{"version":"1.0","provider_name":"kw022024","provider_url":"https:\/\/itegriti.com\/kw022024","title":"Cybersecurity Implications of 5G Technology","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"RiE9TyFiYO\"><a href=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/\">Cybersecurity Implications of 5G Technology<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/embed\/#?secret=RiE9TyFiYO\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity Implications of 5G Technology&#8221; &#8212; kw022024\" data-secret=\"RiE9TyFiYO\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg","thumbnail_width":800,"thumbnail_height":450,"description":"Cyber threats are an area of concern for 5G technologies. Even though the entire infrastructure is different from its predecessors, there are still security holdovers from the earlier communication generations that have not been addressed."}