{"version":"1.0","provider_name":"AppsGeyser","provider_url":"https:\/\/appsgeyser.com\/blog","author_name":"Anastasiya","author_url":"https:\/\/appsgeyser.com\/blog\/author\/anastasiya\/","title":"The Most Important Cybersecurity Tools You Must Have on Your Device","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"YrDXYTh5ZV\"><a href=\"https:\/\/appsgeyser.com\/blog\/cybersecurity-tools-you-must-have-on-your-device\/\">The Most Important Cybersecurity Tools You Must Have on Your Device<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/appsgeyser.com\/blog\/cybersecurity-tools-you-must-have-on-your-device\/embed\/#?secret=YrDXYTh5ZV\" width=\"600\" height=\"338\" title=\"&#8220;The Most Important Cybersecurity Tools You Must Have on Your Device&#8221; &#8212; AppsGeyser\" data-secret=\"YrDXYTh5ZV\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,l){\"use strict\";var e=!1,o=!1;if(l.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=0;o<n.length;o++)n[o].style.display=\"none\";for(o=0;o<i.length;o++)if(r=i[o],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=l.createElement(\"a\"),a=l.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,a.host===s.host)if(l.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=l.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"If you want to ensure that your device will be protected against the malicious intentions of hackers, make sure you keep reading to find out what you need to install on your device.","thumbnail_url":"https:\/\/lh4.googleusercontent.com\/sjeRAZei_omfSPCeeUXukJEd0JXyoXQvbgxJsQQPg22zAtjwiloGK-QzhDcqH6QEsJ_GQe1ca989ODQ8NBGtQ09CTV2_e3LYz3KvYfG3Ge0PKOnhoBf-kv2NJbSNLO4xjmTZzdPbLHIBGaN_4w"}