{"id":734,"date":"2021-07-30T12:44:48","date_gmt":"2021-07-30T12:44:48","guid":{"rendered":"https:\/\/www.cybersurvivalgame.ch\/?page_id=734"},"modified":"2022-12-09T14:21:53","modified_gmt":"2022-12-09T14:21:53","slug":"minacce-e-power-up","status":"publish","type":"page","link":"https:\/\/www.cybersurvivalgame.ch\/?page_id=734","title":{"rendered":"Minacce e Power-up"},"content":{"rendered":"\n<div class=\"wp-block-cover aligncenter is-light\" style=\"min-height:198px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><video class=\"wp-block-cover__video-background intrinsic-ignore\" autoplay muted loop playsinline src=\"https:\/\/www.cybersurvivalgame.ch\/wp-content\/uploads\/2022\/12\/SfondoVideo.mp4\" data-object-fit=\"cover\"><\/video><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n<div class=\"gb-container gb-container-848ffd28\"><div class=\"gb-inside-container\">\n\n\t\t\t<div class=\"uagb-post-grid  uagb-post__image-position-top uagb-block-03b5b7fe   \" data-total=\"1\">\n\n\t\t\t\t<div class=\"uagb-post__items uagb-post__columns-2 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\">\n\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=798\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Aggiornamento software<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tL&#8217;aggiornamento del software \u00e8 fondamentale per garantire la sicurezza e la stabilit\u00e0 del sistema operativo e delle applicazioni installate sul computer o sul cellulare. I \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=798\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=796\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Antivirus<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tL&#8217;installazione di un antivirus \u00e8 essenziale per proteggere il computer o il cellulare da virus, malware e altre minacce informatiche. Un antivirus protegge il dispositivo \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=796\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=779\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Backdoor<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tUna backdoor \u00e8 una funzione nascosta all&#8217;interno di un sistema informatico che consente l&#8217;accesso non autorizzato al sistema saltando le normali protezioni. Le backdoor possono \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=779\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=794\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Backup<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\t\u00c8 fondamentale fare regolarmente il backup dei dati del computer o del cellulare per proteggere le informazioni e prevenirne la perdita in caso di guasto \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=794\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=790\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Blocca schermo<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tL&#8217;utilizzo del blocca schermo \u00e8 una misura importante per proteggere i dati personali e la privacy su un computer, quando ci assentiamo, o su un \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=790\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=783\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Botnet<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tUna botnet \u00e8 una rete di computer infettati da malware e controllati a distanza da un unico individuo o da un&#8217;organizzazione, senza il consenso dei \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=783\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=740\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Cyberbullismo<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tIl cyberbullismo \u00e8 un fenomeno che consiste nell&#8217;utilizzare strumenti telematici come la posta elettronica, i messaggi istantanei o la diffusione di foto personali per molestare \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=740\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=766\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Diffamazione<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tLa diffamazione attraverso canali elettronici \u00e8 un fenomeno in cui informazioni false o fuorvianti vengono diffuse su larga scala per danneggiare l&#8217;immagine di una persona \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=766\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=768\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Diffusione di informazioni riservate<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tLa diffusione di informazioni riservate, sia a livello privato che aziendale, pu\u00f2 causare danni significativi alla privacy e alla reputazione delle persone e delle aziende \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=768\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=764\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Furto d&#8217;informazioni<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tIl furto di informazioni \u00e8 un&#8217;attivit\u00e0 criminale in cui un individuo o un&#8217;organizzazione sottrae informazioni sensibili a un&#8217;altra persona o a un&#8217;azienda per trarre profitto. \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=764\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=787\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Furto dispositivo<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tIl furto o lo smarrimento di un dispositivo come un computer portatile o un cellulare pu\u00f2 essere una minaccia per la sicurezza delle informazioni in \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=787\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=770\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Malfunzionamento<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tIl malfunzionamento delle apparecchiature elettroniche, come i computer e i cellulari, pu\u00f2 essere causato da una serie di fattori, tra cui guasti tecnici interni, errori \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=770\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=756\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Malware<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tIl malware \u00e8 un tipo di software malevolo che pu\u00f2 essere installato su un computer o un cellulare senza il consenso dell&#8217;utente, allo scopo di \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=756\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=792\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Password sicura<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tUna password sicura deve essere composta da una combinazione di lettere maiuscole e minuscole, numeri e caratteri speciali con una lunghezza di almeno 12 caratteri \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=792\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=785\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Perdita di dati<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tLa perdita di dati si verifica quando un utente o un sistema non \u00e8 in grado di accedere alle informazioni memorizzate in un dispositivo di \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=785\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=750\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Phishing<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tIl phishing \u00e8 un tipo di truffa in cui si cerca di ingannare le vittime con falsi messaggi di posta elettronica. Questi messaggi, spesso mascherati \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=750\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=758\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Pretexting<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tIl pretexting \u00e8 un tipo di attacco che mira a ottenere informazioni private da una vittima ingannandola con una falsa motivazione o un pretesto. Gli \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=758\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=760\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Raccolta dati per pianificazione attacchi<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tLa raccolta di informazioni per la pianificazione di attacchi pu\u00f2 essere effettuata utilizzando diverse tecniche. Possono consistere nel convincere le persone a dare involontariamente informazioni \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=760\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=732\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Ransomware<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tIl ransomware \u00e8 un tipo di malware che cripta i dati dell&#8217;utente e richiede un riscatto per ripristinarli. Solitamente, si diffonde tramite allegati di email \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=732\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=772\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Rischi delle comunicazioni<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tTutte le comunicazioni elettroniche, come la posta elettronica, le comunicazioni audio, gli SMS e la messaggistica istantanea, possono essere vulnerabili all&#8217;intercettazione da parte di terze \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=772\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=752\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Spear phishing<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tLo spear phishing \u00e8 una forma di attacco altamente mirato in cui i criminali informatici tentano di ingannare un dipendente di un&#8217;azienda o di un&#8217;organizzazione \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=752\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=781\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Spyware<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tLo spyware \u00e8 un tipo di software malevolo che pu\u00f2 essere installato su un computer o un cellulare senza il consenso dell&#8217;utente. Una volta installato, \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=781\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=777\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Trojan<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tUn Trojan horse (o semplicemente Trojan) \u00e8 un tipo di software malevolo che si nasconde all&#8217;interno di un altro programma apparentemente innocuo o utile, scaricato \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=777\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=744\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Truffe finanziarie<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tLe truffe finanziarie sono un tipo di furto che si basa sull&#8217;inganno delle vittime, facendo credere di poter ottenere un guadagno. Un esempio \u00e8 la \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=744\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=762\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Truffe sentimentali ed emotive<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tLe truffe sentimentali ed emotive sono un tipo di truffa che sfrutta l&#8217;empatia e la vulnerabilit\u00e0 di una vittima fragile per ottenere denaro o informazioni \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=762\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=748\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Vincita a lotteria fasulla<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tLa vincita a lotteria fasulla \u00e8 un tipo di truffa basata sull&#8217;inganno della vittima, facendole credere di aver vinto una grossa somma di denaro. La \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=748\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=775\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Virus<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tUn virus informatico \u00e8 un tipo di software malevolo che pu\u00f2 infettare un computer o un cellulare, causando danni alla vittima. I virus informatici sono \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=775\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<article >\n\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post__inner-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<h3 class=\"uagb-post__title\">\n\t\t\t\t\t<a href=\"https:\/\/www.cybersurvivalgame.ch\/?p=754\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Vishing\/Smishing<\/a>\n\t\t\t\t<\/h3>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t<div class=\"uagb-post-grid-byline\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t\t<div class=\"uagb-post__excerpt\">\n\t\t\t\t\t\tIl vishing e lo smishing sono due tipi di truffe che utilizzano il telefono per ingannare le vittime. Nel vishing, i truffatori si fingono operatori \u2026\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class='uagb-post__text'> \n\t\t\t\t<div class=\"uagb-post__cta\">\n\t\t\t\t\t<a class=\"uagb-post__link uagb-text-link\" href=\"https:\/\/www.cybersurvivalgame.ch\/?p=754\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Read More<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_generate-full-width-content":"","footnotes":""},"class_list":["post-734","page","type-page","status-publish"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/www.cybersurvivalgame.ch\/?author=1"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.cybersurvivalgame.ch\/index.php?rest_route=\/wp\/v2\/pages\/734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersurvivalgame.ch\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cybersurvivalgame.ch\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersurvivalgame.ch\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersurvivalgame.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=734"}],"version-history":[{"count":7,"href":"https:\/\/www.cybersurvivalgame.ch\/index.php?rest_route=\/wp\/v2\/pages\/734\/revisions"}],"predecessor-version":[{"id":1163,"href":"https:\/\/www.cybersurvivalgame.ch\/index.php?rest_route=\/wp\/v2\/pages\/734\/revisions\/1163"}],"wp:attachment":[{"href":"https:\/\/www.cybersurvivalgame.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}