{"id":546036,"date":"2023-10-10T07:54:05","date_gmt":"2023-10-10T13:54:05","guid":{"rendered":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/?p=546036"},"modified":"2023-10-10T07:54:13","modified_gmt":"2023-10-10T13:54:13","slug":"computer-viruses-malicious-software-originat","status":"publish","type":"post","link":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/computer-viruses-malicious-software-originat\/","title":{"rendered":"Computer Viruses: How Did Malicious Software Originate?"},"content":{"rendered":"<figure class=\"wp-block-post-featured-image\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1290\" height=\"675\" src=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/computer-viruses-how-did-malicious-software-originate-cover.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Computer Viruses: How Did Malicious Software Originate?\" style=\"object-fit:cover;\" srcset=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/computer-viruses-how-did-malicious-software-originate-cover.jpg 1290w, https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/computer-viruses-how-did-malicious-software-originate-cover-300x157.jpg 300w, https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/computer-viruses-how-did-malicious-software-originate-cover-1024x536.jpg 1024w, https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/computer-viruses-how-did-malicious-software-originate-cover-768x402.jpg 768w, https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/computer-viruses-how-did-malicious-software-originate-cover-1200x628.jpg 1200w\" sizes=\"(max-width: 1290px) 100vw, 1290px\" data-attachment-id=\"546038\" data-permalink=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/computer-viruses-malicious-software-originat\/computer-viruses-how-did-malicious-software-originate-cover\/\" data-orig-file=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/computer-viruses-how-did-malicious-software-originate-cover.jpg\" data-orig-size=\"1290,675\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"computer-viruses-how-did-malicious-software-originate-cover\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Computer Viruses: How Did Malicious Software Originate?&lt;\/p&gt;\n\" data-large-file=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/computer-viruses-how-did-malicious-software-originate-cover-1024x536.jpg\" title=\"\"><\/figure>\n\n\n<p><b style=\"font-size: inherit;background-color: var(--base-3);color: var(--contrast)\">Computer viruses<\/b><span style=\"font-size: inherit;background-color: var(--base-3);color: var(--contrast)\"> have an extensive and fascinating history that dates back to the early days of computing. These malicious programs have evolved from innocent experiments into <\/span><b style=\"font-size: inherit;background-color: var(--base-3);color: var(--contrast)\">sophisticated cyber threats<\/b><span style=\"font-size: inherit;background-color: var(--base-3);color: var(--contrast)\">. But what is their origin? What was their impact on digital security? And why have they lost relevance today?<\/span> <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Computer Viruses: What Are They?<\/h2>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"669\" height=\"492\" data-attachment-id=\"546040\" data-permalink=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/computer-viruses-malicious-software-originat\/1-10\/\" data-orig-file=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/1-26.jpg\" data-orig-size=\"669,492\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/1-26.jpg\" src=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/1-26.jpg\" alt=\"Computer Viruses: How Did Malicious Software Originate?\" class=\"wp-image-546040\" title=\"\" srcset=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/1-26.jpg 669w, https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/1-26-300x221.jpg 300w\" sizes=\"(max-width: 669px) 100vw, 669px\" \/><\/figure>\n\n\n\n<p>The term &#8220;computer virus&#8221; was coined by American computer scientist <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fred_Cohen\" target=\"_blank\" rel=\"noopener\">Fred Cohen<\/a> in 1983, although the concept of <strong>self-replicating programs<\/strong> had been explored earlier.<\/p>\n\n\n\n<p>One of the earliest known computer viruses is called &#8220;Creeper,&#8221; which emerged in the early 1970s on <a href=\"https:\/\/es.wikipedia.org\/wiki\/ARPANET\" target=\"_blank\" rel=\"noopener\">ARPANET<\/a>, a precursor to the <a href=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/cheems-el-perro-mas-famoso-internet-fallecido\/\">Internet<\/a>. Creeper was a relatively harmless program that displayed a message on infected computers saying, &#8220;I&#8217;m the creeper, catch me if you can!&#8221; It was more of a <strong>proof<\/strong> of concept than a malicious threat.<\/p>\n\n\n\n<p>In 1986, the &#8220;Brain&#8221; virus became one of the first viruses to <strong>affect personal computers<\/strong>. It infected the boot sector of floppy disks and spread through infected disks. The Brain virus was created by two Pakistani brothers, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Brain_(computer_virus)\" target=\"_blank\" rel=\"noopener\">Basit and Amjad Farooq Alvi<\/a>, as a <strong>copy protection<\/strong> measure for their <a href=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/ya-hay-un-metro-que-te-permite-pagar-con-la-cara\/\">software<\/a>.<\/p>\n\n\n\n<p>In the late 1980s and early 1990s, there was an <strong>increase in the spread of viruses<\/strong>, including the infamous <a href=\"https:\/\/es.wikipedia.org\/wiki\/Michelangelo_(virus_inform%C3%A1tico)\" target=\"_blank\" rel=\"noopener\">&#8220;Michelangelo&#8221; virus<\/a> in 1992. This computer virus gained media attention due to its potential to erase data from infected computers on Michelangelo&#8217;s birthday, March 6th.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Have They Lost Relevance?<\/h2>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"700\" height=\"394\" data-attachment-id=\"546042\" data-permalink=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/computer-viruses-malicious-software-originat\/2-10\/\" data-orig-file=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/2-24.jpg\" data-orig-size=\"700,394\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"2\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/2-24.jpg\" src=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/2-24.jpg\" alt=\"Computer Viruses: How Did Malicious Software Originate?\" class=\"wp-image-546042\" title=\"\" srcset=\"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/2-24.jpg 700w, https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/2-24-300x169.jpg 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p>As for why computer viruses are not as prevalent today, several factors have contributed to their decline:<\/p>\n\n\n\n<p>The development of <strong>antivirus<\/strong> software has made it harder for viruses to go unnoticed. These programs can identify and remove <strong>malware<\/strong> before it can cause significant harm.<\/p>\n\n\n\n<p>Greater awareness of cybersecurity practices has made users more cautious about <strong>opening suspicious email<\/strong> attachments or clicking on unknown links.<\/p>\n\n\n\n<p>Modern operating systems like Windows, macOS, and Linux have implemented security measures that make it difficult for viruses to infect and spread.<\/p>\n\n\n\n<p>Cybercriminals have shifted their focus to more profitable forms of malware, such as ransomware and phishing attacks, which can yield significant financial gains.<\/p>\n\n\n\n<p>The <strong>legal consequences<\/strong> of creating and distributing viruses have become more severe, deterring many potential virus creators.<\/p>\n\n\n\n<p><strong><em>While computer viruses are not as common as they once were, the online threat landscape has evolved, and new challenges in cybersecurity occasionally emerge. It is essential to stay vigilant and employ updated security measures to protect against the ever-changing threat of malware and cyberattacks.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer viruses have an extensive and fascinating history that dates back to the early days of computing. These malicious programs [&hellip;]<\/p>\n","protected":false},"author":2284,"featured_media":546038,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"two_page_speed":[],"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false,"jetpack_post_was_ever_published":false},"categories":[107131],"tags":[112976,112977,107210,112978,112980,112979,108359,112982,112981,112984,112983,107145,112986,112985,112987],"class_list":["post-546036","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-arpanet-2","tag-basit-and-amjad-faroog-alvi","tag-brain","tag-cyber-threats","tag-cybersecurity","tag-fred-cohen-2","tag-internet-en","tag-internet-security","tag-macos-2","tag-software-2","tag-systems","tag-technology","tag-virus-2","tag-virus-michelangelo","tag-windows-2"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/computer-viruses-how-did-malicious-software-originate-cover.jpg","jetpack_likes_enabled":false,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pgrue1-2i32","jetpack-related-posts":[{"id":534514,"url":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/kitum-cave-most-dangerous-places-aegb\/","url_meta":{"origin":546036,"position":0},"title":"Kitum Cave, one of the most dangerous places on Earth","author":"Alejandra Galaz","date":"February 27, 2023","format":false,"excerpt":"Kitum Cave is a cave located in Mount Elgon National Park in Kenya. It is known for being one of the most dangerous places on Earth due to the presence of lethal viruses and diseases that can affect humans and other animals. In addition, the cave is known for being\u2026","rel":"","context":"In &quot;Exploring the world&quot;","block_context":{"text":"Exploring the world","link":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/category\/lifestyle\/exploring-the-world\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/02\/c0wbibc90lja1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/02\/c0wbibc90lja1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/02\/c0wbibc90lja1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/02\/c0wbibc90lja1.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":15639,"url":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/encuentran-virus-desconocidos-en-animales-que-se-consumen-en-china\/","url_meta":{"origin":546036,"position":1},"title":"Encuentran virus desconocidos en animales que se consumen en China.","author":"Rafael Ter\u00e1n","date":"February 20, 2022","format":false,"excerpt":"Recently, a group of researchers have reported that they have found dozens of unknown viruses in wild animals that are often eaten in China . The various species subject to analysis in the study include civets, raccoon dogs, badgers and porcupines. The international group of scientists recently published a study\u2026","rel":"","context":"In &quot;Fauna Silvestre&quot;","block_context":{"text":"Fauna Silvestre","link":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/category\/ciencia\/fauna-silvestre\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2022\/02\/png_20220220_194308_0000.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2022\/02\/png_20220220_194308_0000.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2022\/02\/png_20220220_194308_0000.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2022\/02\/png_20220220_194308_0000.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2022\/02\/png_20220220_194308_0000.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":535604,"url":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/china-records-first-h3n8-bird-flu-death-who-says-eacr\/","url_meta":{"origin":546036,"position":2},"title":"China records first H3N8 bird flu death, WHO says","author":"Andrey Robles","date":"April 12, 2023","format":false,"excerpt":"A woman has died from H3N8 bird flu in China, the World Health Organization reported \u2013 the first known human fatality from the avian influenza strain. H3N8 is known to have been circulating since 2002 after first emerging in North American waterfowl. It is known to infect horses, dogs and\u2026","rel":"","context":"In &quot;Health&quot;","block_context":{"text":"Health","link":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/category\/health\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/04\/primera_muerte_gripe_aviar_kjhg-bell.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/04\/primera_muerte_gripe_aviar_kjhg-bell.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/04\/primera_muerte_gripe_aviar_kjhg-bell.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/04\/primera_muerte_gripe_aviar_kjhg-bell.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/04\/primera_muerte_gripe_aviar_kjhg-bell.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":533514,"url":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/fireflies-why-they-glow-and-everything-you-need-to-know-about-them\/","url_meta":{"origin":546036,"position":3},"title":"Fireflies: Why they glow and everything you need to know about them","author":"Alejandra Galaz","date":"March 7, 2023","format":false,"excerpt":"Fireflies are illuminated by a chemical reaction. We give you all the explanation in this article, plus additional information about them, images and GIFs. Table of Contents What are fireflies? Where do fireflies live?Why do fireflies glow?When do fireflies glow?What do fireflies eat?-BONUS- What are fireflies? Whether you call them\u2026","rel":"","context":"In &quot;Wild Life&quot;","block_context":{"text":"Wild Life","link":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/category\/science\/wildlife-en\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2020\/06\/firefly-768x432-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2020\/06\/firefly-768x432-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2020\/06\/firefly-768x432-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2020\/06\/firefly-768x432-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":546722,"url":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/anthony-omari-the-scarred-superhero\/","url_meta":{"origin":546036,"position":4},"title":"Anthony Omari: The Scarred Superhero","author":"Erick Sumoza","date":"October 19, 2023","format":false,"excerpt":"On the night of January 23, 2012, Anthony Omari, a 24-year-old Kenyan, faced a terrifying situation. Three burly individuals armed with machetes stood by his bed. What led him to this situation? This is a story that demonstrates that superheroes don't exist only in fiction. The Courage of Anthony Omari\u2026","rel":"","context":"In &quot;History&quot;","block_context":{"text":"History","link":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/category\/science\/social-science\/history\/"},"img":{"alt_text":"Anthony Omari: The Scarred Superhero","src":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/anthony-omari-the-scarred-superhero-cover.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/anthony-omari-the-scarred-superhero-cover.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/anthony-omari-the-scarred-superhero-cover.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/anthony-omari-the-scarred-superhero-cover.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/10\/anthony-omari-the-scarred-superhero-cover.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":533498,"url":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/the-10-most-fundamental-philosophical-questions-for-the-human-being\/","url_meta":{"origin":546036,"position":5},"title":"The 10 most fundamental philosophical questions for the human being","author":"Rodrigo Vazquez","date":"March 8, 2023","format":false,"excerpt":"Philosophy has been a discipline that has existed for centuries, and in its quest to understand the world around us, it has raised fundamental questions that are still relevant today. These questions have not only helped to define the philosophical discipline, but have also given rise to some of the\u2026","rel":"","context":"In &quot;Education&quot;","block_context":{"text":"Education","link":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/category\/education\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/03\/preguntas.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/03\/preguntas.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/03\/preguntas.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/03\/preguntas.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/wp-content\/uploads\/2023\/03\/preguntas.png?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/wp-json\/wp\/v2\/posts\/546036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/wp-json\/wp\/v2\/users\/2284"}],"replies":[{"embeddable":true,"href":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/wp-json\/wp\/v2\/comments?post=546036"}],"version-history":[{"count":0,"href":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/wp-json\/wp\/v2\/posts\/546036\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/wp-json\/wp\/v2\/media\/546038"}],"wp:attachment":[{"href":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/wp-json\/wp\/v2\/media?parent=546036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/wp-json\/wp\/v2\/categories?post=546036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging-7b2a-cerebrodigitalnet.wpcomstaging.com\/en\/wp-json\/wp\/v2\/tags?post=546036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}