{"version":"1.0","provider_name":"ESET Eesti Blogi","provider_url":"https:\/\/blog.eset.ee\/et\/en\/","title":"ESET Connected Home Monitor Flags IoT Threats","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"12ezQhb6uK\"><a href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/11\/17\/eset-connected-home-monitor-flags-iot-threats\/\">ESET Connected Home Monitor Flags IoT Threats<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.eset.ee\/et\/en\/2017\/11\/17\/eset-connected-home-monitor-flags-iot-threats\/embed\/#?secret=12ezQhb6uK\" width=\"600\" height=\"338\" title=\"&#8220;ESET Connected Home Monitor Flags IoT Threats&#8221; &#8212; ESET Eesti Blogi\" data-secret=\"12ezQhb6uK\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.eset.ee\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/fig2.png","thumbnail_width":903,"thumbnail_height":624,"description":"How many connected devices are on your network? Whether you use IoT devices knowingly or not, the security of these devices is important not only for your network but also for the entire internet. If you use the internet for online shopping, social media, or listening to music, you should care if your Internet of"}