{"version":"1.0","provider_name":"Sharp Innovations Blog","provider_url":"https:\/\/www.sharpinnovations.com\/blog","author_name":"Brian Joly","author_url":"https:\/\/www.sharpinnovations.com\/blog\/author\/bjoly\/","title":"Cybercrime: Common Attacks and Defenses - Sharp Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Nvx6nfR1RD\"><a href=\"https:\/\/www.sharpinnovations.com\/blog\/2024\/09\/cybercrime-common-attacks-and-defenses\/\">Cybercrime: Common Attacks and Defenses<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.sharpinnovations.com\/blog\/2024\/09\/cybercrime-common-attacks-and-defenses\/embed\/#?secret=Nvx6nfR1RD\" width=\"600\" height=\"338\" title=\"&#8220;Cybercrime: Common Attacks and Defenses&#8221; &#8212; Sharp Innovations Blog\" data-secret=\"Nvx6nfR1RD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.sharpinnovations.com\/blog\/wp-content\/uploads\/2024\/09\/cybercrime-blog-banner.jpg","thumbnail_width":1400,"thumbnail_height":350,"description":"Cybercrime is estimated to cost the world up to $10.5 Trillion in 2025.\u00a0 Cybercriminals leverage a wide range of attacks against their victims.\u00a0 Attacks may include the planting of malicious code to take control of devices and capture personal data, credit card numbers, usernames and passwords, and other sensitive personally identifiable information (PII).\u00a0 Cybercrime impacts large enterprise institutions, hospitals, and individuals alike.\u00a0\u00a0 In this introductory article, we'll discuss ransomware, one of the most common forms of cybercrime that inflicts significant damage worldwide, and we'll offer some steps to help protect you against attacks."}