{"version":"1.0","provider_name":"ITU","provider_url":"https:\/\/www.itu.int\/hub","author_name":"ITU News","author_url":"https:\/\/www.itu.int\/hub\/author\/itu-news\/","title":"How to address new Smart City vulnerabilities: report - ITU","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"j6XwWGfSJw\"><a href=\"https:\/\/www.itu.int\/hub\/2020\/05\/how-to-address-new-smart-city-vulnerabilities-report\/\">How to address new Smart City vulnerabilities: report<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.itu.int\/hub\/2020\/05\/how-to-address-new-smart-city-vulnerabilities-report\/embed\/#?secret=j6XwWGfSJw\" width=\"600\" height=\"338\" title=\"&#8220;How to address new Smart City vulnerabilities: report&#8221; &#8212; ITU\" data-secret=\"j6XwWGfSJw\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.itu.int\/hub\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.itu.int\/hub\/wp-content\/uploads\/sites\/4\/2020\/05\/How-to-address-new-Smart-City-vulnerabilities.jpg","thumbnail_width":1110,"thumbnail_height":476,"description":"Vulnerabilities abound in citywide smart systems, but the consequences of their being hacked will be much farther-reaching and potentially much more devastating than an attack on an individual consumer smart device (although citywide and even national cyber attacks can be originated via compromised consumer devices such as unprotected smart thermostats)."}