{"id":2492,"date":"2008-07-30T02:27:37","date_gmt":"2008-07-30T01:27:37","guid":{"rendered":"https:\/\/www.tecnomagazine.it\/tech\/?p=2492"},"modified":"2008-08-01T14:33:18","modified_gmt":"2008-08-01T13:33:18","slug":"cybercriminali-attaccano-i-social-network","status":"publish","type":"post","link":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/","title":{"rendered":"Cybercriminali attaccano i social network"},"content":{"rendered":"<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-1989\" src=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/viruspc.jpg\" alt=\"\" width=\"240\" height=\"102\" \/>\r\n<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n\r\nIl <strong>60% dei 100 siti pi\u00f9 popolari<\/strong> ospita <strong>contenuti maligni<\/strong> o contiene un <strong>sistema occulto per il reindirizzamento degli ignari visitatori dal sito legittimo a un sito con contenuti maligni<\/strong>: lo afferma una ricerca presentata dai <em><strong>Websense Security Labs<\/strong><\/em>.<\/p>\n<p>I 100 siti web pi\u00f9 popolari, molti dei quali sono <strong>social network<\/strong>, rappresentano la maggioranza delle pagine viste dagli utenti e sono quindi il target pi\u00f9 ambito per attacchi da parte dei cybercriminali.<\/p>\n<p>Grazie alla loro <strong>larga base di utenti<\/strong>, alla <strong>buona reputazione<\/strong> e al <strong>supporto di applicazioni web 2.0<\/strong>, questi siti offrono abbondanti opportunit\u00e0 agli autori di codice maligno: nella <strong>prima met\u00e0 del 2008<\/strong>, <strong>oltre il 75% dei siti che Websense ha classificato come maligni erano siti con una buona reputazione e compromessi dai cybercriminali<\/strong>. Questo dato ha visto un <strong>incremento del 50% rispetto al secondo semestre 2007<\/strong>. Interessante notare che <strong>oltre il 45% dei 100 siti pi\u00f9 popolari supporta contenuti generati dagli utenti<\/strong>.<\/p>\n<p><!--more-->I <em><strong>Websense Security Labs<\/strong><\/em> hanno individuato inoltre che <strong>il 29% degli attacchi web maligni includeva codice per il furto dei dati<\/strong>, dimostrando cos\u00ec che l\u2019obiettivo fondamentale dei cybercriminali \u00e8 la <strong>raccolta di informazioni e dati da poter poi usare per scopi fraudolenti<\/strong>. La convergenza di minacce miste e attacchi via email \u00e8 in crescita: <strong>oltre il 76,5% di tutte le email in circolazione negli ultimi 6 mesi conteneva link a siti spam e\/o contenenti codice maligno<\/strong>, un <strong>incremento del 18% rispetto al dicembre 2007<\/strong>.<\/p>\n<p>\u201c<em>Gli attuali cyber criminali possono benissimo fare a meno di perdere tempo a creare loro siti maligni quando possono inserire codice maligno in siti autentici gi\u00e0 esistenti e ricchi di visitatori<\/em>\u201d, spiega <em>Dan Hubbard<\/em>, chief technology officer di Websense. \u201c<em>C\u2019\u00e8 una componente di fiducia nel mondo del web 2.0 che porta a credere che I siti che si frequentano tutti i giorni siano sicuri, ma i cybercriminali sfruttano proprio questo &#8211; la buona reputazione dei siti \u2013 per lanciare i loro attacchi. La maggior parte delle attuali tecnologie di Web security e URL filtering si affida largamente a questa buona reputazione, ma questi metodi sono sorpassati. Ai fini della sicurezza, l\u2019autorevolezza di un URL non ha pi\u00f9 alcuna importanza. Per usare Internet in modo sicuro le organizzazioni hanno oggi bisogno di tecniche di protezione in grado di analizzare i contenuti della pagina web in tempo reale<\/em>\u201d.<\/p>\n<p>Fonte: <a href=\"http:\/\/quomedia.diesis.it\" target=\"_blank\"><em><strong>Quo Media<\/strong><\/em><\/a><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Il 60% dei 100 siti pi\u00f9 popolari ospita contenuti maligni<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50,268],"tags":[151,127,694],"class_list":["post-2492","post","type-post","status-publish","format-standard","hentry","category-web","category-sicurezza","tag-network","tag-ricerca","tag-social"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercriminali attaccano i social network - TecnoMagazine<\/title>\n<meta name=\"description\" content=\"Il 60% dei 100 siti pi\u00f9 popolari ospita contenuti maligni o contiene un sistema occulto per il reindirizzamento degli ignari visitatori dal sito legittimo\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminali attaccano i social network - TecnoMagazine\" \/>\n<meta property=\"og:description\" content=\"Il 60% dei 100 siti pi\u00f9 popolari ospita contenuti maligni o contiene un sistema occulto per il reindirizzamento degli ignari visitatori dal sito legittimo\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2008-07-30T01:27:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2008-08-01T13:33:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/viruspc.jpg\" \/>\n<meta name=\"author\" content=\"Ambra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:site\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ambra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/\"},\"author\":{\"name\":\"Ambra\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"headline\":\"Cybercriminali attaccano i social network\",\"datePublished\":\"2008-07-30T01:27:37+00:00\",\"dateModified\":\"2008-08-01T13:33:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/\"},\"wordCount\":376,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/05\\\/viruspc.jpg\",\"keywords\":[\"network\",\"ricerca\",\"social\"],\"articleSection\":[\"Dal web\",\"Sicurezza\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/\",\"name\":\"Cybercriminali attaccano i social network - TecnoMagazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/05\\\/viruspc.jpg\",\"datePublished\":\"2008-07-30T01:27:37+00:00\",\"dateModified\":\"2008-08-01T13:33:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"description\":\"Il 60% dei 100 siti pi\u00f9 popolari ospita contenuti maligni o contiene un sistema occulto per il reindirizzamento degli ignari visitatori dal sito legittimo\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/05\\\/viruspc.jpg\",\"contentUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/05\\\/viruspc.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/2492\\\/cybercriminali-attaccano-i-social-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminali attaccano i social network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\",\"name\":\"TecnoMagazine\",\"description\":\"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\",\"name\":\"Ambra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"caption\":\"Ambra\"},\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/author\\\/ambra\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminali attaccano i social network - TecnoMagazine","description":"Il 60% dei 100 siti pi\u00f9 popolari ospita contenuti maligni o contiene un sistema occulto per il reindirizzamento degli ignari visitatori dal sito legittimo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/","og_locale":"it_IT","og_type":"article","og_title":"Cybercriminali attaccano i social network - TecnoMagazine","og_description":"Il 60% dei 100 siti pi\u00f9 popolari ospita contenuti maligni o contiene un sistema occulto per il reindirizzamento degli ignari visitatori dal sito legittimo","og_url":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/","og_site_name":"TecnoMagazine","article_published_time":"2008-07-30T01:27:37+00:00","article_modified_time":"2008-08-01T13:33:18+00:00","og_image":[{"url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/viruspc.jpg","type":"","width":"","height":""}],"author":"Ambra","twitter_card":"summary_large_image","twitter_creator":"@tecnomagazineit","twitter_site":"@tecnomagazineit","twitter_misc":{"Scritto da":"Ambra","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/#article","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/"},"author":{"name":"Ambra","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"headline":"Cybercriminali attaccano i social network","datePublished":"2008-07-30T01:27:37+00:00","dateModified":"2008-08-01T13:33:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/"},"wordCount":376,"commentCount":0,"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/viruspc.jpg","keywords":["network","ricerca","social"],"articleSection":["Dal web","Sicurezza"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/","url":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/","name":"Cybercriminali attaccano i social network - TecnoMagazine","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/#primaryimage"},"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/viruspc.jpg","datePublished":"2008-07-30T01:27:37+00:00","dateModified":"2008-08-01T13:33:18+00:00","author":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"description":"Il 60% dei 100 siti pi\u00f9 popolari ospita contenuti maligni o contiene un sistema occulto per il reindirizzamento degli ignari visitatori dal sito legittimo","breadcrumb":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/#primaryimage","url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/viruspc.jpg","contentUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/viruspc.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecnomagazine.it\/tech\/2492\/cybercriminali-attaccano-i-social-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tecnomagazine.it\/tech\/"},{"@type":"ListItem","position":2,"name":"Cybercriminali attaccano i social network"}]},{"@type":"WebSite","@id":"https:\/\/www.tecnomagazine.it\/tech\/#website","url":"https:\/\/www.tecnomagazine.it\/tech\/","name":"TecnoMagazine","description":"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecnomagazine.it\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef","name":"Ambra","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","caption":"Ambra"},"url":"https:\/\/www.tecnomagazine.it\/tech\/author\/ambra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/2492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/comments?post=2492"}],"version-history":[{"count":0,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/2492\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/media?parent=2492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/categories?post=2492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/tags?post=2492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}