{"version":"1.0","provider_name":"DICC ","provider_url":"https:\/\/dicc.in\/blog","author_name":"DICC Institute","author_url":"https:\/\/dicc.in\/blog\/author\/diccmohsin\/","title":"Email Security Tips - DICC","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"M6xu8aVMzX\"><a href=\"https:\/\/dicc.in\/blog\/email-security-tips\/\">Email Security Tips<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/dicc.in\/blog\/email-security-tips\/embed\/#?secret=M6xu8aVMzX\" width=\"600\" height=\"338\" title=\"&#8220;Email Security Tips&#8221; &#8212; DICC \" data-secret=\"M6xu8aVMzX\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/dicc.in\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/dicc.in\/blog\/wp-content\/uploads\/2020\/08\/e-mail-security-min.jpg","thumbnail_width":300,"thumbnail_height":168,"description":"New types of malware and increasingly sophisticated attack mechanisms by cybercriminals keep making headlines.\u00a0For example, security experts are currently warning against fileless malware\u00a0.\u00a0The malicious code is not permanently saved on the affected system.\u00a0Instead, it is reloaded in the working memory.\u00a0There is no permanent copy on the end device.\u00a0Common antivirus programs usually do not recognize this [&hellip;]"}