{"version":"1.0","provider_name":"McAfee Blog","provider_url":"https:\/\/www.mcafee.com\/blogs","author_name":"McAfee","author_url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/","title":"What the Mobile-Born Mean for IoT and Cybersecurity","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"GhkoeMzNOK\"><a href=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-born-iot-cybersecurity\/\">What the Mobile-Born Mean for IoT and Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-born-iot-cybersecurity\/embed\/#?secret=GhkoeMzNOK\" width=\"600\" height=\"338\" title=\"&#8220;What the Mobile-Born Mean for IoT and Cybersecurity&#8221; &#8212; McAfee Blog\" data-secret=\"GhkoeMzNOK\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg","thumbnail_width":200,"thumbnail_height":200,"description":"Since before they knew how to walk, Gen Z \u2013 or the mobile-born generation \u2013 has had a wealth of information, quite literally, at their fingertips. But Gen Z\u2019s haste to be on the cutting edge of technology and trends can often leave them arrogant to the security implications."}