{"id":9579,"date":"2010-07-23T04:08:01","date_gmt":"2010-07-23T03:08:01","guid":{"rendered":"https:\/\/www.tecnomagazine.it\/tech\/?p=9579"},"modified":"2010-07-26T20:10:35","modified_gmt":"2010-07-26T19:10:35","slug":"rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft","status":"publish","type":"post","link":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/","title":{"rendered":"Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft"},"content":{"rendered":"<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-7714\" src=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2010\/03\/virus-pc-2.gif\" alt=\"virus-pc-2\" width=\"262\" height=\"249\" \/>\r\n<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n\r\nPanda Security, The Cloud Security Company, segnala il pericolo che potrebbe scaturire dallo sfruttamento della <strong>vulnerabilit\u00e0 0-day di Microsoft<\/strong>, che consente l\u2019<strong>esecuzione di un file attraverso alcune icone presenti sul desktop degli utenti<\/strong>.<\/p>\n<blockquote><p>\u201cNon si tratta realmente di una vulnerabilit\u00e0\u201d,<\/p><\/blockquote>\n<p>spiega Luis Corrons, direttore tecnico dei laboratori di Panda Security,<\/p>\n<blockquote><p>\u201cma di una funzione precedente, sviluppata senza tenere in considerazione la sicurezza in modo completo. Colpisce tutte le versioni di Windows, incluse quelle interrotte da Microsoft.\u201d<\/p><\/blockquote>\n<p>In quanto \u00e8 impossibile sviluppare patch per tutti i sistemi operativi, dati i volumi di lavoro che ci\u00f2 comporterebbe e per gli attacchi che sono in circolazione, Microsoft ha pubblicato una piccola applicazione come soluzione provvisoria, prima che la patch definitiva sia disponibile. Vi \u00e8, per\u00f2, la possibilit\u00e0 che questa applicazione causi la perdita di alcune icone per l\u2019accesso diretto.<\/p>\n<p><!--more-->Finora, ci sono stati alcuni tentativi \u201cdi concetto\u201d di malware che hanno utilizzato questa funzione.<\/p>\n<blockquote><p>\u201cAbbiamo rilevato il suo sfruttamento per accedere alle infrastrutture critiche di sistema (SCADA) ed \u00e8 solo una questione di tempo perch\u00e9 gli hacker ne approfittino. Quando ci\u00f2 accadr\u00e0, potremmo correre il rischio di assistere ad un\u2019epidemia \u201cvecchio stile\u201d con milioni di utenti colpiti\u201d,<\/p><\/blockquote>\n<p>continua Corrons.<\/p>\n<p><strong>Panda Security consiglia a tutti gli utenti di Windows di scaricare e installare\u00a0 <a href=\"http:\/\/support.microsoft.com\/kb\/2286198#FixItForMe\">l\u2019applicazione<\/a><\/strong>, per assicurarsi un\u2019adeguata protezione e di seguire tutte le regole base di sicurezza, come dotarsi di una soluzione antivirus aggiornata (preferibilmente con una connessione alla cloud, per garantire una rapida risposta a nuovi esemplari di malware) e aggiornare gli altri software installati sul PC.<\/p>\n<p>Per ulteriori informazioni <strong><a href=\"http:\/\/www.pandalabs.com\/\">www.pandalabs.com<\/a><\/strong><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Panda Security, The Cloud Security Company, segnala il pericolo che<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[268,14],"tags":[5876],"class_list":["post-9579","post","type-post","status-publish","format-standard","hentry","category-sicurezza","category-software","tag-vulnerabilita-0-day-di-microsoft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft - TecnoMagazine<\/title>\n<meta name=\"description\" content=\"Panda Security, The Cloud Security Company, segnala il pericolo che potrebbe scaturire dallo sfruttamento della vulnerabilit\u00e0 0-day di Microsoft, che\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft - TecnoMagazine\" \/>\n<meta property=\"og:description\" content=\"Panda Security, The Cloud Security Company, segnala il pericolo che potrebbe scaturire dallo sfruttamento della vulnerabilit\u00e0 0-day di Microsoft, che\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2010-07-23T03:08:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2010-07-26T19:10:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2010\/03\/virus-pc-2.gif\" \/>\n<meta name=\"author\" content=\"Ambra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:site\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ambra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/\"},\"author\":{\"name\":\"Ambra\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"headline\":\"Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft\",\"datePublished\":\"2010-07-23T03:08:01+00:00\",\"dateModified\":\"2010-07-26T19:10:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/\"},\"wordCount\":272,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2010\\\/03\\\/virus-pc-2.gif\",\"keywords\":[\"vulnerabilit\u00e0 0-day di Microsoft\"],\"articleSection\":[\"Sicurezza\",\"Software\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/\",\"name\":\"Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft - TecnoMagazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2010\\\/03\\\/virus-pc-2.gif\",\"datePublished\":\"2010-07-23T03:08:01+00:00\",\"dateModified\":\"2010-07-26T19:10:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"description\":\"Panda Security, The Cloud Security Company, segnala il pericolo che potrebbe scaturire dallo sfruttamento della vulnerabilit\u00e0 0-day di Microsoft, che\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2010\\\/03\\\/virus-pc-2.gif\",\"contentUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2010\\\/03\\\/virus-pc-2.gif\",\"width\":\"262\",\"height\":\"249\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/9579\\\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\",\"name\":\"TecnoMagazine\",\"description\":\"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\",\"name\":\"Ambra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"caption\":\"Ambra\"},\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/author\\\/ambra\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft - TecnoMagazine","description":"Panda Security, The Cloud Security Company, segnala il pericolo che potrebbe scaturire dallo sfruttamento della vulnerabilit\u00e0 0-day di Microsoft, che","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/","og_locale":"it_IT","og_type":"article","og_title":"Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft - TecnoMagazine","og_description":"Panda Security, The Cloud Security Company, segnala il pericolo che potrebbe scaturire dallo sfruttamento della vulnerabilit\u00e0 0-day di Microsoft, che","og_url":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/","og_site_name":"TecnoMagazine","article_published_time":"2010-07-23T03:08:01+00:00","article_modified_time":"2010-07-26T19:10:35+00:00","og_image":[{"url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2010\/03\/virus-pc-2.gif","type":"","width":"","height":""}],"author":"Ambra","twitter_card":"summary_large_image","twitter_creator":"@tecnomagazineit","twitter_site":"@tecnomagazineit","twitter_misc":{"Scritto da":"Ambra","Tempo di lettura stimato":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/#article","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/"},"author":{"name":"Ambra","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"headline":"Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft","datePublished":"2010-07-23T03:08:01+00:00","dateModified":"2010-07-26T19:10:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/"},"wordCount":272,"commentCount":0,"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2010\/03\/virus-pc-2.gif","keywords":["vulnerabilit\u00e0 0-day di Microsoft"],"articleSection":["Sicurezza","Software"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/","url":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/","name":"Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft - TecnoMagazine","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/#primaryimage"},"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2010\/03\/virus-pc-2.gif","datePublished":"2010-07-23T03:08:01+00:00","dateModified":"2010-07-26T19:10:35+00:00","author":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"description":"Panda Security, The Cloud Security Company, segnala il pericolo che potrebbe scaturire dallo sfruttamento della vulnerabilit\u00e0 0-day di Microsoft, che","breadcrumb":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/#primaryimage","url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2010\/03\/virus-pc-2.gif","contentUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2010\/03\/virus-pc-2.gif","width":"262","height":"249"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecnomagazine.it\/tech\/9579\/rischio-di-attacco-attraverso-la-pericolosa-vulnerabilita-0-day-di-microsoft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tecnomagazine.it\/tech\/"},{"@type":"ListItem","position":2,"name":"Rischio di attacco attraverso la pericolosa vulnerabilit\u00e0 0-day di Microsoft"}]},{"@type":"WebSite","@id":"https:\/\/www.tecnomagazine.it\/tech\/#website","url":"https:\/\/www.tecnomagazine.it\/tech\/","name":"TecnoMagazine","description":"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecnomagazine.it\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef","name":"Ambra","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","caption":"Ambra"},"url":"https:\/\/www.tecnomagazine.it\/tech\/author\/ambra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/9579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/comments?post=9579"}],"version-history":[{"count":0,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/9579\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/media?parent=9579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/categories?post=9579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/tags?post=9579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}