{"version":"1.0","provider_name":"Business Yield Technology","provider_url":"https:\/\/businessyield.com\/tech","title":"What Is a Common Indicator of a Phishing Attempt?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MpYGP0mapL\"><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/indicator-of-phishing-attempt\/\">What Is a Common Indicator of a Phishing Attempt?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/businessyield.com\/tech\/cyber-security\/indicator-of-phishing-attempt\/embed\/#?secret=MpYGP0mapL\" width=\"600\" height=\"338\" title=\"&#8220;What Is a Common Indicator of a Phishing Attempt?&#8221; &#8212; Business Yield Technology\" data-secret=\"MpYGP0mapL\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Indicator-of-Phishing-Attempt.jpg","thumbnail_width":740,"thumbnail_height":740,"description":"Phishing attempts stand out as a frequent and deceptive risk\u00a0in the large universe of cyber threats. In this comprehensive blog post, we will delve into the key indicators of phishing attempts, including common signs, spear phishing variations, and even specific indicators within Gmail."}