{"version":"1.0","provider_name":"Nameshield","provider_url":"https:\/\/www.nameshield.com\/de","title":"Cyberattacken - Nameshield","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"HxvwLfnwOW\"><a href=\"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/\">Cyberattacken<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/embed\/#?secret=HxvwLfnwOW\" width=\"600\" height=\"338\" title=\"&#8222;Cyberattacken&#8220; &#8211; Nameshield\" data-secret=\"HxvwLfnwOW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.nameshield.com\/de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Die Gefah\u00adren, die durch Cyber\u00adat\u00adta\u00adcken ent\u00adste\u00adhen sind in aller Mun\u00adde. Wie aber gehen Angrei\u00adfer kon\u00adkret vor? Eine ers\u00adte \u00dcber\u00adsicht m\u00f6g\u00adli\u00adcher Atta\u00adcken haben wir in unse\u00adrem Info\u00adblatt \u201eCyber\u00adat\u00adta\u00adcken\u201c f\u00fcr Sie zusam\u00admen\u00adge\u00adstellt. Um Ihnen das Info\u00adblatt zukom\u00admen las\u00adsen zu k\u00f6n\u00adnen, ben\u00f6\u00adti\u00adgen wir Ihren Namen und Ihre E\u2011Mail Adres\u00adse \u2013 vie\u00adlen Dank!","thumbnail_url":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png"}