{"id":12286,"date":"2021-07-09T08:54:39","date_gmt":"2021-07-09T06:54:39","guid":{"rendered":"https:\/\/news.save.ch\/?p=12286"},"modified":"2023-07-16T19:26:01","modified_gmt":"2023-07-16T17:26:01","slug":"schutz-vor-trojanischen-pferden","status":null,"type":"post","link":"https:\/\/news.save.ch\/it\/schutz-vor-trojanischen-pferden\/","title":{"rendered":"Protezione dai cavalli di Troia"},"content":{"rendered":"<figure id=\"attachment_12288\" aria-describedby=\"caption-attachment-12288\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-12288 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/07\/Trojanhorse_pixabay_teaser.jpg\" alt=\"\" width=\"680\" height=\"435\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/07\/Trojanhorse_pixabay_teaser.jpg 960w, https:\/\/news.save.ch\/wp-content\/uploads\/2021\/07\/Trojanhorse_pixabay_teaser-375x240.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-12288\" class=\"wp-caption-text\">\u00a9Pixabay<\/figcaption><\/figure>\n<p>Secondo i campioni casuali della societ\u00e0 di consulenza informatica IoT-Inspector di Bad Homburg, il 50% dei dispositivi presenta spesso vulnerabilit\u00e0 evidenti che consentirebbero un attacco hacker all'intera infrastruttura di sistema. \u00c8 necessario prestare particolare attenzione all'acquisto di stampanti, router, telecamere di sicurezza e opzioni di illuminazione. Gli hacker conoscono le vulnerabilit\u00e0 e amano sfruttarle. Secondo IoT-Inspector, in ogni dispositivo sono presenti in media componenti software di oltre dieci produttori diversi, i cosiddetti produttori OEM. In una dettagliata lista di controllo, la societ\u00e0 di consulenza informatica consiglia i seguenti suggerimenti per la sicurezza:<\/p>\n<ul>\n<li>In primo luogo, \u00e8 necessario effettuare una valutazione delle esigenze di protezione e un'analisi delle minacce per stabilire linee guida chiare per la sicurezza dell'IoT.<\/li>\n<li>Definizione di requisiti tecnici di sicurezza concreti per gli appalti. Questi sono registrati in una specifica di sicurezza e devono essere implementati in modo verificabile dal produttore. Una guida in tal senso \u00e8 fornita da specifiche internazionali come ISA\/IEC 62443 o ETSI 303 645. Inoltre, esistono piattaforme di approvvigionamento incentrate sulla sicurezza da cui \u00e8 possibile trarre testi concreti di approvvigionamento.<\/li>\n<li>Verifica dell'affidabilit\u00e0 e della diligenza del produttore nel contesto dello sviluppo di hardware e software. Per orientarsi, i modelli di maturit\u00e0 consolidati come <a href=\"https:\/\/owasp.org\/www-project-samm\/\" target=\"_blank\" rel=\"noopener\">OWASP SAMM<\/a> o <a href=\"https:\/\/www.bsimm.com\/\" target=\"_blank\" rel=\"noopener\">BSIMM<\/a>. Il produttore deve dimostrare di aver implementato il livello di maturit\u00e0 richiesto - a seconda delle esigenze di protezione del dispositivo - per tutte le attivit\u00e0 di sviluppo.<\/li>\n<li>Esecuzione di test di sicurezza automatizzati del firmware dell'unit\u00e0, sia in fase di accettazione che a intervalli fissi, al fine di rilevare eventuali nuove vulnerabilit\u00e0 introdotte dagli aggiornamenti del firmware.<\/li>\n<li>Gli audit Whitebox sono raccomandati in base alla <a href=\"https:\/\/owasp.org\/www-project-internet-of-things\/\" target=\"_blank\" rel=\"noopener\">Guide di test OWASP IoT<\/a>.<br \/>\nRichiedere al produttore una garanzia scritta che tutti i requisiti di sicurezza definiti siano stati rispettati.<\/li>\n<li>Revisione della documentazione sulla sicurezza creata durante lo sviluppo del software (ad esempio, documentazione sull'architettura di sicurezza, analisi del flusso di dati, risultati dei test di sicurezza interni del produttore).<\/li>\n<li>Se un dispositivo IoT accede a informazioni riservate o viene utilizzato in aree particolarmente vulnerabili, \u00e8 necessario condurre una revisione completa del codice sorgente di sicurezza del firmware, nonch\u00e9 una revisione della sicurezza fisica del dispositivo IoT stesso, concentrandosi sulle backdoor nascoste nel software e nell'hardware.<\/li>\n<\/ul>\n<p>Per le parti interessate, IoT Inspector offre un <a href=\"https:\/\/www.iot-inspector.com\/de\/blog\/whitepaper-beschaffung-sicherer-iot-geraete-fuer-unternehmen\/\" target=\"_blank\" rel=\"noopener\">Carta bianca<\/a> scaricare.<\/p>\n<p><em>Fonte: IoT Inspector GmbH<\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Stichproben der IT-Beratungsfirma IoT-Inspector aus Bad Homburg zufolge weisen oft 50 Prozent an Ger\u00e4ten eklatante Schwachstellen auf, die einen Hackerangriff auf die ganze Systeminfrastruktur zulassen w\u00fcrden. Besonders bei der Beschaffung von Druckern, Routern, Sicherheitskameras und Beleuchtungsoptionen sei Vorsicht geboten. Die Hacker kennen die Schwachstellen und nutzen diese gerne aus. Laut IoT-Inspector stecken in jedem Ger\u00e4t [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":12288,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[1,3313],"tags":[657,4601,5454,461,5453,3634,337],"class_list":["post-12286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","category-digitalisierung","tag-cyber-security","tag-firmware","tag-hersteller","tag-iot","tag-iot-geraete","tag-schwachstellen","tag-sicherheitstipps"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"1","_yoast_wpseo_focuskw_text_input":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Schutz vor trojanischen Pferden - Save<\/title>\n<meta name=\"description\" content=\"Nicht alle Router, Drucker oder Smart Devices sind sicher, ein Grossteil gef\u00e4hrdet die gesamte IT. Die IoT-Firmware-Analysten von IoT Inspector haben einige hilfreiche Tipps, wie ein angemessener Schutz der IoT-Infrastruktur erreicht werden kann.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/it\/schutz-vor-trojanischen-pferden\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schutz vor trojanischen Pferden - Save\" \/>\n<meta property=\"og:description\" content=\"Nicht alle Router, Drucker oder Smart Devices sind sicher, ein Grossteil gef\u00e4hrdet die gesamte IT. Die IoT-Firmware-Analysten von IoT Inspector haben einige hilfreiche Tipps, wie ein angemessener Schutz der IoT-Infrastruktur erreicht werden kann.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/it\/schutz-vor-trojanischen-pferden\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-09T06:54:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-16T17:26:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/07\/Trojanhorse_pixabay_teaser.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"614\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Gr\u00f6flin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Gr\u00f6flin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/\"},\"author\":{\"name\":\"Simon Gr\u00f6flin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/ad4ef21102fd6125312409ac57d5296d\"},\"headline\":\"Schutz vor trojanischen Pferden\",\"datePublished\":\"2021-07-09T06:54:39+00:00\",\"dateModified\":\"2023-07-16T17:26:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/\"},\"wordCount\":339,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Trojanhorse_pixabay_teaser.jpg\",\"keywords\":[\"Cyber-Security\",\"Firmware\",\"Hersteller\",\"IoT\",\"IoT-Ger\u00e4te\",\"Schwachstellen\",\"Sicherheitstipps\"],\"articleSection\":[\"ALLGEMEIN\",\"DIGITALISIERUNG\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/\",\"name\":\"Schutz vor trojanischen Pferden - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Trojanhorse_pixabay_teaser.jpg\",\"datePublished\":\"2021-07-09T06:54:39+00:00\",\"dateModified\":\"2023-07-16T17:26:01+00:00\",\"description\":\"Nicht alle Router, Drucker oder Smart Devices sind sicher, ein Grossteil gef\u00e4hrdet die gesamte IT. Die IoT-Firmware-Analysten von IoT Inspector haben einige hilfreiche Tipps, wie ein angemessener Schutz der IoT-Infrastruktur erreicht werden kann.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Trojanhorse_pixabay_teaser.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Trojanhorse_pixabay_teaser.jpg\",\"width\":960,\"height\":614,\"caption\":\"\u00a9Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/schutz-vor-trojanischen-pferden\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Schutz vor trojanischen Pferden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/ad4ef21102fd6125312409ac57d5296d\",\"name\":\"Simon Gr\u00f6flin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"caption\":\"Simon Gr\u00f6flin\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/it\\\/author\\\/simon-groeflin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protezione dai cavalli di Troia - Salva","description":"Non tutti i router, le stampanti o i dispositivi intelligenti sono sicuri; una buona parte mette a rischio l'intero sistema informatico. Gli analisti del firmware IoT di IoT Inspector hanno alcuni consigli utili su come ottenere una protezione adeguata dell'infrastruttura IoT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/it\/schutz-vor-trojanischen-pferden\/","og_locale":"it_IT","og_type":"article","og_title":"Schutz vor trojanischen Pferden - Save","og_description":"Nicht alle Router, Drucker oder Smart Devices sind sicher, ein Grossteil gef\u00e4hrdet die gesamte IT. Die IoT-Firmware-Analysten von IoT Inspector haben einige hilfreiche Tipps, wie ein angemessener Schutz der IoT-Infrastruktur erreicht werden kann.","og_url":"https:\/\/news.save.ch\/it\/schutz-vor-trojanischen-pferden\/","og_site_name":"Save","article_published_time":"2021-07-09T06:54:39+00:00","article_modified_time":"2023-07-16T17:26:01+00:00","og_image":[{"width":960,"height":614,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/07\/Trojanhorse_pixabay_teaser.jpg","type":"image\/jpeg"}],"author":"Simon Gr\u00f6flin","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Simon Gr\u00f6flin","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/"},"author":{"name":"Simon Gr\u00f6flin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/ad4ef21102fd6125312409ac57d5296d"},"headline":"Schutz vor trojanischen Pferden","datePublished":"2021-07-09T06:54:39+00:00","dateModified":"2023-07-16T17:26:01+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/"},"wordCount":339,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/07\/Trojanhorse_pixabay_teaser.jpg","keywords":["Cyber-Security","Firmware","Hersteller","IoT","IoT-Ger\u00e4te","Schwachstellen","Sicherheitstipps"],"articleSection":["ALLGEMEIN","DIGITALISIERUNG"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/","url":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/","name":"Protezione dai cavalli di Troia - Salva","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/07\/Trojanhorse_pixabay_teaser.jpg","datePublished":"2021-07-09T06:54:39+00:00","dateModified":"2023-07-16T17:26:01+00:00","description":"Non tutti i router, le stampanti o i dispositivi intelligenti sono sicuri; una buona parte mette a rischio l'intero sistema informatico. Gli analisti del firmware IoT di IoT Inspector hanno alcuni consigli utili su come ottenere una protezione adeguata dell'infrastruttura IoT.","breadcrumb":{"@id":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/07\/Trojanhorse_pixabay_teaser.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/07\/Trojanhorse_pixabay_teaser.jpg","width":960,"height":614,"caption":"\u00a9Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/schutz-vor-trojanischen-pferden\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Schutz vor trojanischen Pferden"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Risparmiare","description":"Rivista svizzera specializzata in sicurezza","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sulla sicurezza","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/ad4ef21102fd6125312409ac57d5296d","name":"Simon Gr\u00f6flin","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","caption":"Simon Gr\u00f6flin"},"url":"https:\/\/news.save.ch\/it\/author\/simon-groeflin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/12286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/comments?post=12286"}],"version-history":[{"count":2,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/12286\/revisions"}],"predecessor-version":[{"id":20976,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/12286\/revisions\/20976"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media\/12288"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media?parent=12286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/categories?post=12286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/tags?post=12286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}