{"version":"1.0","provider_name":"Nameshield","provider_url":"https:\/\/www.nameshield.com\/de","title":"Cyberangriff","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"z0TsmBCkUy\"><a href=\"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/\">Cyberangriff<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/embed\/#?secret=z0TsmBCkUy\" width=\"600\" height=\"338\" title=\"&#8222;Cyberangriff&#8220; &#8211; Nameshield\" data-secret=\"z0TsmBCkUy\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.nameshield.com\/de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Die Evo\u00adlu\u00adti\u00adon der Tech\u00adnik und das Auf\u00adkom\u00admen neu\u00ader Tech\u00adno\u00adlo\u00adgien f\u00fch\u00adren zu immer kom\u00adple\u00adxe\u00adren Cyber\u00adan\u00adgrif\u00adfen und bie\u00adten den Angrei\u00adfern neue M\u00f6g\u00adlich\u00adkei\u00adten. Es exis\u00adtie\u00adren ver\u00adschie\u00adde\u00adne Arten von Cyber\u00adan\u00adgrif\u00adfen, wie z. B. auf das DNS abzie\u00adlen\u00adde (DDoS, DNS Cache Poi\u00adso\u00adning, DNS-Spoo\u00adfing, Man in the Midd\u00adle) Angrif\u00adfe oder Angrif\u00adfe, die direkt auf die Nut\u00adzer abzie\u00adlen, um ver\u00adtrau\u00adli\u00adche Infor\u00adma\u00adtio\u00adnen f\u00fcr&hellip;&nbsp;Weiterlesen &raquo;","thumbnail_url":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png"}