{"version":"1.0","provider_name":"LISOT","provider_url":"https:\/\/www.lisot.com\/ca\/","author_name":"Lisot Inform\u00e1tica empresarial","author_url":"https:\/\/www.lisot.com\/ca\/author\/komunicalo\/","title":"Temes i formes m\u00e9s comuns de phishing - LISOT","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"pyWvyY6iDZ\"><a href=\"https:\/\/www.lisot.com\/ca\/temes-i-formes-mes-comuns-de-phishing\/\">Temes i formes m\u00e9s comuns de phishing<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.lisot.com\/ca\/temes-i-formes-mes-comuns-de-phishing\/embed\/#?secret=pyWvyY6iDZ\" width=\"600\" height=\"338\" title=\"&#8220;Temes i formes m\u00e9s comuns de phishing&#8221; &#8212; LISOT\" data-secret=\"pyWvyY6iDZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/09\/correo-electronico-nuevo.jpg","thumbnail_width":1200,"thumbnail_height":800,"description":"En articles anteriors hem parlat de les estrat\u00e8gies m\u00e9s habituals de phishing, entre les quals estan els correus electr\u00f2nics que pretenen enganyar el receptor perqu\u00e8 de les seves dades personals. Quins s\u00f3n els correus electr\u00f2nics de phishing m\u00e9s comuns? Problemes de facturaci\u00f3:se li indica que alguna cosa que ha comprat en l\u00ednia recentment no es pot [...]"}