{"id":39568,"date":"2024-09-09T09:11:00","date_gmt":"2024-09-09T09:11:00","guid":{"rendered":"https:\/\/www.cyberguru.it\/?p=39568"},"modified":"2024-10-03T14:34:07","modified_gmt":"2024-10-03T14:34:07","slug":"home-sweet-home-increasingly-at-risk-of-cyber-attack","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/","title":{"rendered":"Home sweet home, increasingly at risk of cyber attack!"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-l-antico-mito-della-privacy-casalinga-cede-il-passo-agli-sguardi-indiscreti-della-rete\"><em>The old myth of home privacy gives way to the prying eyes of the Net.<\/em><\/h2>\n\n<p>From a nest of rest and privacy, protected from the world&#8217;s gaze, to a place that exposes us to prying eyes hunting for our secrets.\nFrom the traditional four walls impenetrable by strangers to a space overlooking the largely unknown world of the web. <strong>This is the metamorphosis (or evolution, depending on one&#8217;s point of view) that the traditional concept of &#8220;home,&#8221; which today is increasingly &#8220;smart,&#8221; is undergoing.<\/strong> <\/p>\n\n<p>After all, raise your hand if you are not subject to the fascination of technology and artificial intelligence tools.  <br\/>Particularly within one&#8217;s own home where it is now enough to press a button or express a voice command without even getting up from the sofa to relieve us from the inconvenience of many daily chores: starting the washing machine, turning on the TV, operating the heating even remotely, and so on.\nA saving of time and energy that allows us, especially in moments of relaxation, to devote ourselves to more pleasant and rewarding activities.   <\/p>\n\n<p>In short, the smart home is undoubtedly a modern dream and, apparently, within the reach of many since, according to a recent report by the security company <a href=\"https:\/\/www.bitdefender.it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitfinder<\/a>, <strong>&#8220;an average household has 21 connected devices in their home.&#8221;<\/strong><\/p>\n\n<p>A figure that may seem like good news because it indicates how much people are keeping up with technology and innovation.<\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>But at the same time, <strong>Bitfinder<\/strong> suggests we also look at the flip side of the coin:<strong>the risk of privacy violations and increased vulnerability to cyber attacks<\/strong> to which these connections subject our private lives.<\/p>\n<\/blockquote>\n\n<p>In fact, again according to the report, <strong>home networks have experienced an average of more than 10 attacks every 24 hours targeting devices in the home over the past year, <\/strong>up from 8 attacks the previous year.<\/p>\n\n<p>According to the analysis, <strong>smart TVs<\/strong> had the highest number of vulnerabilities discovered (34 percent), followed by <strong>smart outlets (18 percent) and video surveillance cameras (13 percent).<\/strong><\/p>\n\n<p>The discrepancy between the vulnerability of televisions and other devices suggests that televisions may possess inherently complex systems or face unique security challenges that lead to more vulnerabilities per device.<\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>99.3 percent of attempts to exploit connected devices<\/strong> are based on common vulnerabilities and exposures already known and resolved, <em>&#8220;demonstrating the importance of applying security fixes and using the latest software<\/em>,&#8221; the cybersecurity firm points out.<\/p>\n<\/blockquote>\n\n<p>Indeed, the high number of vulnerabilities in televisions underscores the need for strong security measures in consumer electronics, particularly considering the potential risks associated with devices that often have access to sensitive information, have a long lifespan, and are tightly integrated with sensitive home network components (such as Nas devices or other mass storage media).<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-come-proteggersi\"><strong>How to protect yourself?<\/strong><\/h3>\n\n<p>Knowledge of the tools to defend against these risks is therefore paramount. <strong>Awareness and proper training remain the two most effective weapons<\/strong>.  <\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>In addition to these, it is good to follow a number of recommendations.<\/strong><\/p>\n<\/blockquote>\n\n<ul class=\"wp-block-list\">\n<li>Always make sure the devices&#8217; software is updated to the latest version.<\/li>\n\n\n\n<li>Do not use products that are no longer supported by their manufacturers and can no longer be updated.<\/li>\n\n\n\n<li>Disable functions that are not needed.  <\/li>\n\n\n\n<li>If you are not in the habit of using microphones or webcams in your Smart TV, disable them to reactivate them only when needed.\nIf you do not have to perform automatic payment transactions with a device, avoid providing credit card and e-wallet information. <\/li>\n\n\n\n<li>Always beware of personal<strong>, <\/strong>confidential or even sensitive data, &#8220;special data&#8221; as defined by the GDPR, being captured and shared on the network by the device.<\/li>\n\n\n\n<li>When the configuration allows, always set up an encrypted connection<strong>. <\/strong>Be wary of devices that do not allow such communication and that transfer information &#8220;in the clear.&#8221;<\/li>\n\n\n\n<li>Change default passwords to strong passwords.\nNot all IoT systems allow the use of special characters, but almost all allow combinations of alphanumeric characters, upper and lower case, and numbers.\nTherefore, try to create combinations that are not easy to guess.  <\/li>\n\n\n\n<li>Change some manufacturer defaults when this is possible, such as the name by which that device shows up on the network or the communication port.\nTo protect yourself better invest some time to understand the meaning of some configuration fields. <\/li>\n\n\n\n<li>Be careful not to leave transportable devices unattended.\nTheft could result in the loss of personal data, especially if access to the device is not adequately protected. <\/li>\n\n\n\n<li>For home devices, remember that these connect to the network by taking advantage of the router, to which they will, in most cases, connect using Wi-Fi.\nAlways remember the importance of configuring your home router to customize the configuration set by the manufacturer or network service provider.\nIn particular, it is considered an essential measure to change the login credentials, especially the password.  <\/li>\n\n\n\n<li>Finally, watch out for maintenance.\nThere is a tendency in this particular market to continually release new models, and this leads many manufacturers to not maintain older models.\nPeriodic Internet searches, with reference to manufacturers&#8217; sites, can help you check whether updates and support are still active.\nBe wary of those manufacturers that do not have well-structured Internet sites.   <\/li>\n<\/ul>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>In general, awareness of the risks in using these tools is essential to avoid running into bad adventures.<\/p>\n<\/blockquote>\n\n<p>Always be very careful about the transactions you make online especially if these can jeopardize sensitive data.  <\/p>\n\n<p>A smart home can certainly be very convenient and can give us conveniences that were unthinkable just a few years ago, but to really enjoy it, it is necessary to gain proper digital posture through targeted and quality training.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The old myth of home privacy gives way to the prying eyes of the Net. From a nest of rest and privacy, protected from the world&#8217;s gaze, to a place that exposes us to prying eyes hunting for our secrets. From the traditional four walls impenetrable by strangers to a space overlooking the largely unknown [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":39564,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[470],"class_list":["post-39568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","tag-cyber-security-awareness-en-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Home sweet home, increasingly at risk of cyber attack!<\/title>\n<meta name=\"description\" content=\"Smart home at cyber risk: learn how technology and artificial intelligence are transforming the concept of the traditional home.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home sweet home, increasingly at risk of cyber attack!\" \/>\n<meta property=\"og:description\" content=\"Smart home at cyber risk: learn how technology and artificial intelligence are transforming the concept of the traditional home.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T09:11:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-03T14:34:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/casa-dolce-casa-.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"simona derubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"simona derubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/\"},\"author\":{\"name\":\"simona derubis\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"headline\":\"Home sweet home, increasingly at risk of cyber attack!\",\"datePublished\":\"2024-09-09T09:11:00+00:00\",\"dateModified\":\"2024-10-03T14:34:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/\"},\"wordCount\":935,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/casa-dolce-casa-.webp\",\"keywords\":[\"Cyber Security Awareness\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/\",\"name\":\"Home sweet home, increasingly at risk of cyber attack!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/casa-dolce-casa-.webp\",\"datePublished\":\"2024-09-09T09:11:00+00:00\",\"dateModified\":\"2024-10-03T14:34:07+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"description\":\"Smart home at cyber risk: learn how technology and artificial intelligence are transforming the concept of the traditional home.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/casa-dolce-casa-.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/casa-dolce-casa-.webp\",\"width\":1200,\"height\":688,\"caption\":\"casa-smart-rischio-cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/09\\\/09\\\/home-sweet-home-increasingly-at-risk-of-cyber-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home sweet home, increasingly at risk of cyber attack!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\",\"name\":\"simona derubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"caption\":\"simona derubis\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/simona-derubis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Home sweet home, increasingly at risk of cyber attack!","description":"Smart home at cyber risk: learn how technology and artificial intelligence are transforming the concept of the traditional home.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/","og_locale":"en_US","og_type":"article","og_title":"Home sweet home, increasingly at risk of cyber attack!","og_description":"Smart home at cyber risk: learn how technology and artificial intelligence are transforming the concept of the traditional home.","og_url":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2024-09-09T09:11:00+00:00","article_modified_time":"2024-10-03T14:34:07+00:00","og_image":[{"width":1200,"height":688,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/casa-dolce-casa-.webp","type":"image\/webp"}],"author":"simona derubis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"simona derubis","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/"},"author":{"name":"simona derubis","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"headline":"Home sweet home, increasingly at risk of cyber attack!","datePublished":"2024-09-09T09:11:00+00:00","dateModified":"2024-10-03T14:34:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/"},"wordCount":935,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/casa-dolce-casa-.webp","keywords":["Cyber Security Awareness"],"articleSection":["Security Awareness"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/","url":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/","name":"Home sweet home, increasingly at risk of cyber attack!","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/casa-dolce-casa-.webp","datePublished":"2024-09-09T09:11:00+00:00","dateModified":"2024-10-03T14:34:07+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"description":"Smart home at cyber risk: learn how technology and artificial intelligence are transforming the concept of the traditional home.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/casa-dolce-casa-.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/casa-dolce-casa-.webp","width":1200,"height":688,"caption":"casa-smart-rischio-cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2024\/09\/09\/home-sweet-home-increasingly-at-risk-of-cyber-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Home sweet home, increasingly at risk of cyber attack!"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484","name":"simona derubis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","caption":"simona derubis"},"url":"https:\/\/www.cyberguru.it\/en\/author\/simona-derubis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/39568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=39568"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/39568\/revisions"}],"predecessor-version":[{"id":39569,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/39568\/revisions\/39569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/39564"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=39568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=39568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=39568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}