{"id":13921,"date":"2011-03-29T13:41:40","date_gmt":"2011-03-29T12:41:40","guid":{"rendered":"https:\/\/www.tecnomagazine.it\/tech\/?p=13921"},"modified":"2011-03-29T13:41:40","modified_gmt":"2011-03-29T12:41:40","slug":"panda-security-report-sul-malware-i-trimestre-2011","status":"publish","type":"post","link":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/","title":{"rendered":"Panda Security: report sul malware I trimestre 2011"},"content":{"rendered":"<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-3934\" src=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus-300x198.jpg\" alt=\"\" width=\"290\" height=\"190\" srcset=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus-300x198.jpg 300w, https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg 350w\" sizes=\"auto, (max-width: 290px) 100vw, 290px\" \/>\r\n<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n\r\nI laboratori di <em><strong><a href=\"http:\/\/www.pandasecurity.com\/\" target=\"_blank\">Panda Security<\/a><\/strong><\/em>, The Cloud Security Company, hanno rilevato nel primo trimestre di quest\u2019anno un significativo aumento della quantit\u00e0 di minacce informatiche in circolazione rispetto al periodo corrispondente nel 2010. Tale percentuale si attesta attorno ad un pi\u00f9 26% di minacce rispetto al primo trimestre 2010.\u00a0Il malware \u00e8 cresciuto anche durante il trascorso 2010, ma, come rilevato dai laboratori di Panda Security, non ha mai raggiunto livelli cos\u00ec evidenti come negli ultimi mesi.<\/p>\n<p>Un grafico di riferimento \u00e8 disponibile su\u00a0<a href=\"http:\/\/press.pandasecurity.com\/wp-content\/uploads\/2011\/03\/Graph1.jpg\" target=\"_blank\">http:\/\/press.pandasecurity.com\/wp-content\/uploads\/2011\/03\/Graph1.jpg<\/a>.<\/p>\n<p>Ogni giorno sono stati individuati oltre 73.000 nuovi esemplari di malware, la maggior parte appartenenti alla categoria dei <strong>Trojan<\/strong>. I trojan (o trojan horse, cavallo di troia in lingua italiana) devono il loro nome alla forma in cui si presentano all&#8217;utente: per nascondere le proprie reali &#8220;intenzioni&#8221; (per cos\u00ec dire), essi si celano all&#8217;interno di un programma o di un&#8217; utility all&#8217;apparenza utile. I trojan possono contenere un qualsiasi tipo di istruzione maligna.<\/p>\n<p>I trojan cominciarono ad essere\u00a0sistematicamente\u00a0adoperati \u00a0per operazioni criminose online pi\u00f9 o meno\u00a0negli anni successivi al 2001 o 2002. Per esempio, pi\u00f9 nello specifico, per inviare messaggi di spam e per rubare informazioni e dati personali, quali numeri di carte di credito e di altri documenti o anche solo indirizzi e-mail.<\/p>\n<p>I Trojan sono ad oggi la tipologia di malware pi\u00f9 diffusa e rappresentano il 70% di tutto il nuovo malware creato. Come affermano i laboratori di Panda Security, questi dati non sorprendono, considerando i consistenti guadagni che i cyber criminali ottengono attraverso le frodi o i furti di denaro sfruttando i servizi bancari online.<br \/>\n<!--more--><\/p>\n<blockquote><p>\u201cLa possibilit\u00e0 di acquistare su Internet tool che permettono, anche ai non esperti, di creare Trojan in pochi minuti e avviare attivit\u00e0 illegali \u00e8 la causa principale di questo notevole incremento,\u201d<\/p><\/blockquote>\n<p>spiega Luis Corrons, direttore tecnico dei laboratori di Panda Security.<\/p>\n<p>Le differenti tipologie non sono cresciute allo stesso ritmo, i Trojan bancari e i falsi antivirus sono diminuiti, mentre i bot restano stabili. E&#8217; aumentato, invece, il numero di downloader, che sono Trojan che scaricano ulteriore malware sul computer dell\u2019utente. Spesso gli hacker utilizzano questa specie perch\u00e9 \u00e8 pi\u00f9 leggera (contiene, infatti solo un codice di poche linee di comando) e pu\u00f2 passare inosservata agli occhi dell&#8217;utente.<\/p>\n<p>Un grafico \u00e8 disponibile su <a href=\"http:\/\/prensa.pandasecurity.com\/wp-content\/uploads\/2011\/03\/GRAPH3ES.jpg\" target=\"_blank\">http:\/\/prensa.pandasecurity.com\/wp-content\/uploads\/2011\/03\/GRAPH3ES.jpg<\/a>.<\/p>\n<p>Per un controllo efficace dei PC, ricordate che \u00e8 possibile utilizzare il tool gratuito online Panda Cloud Antivirus o Panda ActiveScan, disponibili rispettivamente ai seguenti indirizzi web: <a href=\"www.cloudantivirus.com\" target=\"_blank\">www.cloudantivirus.com<\/a> e <a href=\"http:\/\/www.pandasecurity.com\/activescan\/index\/\" target=\"_blank\">http:\/\/www.pandasecurity.com\/activescan\/index\/<\/a>.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>I laboratori di Panda Security, The Cloud Security Company, hanno<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3473,50,268],"tags":[2170,7534,7533],"class_list":["post-13921","post","type-post","status-publish","format-standard","hentry","category-glossario","category-web","category-sicurezza","tag-panda-security","tag-panda-security-report-malware-i-trimestre-2011","tag-report-malware-i-trimestre-2011"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Panda Security: report sul malware I trimestre 2011 - TecnoMagazine<\/title>\n<meta name=\"description\" content=\"I laboratori di Panda Security, The Cloud Security Company, hanno rilevato nel primo trimestre di quest\u2019anno un significativo aumento della quantit\u00e0 di\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Panda Security: report sul malware I trimestre 2011 - TecnoMagazine\" \/>\n<meta property=\"og:description\" content=\"I laboratori di Panda Security, The Cloud Security Company, hanno rilevato nel primo trimestre di quest\u2019anno un significativo aumento della quantit\u00e0 di\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2011-03-29T12:41:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus-300x198.jpg\" \/>\n<meta name=\"author\" content=\"Ambra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:site\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ambra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/\"},\"author\":{\"name\":\"Ambra\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"headline\":\"Panda Security: report sul malware I trimestre 2011\",\"datePublished\":\"2011-03-29T12:41:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/\"},\"wordCount\":429,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/virus-300x198.jpg\",\"keywords\":[\"Panda Security\",\"Panda Security report malware I trimestre 2011\",\"report malware I trimestre 2011\"],\"articleSection\":[\"Capirci di pi\u00f9\",\"Dal web\",\"Sicurezza\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/\",\"name\":\"Panda Security: report sul malware I trimestre 2011 - TecnoMagazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/virus-300x198.jpg\",\"datePublished\":\"2011-03-29T12:41:40+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"description\":\"I laboratori di Panda Security, The Cloud Security Company, hanno rilevato nel primo trimestre di quest\u2019anno un significativo aumento della quantit\u00e0 di\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/virus.jpg\",\"contentUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/virus.jpg\",\"width\":\"350\",\"height\":\"231\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/13921\\\/panda-security-report-sul-malware-i-trimestre-2011\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Panda Security: report sul malware I trimestre 2011\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\",\"name\":\"TecnoMagazine\",\"description\":\"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\",\"name\":\"Ambra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"caption\":\"Ambra\"},\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/author\\\/ambra\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Panda Security: report sul malware I trimestre 2011 - TecnoMagazine","description":"I laboratori di Panda Security, The Cloud Security Company, hanno rilevato nel primo trimestre di quest\u2019anno un significativo aumento della quantit\u00e0 di","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/","og_locale":"it_IT","og_type":"article","og_title":"Panda Security: report sul malware I trimestre 2011 - TecnoMagazine","og_description":"I laboratori di Panda Security, The Cloud Security Company, hanno rilevato nel primo trimestre di quest\u2019anno un significativo aumento della quantit\u00e0 di","og_url":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/","og_site_name":"TecnoMagazine","article_published_time":"2011-03-29T12:41:40+00:00","og_image":[{"url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus-300x198.jpg","type":"","width":"","height":""}],"author":"Ambra","twitter_card":"summary_large_image","twitter_creator":"@tecnomagazineit","twitter_site":"@tecnomagazineit","twitter_misc":{"Scritto da":"Ambra","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/#article","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/"},"author":{"name":"Ambra","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"headline":"Panda Security: report sul malware I trimestre 2011","datePublished":"2011-03-29T12:41:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/"},"wordCount":429,"commentCount":0,"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus-300x198.jpg","keywords":["Panda Security","Panda Security report malware I trimestre 2011","report malware I trimestre 2011"],"articleSection":["Capirci di pi\u00f9","Dal web","Sicurezza"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/","url":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/","name":"Panda Security: report sul malware I trimestre 2011 - TecnoMagazine","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/#primaryimage"},"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus-300x198.jpg","datePublished":"2011-03-29T12:41:40+00:00","author":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"description":"I laboratori di Panda Security, The Cloud Security Company, hanno rilevato nel primo trimestre di quest\u2019anno un significativo aumento della quantit\u00e0 di","breadcrumb":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/#primaryimage","url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg","contentUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg","width":"350","height":"231"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecnomagazine.it\/tech\/13921\/panda-security-report-sul-malware-i-trimestre-2011\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tecnomagazine.it\/tech\/"},{"@type":"ListItem","position":2,"name":"Panda Security: report sul malware I trimestre 2011"}]},{"@type":"WebSite","@id":"https:\/\/www.tecnomagazine.it\/tech\/#website","url":"https:\/\/www.tecnomagazine.it\/tech\/","name":"TecnoMagazine","description":"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecnomagazine.it\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef","name":"Ambra","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","caption":"Ambra"},"url":"https:\/\/www.tecnomagazine.it\/tech\/author\/ambra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/13921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/comments?post=13921"}],"version-history":[{"count":0,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/13921\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/media?parent=13921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/categories?post=13921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/tags?post=13921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}