{"version":"1.0","provider_name":"ESET Eesti Blogi","provider_url":"https:\/\/blog.eset.ee\/et\/en\/","title":"10 ways to ruin a cybercriminal\u2019s day","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"FczrpTBTeh\"><a href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/06\/10-ways-to-ruin-a-cybercriminals-day\/\">10 ways to ruin a cybercriminal\u2019s day<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/06\/10-ways-to-ruin-a-cybercriminals-day\/embed\/#?secret=FczrpTBTeh\" width=\"600\" height=\"338\" title=\"&#8220;10 ways to ruin a cybercriminal\u2019s day&#8221; &#8212; ESET Eesti Blogi\" data-secret=\"FczrpTBTeh\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.eset.ee\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_397249303-1-623x410.jpg","thumbnail_width":623,"thumbnail_height":410,"description":"&nbsp; Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone \u2013 from the most inexperienced to the most advanced user \u2013 takes measures to protect themselves from cybercriminals seeking to compromise or steal information. In this article, we discuss how you can"}