{"version":"1.0","provider_name":"AppsGeyser","provider_url":"https:\/\/appsgeyser.com\/blog","author_name":"Anastasiya","author_url":"https:\/\/appsgeyser.com\/blog\/author\/anastasiya\/","title":"What is cyber espionage and how to prevent - AppsGeyser","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"g1WRqBoe9k\"><a href=\"https:\/\/appsgeyser.com\/blog\/what-is-cyber-espionage-and-how-to-prevent\/\">What is cyber espionage and how to prevent<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/appsgeyser.com\/blog\/what-is-cyber-espionage-and-how-to-prevent\/embed\/#?secret=g1WRqBoe9k\" width=\"600\" height=\"338\" title=\"&#8220;What is cyber espionage and how to prevent&#8221; &#8212; AppsGeyser\" data-secret=\"g1WRqBoe9k\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,l){\"use strict\";var e=!1,o=!1;if(l.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=0;o<n.length;o++)n[o].style.display=\"none\";for(o=0;o<i.length;o++)if(r=i[o],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=l.createElement(\"a\"),a=l.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,a.host===s.host)if(l.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=l.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/appsgeyser.com\/blog\/wp-content\/uploads\/2021\/07\/hacker-4031973_1920.jpg","thumbnail_width":1920,"thumbnail_height":1334,"description":"In today's information age, data is the new asset. Having the current data and information in hand is valuable and gives an upper hand in trade and business. But like all things valuable, there would also be threats to it. In this case, it is cyber spying or cyber espionage."}