{"version":"1.0","provider_name":"MozDomains Blog","provider_url":"https:\/\/www.mozdomains.co.mz\/blog\/en","author_name":"Momed Jussub","author_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/","title":"3 Ways To Spot Malicious Websites - MozDomains Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"UbpWtbWs8u\"><a href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/3-ways-to-spot-malicious-websites\/\">3 Ways To Spot Malicious Websites<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/3-ways-to-spot-malicious-websites\/embed\/#?secret=UbpWtbWs8u\" width=\"600\" height=\"338\" title=\"&#8220;3 Ways To Spot Malicious Websites&#8221; &#8212; MozDomains Blog\" data-secret=\"UbpWtbWs8u\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/Computer_hacker_security_attack_thumb800.jpg","thumbnail_width":800,"thumbnail_height":450,"description":"Phishing scams have brought in serious concerns as hackers use it to steal information by diverting users to\u00a0malicious websites. Phishing scams use attractive advertisements as a bait which is too good to believe, while the users get tricked into clicking such advertisement links and get directed to the\u00a0malicious websites. With curiosity gushing in, most of us click on the malicious link or attachment, later to realize that the mail containing the link\/attachment is a scam. The result of which would be giving away information to the malware author and hence loss of data, or it might be used to find\u2026"}