{"version":"1.0","provider_name":"McAfee Blog","provider_url":"https:\/\/www.mcafee.com\/blogs","author_name":"McAfee","author_url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/","title":"How to Squash the Android\/TimpDoor SMiShing Scam | McAfee Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"olUNwz8Oi7\"><a href=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/\">How to Squash the Android\/TimpDoor SMiShing Scam<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/embed\/#?secret=olUNwz8Oi7\" width=\"600\" height=\"338\" title=\"&#8220;How to Squash the Android\/TimpDoor SMiShing Scam&#8221; &#8212; McAfee Blog\" data-secret=\"olUNwz8Oi7\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg","thumbnail_width":600,"thumbnail_height":400,"description":"As technology becomes more advanced, so do cybercriminals\u2019 strategies for gaining access to our personal information. And while phishing scams have been around for over two decades, attackers have adapted their methods to \u201cbait\u201d victims through a variety of platforms."}