{"id":26964,"date":"2017-01-03T16:00:51","date_gmt":"2017-01-03T16:00:51","guid":{"rendered":"http:\/\/blog.parallels.com\/?p=31947"},"modified":"2017-01-03T16:00:51","modified_gmt":"2017-01-03T16:00:51","slug":"phishers-pretending-to-be-apple","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/phishers-pretending-to-be-apple\/","title":{"rendered":"Phishers pretending to be Apple"},"content":{"rendered":"<p>In my opinion, one of the most despicable types of computer criminals today is the phisher. As Wikipedia explains: &#8220;Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication\u2026\u00a0Phishing is typically carried [&#8230;]<\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/blog.parallels.com\/2017\/01\/03\/phishers\/\">Phishers pretending to be Apple<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/blog.parallels.com\/\">Parallels Blog<\/a>.<\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/parallels\/XFIF?a=4vXryucS1uo:_RJ0CSDduvQ:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/parallels\/XFIF?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In my opinion, one of the most despicable types of computer criminals today is the phisher. As Wikipedia explains: &ldquo;Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication&hellip;&nbsp;Phishing is typically carried [&#8230;]<\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/blog.parallels.com\/2017\/01\/03\/phishers\/\">Phishers pretending to be Apple<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/blog.parallels.com\/\">Parallels Blog<\/a>.<\/p>\n<div>\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/parallels\/XFIF?a=4vXryucS1uo:_RJ0CSDduvQ:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/parallels\/XFIF?d=yIl2AUoC8zA\" border=\"0\"><\/a>\n<\/div>\n","protected":false},"author":100,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[259,4691,4692,2398,1937,2447,3142,4525,4693,912,4694],"tags":[],"class_list":["post-26964","post","type-post","status-publish","format-standard","hentry","category-apple","category-computer-criminals","category-email-spoofing","category-parallels-business-solutions","category-parallels-desktop-for-mac","category-parallels-mac-management","category-parallels-remote-application-server","category-parallels-toolbox","category-phishers","category-phishing","category-phishing-email"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/26964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/100"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=26964"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/26964\/revisions"}],"predecessor-version":[{"id":26965,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/26964\/revisions\/26965"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=26964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=26964"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=26964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}