{"version":"1.0","provider_name":"Expert in Cyber Security and Computer Repair Services","provider_url":"https:\/\/tncomputermedics.com","author_name":"tncm","author_url":"https:\/\/tncomputermedics.com\/author\/e4572b8864bd281d\/","title":"Understanding Social Engineering and Its Various Attack Types","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"DBNrKs5z9R\"><a href=\"https:\/\/tncomputermedics.com\/understanding-social-engineering-and-its-various-attack-types\/\">Understanding Social Engineering and Its Various Attack Types<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/tncomputermedics.com\/understanding-social-engineering-and-its-various-attack-types\/embed\/#?secret=DBNrKs5z9R\" width=\"600\" height=\"338\" title=\"&#8220;Understanding Social Engineering and Its Various Attack Types&#8221; &#8212; Expert in Cyber Security and Computer Repair Services\" data-secret=\"DBNrKs5z9R\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Understanding-Social-Engineering-and-Its-Various-Attack-Types.png","thumbnail_width":1600,"thumbnail_height":900,"description":"It is widely understood that there are individuals who possess advanced technical skills and use them to gain unauthorized access to secure computer systems, putting valuable data at risk. This particular type of malicious actor frequently makes headlines. However, there are other individuals or groups that are also attracting attention. Similarly, there are individuals known as &#8220;social engineers&#8221; who employ various methods, such as phone calls and other media, to[&hellip;]"}