.137.88 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-254-137-88.eu-west-1.compute.amazonaws.com
Software
Cowboy / Express
Resource Hash
d941dc2bf021931644ef78a7714336b87e25ade9abc743ca247e8e8fc8fd477b

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:14 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Oct 2018 13:44:52 GMT
Server
Cowboy
X-Powered-By
Express
Etag
W/"fc0f-16635063820"
Vary
Accept-Encoding
P3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Via
1.1 vegur
Cache-Control
public, max-age=600
Transfer-Encoding
chunked
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/javascript; charset=UTF-8
verify
id.tinypass.com/id/api/v1/identity/token/
74 B
468 B
Script
General
Full URL
https://id.tinypass.com/id/api/v1/identity/token/verify?callback=jQuery171042866735092292463_1544711054622&client_id=B6sIXKLiin&token=&_=1544711054811
Requested by
Host: cdn.tinypass.com
URL: https://cdn.tinypass.com/api/tinypass.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.16.76.51 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
dd3696639c83813d208b3b850c4cea9a41b1126a6de2faf896b21fa55b101939

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
br
p3p
CP="ALL ADM DEV PSAi COM OUR OTRo STP IND ONL", CP="NON DSP COR OUR IND"
status
200
pragma
no-cache
wn
prod-id-10-0-2-162
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS, HEAD
content-type
application/json
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cf-ray
488917dcb8092360-FRA
access-control-allow-headers
origin, content-type, accept, authorization
expires
Thu, 01 Jan 1970 00:00:00 GMT
a.js
stats.pagefair.com/stats/page_view_event/D1FE8BBC53024C48/
25 B
733 B
XHR
General
Full URL
https://stats.pagefair.com/stats/page_view_event/D1FE8BBC53024C48/a.js?wl_div_hid_t0=0&div_hid_t0=0&s_blk=0&i_blk=0&wl_i_blk=0&is_ab=0&is_wl=1&new_monthly=1&new_daily=1&_=1544711054584
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.19.159.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-19-159-96.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
2671d72b96d6d9a1b8bbc1429048505ea6dbc3514daf22ab6dd6dfc8a70ce8d3

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:25:14 GMT
Server
nginx
Access-Control-Allow-Methods
GET, POST, OPTIONS
P3P
CP="NID DSP ALL COR"
Access-Control-Allow-Origin
https://www.businessinsider.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/javascript
Access-Control-Allow-Headers
Authorization,Content-Type,Accept,Origin,User-Agent,Cache-Control,Keep-Alive,X-Requested-With,If-Modified-Since,X-CSRF-TOKEN
Content-Length
25
show_companion_ad.js
pagead2.googlesyndication.com/pagead/
172 KB
64 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_companion_ad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_285.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81c::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
589890904ae0e65b57c83d0021fba89ef2f0b0a346d089d9b5f5bec99c784bad
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
11
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
64846
x-xss-protection
1; mode=block
server
cafe
etag
7629773181183005093
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Thu, 13 Dec 2018 15:24:03 GMT
puACk8ZV.js
content.jwplatform.com/libraries/
116 KB
36 KB
Script
General
Full URL
https://content.jwplatform.com/libraries/puACk8ZV.js?_=1544711054432
Requested by
Host: media.businessinsider.com
URL: https://media.businessinsider.com/public/scripts/vendor.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:7600:1:a3fa:7cc0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
openresty /
Resource Hash
989d260779b52d4cf993a481163e11f8b311bcaff2386125142e8b7e742d4e45

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
server
openresty
access-control-allow-origin
*
x-cache
Miss from cloudfront
content-type
text/javascript; charset=utf-8
status
200
cache-control
max-age=150, max-stale=180
content-length
36799
via
1.1 492376a657ddc8d381dbc676ab798325.cloudfront.net (CloudFront)
x-amz-cf-id
VNBcbKmxV3SRjbA4BgbbZVs7I5FvEWBa1WJjbDhjknBWJa8Oe9Rzsw==
expires
Thu, 13 Dec 2018 14:26:42 GMT
hub.html
oil.axelspringer.com/release/1.1.2/ Frame 912D
0
0
Document
General
Full URL
https://oil.axelspringer.com/release/1.1.2/hub.html
Requested by
Host: oil.axelspringer.com
URL: https://oil.axelspringer.com/release/1.1.2/oil.1.1.2-RELEASE.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.254.137.88 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-254-137-88.eu-west-1.compute.amazonaws.com
Software
Cowboy / Express
Resource Hash

Request headers

Host
oil.axelspringer.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T

Response headers

Server
Cowboy
Connection
keep-alive
X-Powered-By
Express
P3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Accept-Ranges
bytes
Cache-Control
public, max-age=600
Last-Modified
Tue, 02 Oct 2018 13:44:52 GMT
Etag
W/"9b92-16635063820"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Date
Thu, 13 Dec 2018 14:24:15 GMT
Transfer-Encoding
chunked
Via
1.1 vegur
1.1.1.2-RELEASE.chunk.js
oil.axelspringer.com/release/1.1.2/
6 KB
3 KB
Script
General
Full URL
https://oil.axelspringer.com/release/1.1.2/1.1.1.2-RELEASE.chunk.js
Requested by
Host: oil.axelspringer.com
URL: https://oil.axelspringer.com/release/1.1.2/oil.1.1.2-RELEASE.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.254.137.88 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-254-137-88.eu-west-1.compute.amazonaws.com
Software
Cowboy / Express
Resource Hash
d79233b3de1a1b7f24f6175c0fdca3371871dc2e22851767194817487966ca8f

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:15 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Oct 2018 13:44:52 GMT
Server
Cowboy
X-Powered-By
Express
Etag
W/"1614-16635063820"
Vary
Accept-Encoding
P3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Via
1.1 vegur
Cache-Control
public, max-age=600
Transfer-Encoding
chunked
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/javascript; charset=UTF-8
0.1.1.2-RELEASE.chunk.js
oil.axelspringer.com/release/1.1.2/
31 KB
9 KB
Script
General
Full URL
https://oil.axelspringer.com/release/1.1.2/0.1.1.2-RELEASE.chunk.js
Requested by
Host: oil.axelspringer.com
URL: https://oil.axelspringer.com/release/1.1.2/oil.1.1.2-RELEASE.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.254.137.88 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-254-137-88.eu-west-1.compute.amazonaws.com
Software
Cowboy / Express
Resource Hash
18af8f56a2fcdc7d6f8e038af660b8ed05a176dd21452814cf0b0d69b860ba5a

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:15 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Oct 2018 13:44:52 GMT
Server
Cowboy
X-Powered-By
Express
Etag
W/"7d46-16635063820"
Vary
Accept-Encoding
P3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Via
1.1 vegur
Cache-Control
public, max-age=600
Transfer-Encoding
chunked
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/javascript; charset=UTF-8
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j72&a=45720967&t=event&ni=0&_s=1&dl=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurit...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-2241657-6&cid=500831122.1544711055&jid=832213609&_gid=419174690.1544711055&gjid=770242077&_v=j72&z=744930975
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=500831122.1544711055&jid=832213609&_v=j72&z=744930975
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=500831122.1544711055&jid=832213609&_v=j72&z=744930975&slf_rd=1&random=3054484497
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=500831122.1544711055&jid=832213609&_v=j72&z=744930975&slf_rd=1&random=3054484497
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:15 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:15 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2241657-6&cid=500831122.1544711055&jid=832213609&_v=j72&z=744930975&slf_rd=1&random=3054484497
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
ggjw510.js
seccdn-gl.imrworldwide.com/novms/jw/
70 KB
17 KB
Script
General
Full URL
https://seccdn-gl.imrworldwide.com/novms/jw/ggjw510.js
Requested by
Host: content.jwplatform.com
URL: https://content.jwplatform.com/libraries/puACk8ZV.js?_=1544711054432
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.188 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-188.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
1bf9cd051ef56ce1f8b3042d60218072ff675820793ecfea5d69f5f68a4e0331

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
TbdqBc8nzznGPVjpOOZIzXOYi0OqP344
Content-Encoding
gzip
Last-Modified
Thu, 06 Dec 2018 14:16:53 GMT
Server
AmazonS3
Age
352
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 3283735112d0a322451d32ef038129c9.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
iiEhwuZKfVUW-xtPjPbQrMSzhsvzLaj6raEoDX-kOIHAB5736cHk7g==
Date
Thu, 13 Dec 2018 14:18:24 GMT
googima.js
ssl.p.jwpcdn.com/player/plugins/googima/v/8.5.6/
49 KB
15 KB
Script
General
Full URL
https://ssl.p.jwpcdn.com/player/plugins/googima/v/8.5.6/googima.js
Requested by
Host: content.jwplatform.com
URL: https://content.jwplatform.com/libraries/puACk8ZV.js?_=1544711054432
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2606:2800:233:9d9:186a:1821:7f8:93e , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F1B) /
Resource Hash
2b911a4f21c20f77875f152d0d990717f1ad20cc501e8a56b715e86d58d8f6ab

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
last-modified
Fri, 09 Nov 2018 17:24:22 GMT
server
ECAcc (frc/8F1B)
access-control-allow-origin
*
etag
"d0ede0fc8129cca247d18dc83701f019+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/plain
status
200
cache-control
max-age=31536000, immutable
content-length
15321
jwpsrv.js
ssl.p.jwpcdn.com/player/v/8.6.3/
46 KB
14 KB
Script
General
Full URL
https://ssl.p.jwpcdn.com/player/v/8.6.3/jwpsrv.js
Requested by
Host: content.jwplatform.com
URL: https://content.jwplatform.com/libraries/puACk8ZV.js?_=1544711054432
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2606:2800:233:9d9:186a:1821:7f8:93e , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FE5) /
Resource Hash
c0ec4bab4643d0fd3a18f1540e4f97e004acfc279d970f87d03ba5eefb44a793

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
last-modified
Mon, 03 Dec 2018 18:12:02 GMT
server
ECAcc (frc/8FE5)
access-control-allow-origin
*
etag
"0843218d26833af37105f5683be333b7+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/plain
status
200
cache-control
max-age=900, immutable
content-length
14644
jwplayer.core.controls.js
ssl.p.jwpcdn.com/player/v/8.6.3/
245 KB
61 KB
Script
General
Full URL
https://ssl.p.jwpcdn.com/player/v/8.6.3/jwplayer.core.controls.js
Requested by
Host: content.jwplatform.com
URL: https://content.jwplatform.com/libraries/puACk8ZV.js?_=1544711054432
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2606:2800:233:9d9:186a:1821:7f8:93e , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8E93) /
Resource Hash
ceaa6bb5a92499327043d2883a24e473f7abdcdec6add691d9b20f96bb1dfa62

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
last-modified
Fri, 09 Nov 2018 19:56:20 GMT
server
ECAcc (frc/8E93)
access-control-allow-origin
*
etag
"d80091964b0847c48a6a312acad8f066+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript
status
200
cache-control
max-age=31536000, immutable
content-length
62048
dFhVfyKR
cdn.jwplayer.com/v2/media/
2 KB
1 KB
XHR
General
Full URL
https://cdn.jwplayer.com/v2/media/dFhVfyKR
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:e00:1:a3fa:7cc0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
openresty /
Resource Hash
8474f7c574c9db83b4c312d703163097be9e2478e393c45223381f8292ad2edc

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
server
openresty
status
200
x-cache
Miss from cloudfront
content-type
application/json; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=1200, max-stale=180
content-length
862
via
1.1 2905d0bd25e66c3f788fb2134262d52a.cloudfront.net (CloudFront)
x-amz-cf-id
iVNl0fgdopv1WzmvUhlUzRhOprRg1ew5tgidOnszhdFiT0Slleap-w==
expires
Thu, 13 Dec 2018 14:44:15
related.js
ssl.p.jwpcdn.com/player/v/8.6.3/
97 KB
21 KB
Script
General
Full URL
https://ssl.p.jwpcdn.com/player/v/8.6.3/related.js
Requested by
Host: content.jwplatform.com
URL: https://content.jwplatform.com/libraries/puACk8ZV.js?_=1544711054432
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2606:2800:233:9d9:186a:1821:7f8:93e , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8E95) /
Resource Hash
e13829d4f44f2d47f97381c4793b7e2fc628cb778782c238ee20d1c3879de159

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
last-modified
Fri, 09 Nov 2018 19:56:25 GMT
server
ECAcc (frc/8E95)
access-control-allow-origin
*
etag
"a971f29dfea26965d93e1fdd25c37ca0+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript
status
200
cache-control
max-age=31536000, immutable
content-length
21758
execute
experience.tinypass.com/xbuilder/experience/
13 KB
5 KB
XHR
General
Full URL
https://experience.tinypass.com/xbuilder/experience/execute?aid=B6sIXKLiin
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.16.76.51 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3ea957c41855ce448cb7d34e568f711ff717a119a3ec246faa9e75898fdd8723

Request headers

Accept
*/*
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
br
p3p
CP="NON DSP COR OUR IND"
status
200
x-request-id
CfoiojpWek7
pragma
no-cache
wn
prod-exp-10-0-1-132
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-allow-methods
POST, GET, OPTIONS
content-type
application/json;charset=utf-8
access-control-allow-origin
https://www.businessinsider.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cf-ray
488917df292a2360-FRA
expires
Thu, 01 Jan 1970 00:00:00 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/
230 KB
79 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: content.jwplatform.com
URL: https://content.jwplatform.com/libraries/puACk8ZV.js?_=1544711054432
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
369771a52709167d37e817b7ff3d3c8202037efde6a89eccd37690355caa99ca
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
80866
x-xss-protection
1; mode=block
expires
Thu, 13 Dec 2018 14:24:15 GMT
2F5aFuowEeagCwY3v_uBow.json
entitlements.jwplayer.com/
20 B
210 B
XHR
General
Full URL
https://entitlements.jwplayer.com/2F5aFuowEeagCwY3v_uBow.json
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2606:2800:133:9a:24ed:9b6:1020:2655 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FBF) /
Resource Hash
28fed41dac64047024297e339d968eba283835098b5649c3eaa29ee3153424bd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
last-modified
Thu, 13 Dec 2018 11:57:10 GMT
server
ECAcc (frc/8FBF)
status
200
vary
Accept-Encoding
x-cache
HIT
content-type
application/json
access-control-allow-origin
*
cache-control
max-age=1800, s-maxage=13920
accept-ranges
bytes
content-length
46
ggcmb510.js
seccdn-gl.imrworldwide.com/novms/js/2/
12 KB
5 KB
Script
General
Full URL
https://seccdn-gl.imrworldwide.com/novms/js/2/ggcmb510.js
Requested by
Host: seccdn-gl.imrworldwide.com
URL: https://seccdn-gl.imrworldwide.com/novms/jw/ggjw510.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.188 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-188.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f68ec7cf550e86cb14e4d992724157c4f625ea3f0cd7d06e9e533c17c735401d

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
4b0wiuOGn_H2Xe15sjxX46Yfwua5Sr9n
Content-Encoding
gzip
Last-Modified
Thu, 06 Dec 2018 14:16:47 GMT
Server
AmazonS3
Age
429
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 3283735112d0a322451d32ef038129c9.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
mIm78U3q3Sv_GUm6aNhgLfPF_nM7GWihqdM45pPhPvXUUoyC80rE8Q==
Date
Thu, 13 Dec 2018 14:17:11 GMT
/
www.facebook.com/tr/ Frame 6744
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
9080
pragma
no-cache
cache-control
no-cache
origin
https://www.businessinsider.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
accept-encoding
gzip, deflate, br
Origin
https://www.businessinsider.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T

Response headers

status
200
content-type
text/plain
access-control-allow-origin
https://www.businessinsider.com
access-control-allow-credentials
true
content-length
0
server
proxygen-bolt
date
Thu, 13 Dec 2018 14:24:15 GMT
glcfg510.js
cdn-gl.imrworldwide.com/novms/js/2/configs/
2 KB
1 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/configs/glcfg510.js
Requested by
Host: seccdn-gl.imrworldwide.com
URL: https://seccdn-gl.imrworldwide.com/novms/js/2/ggcmb510.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.168 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-168.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
acf3b5b3ade1391096f23120b725a032dce430448ba8aff2a6f0c3f9c598b2a3

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
F1S9b2uu2YkgxQXmpRfWGFP2BW0XMZ5Z
Content-Encoding
gzip
Last-Modified
Thu, 06 Dec 2018 14:16:46 GMT
Server
AmazonS3
Age
425
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
Ramf66v-rGvjYHdKa6IXY8mv7EcrVW6yr4c4rBoPhp58swBXZtfJVA==
Date
Thu, 13 Dec 2018 14:17:15 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/businessinsider/loader.js?_=1544711054431
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.43.115.95 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-43-115-95.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:15 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Fri, 14 Dec 2018 14:24:15 GMT
vendorlist.json
vendorlist.consensu.org/
73 KB
14 KB
XHR
General
Full URL
https://vendorlist.consensu.org/vendorlist.json
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:ae00:1:af78:4c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
50b8c15fb451ba0a08f202867fefce8df2d7c009b8737cf2b49d2dd3a39b69ae

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com

Response headers

x-amz-version-id
EL2NlwyEc7jbdz.j9wLU1ZVaQj.eYJGP
content-encoding
gzip
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
58505
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 06 Dec 2018 16:00:18 GMT
server
AmazonS3
date
Wed, 12 Dec 2018 22:09:12 GMT
access-control-max-age
86400
access-control-allow-methods
GET
content-type
application/json; charset=utf-8
via
1.1 f66721f299cdd94cb1cfea4adb30fe56.cloudfront.net (CloudFront)
cache-control
max-age=259200
x-amz-cf-id
EbXq1FHQ5tS1qK0pBD-zsdjeAAVRGYi0BsnXuu6oEpYQ8T2G-cqMYg==
P5982DE1D-31C5-404B-8D77-E9A79954963A.js
cdn-gl.imrworldwide.com/conf/
29 KB
7 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/conf/P5982DE1D-31C5-404B-8D77-E9A79954963A.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.168 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-168.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
742464245b2e4e4312fba05d68e9643cd65dcc089c4a342072c5b69ba4070f4b

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 13:22:43 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Dec 2018 13:21:05 GMT
Server
AmazonS3
Age
55
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
2f2JoluDYPabBz0754.7cA6JE2jpsg9f
Via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
VyI4WsweiRb2xb1qX0JtCGAZkmFSdpkweQaLNiwNqQ7p0eDpZvEzaQ==
sdk.js
api-esp.piano.io/public/sdk/v04/
27 KB
10 KB
Script
General
Full URL
https://api-esp.piano.io/public/sdk/v04/sdk.js?v=xxx
Requested by
Host: cdn.tinypass.com
URL: https://cdn.tinypass.com/api/tinypass.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.201.230.67 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-201-230-67.compute-1.amazonaws.com
Software
nginx /
Resource Hash
a1417af119902fb1af10b033807f54d7fc1be374dfeabfae3fe8e56b76fe72f0

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:15 GMT
Content-Encoding
gzip
X-TQ-Node
x
X-Cache-Status
HIT
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Max-Age
36000
Connection
keep-alive
Content-Length
9095
Last-Modified
Mon, 26 Nov 2018 13:49:46 GMT
Server
nginx
ETag
W/"1206c-16750487890"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,PUT,POST,PATCH,DELETE,OPTIONS
Content-Type
application/javascript; charset=UTF-8
Access-Control-Allow-Origin
api-esp.piano.io
Cache-Control
max-age=1800, public
Access-Control-Allow-Credentials
true
Access-Control-Allow-Headers
User-Agent,Origin,Content-Type,Accept,Accept-Encoding,Accept-Language,Content-Type,Cookie,Piano-ESP-Static-Content,X-CSRF-Token,X-CSRFToken
Expires
Thu, 13 Dec 2018 14:54:15 GMT
collect
www.google-analytics.com/
35 B
98 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j72&a=45720967&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&dp=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&ul=en-us&de=UTF-8&dt=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=Piano&ea=Freemium&el=FreemiumCookieDrop&_u=6HDACUADR~&jid=&gjid=&cid=500831122.1544711055&tid=UA-2241657-6&_gid=419174690.1544711055&gtm=2wgbc0NS64GV&cg1=video&cg2=staff&cg3=Video%7CTI%20Original%20Video%7CBI%20Original%20Video%7CHackers%7CHacking%7CTech%7CCisco%7CPhone%7CCybersecurity%7CRed%20Balloon%20Security%7CAng%20Cui%7CMatthew%20Stuart%7Chacker%7CDonald%20Trump&cg4=video&cd1=video&cd2=video&cd3=staff&cd4=Chris%20Snyder&cd5=Jennifer%20Ortakales&cd6=Video%7CTI%20Original%20Video%7CBI%20Original%20Video%7CHackers%7CHacking%7CTech%7CCisco%7CPhone%7CCybersecurity%7CRed%20Balloon%20Security%7CAng%20Cui%7CMatthew%20Stuart%7Chacker%7CDonald%20Trump&cd7=&cd9=hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&cd10=5a12f7713dbef430008b7200&cd11=2018-10-25&cd14=Business%20Insider&cd25=&cd26=2017-11-20&cd27=A%20cybersecurity%20expert%20showed%20us%20how%20hackers%20can%20tap%20into%20an%20office%20phone%20and%20listen%20to%20everything%20you%27re%20saying&cd28=Chris%20Snyder&cd30=0&cd31=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&cd32=841&cd33=BIRTA&cd35=video&cd34=500831122.1544711055&z=1279172380
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:817::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 12 Dec 2018 02:32:04 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
129131
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1544711055402&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Ins...
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1544711055402&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20In...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1544711055402&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&c7=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&c9=
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.43.115.95 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-43-115-95.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 13 Dec 2018 14:24:15 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1544711055402&ns_c=UTF-8&cv=3.1e&c8=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&c7=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&c9=
Pragma
no-cache
Date
Thu, 13 Dec 2018 14:24:15 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
load.js
widget.perfectmarket.com/businessinsider/
3 KB
2 KB
Script
General
Full URL
https://widget.perfectmarket.com/businessinsider/load.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/businessinsider/loader.js?_=1544711054431
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f67eaec040708ce9302954f43570c0a0e09cdce85946218d15cd1bac9b14cbf8

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
DDhp7J3vdOPL8clZp0zFB8kuWllp3jAX
content-encoding
gzip
age
37
x-cache
HIT, HIT
status
200
date
Thu, 13 Dec 2018 14:24:15 GMT
content-length
1264
x-amz-id-2
aYv6WkLd8dIx8FdZ2jXlxIjlUIlmEaMdjPvaFrS9ubTrSvHG07A47CY1of9JROh3KPoikeeOPQU=
x-served-by
cache-lax8651-LAX, cache-fra19142-FRA
last-modified
Fri, 01 Jun 2018 04:52:54 GMT
server
AmazonS3
x-timer
S1544711055.456102,VS0,VE0
etag
"9895fa38727da87e99ebdd4a4b130593"
vary
Accept-Encoding
x-amz-request-id
60AE1DE8046A7D50
via
1.1 varnish, 1.1 varnish
cache-control
max-age=300
accept-ranges
bytes
content-type
text/plain
x-cache-hits
1, 2
impl.335-485-RELEASE.js
cdn.taboola.com/libtrc/
428 KB
117 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/impl.335-485-RELEASE.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/businessinsider/loader.js?_=1544711054431
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
95e583a6d3243888580ea62d9f56c6f4fc63f4ae416bc1cc8ae41951ff7897d6

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
MogFNkZMYqsN85PbAvHPgu50tKcEj5wg
content-encoding
gzip
age
237
x-cache
HIT
status
200
date
Thu, 13 Dec 2018 14:24:15 GMT
x-amz-replication-status
PENDING
content-length
119026
x-amz-id-2
SIlzzB3HoKj2n7xSFiNf9V+BsoP7z6VCIB42+D6GqK7Jl+A3Tk0AGqNdHBvk2nMJWPrRtJQW5Ss=
x-served-by
cache-fra19143-FRA
last-modified
Thu, 13 Dec 2018 14:20:13 GMT
server
AmazonS3
x-timer
S1544711055.413837,VS0,VE0
etag
"b582b69bf4007f2bea0a61986c35e0e6"
vary
Accept-Encoding
x-amz-request-id
1F8D73DB730F56FA
via
1.1 varnish
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
86
x-cache-hits
2641
provider.hlsjs.js
ssl.p.jwpcdn.com/player/v/8.6.3/
295 KB
82 KB
Script
General
Full URL
https://ssl.p.jwpcdn.com/player/v/8.6.3/provider.hlsjs.js
Requested by
Host: content.jwplatform.com
URL: https://content.jwplatform.com/libraries/puACk8ZV.js?_=1544711054432
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2606:2800:233:9d9:186a:1821:7f8:93e , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FD8) /
Resource Hash
a6911d5a0c50d887dc9d0f621bdda19526a4df31fdf8283864deea55dd9aa3e4

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
last-modified
Fri, 09 Nov 2018 19:56:23 GMT
server
ECAcc (frc/8FD8)
access-control-allow-origin
*
etag
"570975db383eb544180bc8a071c3d555+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript
status
200
cache-control
max-age=31536000, immutable
content-length
83696
dFhVfyKR-120.vtt
assets-jpcust.jwpsrv.com/strips/
Redirect Chain
  • https://cdn.jwplayer.com/strips/dFhVfyKR-120.vtt
  • https://assets-jpcust.jwpsrv.com/strips/dFhVfyKR-120.vtt
0
-1 B
XHR
General
Full URL
https://assets-jpcust.jwpsrv.com/strips/dFhVfyKR-120.vtt
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:e00:1:a3fa:7cc0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
openresty /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
via
1.1 2905d0bd25e66c3f788fb2134262d52a.cloudfront.net (CloudFront)
server
openresty
access-control-allow-origin
*
location
https://assets-jpcust.jwpsrv.com/strips/dFhVfyKR-120.vtt
x-cache
Miss from cloudfront
content-type
text/html
status
301
content-length
178
x-amz-cf-id
lE5b1Pbvq1H6zLZfbAQSiKIWVa62G4XjRUpwyISzc3bG1xMot_Sfrg==

Redirect headers

date
Thu, 13 Dec 2018 14:24:15 GMT
via
1.1 2905d0bd25e66c3f788fb2134262d52a.cloudfront.net (CloudFront)
server
openresty
status
301
location
https://assets-jpcust.jwpsrv.com/strips/dFhVfyKR-120.vtt
x-cache
Miss from cloudfront
content-type
text/html
access-control-allow-origin
*
content-length
178
x-amz-cf-id
lE5b1Pbvq1H6zLZfbAQSiKIWVa62G4XjRUpwyISzc3bG1xMot_Sfrg==
ty0wax1n-720.jpg
assets-jpcust.jwpsrv.com/thumbnails/
Redirect Chain
  • https://cdn.jwplayer.com/thumbs/dFhVfyKR-720.jpg
  • https://assets-jpcust.jwpsrv.com/thumbnails/ty0wax1n-720.jpg
56 KB
56 KB
Image
General
Full URL
https://assets-jpcust.jwpsrv.com/thumbnails/ty0wax1n-720.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1d::514 , European Union, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
fc2a27e11d17db8c0548e3bb852eed6208afc0f46f2d41c3b96e179fd1b914be

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
XXGfhi8KyhfhOikht0NlDbIpATRHDF0z
content-encoding
gzip
age
0
x-cache
MISS
status
200
date
Thu, 13 Dec 2018 14:24:15 GMT
content-length
56992
via
1.1 varnish
x-served-by
cache-cdg20749-CDG
last-modified
Wed, 29 Nov 2017 14:18:32 GMT
server
nginx
x-timer
S1544711056.748597,VS0,VE181
etag
"c287105786af4bb1b80bfe8a2d9c0474"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
accept-ranges
bytes
access-control-allow-headers
accept-encoding, cache-control, origin, dnt, accept-language
x-cache-hits
0

Redirect headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
server
openresty
access-control-allow-origin
*
location
https://assets-jpcust.jwpsrv.com/thumbnails/ty0wax1n-720.jpg
access-control-allow-methods
GET
content-type
image/jpeg
status
302
cache-control
max-age=180, max-stale=180
x-cache
Miss from cloudfront
access-control-allow-headers
accept-encoding, cache-control, origin, dnt, accept-language
content-length
20
via
1.1 c0486ca54d4ad5a3da496bc2b5f49cd2.cloudfront.net (CloudFront)
x-amz-cf-id
O8L1_AlbzV0vW4ClLAuTkCZdsZG0rXYmqZQxBxSz4wuJQZbx58H0fA==
collect
www.google-analytics.com/
35 B
93 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j72&a=45720967&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&dp=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&ul=en-us&de=UTF-8&dt=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=video%20player&ea=playback-playerisready&el=A%20cybersecurity%20expert%20showed%20us%20how%20hackers%20can%20tap%20into%20an%20office%20phone%20and%20listen%20to%20everything%20you%27re%20saying&_u=6HDACUADR~&jid=&gjid=&cid=500831122.1544711055&tid=UA-2241657-6&_gid=419174690.1544711055&gtm=2wgbc0NS64GV&cg1=video&cg2=staff&cg3=Video%7CTI%20Original%20Video%7CBI%20Original%20Video%7CHackers%7CHacking%7CTech%7CCisco%7CPhone%7CCybersecurity%7CRed%20Balloon%20Security%7CAng%20Cui%7CMatthew%20Stuart%7Chacker%7CDonald%20Trump&cg4=video&cd1=video&cd2=video&cd3=staff&cd4=Chris%20Snyder&cd5=Jennifer%20Ortakales&cd6=Video%7CTI%20Original%20Video%7CBI%20Original%20Video%7CHackers%7CHacking%7CTech%7CCisco%7CPhone%7CCybersecurity%7CRed%20Balloon%20Security%7CAng%20Cui%7CMatthew%20Stuart%7Chacker%7CDonald%20Trump&cd7=&cd9=hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&cd10=5a12f7713dbef430008b7200&cd11=2018-10-25&cd14=Business%20Insider&cd25=&cd26=2017-11-20&cd27=A%20cybersecurity%20expert%20showed%20us%20how%20hackers%20can%20tap%20into%20an%20office%20phone%20and%20listen%20to%20everything%20you%27re%20saying&cd28=Chris%20Snyder&cd30=0&cd31=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&cd32=841&cd33=BIRTA&cd35=video&cd34=500831122.1544711055&z=2029911531
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:817::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 12 Dec 2018 02:32:04 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
129131
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
bridge3.264.0_en.html
imasdk.googleapis.com/js/core/ Frame 1CCE
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.264.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.264.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
171368
date
Fri, 07 Dec 2018 15:44:46 GMT
expires
Sat, 07 Dec 2019 15:44:46 GMT
last-modified
Fri, 07 Dec 2018 03:16:03 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, max-age=31536000
age
513569
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
client.js
s0.2mdn.net/instream/video/
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::2006 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
10523
x-xss-protection
1; mode=block
expires
Thu, 13 Dec 2018 14:24:15 GMT
json
trc.taboola.com/businessinsider/trc/3/
4 KB
2 KB
Script
General
Full URL
https://trc.taboola.com/businessinsider/trc/3/json?tim=14%3A24%3A15.609&data=%7B%22id%22%3A42%2C%22ii%22%3A%22%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%22%2C%22it%22%3A%22video%22%2C%22sd%22%3Anull%2C%22ui%22%3Anull%2C%22uifp%22%3Anull%2C%22vi%22%3A1544711055599%2C%22cv%22%3A%22335-485-RELEASE%22%2C%22uiv%22%3A%22default%22%2C%22u%22%3A%22https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%22%2C%22bv%22%3A%220%22%2C%22ul%22%3A%5B%22en-US%22%5D%2C%22cmps%22%3A0%2C%22ga%22%3Atrue%2C%22cdb%22%3A%22BOYuDOaOYuDOaBQABBENB8AAAAAjCAAA%22%2C%22btv%22%3A%220%22%2C%22cos%22%3A%224g%22%2C%22bad%22%3A-1%2C%22bw%22%3A1600%2C%22sw%22%3A1600%2C%22sh%22%3A1200%2C%22qs%22%3A%22%3FIR%3DT%22%2C%22r%22%3A%5B%7B%22li%22%3A%22rbox-blended%22%2C%22s%22%3A4%2C%22uim%22%3A%22organic-thumbnails-b%3Aabp%3D0%22%2C%22uip%22%3A%22Right%20Rail%20Thumbnails%22%2C%22orig_uip%22%3A%22Right%20Rail%20Thumbnails%22%2C%22cd%22%3A297%2C%22mw%22%3A0%7D%5D%2C%22cb%22%3A%22TRC.callbacks.recommendations_1%22%2C%22lt%22%3A%22normal%22%7D
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.335-485-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
30bb86521a0a04afdeea5c32aee101f0324ca54ff62495901beb92b710699ced

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
200
via
1.1 varnish
x-served-by
cache-fra19143-FRA
server
nginx
x-timer
S1544711056.636396,VS0,VE53
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
expires
Thu, 01 Jan 1970 00:00:00 GMT
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
e1ef3f41-4bf7-4443-b3b1-b787907ae858
https://www.businessinsider.com/
0
0

gcid-0.1.0.html
g.jwpsrv.com/g/ Frame DD58
0
0
Document
General
Full URL
https://g.jwpsrv.com/g/gcid-0.1.0.html?aid=2F5aFuowEeagCwY3v_uBow&id=dFhVfyKR&emi=1p19akio7h76&pli=ltjh2i1mskqz&pv=8.6.3&tv=3.5.6
Requested by
Host: ssl.p.jwpcdn.com
URL: https://ssl.p.jwpcdn.com/player/v/8.6.3/jwpsrv.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1d::514 , European Union, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.8.0 /
Resource Hash

Request headers

:method
GET
:authority
g.jwpsrv.com
:scheme
https
:path
/g/gcid-0.1.0.html?aid=2F5aFuowEeagCwY3v_uBow&id=dFhVfyKR&emi=1p19akio7h76&pli=ltjh2i1mskqz&pv=8.6.3&tv=3.5.6
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T

Response headers

status
204
retry-after
0
content-type
text/html; charset=utf-8
accept-ranges
bytes
date
Thu, 13 Dec 2018 14:24:15 GMT
via
1.1 varnish
x-served-by
cache-cdg20749-CDG
x-cache
HIT
x-cache-hits
0
x-timer
S1544711056.748789,VS0,VE0
access-control-allow-origin
*
server
nginx/1.8.0
pmk-201808001.9.js
widget.perfectmarket.com/businessinsider/
116 KB
31 KB
Script
General
Full URL
https://widget.perfectmarket.com/businessinsider/pmk-201808001.9.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/businessinsider/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
793abe4a19aed2cedcc25724e467e5f9253d5417583b9134c2f1f15268cb2386

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
m3L2scwMZGaD4zI1RBPmUp2FZQ.qxxsj
content-encoding
gzip
age
16882278
x-cache
HIT, HIT
status
200
date
Thu, 13 Dec 2018 14:24:15 GMT
content-length
31844
x-amz-id-2
KAHoPK1kZwx9ZqL3RNmkzsGBmv91BS5GWwEMkkTVvta16mm1i2rJtjsCioI13DO+XRcVWxjKL5Q=
x-served-by
cache-lax8623-LAX, cache-fra19142-FRA
last-modified
Fri, 01 Jun 2018 04:52:54 GMT
server
AmazonS3
x-timer
S1544711056.643616,VS0,VE0
etag
"daf0843fc2ac1748288a7be2eb90b5ca"
vary
Accept-Encoding
x-amz-request-id
0D634EF20BAB656F
via
1.1 varnish, 1.1 varnish
cache-control
max-age=31536000
accept-ranges
bytes
content-type
text/javascript
x-cache-hits
3, 43968
dFhVfyKR-120.vtt
assets-jpcust.jwpsrv.com/strips/
5 KB
1 KB
XHR
General
Full URL
https://assets-jpcust.jwpsrv.com/strips/dFhVfyKR-120.vtt
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1d::514 , European Union, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
8fdcc64a7b66eb7e89aaa5cf439ba910d2c7c7df123e5fd6f778ac2484f89da9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
null

Response headers

x-amz-version-id
uOWA9Wl5woVDw0ZTiCv7OBsb2hV5_5.N
content-encoding
gzip
etag
"58ad53be82584c91526b13cfd0c3b283"
age
0
x-cache
MISS
status
200
content-length
853
x-served-by
cache-cdg20734-CDG
access-control-allow-origin
*
last-modified
Mon, 20 Nov 2017 21:32:29 GMT
server
nginx
x-timer
S1544711056.748336,VS0,VE166
date
Thu, 13 Dec 2018 14:24:15 GMT
vary
Accept-Encoding
content-type
text/vtt
via
1.1 varnish
accept-ranges
bytes
access-control-allow-headers
accept-encoding, cache-control, origin, dnt, accept-language
x-cache-hits
0
user-adchoice.335-485-RELEASE.es6.js
cdn.taboola.com/libtrc/
1 KB
958 B
Script
General
Full URL
https://cdn.taboola.com/libtrc/user-adchoice.335-485-RELEASE.es6.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/businessinsider/loader.js?_=1544711054431
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b24426b7bf8c2cb806d7432fdf4282bd1faa4965f88c70165bbc3d9aecce66d0

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
qz1Yh019dU0T9jm8jxVlBFJD5ulU38HL
content-encoding
gzip
age
218
x-cache
HIT
status
200
date
Thu, 13 Dec 2018 14:24:15 GMT
x-amz-replication-status
COMPLETED
content-length
717
x-amz-id-2
BT7qXE8VFEaT3/Lt/ZniI0gGZ1M/Qi6yMHBkHigHqJEVNFZQUakk3oIGm0SHTEPBfbx/a8iHZpA=
x-served-by
cache-fra19143-FRA
last-modified
Thu, 13 Dec 2018 14:20:37 GMT
server
AmazonS3
x-timer
S1544711056.718010,VS0,VE0
etag
"c47b89a4c48ba3c3ae1f25e811464887"
vary
Accept-Encoding
x-amz-request-id
E34F60A742654B65
via
1.1 varnish
cache-control
private,max-age=14400
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
86
x-cache-hits
3280
userx.335-485-RELEASE.es6.js
cdn.taboola.com/libtrc/
20 KB
7 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/userx.335-485-RELEASE.es6.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/businessinsider/loader.js?_=1544711054431
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a89b80795d20fe3217f43615c09ce0fedb3ceca1577fadc8f6852d9da943ef29

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
4g.YgEDnKId00nAKFM9dkTvfR4oIHOsx
content-encoding
gzip
age
217
x-cache
HIT
status
200
date
Thu, 13 Dec 2018 14:24:15 GMT
x-amz-replication-status
COMPLETED
content-length
6685
x-amz-id-2
2jr3KIIgfHZBCbQOfh2zEkoXyh+etGS310N36BKs9zNeAbOYo4uIlOKNzOzgTRSn4QRLcyLgVcU=
x-served-by
cache-fra19143-FRA
last-modified
Thu, 13 Dec 2018 14:20:38 GMT
server
AmazonS3
x-timer
S1544711056.718182,VS0,VE0
etag
"6a6332f5b9b38302e05259fd0256b927"
vary
Accept-Encoding
x-amz-request-id
60A4CA97CC5CDC67
via
1.1 varnish
cache-control
private,max-age=14400
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
86
x-cache-hits
1273
available
trc.taboola.com/businessinsider/log/3/
0
253 B
XHR
General
Full URL
https://trc.taboola.com/businessinsider/log/3/available
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:15 GMT
via
1.1 varnish
server
nginx
x-timer
S1544711056.738624,VS0,VE9
x-served-by
cache-fra19143-FRA
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.businessinsider.com
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
a-63-year-old-model-reveals-the-secrets-that-keep-her-feeling-young.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//static2.uk.businessinsider.com/image/5bed4d71dde86716503ecd99-1190-625/
10 KB
11 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//static2.uk.businessinsider.com/image/5bed4d71dde86716503ecd99-1190-625/a-63-year-old-model-reveals-the-secrets-that-keep-her-feeling-young.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
4e7e14a45f7727198f9207a37283f52b9a547fc7264e8755ea98198edcab9884

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
via
1.1 varnish
age
2419088
x-cache
HIT
status
200
expiration
expiry-date="Sun, 16 Dec 2018 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//static2.uk.businessinsider.com/image/5bed4d71dde86716503ecd99-1190-625/a-63-year-old-model-reveals-the-secrets-that-keep-her-feeling-young.jpg
content-length
10394
x-served-by
cache-fra19143-FRA
last-modified
Thu, 15 Nov 2018 14:08:49 GMT
server
cloudinary
x-timer
S1544711056.766746,VS0,VE0
etag
"d3d7b694f1db48cc8b124d8bf45124a3"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
153
5c112cf0dde86732545072f2-480-240.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//amp.businessinsider.com/images/
15 KB
15 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//amp.businessinsider.com/images/5c112cf0dde86732545072f2-480-240.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
7f365c0afddd2a602b1655128dfe950dc7433258c49f7965432973e1eb542f18

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
via
1.1 varnish
age
79359
x-cache
HIT
status
200
expiration
expiry-date="Sat, 12 Jan 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//amp.businessinsider.com/images/5c112cf0dde86732545072f2-480-240.jpg
content-length
14939
x-served-by
cache-fra19143-FRA
last-modified
Wed, 12 Dec 2018 16:01:50 GMT
server
cloudinary
x-timer
S1544711056.766743,VS0,VE0
etag
"c70b190e705cb4274ff660fa869fd6ce"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
9
5c112e574a821330f82cbd59-1136-568.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//amp.businessinsider.com/images/
8 KB
8 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//amp.businessinsider.com/images/5c112e574a821330f82cbd59-1136-568.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
1fba01db99f29df68d7b0878d3826977b5f97748642fb6e2b2799ae0a3cd8080

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
via
1.1 varnish
age
74858
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//amp.businessinsider.com/images/5c112e574a821330f82cbd59-1136-568.jpg
content-length
7951
x-request-id
a9e1271b42995747
x-served-by
cache-fra19143-FRA
server
cloudinary
x-timer
S1544711056.766719,VS0,VE0
etag
"ffa9007f53a21da979931c419ef359cb"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
61
5bf4332df556fc055b191a6c-960-480.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//amp.businessinsider.com/images/
12 KB
12 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//amp.businessinsider.com/images/5bf4332df556fc055b191a6c-960-480.jpg
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
c5387f75cff68a36f2a3381d115af16e3196ea56952fbaace8f837ccdb87ac13

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
via
1.1 varnish
age
1186890
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_150%2Cw_180%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//amp.businessinsider.com/images/5bf4332df556fc055b191a6c-960-480.jpg
content-length
12009
x-request-id
ad56e76c4e163942
x-served-by
cache-fra19143-FRA
last-modified
Thu, 29 Nov 2018 20:06:07 GMT
server
cloudinary
x-timer
S1544711056.766668,VS0,VE0
etag
"402b40afca03c17a5b0c499ad5d0d115"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
43
f539211219b796ffbb49949997c764f0.png
cdn.taboola.com/libtrc/static/thumbnails/
254 B
728 B
Image
General
Full URL
https://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.335-485-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f68019eb4b4e5933301d4ee75969e0cb94ed8333bf514630fa749eb9c3e483c9

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
hL.cyLD7Q4TL5ceY.7JQwF9m5IYI8mkC
via
1.1 varnish
age
17935
x-cache
HIT
status
200
date
Thu, 13 Dec 2018 14:24:15 GMT
x-amz-replication-status
COMPLETED
content-length
254
x-amz-id-2
NHYqfgHhQMaFiaJfDtKC9204ZOyUMXDomIHau6bwEOKVPEp427r4r0UiFipOO01wjx45H1bVHTE=
x-served-by
cache-fra19143-FRA
last-modified
Wed, 24 Jun 2015 07:14:11 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1377415166/atime:1435052450/md5:dfa7b52c86e56bd67fa4002f6ed19854/ctime:1422381567
x-timer
S1544711056.764147,VS0,VE0
etag
"dfa7b52c86e56bd67fa4002f6ed19854"
x-amz-request-id
D631AE82D5B67BBE
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
image/png
abp
86
x-cache-hits
85803
11
api-esp.piano.io/publisher/fusion/lucid/data/
0
573 B
XHR
General
Full URL
https://api-esp.piano.io/publisher/fusion/lucid/data/11?email=&visitor=yXWVHn0vhHGUJ1SaMviTh5lNUegYJasIwL1PiSiKbHt1H5yTg7Oous37TryU&stored_visitor=&pnespid=
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.204.114.148 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-204-114-148.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
GET
Origin
https://www.businessinsider.com
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Access-Control-Request-Headers
content-type

Response headers

Date
Thu, 13 Dec 2018 14:24:16 GMT
X-TQ-Node
x
Server
nginx
Access-Control-Max-Age
36000
Access-Control-Allow-Methods
GET,PUT,POST,PATCH,DELETE,OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://www.businessinsider.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
User-Agent,Origin,Content-Type,Accept,Accept-Encoding,Accept-Language,Content-Type,Cookie,Piano-ESP-Static-Content,X-CSRF-Token,X-CSRFToken
Content-Length
0
nr-1099.min.js
js-agent.newrelic.com/
23 KB
9 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-1099.min.js
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.110 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
685e511070d7d36ad071ea39c387547c95bf064727890a3e9abf1d0283184794

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 13 Dec 2018 14:24:15 GMT
content-encoding
gzip
x-amz-request-id
0F91A44CB8BB51BA
x-cache
HIT
status
200
content-length
9139
x-amz-id-2
1kVBDajyPe9yNfvcIt7CQoQq0Tgjcvk5nnkBUcfzhmZSMr1SxtHUg5CkTFq+7J8h180I4bkn1Zg=
x-served-by
cache-fra19128-FRA
last-modified
Tue, 02 Oct 2018 02:58:53 GMT
server
AmazonS3
x-timer
S1544711056.976079,VS0,VE0
etag
"eed931ffe2a555a310715cf8678d32f5"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
40946
optout_check
beacon.krxd.net/
69 B
322 B
Script
General
Full URL
https://beacon.krxd.net/optout_check?callback=Krux.ns.businessinsider.kxjsonp_optOutCheck
Requested by
Host: cdn.krxd.net
URL: https://cdn.krxd.net/ctjs/controltag.js.c18d2ea515480e99b9a7056becfa6a91
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.137.176.25 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-46-137-176-25.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
5c3b84adc0f08fb50210fad1fbbdb97c3eef56b89c1f0c8cf7cd405b1780a894

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:15 GMT
Cache-Control
private, max-age=0, s-max-age=0
X-Request-Time
D=58 t=1544711055
Connection
keep-alive
X-Served-By
beacon-n028-dub.krxd.net
Content-Length
69
Content-Type
text/javascript
chartbeat.js
s3.amazonaws.com/static.chartbeat.com/js/
35 KB
35 KB
Script
General
Full URL
https://s3.amazonaws.com/static.chartbeat.com/js/chartbeat.js
Requested by
Host: media.businessinsider.com
URL: https://media.businessinsider.com/public/scripts/foot.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.216.16.3 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
c46f8698db452aca7eccf43baf4f36c6c3a61b6fe2918029c62e76a357e55365

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 13 Dec 2018 14:24:17 GMT
Last-Modified
Thu, 04 Oct 2018 02:34:26 GMT
Server
AmazonS3
x-amz-request-id
433C81DC52799A7A
ETag
"6331f6204f3f22afa008480b710c3f7a"
Content-Type
application/javascript
Accept-Ranges
bytes
Content-Length
35965
x-amz-id-2
M9EPT8G2sjMtr2zpYRoIgFPseAhKdxDQtDGx8jBEQVkwmmDUTCvmCpOPMmMSBzA0a12jFHSi58s=
ping.gif
jwpltx.com/v1/jwplayer6/
0
103 B
Image
General
Full URL
https://jwpltx.com/v1/jwplayer6/ping.gif?h=1445006559&e=e&n=2491839113722363&abc=0&abt=57_right_click_share_off&aid=2F5aFuowEeagCwY3v_uBow&ask=00000000&at=1&c=1&ccp=0&cp=0&d=1&eb=0&ed=6&emi=1p19akio7h76&i=0&id=dFhVfyKR&lsa=fail&mt=0&pbd=1&pbr=1&pgi=pnqc3p13afd4&ph=1&pid=puACk8ZV&pii=0&pl=467&plc=1&pli=ltjh2i1mskqz&pp=hlsjs&prc=1&ps=4&pss=1&pt=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&pu=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&pv=8.6.3&pyc=0&s=1&sdk=0&stc=1&t=A%20cybersecurity%20expert%20showed%20us%20how%20hackers%20can%20tap%20into%20an%20office%20phone%20and%20listen%20to%20everything%20you%27re%20saying&tv=3.5.6&tvs=0&vb=1&vi=1&vl=90&wd=830&ab=1&cb=1&cme=0&dd=0&fv=&ga=0&mk=hls&mu=https%3A%2F%2Fcdn.jwplayer.com%2Fmanifests%2FdFhVfyKR.m3u8&pbc=0&pd=2&pdr=&plng=en-US&plt=3400&pni=0&pnl=35&po=0&pogt=A%20cybersecurity%20expert%20showed%20us%20how%20hackers%20can%20tap%20into%20an%20office%20phone%20and%20listen%20to%20everything%20you%27re%20saying&r=1&sn=%5Bobject%20Object%5D&sp=0&st=350&vp=1&sa=1544711055997
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.12.137 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-12-137.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Connection
keep-alive
Date
Thu, 13 Dec 2018 14:24:16 GMT
Server
nginx
ping.gif
jwpltx.com/v1/jwplayer6/
0
103 B
Image
General
Full URL
https://jwpltx.com/v1/jwplayer6/ping.gif?h=-1098683955&e=ana&n=8200754057551818&aid=2F5aFuowEeagCwY3v_uBow&emi=1p19akio7h76&id=dFhVfyKR&pli=ltjh2i1mskqz&pv=8.6.3&tv=3.5.6&sa=1544711055997
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.12.137 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-12-137.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Connection
keep-alive
Date
Thu, 13 Dec 2018 14:24:16 GMT
Server
nginx
trackpxl
traffic.outbrain.com/network/
0
510 B
Image
General
Full URL
https://traffic.outbrain.com/network/trackpxl?advid=1521&action=view&r=384
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

4b4136998e
bam.nr-data.net/1/
57 B
261 B
Script
General
Full URL
https://bam.nr-data.net/1/4b4136998e?a=82437379&sa=1&v=1099.d27c17c&t=Unnamed%20Transaction&rst=3879&ref=https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&be=1659&fe=3844&dc=2370&af=err,xhr,stn,ins&perf=%7B%22timing%22:%7B%22of%22:1544711052126,%22n%22:0,%22f%22:1634,%22dn%22:1634,%22dne%22:1634,%22c%22:1634,%22ce%22:1634,%22rq%22:1635,%22rp%22:1644,%22rpe%22:1654,%22dl%22:1649,%22di%22:2370,%22ds%22:2370,%22de%22:2377,%22dc%22:3843,%22l%22:3844,%22le%22:3871%7D,%22navigation%22:%7B%7D%7D&jsonp=NREUM.setToken
Requested by
Host: js-agent.newrelic.com
URL: https://js-agent.newrelic.com/nr-1099.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.247.242.20 , United States, ASN23467 (NEWRELIC-AS-1 - New Relic, US),
Reverse DNS
bam-8.nr-data.net
Software
/
Resource Hash
5e864c2e3f674c60970513411eaeeeafd2d615d842e65ec01d09ccfcb4a7b38d

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
text/javascript;charset=ISO-8859-1
Content-Length
57
Expires
Thu, 01 Jan 1970 00:00:00 GMT
social
trc.taboola.com/businessinsider/log/3/
0
237 B
Image
General
Full URL
https://trc.taboola.com/businessinsider/log/3/social?ri=62546dc94eacea3a38682ad64dd7647e&sd=v2_9e9ced3e387f8c0814081d17e89c6f55_6816deb2-c5b5-43ff-9066-56625a62784d-tuct30bf10f_1544711055_1544711055_CNawjgYQjgYY79HQv_osIAEoATA4OJvjCUCCihBImMQXUKXsEFgBYAA&ui=6816deb2-c5b5-43ff-9066-56625a62784d-tuct30bf10f&pi=/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&wi=-1193887890180378640&pt=video&vi=1544711055599&st=social-visible&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A1%2C%22ln%22%3A%22top%22%2C%22lx%22%3A1311%2C%22ly%22%3A195%2C%22m%22%3A%22stp%22%2C%22v%22%3A3%7D%2C%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A1%2C%22ln%22%3A%22top%22%2C%22lx%22%3A178%2C%22ly%22%3A8%2C%22m%22%3A%22stp%22%2C%22v%22%3A3%7D%5D%7D&tim=14%3A24%3A16.273&id=6627&llvl=1&cv=335-485-RELEASE&
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:16 GMT
via
1.1 varnish
server
nginx
x-timer
S1544711056.277424,VS0,VE8
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
cache-control
no-cache
access-control-allow-credentials
true
x-cache-hits
0
accept-ranges
bytes
content-type
image/gif
access-control-allow-origin
*
x-served-by
cache-fra19143-FRA
11
api-esp.piano.io/publisher/fusion/lucid/data/
319 B
991 B
XHR
General
Full URL
https://api-esp.piano.io/publisher/fusion/lucid/data/11?email=&visitor=yXWVHn0vhHGUJ1SaMviTh5lNUegYJasIwL1PiSiKbHt1H5yTg7Oous37TryU&stored_visitor=&pnespid=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.201.230.67 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-201-230-67.compute-1.amazonaws.com
Software
nginx /
Resource Hash
3da607eac5d3780f6f513f2e94c01aa5d1991bd05338487ba982ae78bbce285d

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/json

Response headers

Date
Thu, 13 Dec 2018 14:24:16 GMT
Content-Encoding
gzip
X-TQ-Node
x
X-Cache-Status
BYPASS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
255
Server
nginx
ETag
W/"13f-wAgSTBHNZTuDx+bG6EcBlzIcMK4"
Access-Control-Max-Age
36000
Access-Control-Allow-Methods
GET,PUT,POST,PATCH,DELETE,OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.businessinsider.com
Access-Control-Allow-Credentials
true
Access-Control-Allow-Headers
User-Agent,Origin,Content-Type,Accept,Accept-Encoding,Accept-Language,Content-Type,Cookie,Piano-ESP-Static-Content,X-CSRF-Token,X-CSRFToken
22
api-esp.piano.io/tracker/lucid/visit/
0
573 B
XHR
General
Full URL
https://api-esp.piano.io/tracker/lucid/visit/22?story_url=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&visitor=yXWVHn0vhHGUJ1SaMviTh5lNUegYJasIwL1PiSiKbHt1H5yTg7Oous37TryU
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.204.114.148 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-204-114-148.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://www.businessinsider.com
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Access-Control-Request-Headers
content-type

Response headers

Date
Thu, 13 Dec 2018 14:24:16 GMT
X-TQ-Node
x
Server
nginx
Access-Control-Max-Age
36000
Access-Control-Allow-Methods
GET,PUT,POST,PATCH,DELETE,OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://www.businessinsider.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
User-Agent,Origin,Content-Type,Accept,Accept-Encoding,Accept-Language,Content-Type,Cookie,Piano-ESP-Static-Content,X-CSRF-Token,X-CSRFToken
Content-Length
0
ping
ping.chartbeat.net/
43 B
168 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=businessinsider.com&p=%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&u=zKpkJCErm2ZDKJUJJ&d=businessinsider.com&g=14447&g0=video&g1=Chris%20Snyder&n=1&f=00001&c=0&x=0&m=0&y=4502&o=1585&w=1200&j=45&R=1&W=0&I=0&E=0&e=0&r=&b=3844&t=Dr3INODNqMd8DKbHp4DpGDzkBnd6Bd&V=109&i=Hackers%20may%20be%20able%20to%20tap%20into%20your%20office%20phone%20-%20Business%20Insider&tz=0&sn=1&sv=DN08MvB2HVFJBi92O_DcZMVABQm1md&sd=1&im=067b0ef2&_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.12.124 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-206-12-124.compute-1.amazonaws.com
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Thu, 13 Dec 2018 14:24:16 GMT
cache-control
no-cache, no-store, must-revalidate
expires
0
content-length
43
content-type
image/gif
22
api-esp.piano.io/tracker/lucid/visit/
82 B
834 B
XHR
General
Full URL
https://api-esp.piano.io/tracker/lucid/visit/22?story_url=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&visitor=yXWVHn0vhHGUJ1SaMviTh5lNUegYJasIwL1PiSiKbHt1H5yTg7Oous37TryU
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.201.230.67 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-201-230-67.compute-1.amazonaws.com
Software
nginx /
Resource Hash
9def3108f6f056260ef00d6d36468258943e1efb1bf97f58171a8b6a14aef238

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/json

Response headers

Date
Thu, 13 Dec 2018 14:24:16 GMT
Content-Encoding
gzip
X-TQ-Node
x
Server
nginx
ETag
W/"52-hJ1ENKDSZwzMiUo8CHEAXgDIc00"
Vary
Accept-Encoding, X-HTTP-Method-Override
Access-Control-Allow-Methods
GET,PUT,POST,PATCH,DELETE,OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://www.businessinsider.com
Access-Control-Max-Age
36000
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Headers
User-Agent,Origin,Content-Type,Accept,Accept-Encoding,Accept-Language,Content-Type,Cookie,Piano-ESP-Static-Content,X-CSRF-Token,X-CSRFToken
Content-Length
94
visible
trc.taboola.com/businessinsider/log/3/
0
102 B
XHR
General
Full URL
https://trc.taboola.com/businessinsider/log/3/visible
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:16 GMT
via
1.1 varnish
server
nginx
x-timer
S1544711057.769674,VS0,VE9
x-served-by
cache-fra19143-FRA
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.businessinsider.com
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
gn
secure-dcr.imrworldwide.com/cgi-bin/
44 B
332 B
Image
General
Full URL
https://secure-dcr.imrworldwide.com/cgi-bin/gn?prd=dcr&ci=us-103525&ch=us-103525_c03_video_S&asn=video&sessionId=eElzBflx5QjaplHL3RCdsBMxDfl7F1544711054&prv=1&c6=vc,c03&ca=NA&c13=asid,PF0863AE4-16F7-453B-A349-CA13E26ED811&c32=segA,NA&c33=segB,NA&c34=segC,NA&c15=apn,&sup=0&segment2=&segment1=&forward=1&plugv=&playerv=&ad=0&cr=V&c9=devid,&enc=true&c1=nuid,999&at=view&rt=text&c16=sdkv,bj.6.0.0&c27=cln,0&crs=&lat=&lon=&c29=plid,15447110547803311&c30=bldv,6.0.0.158-3&st=dcr&c7=osgrp,&c8=devgrp,&c10=plt,&c40=adbid,&c14=osver,NA&c26=dmap,1&dd=&hrd=&wkd=&c35=adrsid,&c36=cref1,&c37=cref2,&c11=agg,1&c12=apv,&c51=adl,0&c52=noad,0&devtypid=&pc=NA&c53=fef,n&c54=oad,&c55=cref3,&c57=adldf,2&ai=5a12f7713dbef430008b7200&c3=st,c&c64=starttm,1544711056&adid=5a12f7713dbef430008b7200&c58=isLive,false&c59=sesid,&c61=createtm,1544711055&c63=pipMode,&uoo=&c68=bndlid,&nodeTM=&logTM=&c73=phtype,&c74=dvcnm,&c76=adbsnid,&c44=progen,&davty=0&si=https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT&c66=mediaurl,&c62=sendTime,1544711055&rnd=245295
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.203.27 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-203-27.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:16 GMT
server
nginx
access-control-allow-origin
*
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
status
200
cache-control
no-cache
content-type
image/gif
content-length
44
expires
Thu, 01 Dec 1994 16:00:00 GMT
social
trc.taboola.com/businessinsider/log/3/
0
54 B
Image
General
Full URL
https://trc.taboola.com/businessinsider/log/3/social?ri=62546dc94eacea3a38682ad64dd7647e&sd=v2_9e9ced3e387f8c0814081d17e89c6f55_6816deb2-c5b5-43ff-9066-56625a62784d-tuct30bf10f_1544711055_1544711055_CNawjgYQjgYY79HQv_osIAEoATA4OJvjCUCCihBImMQXUKXsEFgBYAA&ui=6816deb2-c5b5-43ff-9066-56625a62784d-tuct30bf10f&pi=/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&wi=-1193887890180378640&pt=video&vi=1544711055599&st=social-available&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A2%2C%22m%22%3A%22stp%22%7D%2C%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22player-div%22%2C%22nm%22%3A%22video%22%2C%22c%22%3A1%2C%22m%22%3A%22video%22%7D%2C%7B%22i%22%3A%22ctx%22%2C%22ism%22%3Afalse%2C%22srx%22%3A1600%2C%22sry%22%3A1200%2C%22pd%22%3Anull%2C%22tpl%22%3A%22%22%2C%22url%22%3A%22https%3A%2F%2Fwww.businessinsider.com%2Fhackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%22%2C%22rref%22%3A%22%22%2C%22sref%22%3A%22_undefined_%22%2C%22hdl%22%3A%22A%20cybersecurity%20expert%20showed%20us%20how%20hackers%20can%20tap%20into%20an%20office%20phone%20and%20listen%20to%20everything%20you%27re%20saying%22%2C%22sec%22%3A%22Tech%20Insider%22%2C%22aut%22%3A%5B%22Chris%20Snyder%22%5D%2C%22img%22%3A%22https%3A%2F%2Famp.businessinsider.com%2Fimages%2F5a1ec105f914c356018b6aeb-1136-568.jpg%22%2C%22v%22%3A13%7D%5D%7D&tim=14%3A24%3A16.852&id=5496&llvl=1&cv=335-485-RELEASE&
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:16 GMT
via
1.1 varnish
server
nginx
x-timer
S1544711057.855730,VS0,VE9
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
cache-control
no-cache
access-control-allow-credentials
true
x-cache-hits
0
accept-ranges
bytes
content-type
image/gif
access-control-allow-origin
*
x-served-by
cache-fra19143-FRA
social
trc.taboola.com/businessinsider/log/3/
0
78 B
Image
General
Full URL
https://trc.taboola.com/businessinsider/log/3/social?ri=62546dc94eacea3a38682ad64dd7647e&sd=v2_9e9ced3e387f8c0814081d17e89c6f55_6816deb2-c5b5-43ff-9066-56625a62784d-tuct30bf10f_1544711055_1544711055_CNawjgYQjgYY79HQv_osIAEoATA4OJvjCUCCihBImMQXUKXsEFgBYAA&ui=6816deb2-c5b5-43ff-9066-56625a62784d-tuct30bf10f&pi=/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11&wi=-1193887890180378640&pt=video&vi=1544711055599&st=social-visible&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22player-div%22%2C%22nm%22%3A%22video%22%2C%22c%22%3A1%2C%22ln%22%3A%22top%22%2C%22lx%22%3A178%2C%22ly%22%3A231%2C%22m%22%3A%22video%22%2C%22v%22%3A3%2C%22md%22%3A%7B%22ap%22%3Anull%2C%22vd%22%3Anull%7D%7D%5D%7D&tim=14%3A24%3A17.104&id=5109&llvl=1&cv=335-485-RELEASE&
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:17 GMT
via
1.1 varnish
server
nginx
x-timer
S1544711057.107519,VS0,VE9
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
cache-control
no-cache
access-control-allow-credentials
true
x-cache-hits
0
accept-ranges
bytes
content-type
image/gif
access-control-allow-origin
*
x-served-by
cache-fra19143-FRA
perf
trc.taboola.com/businessinsider/log/3/
0
79 B
XHR
General
Full URL
https://trc.taboola.com/businessinsider/log/3/perf
Requested by
Host: www.businessinsider.com
URL: https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11?IR=T
Origin
https://www.businessinsider.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Thu, 13 Dec 2018 14:24:25 GMT
via
1.1 varnish
server
nginx
x-timer
S1544711065.357907,VS0,VE11
x-served-by
cache-fra19143-FRA
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.businessinsider.com
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.businessinsider.com
URL
blob:https://www.businessinsider.com/e1ef3f41-4bf7-4443-b3b1-b787907ae858

Verdicts & Comments Add Verdict or Comment

269 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| LUX function| createPerformanceMark function| createPerformanceMeasure object| BI object| NREUM object| newrelic function| __nr_require object| __iasPET function| Krux object| apstag object| dataLayer string| GoogleAnalyticsObject function| ga function| FontFaceObserver object| _PIANO object| tp function| __cmp object| google_tag_data object| gaplugins object| gaGlobal function| BlockAdBlock object| blockAdBlock number| LUX_t_start number| LUX_t_end object| PianoESPConfig object| google_tag_manager function| postscribe object| google_optimize function| getTrafficSrcCookie object| virtualPageSplit object| gaData function| fbq function| _fbq object| _ml function| pf_notify function| async_load number| pf_loader string| bm_website_code function| loadJWLib number| jwInterval function| createCookie undefined| getClientID object| jq function| qp object| nSdkInstance object| nielsenMetadata object| NOLBUNDLE object| pbjs function| pbjsChunk object| __core-js_shared__ function| __test__createLogUtils function| __test__getFilteredSizes function| __test__filterSizes function| __test__filterSizesByIntersection function| __test__getAllSizeMappingSizes function| __test__hasValidSize function| __test__findSlotPattern function| __test__createAdUnits function| __test__createAdUnit function| __test__createVideoAdUnit function| __test__wrapFirstPartyValuesInArrays function| __test__convertPatternStringsToRegEx function| __test__applyFirstPartyData function| __test__playerSizeIsValid function| __test__hasVideoMediaType function| __test__findVideoPattern function| __test__normalizeSizes function| __test__getSizes function| __test__getGptSlotSizes function| __test__getViewport function| __test__setGetViewport function| __test__cleanFirstPartyData object| DigiTrust object| DigiTrustCrypto function| $ function| jQuery function| require object| _purrrf object| Handlebars object| _cachedLibs object| googletag object| core object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill object| _sf_async_config number| _sf_startpt object| _comscore number| inteval number| OB_ADV_ID string| scheme string| str object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken function| udm_ object| ns_p object| COMSCORE function| ___tp object| localCookieStorage object| sessionCookieStorage object| jQuery171042866735092292463 string| __tpVersion undefined| jQuery171042866735092292463_1544711054621 string| emmUrlKey string| optoutCookieKey object| ns object| paramsPassed object| stateObject string| BUILDVERSION object| stateEvents function| FlipboardWidgets undefined| OBPixel undefined| jQuery171042866735092292463_1544711054622 object| GPT_jstiming object| google_reactive_ads_global_state number| google_measure_js_timing boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| googleCompanionsServicePresent function| googleGetCompanionAdSlots function| googleSetCompanionAdContents function| google_show_companion_ad function| google_show_companion_ad_in_slot function| google_get_companion_slot_params function| google_companion_error function| google_companion_loaded function| google_increment_num_ad_mouseovers string| google_ad_output string| google_ad_client string| google_flash_version boolean| google_webgl_support string| google_ad_section string| google_country object| oilJsonp object| AS_OIL object| jwDefaults object| webpackJsonpjwplayer function| jwplayer number| timeCount number| playCount object| NT number| width number| height object| NOLCMB function| Goog_AdSense_Lidar_sendVastEvent function| Goog_AdSense_Lidar_getViewability function| Goog_AdSense_Lidar_getUrlSignalsArray function| Goog_AdSense_Lidar_getUrlSignalsList object| ima object| google object| TRC object| _tblConsole object| _taboola string| pm_pgtp undefined| msg boolean| readyCheck object| par object| closure_lm_282262 function| __trcCopyProps function| __trcFromError function| __trcClientTimestamp function| __trcLog function| __trcError function| __trcDebug function| __trcInfo function| __trcWarn function| __trcDOMWalker function| __trcPurgeEventHandlers function| __trcJSONify function| __trcUnJSONify function| __trcGetMargins function| __trcAttachResize function| __trcDetachResize function| __trcTrim function| __trcGetElementsByClass function| __trcToArray function| __trcObjectCreate function| Gettext function| PageManager object| params number| trc_debug_level string| trc_video_id boolean| trc_testmode object| TRCImpl number| taboola_view_id boolean| _tb_dis string| pm_ppy string| _pmep string| _pmep_geo string| _pmpmk boolean| _pmasync boolean| _pmoptimization boolean| _pmoptimizationmanipulation boolean| _pmhp boolean| _pmsb object| pmk object| pmglb object| pmfa object| pmad object| pmdebug_c object| _pmenv object| _pma undefined| _tb_d undefined| _tb_rand object| _pm_ecd boolean| _tb_vautop string| _tb_vpx function| _pmloadfile function| pmws_request_done function| _tb_getUrlParameter object| _tb_ext_xp object| closure_lm_136738 object| _pmk function| TBWidgetFacebook function| TBClickToPlayVideo function| TBClickToPlayVideoElem function| TBVideoElem function| TBVideoEvents function| TBOptimizationAutoPlayInfoFromXPathAndURL function| TBWidgetVideoPlayer function| TBGenericVideoModule function| TBOtherPlayer function| TBVideoMetaData function| TBVideo function| TBVideoDetectionYoutubeAPI function| TBOptimizationTouchAndClickEventTracker function| TBWidgetStorage object| PMFileLoader object| PMPage object| PMTemplate function| PMTracking function| PMUniversalGA function| PMMdotLabs function| PMComScore function| PMPublisher function| TBOptimization function| PMGlobal function| pmws_getlocation_done object| pmdebug object| pmws object| ti object| _pm_mcg object| tbopt object| PianoESP number| _sf_endpt boolean| check20 boolean| check40 boolean| check60 boolean| check80 boolean| check100 object| _cb_shared object| pSUPERFLY_mab object| _cbq object| pSUPERFLY object| videoXpaths

15 Cookies

Domain/Path Name / Value
www.businessinsider.com/ Name: pnespsdk_ssn
Value: %7B%22%24s%22%3A1544711056438%2C%22visitNumber%22%3A1%7D
www.businessinsider.com/ Name: _tb_t_ppg
Value: https%3A//www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11%3FIR%3DT
www.businessinsider.com/ Name: __pat
Value: -18000000
.businessinsider.com/ Name: bipf
Value: 1
.businessinsider.com/ Name: _ga
Value: GA1.2.500831122.1544711055
www.businessinsider.com/ Name: _tb_sess_r
Value:
.businessinsider.com/ Name: _gid
Value: GA1.2.419174690.1544711055
www.businessinsider.com/ Name: pnespsdk_visitor
Value: yXWVHn0vhHGUJ1SaMviTh5lNUegYJasIwL1PiSiKbHt1H5yTg7Oous37TryU
.businessinsider.com/ Name: _gat_UA-2241657-6
Value: 1
.businessinsider.com/ Name: __pvi
Value: %7B%22id%22%3A%22v-2018-12-13-14-24-14-737-oMZABHBbed4JlFmP-26f2c29dbc2f28ddf22d84849a15df4f%22%2C%22domain%22%3A%22.businessinsider.com%22%2C%22time%22%3A1544711055383%7D
www.businessinsider.com/ Name: trc_cookie_storage
Value: businessinsider%253Asession-data%3Dv2_9e9ced3e387f8c0814081d17e89c6f55_6816deb2-c5b5-43ff-9066-56625a62784d-tuct30bf10f_1544711055_1544711055_CNawjgYQjgYY79HQv_osIAEoATA4OJvjCUCCihBImMQXUKXsEFgBYAA%7Ctaboola%2520global%253Alocal-storage-keys%3D%255B%2522businessinsider%253Asession-data%2522%252C%2522taboola%2520global%253Auser-id%2522%255D%7Ctaboola%2520global%253Auser-id%3D6816deb2-c5b5-43ff-9066-56625a62784d-tuct30bf10f
.businessinsider.com/ Name: __tbc
Value: %7Bjbd%7DeyJ2IjozLCJwayI6InlYV1ZIbjB2aEhHVUoxU2FNdmlUaDVsTlVlZ1lKYXNJd0wxUGlTaUtiSHQxSDV5VGc3T291czM3VHJ5VSIsInNrIjoiQjZzSVhLTGlpbiJ9
.imrworldwide.com/ Name: IMRID
Value: f034cba6-bd1f-494c-9f69-6db894c4f189
.businessinsider.com/ Name: xbc
Value: %7Bjbd%7DeyJ2IjozLCJwayI6InlYV1ZIbjB2aEhHVUoxU2FNdmlUaDVsTlVlZ1lKYXNJd0wxUGlTaUtiSHQxSDV5VGc3T291czM3VHJ5VSIsInNrIjoiQjZzSVhLTGlpbiJ9
.businessinsider.com/ Name: _fbp
Value: fb.1.1544711055284.1182851765

14 Console Messages

Source Level URL
Text
console-api log URL: https://media.businessinsider.com/public/scripts/foot.js(Line 1)
Message:
%cFunc Name: build | Description: configure ads start time| Func Output:
console-api log URL: https://media.businessinsider.com/public/scripts/foot.js(Line 1)
Message:
%cFunc Name: calculatePositions | Description: update cached elements | Func Output:
console-api log URL: https://media.businessinsider.com/public/scripts/foot.js(Line 1)
Message:
%cFunc Name: checkPositionsAndLoad| Description: postload an element | Func Output:
console-api info URL: https://media.businessinsider.com/public/scripts/foot.js(Line 1)
Message:
%cFunc Name: bind | Description: postload module initialized| Func Output:
console-api log URL: https://media.businessinsider.com/public/scripts/foot.js(Line 1)
Message:
%cFunc Name: chartbeatModuleScope| Description: pageType | Func Output:
console-api info URL: https://media.businessinsider.com/public/scripts/foot.js(Line 1)
Message:
%cFunc Name: render | Description: render welcome-ads | Func Output:
console-api log URL: https://media.businessinsider.com/public/scripts/foot.js(Line 1)
Message:
%cFunc Name: checkPianoAccess | Description: Piano access check, access denied| Func Output:
console-api log (Line 4)
Message:
setting bipf cookie
console-api log (Line 5)
Message:
in segment
console-api log (Line 4)
Message:
segment freemium
console-api warning URL: https://content.jwplatform.com/libraries/puACk8ZV.js?_=1544711054432(Line 11)
Message:
JW Player Warning 301129. For more information see https://developer.jwplayer.com/jw-player/docs/developer-guide/api/errors-reference#301129
console-api log URL: https://media.businessinsider.com/public/scripts/foot.js(Line 1)
Message:
%cFunc Name: _loadChartbeat | Description: read _sf_startpt | Func Output:
console-api log URL: https://media.businessinsider.com/public/scripts/foot.js(Line 1)
Message:
%cFunc Name: _loadChartbeat | Description: set attributes | Func Output:
console-api log URL: https://media.businessinsider.com/public/scripts/foot.js(Line 1)
Message:
%cFunc Name: _loadChartbeat | Description: read configs | Func Output:

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

a.eb.emediausa.com
a.quora.com
ads.rubiconproject.com
adservice.google.com
adservice.google.de
ajax.googleapis.com
amp.businessinsider.com
analytics.businessinsider.com
api-esp.piano.io
asset.pagefair.com
asset.pagefair.net
assets-jpcust.jwpsrv.com
bam.nr-data.net
beacon.krxd.net
buy.tinypass.com
c.amazon-adsystem.com
cdn-gl.imrworldwide.com
cdn.adsafeprotected.com
cdn.digitru.st
cdn.flipboard.com
cdn.jwplayer.com
cdn.krxd.net
cdn.speedcurve.com
cdn.taboola.com
cdn.tinypass.com
connect.facebook.net
consumer.krxd.net
content.jwplatform.com
entitlements.jwplayer.com
experience.tinypass.com
fpn.flipboard.com
g.jwpsrv.com
geoip.businessinsider.com
id.tinypass.com
images.taboola.com
imasdk.googleapis.com
js-agent.newrelic.com
jwpltx.com
mailing.eb.emediausa.com
media.businessinsider.com
ml314.com
oil.axelspringer.com
pagead2.googlesyndication.com
ping.chartbeat.net
q.quora.com
s0.2mdn.net
s3.amazonaws.com
sb.scorecardresearch.com
seccdn-gl.imrworldwide.com
secure-dcr.imrworldwide.com
securepubads.g.doubleclick.net
ssl.p.jwpcdn.com
stats.g.doubleclick.net
stats.pagefair.com
traffic.outbrain.com
trc.taboola.com
vendorlist.consensu.org
widget.perfectmarket.com
widgets.outbrain.com
www.businessinsider.com
www.businessinsider.de
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.npttech.com
www.businessinsider.com
104.16.76.51
108.161.188.128
13.56.86.245
151.101.0.175
151.101.0.64
151.101.1.171
151.101.1.176
151.101.1.181
151.101.1.2
151.101.192.175
151.101.2.110
151.101.2.2
151.101.2.217
159.180.84.2
162.247.242.20
172.217.21.194
184.30.221.111
2.19.45.224
23.211.10.44
23.43.115.95
23.67.129.200
2600:9000:2047:4800:14:85db:2b40:93a1
2600:9000:2047:7600:1:a3fa:7cc0:93a1
2600:9000:2047:7a00:e:5a70:ca47:86e1
2600:9000:2047:9e00:1:a3fa:7cc0:93a1
2600:9000:2047:ae00:1:af78:4c0:93a1
2600:9000:2047:e00:1:a3fa:7cc0:93a1
2606:2800:133:9a:24ed:9b6:1020:2655
2606:2800:233:9d9:186a:1821:7f8:93e
2606:4700:30::681f:432f
2a00:1450:4001:806::200a
2a00:1450:4001:809::2002
2a00:1450:4001:817::200e
2a00:1450:4001:81b::2002
2a00:1450:4001:81b::2008
2a00:1450:4001:81c::2002
2a00:1450:4001:820::2002
2a00:1450:4001:820::2003
2a00:1450:4001:820::200a
2a00:1450:4001:821::2006
2a00:1450:4001:824::2004
2a00:1450:400c:c08::9b
2a03:2880:f01c:216:face:b00c:0:3
2a03:2880:f11c:8083:face:b00c:0:25de
2a04:4e42:1d::514
34.201.230.67
34.206.12.124
34.254.137.88
46.137.176.25
52.19.159.96
52.204.114.148
52.216.16.3
52.222.147.236
52.222.149.168
52.222.149.188
52.222.149.62
52.3.12.137
52.31.203.27
52.86.72.168
54.171.224.12
94.31.29.248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