{"version":"1.0","provider_name":"Grado de Inge Inform\u00e1tica","provider_url":"http:\/\/blogs.udima.es\/ingenieria-informatica","author_name":"Sandra Madiedo","author_url":"http:\/\/blogs.udima.es\/ingenieria-informatica\/author\/sandra-madiedo\/","title":"Diez predicciones de ciberseguridad - Blog de Inform\u00e1tica","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"1fQmqDqtOA\"><a href=\"http:\/\/blogs.udima.es\/ingenieria-informatica\/diez-predicciones-de-ciberseguridad\/\">Diez predicciones de ciberseguridad<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/blogs.udima.es\/ingenieria-informatica\/diez-predicciones-de-ciberseguridad\/embed\/#?secret=1fQmqDqtOA\" width=\"600\" height=\"338\" title=\"\u00abDiez predicciones de ciberseguridad\u00bb \u2014 Grado de Inge Inform\u00e1tica\" data-secret=\"1fQmqDqtOA\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blogs.udima.es\/ingenieria-informatica\/wp-content\/uploads\/2023\/04\/GettyImages-1399863063.jpg","thumbnail_width":2121,"thumbnail_height":1414,"description":"Lumu Technologies, una compa\u00f1\u00eda de seguridad tecnol\u00f3gica, ha dado a conocer 10 predicciones para este en cuanto a las tendencias de ciberseguridad. La empresa afirm\u00f3 que la recesi\u00f3n econ\u00f3mica ser\u00e1 aprovechada por parte de los criminales para ampliar sus objetivos, seg\u00fan explica un reporte de Ebanking News, que se hace eco de las predicciones. \u201cLos [&hellip;]"}