{"id":1705,"date":"2008-03-06T21:57:24","date_gmt":"2008-03-06T20:57:24","guid":{"rendered":"https:\/\/www.tecnomagazine.it\/tech\/2008-03-06\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/"},"modified":"2008-03-06T21:57:24","modified_gmt":"2008-03-06T20:57:24","slug":"scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc","status":"publish","type":"post","link":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/","title":{"rendered":"Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC"},"content":{"rendered":"<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg\" alt=\"viruspc.jpg\" align=\"left\" border=\"0\" height=\"102\" width=\"240\" \/>\r\n<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n\r\nSi tratta di un <strong>problema di sicurezza<\/strong>, simile a <a href=\"https:\/\/www.tecnomagazine.it\/tech\/2008-01-18\/sicurezza-a-rischio-per-un-bug-di-office\/\">quello scoperto qualche mese fa<\/a>, denominato <em><strong>CVE-2007-6026<\/strong><\/em>, che colpisce la <strong>medesima libreria<\/strong> <em><strong>msjet40.dll<\/strong><\/em>, ma <strong>in un altro punto<\/strong>.<\/p>\n<p>La situazione \u00e8 aggravata dal fatto che i <em><strong>cyber-criminali<\/strong><\/em> <strong>utilizzano queste falle per installare malware silenzioso sui computer.<\/strong> In questo caso, <em><strong><a href=\"http:\/\/www.pandasecurity.com\">Panda Security<\/a><\/strong><\/em> ha <strong>rilevato che la vulnerabilit\u00e0 \u00e8 usata per diffondere il pericoloso <em>Trojan Keylogger.DB<\/em><\/strong>, progettato per <strong>rubare dati confidenziali degli utenti attraverso il recupero della battitura sulla tastiera<\/strong>.<\/p>\n<p>Questa falla di sicurezza \u00e8 <strong>sfruttata attraverso file pericolosi di <em>Access<\/em><\/strong> (<em><strong>.mdb<\/strong><\/em>), costruiti appositamente, contenenti il <strong>codice maligno<\/strong>.<\/p>\n<p><!--more--><em>Luis Corrons<\/em>, direttore tecnico dei laboratori di <em><strong>Panda Security<\/strong><\/em> afferma \u201c<em>ogni volta che compare una vulnerabilit\u00e0 di questo genere, i cyber-criminali cercano di trarne il maggiore vantaggio. Ci sar\u00e0, quindi, la possibilit\u00e0 che vengano diffusi numerosi file di Access che non solo contengono il Trojan, ma anche altri tipi di minacce.<\/em>\u201d<\/p>\n<p>Per non cadere vittime di questo problema di sicurezza, <em><strong>Panda Security<\/strong><\/em> consiglia agli utenti di <strong>non aprire file sospetti<\/strong> &#8211; <strong>ricevuti o scaricati da Internet<\/strong> \u2013 e di <strong>aggiornare le soluzioni di protezione<\/strong>, soprattutto <strong>fino a quando non sar\u00e0 disponibile una <em>patch<\/em> per risolvere questa vulnerabilit\u00e0<\/strong>.<\/p>\n<p>Da <em><strong><a href=\"http:\/\/www.fullpress.it\">FullPress.it<\/a><\/strong><\/em><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Si tratta di un problema di sicurezza, simile a quello<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50,14],"tags":[182,9565,186],"class_list":["post-1705","post","type-post","status-publish","format-standard","hentry","category-web","category-software","tag-office","tag-sicurezza","tag-trojan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC - TecnoMagazine<\/title>\n<meta name=\"description\" content=\"Si tratta di un problema di sicurezza, simile a quello scoperto qualche mese fa, denominato CVE-2007-6026, che colpisce la medesima libreria msjet40.dll,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC - TecnoMagazine\" \/>\n<meta property=\"og:description\" content=\"Si tratta di un problema di sicurezza, simile a quello scoperto qualche mese fa, denominato CVE-2007-6026, che colpisce la medesima libreria msjet40.dll,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2008-03-06T20:57:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg\" \/>\n<meta name=\"author\" content=\"Ambra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:site\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ambra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/\"},\"author\":{\"name\":\"Ambra\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"headline\":\"Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC\",\"datePublished\":\"2008-03-06T20:57:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/\"},\"wordCount\":206,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"keywords\":[\"office\",\"Sicurezza\",\"trojan\"],\"articleSection\":[\"Dal web\",\"Software\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/\",\"name\":\"Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC - TecnoMagazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"datePublished\":\"2008-03-06T20:57:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"description\":\"Si tratta di un problema di sicurezza, simile a quello scoperto qualche mese fa, denominato CVE-2007-6026, che colpisce la medesima libreria msjet40.dll,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"contentUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1705\\\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\",\"name\":\"TecnoMagazine\",\"description\":\"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\",\"name\":\"Ambra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"caption\":\"Ambra\"},\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/author\\\/ambra\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC - TecnoMagazine","description":"Si tratta di un problema di sicurezza, simile a quello scoperto qualche mese fa, denominato CVE-2007-6026, che colpisce la medesima libreria msjet40.dll,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/","og_locale":"it_IT","og_type":"article","og_title":"Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC - TecnoMagazine","og_description":"Si tratta di un problema di sicurezza, simile a quello scoperto qualche mese fa, denominato CVE-2007-6026, che colpisce la medesima libreria msjet40.dll,","og_url":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/","og_site_name":"TecnoMagazine","article_published_time":"2008-03-06T20:57:24+00:00","og_image":[{"url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","type":"","width":"","height":""}],"author":"Ambra","twitter_card":"summary_large_image","twitter_creator":"@tecnomagazineit","twitter_site":"@tecnomagazineit","twitter_misc":{"Scritto da":"Ambra","Tempo di lettura stimato":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/#article","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/"},"author":{"name":"Ambra","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"headline":"Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC","datePublished":"2008-03-06T20:57:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/"},"wordCount":206,"commentCount":0,"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","keywords":["office","Sicurezza","trojan"],"articleSection":["Dal web","Software"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/","url":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/","name":"Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC - TecnoMagazine","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/#primaryimage"},"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","datePublished":"2008-03-06T20:57:24+00:00","author":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"description":"Si tratta di un problema di sicurezza, simile a quello scoperto qualche mese fa, denominato CVE-2007-6026, che colpisce la medesima libreria msjet40.dll,","breadcrumb":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/#primaryimage","url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","contentUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecnomagazine.it\/tech\/1705\/scoperta-una-nuova-vulnerabilita-in-microsoft-access-sfruttata-per-attaccare-i-pc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tecnomagazine.it\/tech\/"},{"@type":"ListItem","position":2,"name":"Scoperta una nuova vulnerabilit\u00e0 in Microsoft Access sfruttata per attaccare i PC"}]},{"@type":"WebSite","@id":"https:\/\/www.tecnomagazine.it\/tech\/#website","url":"https:\/\/www.tecnomagazine.it\/tech\/","name":"TecnoMagazine","description":"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecnomagazine.it\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef","name":"Ambra","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","caption":"Ambra"},"url":"https:\/\/www.tecnomagazine.it\/tech\/author\/ambra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/1705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/comments?post=1705"}],"version-history":[{"count":0,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/1705\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/media?parent=1705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/categories?post=1705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/tags?post=1705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}