{"id":1812,"date":"2008-04-03T09:21:48","date_gmt":"2008-04-03T08:21:48","guid":{"rendered":"https:\/\/www.tecnomagazine.it\/tech\/2008-04-03\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/"},"modified":"2008-04-02T22:11:21","modified_gmt":"2008-04-02T21:11:21","slug":"primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware","status":"publish","type":"post","link":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/","title":{"rendered":"Primo trimestre 2008: quasi un terzo del malware \u00e8 adware"},"content":{"rendered":"<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg\" alt=\"viruspc.jpg\" align=\"left\" border=\"0\" height=\"102\" width=\"240\" \/>\r\n<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n\r\nIn base al <strong>report Q1 2008<\/strong> redatto dal laboratorio di analisi e rilevazione di malware di <em><strong>Panda Security<\/strong><\/em>, l\u2019<strong>adware<\/strong>, con il <strong>28.58% della totalit\u00e0 delle infezioni<\/strong>, \u00e8 <strong>il tipo di malware che ha cagionato il maggior numero di contagi di PC nei primi tre mesi dell\u2019anno<\/strong>.<\/p>\n<p>Secondi agli adware si trovano i <strong>Trojan<\/strong> con il <strong>25.46%<\/strong> seguiti dai <strong>worm con il 9.94%<\/strong>.<\/p>\n<p>Come per i <strong>virus pi\u00f9 attivi nel primo trimestre del 2008<\/strong>, in vetta alla lista troviamo l\u2019<strong>adware Comet<\/strong>, al secondo posto l\u2019<strong>adware NaviPromo<\/strong> seguito dal <strong>worm Bagle.HX<\/strong>, creato per diffondere ed infettare il maggior numero di PC possibile.<\/p>\n<p>Le maggiori minacce del primo trimestre 2008:<\/p>\n<ol>\n<li><strong>Adware\/Comet<\/strong><\/li>\n<li><strong>Adware\/NaviPromo<\/strong><\/li>\n<li><strong>W32 Bagle.HX.Worm<\/strong><\/li>\n<li><strong>W32 Bagle.RC.Worm<\/strong><\/li>\n<li><strong>W32 Bagle.RP.Worm<\/strong><\/li>\n<li><strong>Adware\/SaveNow<\/strong><\/li>\n<li><strong>Adware\/Starware<\/strong><\/li>\n<li><strong>W32\/Puce.E.worm<\/strong><\/li>\n<li><strong>Adware\/Zango<\/strong><\/li>\n<li><strong>Spyware\/Virtumonde<\/strong><\/li>\n<\/ol>\n<p><!--more-->\u201c<em>L\u2019adware \u00e8 un tipo di codice maligno che mostra annunci pubblicitari tutte le volte in cui l\u2019utente naviga nel web. A parte essere davvero fastidioso, il problema \u00e8 che parecchie varianti possono compromettere la sicurezza o le prestazioni del computer e, per questo motivo, gli utenti devono sempre ricorrere a delle precauzioni<\/em>\u201d, afferma <em>Luis Corrons<\/em>, direttore tecnico dei <strong>Laboratori di Panda Security<\/strong>.<\/p>\n<p>\u201c<em>L\u2019enorme quantit\u00e0 di nuovi Trojan messi in circolazione ogni mese mostra come i cyber-criminali siano interessati a creare sempre pi\u00f9 frequentemente nuovi codici maligni aumentando le difficolt\u00e0 nella rilevazione da parte delle soluzioni di sicurezza, senza cos\u00ec riuscire ad aggiornare i file di firma in tempo, lasciando gli utenti non protetti<\/em>\u201d afferma <em>Luis Corrons<\/em>.<\/p>\n<p><a href=\"http:\/\/www.cellularmagazine.it\/blog\/2008-04-03\/minacce-per-telefoni-cellulari\/\"><u><em><strong>Minacce per telefoni cellulari<\/strong><\/em><\/u><\/a><\/p>\n<p>Il report Q1 2008 dei laboratori di Panda Security include una sezione appositamente dedicata alle minacce per telefoni cellulari: Smartphone, iPhone, etc. Secondo il laboratorio di Panda Security i maggiori pericoli che colpiscono questi apparecchi sono worm, Tojan e spyware (spyphone).<\/p>\n<p>\u201c<em>Il comportamento e le caratteristiche sono similari a quelle dei codici maligni per computer\u201d, spiega Corrons. \u201cI Trojan creati per rubare dati confidenziali come password di email, contatti di programmi di instant messaging etc. sono i pi\u00f9 diffusi con il 54.48% del totale delle infezioni. Ci\u00f2 dimostra come gli attacchi contro i dispositivi di telefonia mobile siano diventati sempre pi\u00f9 sofisticati<\/em>\u201d.<\/p>\n<p>Gli effetti pi\u00f9 comuni prodotti dai malware, secondo i laboratori di Panda Security, sono i seguenti:<\/p>\n<ul>\n<li><strong> Malfunzionamento: il cellulare pu\u00f2 bloccarsi<\/strong><\/li>\n<li><strong>Perdita di produttivit\u00e0: consumo di batteria<\/strong><\/li>\n<li><strong>Costi superflui: spedizione di SMS a numeri con tariffe speciali<\/strong><\/li>\n<li><strong>Perdita di dati e informazioni: cancellazioni di cartelle e messaggi<\/strong><\/li>\n<li><strong>Furto di informazioni confidenziali: numeri di telefono, SMS od altri dati sensibili che possono essere archiviati all\u2019interno del dispositivo.<\/strong><\/li>\n<\/ul>\n<p>Il report, inoltre, include informazioni su tematiche quali le pi\u00f9 rilevanti vulnerabilit\u00e0 che sono state scoperte nei primi tre mesi dell\u2019anno, un nuovo attacco che utilizza rootkit capaci di sostituire il Master Boot record (MBR) del computer o l\u2019analisi delle evoluzioni del \u201cStorm Worm\u201d, uno dei pi\u00f9 aggressivi worm dello scorso anno.<\/p>\n<p>Puoi scaricare il report dei Laboratori di Panda Security da: <strong><a href=\"http:\/\/www.pandasecurity.com\/homeusers\/security-info\/tools\/reports\">http:\/\/www.pandasecurity.com\/homeusers\/security-info\/tools\/reports<\/a><\/strong><\/p>\n<p>Da <a href=\"http:\/\/www.fullpress.it\"><em><strong>FullPress.it<\/strong><\/em><\/a><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>In base al report Q1 2008 redatto dal laboratorio di<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50,14],"tags":[488,186,427],"class_list":["post-1812","post","type-post","status-publish","format-standard","hentry","category-web","category-software","tag-adware","tag-trojan","tag-worm"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Primo trimestre 2008: quasi un terzo del malware \u00e8 adware - TecnoMagazine<\/title>\n<meta name=\"description\" content=\"In base al report Q1 2008 redatto dal laboratorio di analisi e rilevazione di malware di Panda Security, l\u2019adware, con il 28.58% della totalit\u00e0 delle\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Primo trimestre 2008: quasi un terzo del malware \u00e8 adware - TecnoMagazine\" \/>\n<meta property=\"og:description\" content=\"In base al report Q1 2008 redatto dal laboratorio di analisi e rilevazione di malware di Panda Security, l\u2019adware, con il 28.58% della totalit\u00e0 delle\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2008-04-03T08:21:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg\" \/>\n<meta name=\"author\" content=\"Ambra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:site\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ambra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/\"},\"author\":{\"name\":\"Ambra\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"headline\":\"Primo trimestre 2008: quasi un terzo del malware \u00e8 adware\",\"datePublished\":\"2008-04-03T08:21:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/\"},\"wordCount\":504,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"keywords\":[\"adware\",\"trojan\",\"worm\"],\"articleSection\":[\"Dal web\",\"Software\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/\",\"name\":\"Primo trimestre 2008: quasi un terzo del malware \u00e8 adware - TecnoMagazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"datePublished\":\"2008-04-03T08:21:48+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"description\":\"In base al report Q1 2008 redatto dal laboratorio di analisi e rilevazione di malware di Panda Security, l\u2019adware, con il 28.58% della totalit\u00e0 delle\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"contentUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1812\\\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Primo trimestre 2008: quasi un terzo del malware \u00e8 adware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\",\"name\":\"TecnoMagazine\",\"description\":\"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\",\"name\":\"Ambra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"caption\":\"Ambra\"},\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/author\\\/ambra\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Primo trimestre 2008: quasi un terzo del malware \u00e8 adware - TecnoMagazine","description":"In base al report Q1 2008 redatto dal laboratorio di analisi e rilevazione di malware di Panda Security, l\u2019adware, con il 28.58% della totalit\u00e0 delle","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/","og_locale":"it_IT","og_type":"article","og_title":"Primo trimestre 2008: quasi un terzo del malware \u00e8 adware - TecnoMagazine","og_description":"In base al report Q1 2008 redatto dal laboratorio di analisi e rilevazione di malware di Panda Security, l\u2019adware, con il 28.58% della totalit\u00e0 delle","og_url":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/","og_site_name":"TecnoMagazine","article_published_time":"2008-04-03T08:21:48+00:00","og_image":[{"url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","type":"","width":"","height":""}],"author":"Ambra","twitter_card":"summary_large_image","twitter_creator":"@tecnomagazineit","twitter_site":"@tecnomagazineit","twitter_misc":{"Scritto da":"Ambra","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/#article","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/"},"author":{"name":"Ambra","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"headline":"Primo trimestre 2008: quasi un terzo del malware \u00e8 adware","datePublished":"2008-04-03T08:21:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/"},"wordCount":504,"commentCount":1,"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","keywords":["adware","trojan","worm"],"articleSection":["Dal web","Software"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/","url":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/","name":"Primo trimestre 2008: quasi un terzo del malware \u00e8 adware - TecnoMagazine","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/#primaryimage"},"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","datePublished":"2008-04-03T08:21:48+00:00","author":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"description":"In base al report Q1 2008 redatto dal laboratorio di analisi e rilevazione di malware di Panda Security, l\u2019adware, con il 28.58% della totalit\u00e0 delle","breadcrumb":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/#primaryimage","url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","contentUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecnomagazine.it\/tech\/1812\/primo-trimestre-2008-quasi-un-terzo-del-malware-e-adware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tecnomagazine.it\/tech\/"},{"@type":"ListItem","position":2,"name":"Primo trimestre 2008: quasi un terzo del malware \u00e8 adware"}]},{"@type":"WebSite","@id":"https:\/\/www.tecnomagazine.it\/tech\/#website","url":"https:\/\/www.tecnomagazine.it\/tech\/","name":"TecnoMagazine","description":"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecnomagazine.it\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef","name":"Ambra","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","caption":"Ambra"},"url":"https:\/\/www.tecnomagazine.it\/tech\/author\/ambra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/1812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/comments?post=1812"}],"version-history":[{"count":0,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/1812\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/media?parent=1812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/categories?post=1812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/tags?post=1812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}