{"version":"1.0","provider_name":"Faleddo","provider_url":"https:\/\/faleddo.com\/blog","author_name":"faleddo","author_url":"https:\/\/faleddo.com\/blog\/author\/faleddo\/","title":"Protect Yourself from Phishing Attacks - Faleddo","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"knMNe2CRod\"><a href=\"https:\/\/faleddo.com\/blog\/protect-yourself-from-phishing-attacks\/\">Protect Yourself from Phishing Attacks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/faleddo.com\/blog\/protect-yourself-from-phishing-attacks\/embed\/#?secret=knMNe2CRod\" width=\"600\" height=\"338\" title=\"&#8220;Protect Yourself from Phishing Attacks&#8221; &#8212; Faleddo\" data-secret=\"knMNe2CRod\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/faleddo.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Phishing attacks are like the digital equivalent of a con artist trying to trick you into giving away your personal information. They can come in the form of emails, phone calls, or even text messages, pretending to be from legitimate sources like your bank, a government agency, or a company you trust. The goal is [&hellip;]"}