{"id":1799,"date":"2008-03-30T20:28:33","date_gmt":"2008-03-30T19:28:33","guid":{"rendered":"https:\/\/www.tecnomagazine.it\/tech\/2008-03-30\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/"},"modified":"2008-03-30T21:29:25","modified_gmt":"2008-03-30T20:29:25","slug":"g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware","status":"publish","type":"post","link":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/","title":{"rendered":"G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware"},"content":{"rendered":"<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg\" alt=\"viruspc.jpg\" align=\"left\" border=\"0\" height=\"102\" width=\"240\" \/>\r\n<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n\r\nDopo una <a href=\"https:\/\/www.tecnomagazine.it\/tech\/2008-03-26\/g-data-il-nuovo-porno-malware-usa-britney-spears-e-paris-hilton\/\">prima ondata di e-mail di Spam segnalata<\/a> da <a href=\"http:\/\/www.gdata.it\"><em><strong>G DATA<\/strong><\/em><\/a><em><strong> Security Labs<\/strong><\/em> <a href=\"https:\/\/www.tecnomagazine.it\/tech\/2008-03-26\/g-data-il-nuovo-porno-malware-usa-britney-spears-e-paris-hilton\/\">nei scorsi giorni<\/a>, i criminali online hanno ulteriormente potenziato i loro attacchi diffondendo una <strong>seconda ondata di malware<\/strong> che utilizza nuovamente<strong> come esca famose attrici o cantanti<\/strong>. Anche in questo caso <strong>si promette la visione di materiale pornografico<\/strong>, ma <strong>il numero delle star coinvolte \u00e8 aumentato esponenzialmente<\/strong> fino a superare la <strong>cinquantina di nomi<\/strong>.  Il sospetto \u00e8 che i cybercriminali utilizzino come fonte di ispirazione i pi\u00f9 diffusi magazine lifestyle piuttosto che la classifica americana delle 50 donne pi\u00f9 belle. Anche l\u2019offerta di materiale pornografico si \u00e8 fatta pi\u00f9 ricca ed articolata, spaziando da semplici foto fino a Dvd o file in formato MPEG4.  Il testo che accomuna tutte queste mail \u00e8 un <strong>chiaro invito a scaricare materiale hard<\/strong>: \u201c<strong><em>Download it now<\/em><\/strong>\u201d.<\/p>\n<p>In particolare <strong>si sfrutta la funzione di forwarding inclusa in <em>Google<\/em><\/strong> per <strong>reindirizzare gli utenti su un sito che sfrutta un\u2019infezione<\/strong> cosiddetta <em><strong>DRive-By<\/strong><\/em> del <strong>Trojan<\/strong>&#8211;<em><strong>Downloader.HTML.IFrame.fs<\/strong><\/em> (in precedenza veniva invece utilizzato un file di tipo <em><strong>.exe<\/strong><\/em> pi\u00f9 facilmente individuabile come potenzialmente dannoso).<\/p>\n<p>Ecco una lista delle celebrit\u00e0 pi\u00f9 utilizzate per ingannare gli utenti:<\/p>\n<p>Liv Tyler<br \/>\nNicole Kidman<br \/>\nKate Moss<br \/>\nMonica Bellucci<br \/>\nCameron Diaz<br \/>\nClare Morgan<br \/>\nSalma Hayek<br \/>\nAvril Lavigne<br \/>\nNicole Richie<br \/>\nVeronica Zemanova<br \/>\nMadonna<br \/>\nJessica Alba<br \/>\nDemi Moore<br \/>\nJennifer Lopez<br \/>\nPenelope Cruz<\/p>\n<p>Il consiglio agli utenti \u00e8 quello di <strong>attivare il controllo del traffico HTTP per proteggersi cos\u00ec da ogni infezione<\/strong>.<br \/>\n<!--more--> Ralf Benzmueller, Responsabile di G DATA Security Labs ha dichiarato: \u201c<em>Chi riceve queste e-mail le dovrebbe cancellare immediatamente senza nemmeno leggerle. In questa seconda ondata, infatti, vengono utilizzati download di tipo Drive-By. \u00c8 consigliabile tenere sempre attivo il modulo di controllo del traffico HTTP ogni volta che si usa Internet<\/em>\u201d.<\/p>\n<p>L\u2019utilizzo delle soluzioni di sicurezza di G DATA \u00e8 una garanzia per bloccare l\u2019accesso a questi siti infetti.<\/p>\n<p>Da <a href=\"http:\/\/www.fullpress.it\"><em><strong>FullPress.it<\/strong><\/em><\/a><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Dopo una prima ondata di e-mail di Spam segnalata da<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,50,14],"tags":[186,467,61],"class_list":["post-1799","post","type-post","status-publish","format-standard","hentry","category-computer","category-web","category-software","tag-trojan","tag-vip","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware - TecnoMagazine<\/title>\n<meta name=\"description\" content=\"Dopo una prima ondata di e-mail di Spam segnalata da G DATA Security Labs nei scorsi giorni, i criminali online hanno ulteriormente potenziato i loro\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware - TecnoMagazine\" \/>\n<meta property=\"og:description\" content=\"Dopo una prima ondata di e-mail di Spam segnalata da G DATA Security Labs nei scorsi giorni, i criminali online hanno ulteriormente potenziato i loro\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2008-03-30T19:28:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2008-03-30T20:29:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg\" \/>\n<meta name=\"author\" content=\"Ambra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:site\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ambra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/\"},\"author\":{\"name\":\"Ambra\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"headline\":\"G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware\",\"datePublished\":\"2008-03-30T19:28:33+00:00\",\"dateModified\":\"2008-03-30T20:29:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/\"},\"wordCount\":322,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"keywords\":[\"trojan\",\"vip\",\"virus\"],\"articleSection\":[\"Computer\",\"Dal web\",\"Software\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/\",\"name\":\"G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware - TecnoMagazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"datePublished\":\"2008-03-30T19:28:33+00:00\",\"dateModified\":\"2008-03-30T20:29:25+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"description\":\"Dopo una prima ondata di e-mail di Spam segnalata da G DATA Security Labs nei scorsi giorni, i criminali online hanno ulteriormente potenziato i loro\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"contentUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1799\\\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\",\"name\":\"TecnoMagazine\",\"description\":\"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\",\"name\":\"Ambra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"caption\":\"Ambra\"},\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/author\\\/ambra\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware - TecnoMagazine","description":"Dopo una prima ondata di e-mail di Spam segnalata da G DATA Security Labs nei scorsi giorni, i criminali online hanno ulteriormente potenziato i loro","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/","og_locale":"it_IT","og_type":"article","og_title":"G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware - TecnoMagazine","og_description":"Dopo una prima ondata di e-mail di Spam segnalata da G DATA Security Labs nei scorsi giorni, i criminali online hanno ulteriormente potenziato i loro","og_url":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/","og_site_name":"TecnoMagazine","article_published_time":"2008-03-30T19:28:33+00:00","article_modified_time":"2008-03-30T20:29:25+00:00","og_image":[{"url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","type":"","width":"","height":""}],"author":"Ambra","twitter_card":"summary_large_image","twitter_creator":"@tecnomagazineit","twitter_site":"@tecnomagazineit","twitter_misc":{"Scritto da":"Ambra","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/#article","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/"},"author":{"name":"Ambra","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"headline":"G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware","datePublished":"2008-03-30T19:28:33+00:00","dateModified":"2008-03-30T20:29:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/"},"wordCount":322,"commentCount":0,"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","keywords":["trojan","vip","virus"],"articleSection":["Computer","Dal web","Software"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/","url":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/","name":"G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware - TecnoMagazine","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","datePublished":"2008-03-30T19:28:33+00:00","dateModified":"2008-03-30T20:29:25+00:00","author":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"description":"Dopo una prima ondata di e-mail di Spam segnalata da G DATA Security Labs nei scorsi giorni, i criminali online hanno ulteriormente potenziato i loro","breadcrumb":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/#primaryimage","url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","contentUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecnomagazine.it\/tech\/1799\/g-data-nuovi-vip-tra-cui-monica-bellucci-o-madonna-come-esca-per-il-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tecnomagazine.it\/tech\/"},{"@type":"ListItem","position":2,"name":"G DATA: nuovi Vip tra cui Monica Bellucci o Madonna come esca per il malware"}]},{"@type":"WebSite","@id":"https:\/\/www.tecnomagazine.it\/tech\/#website","url":"https:\/\/www.tecnomagazine.it\/tech\/","name":"TecnoMagazine","description":"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecnomagazine.it\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef","name":"Ambra","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","caption":"Ambra"},"url":"https:\/\/www.tecnomagazine.it\/tech\/author\/ambra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/1799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/comments?post=1799"}],"version-history":[{"count":0,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/1799\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/media?parent=1799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/categories?post=1799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/tags?post=1799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}