{"id":14200,"date":"2016-10-27T14:34:40","date_gmt":"2016-10-27T12:34:40","guid":{"rendered":"https:\/\/dev.sicherheitsforum.ch\/?p=1022"},"modified":"2023-03-14T08:57:11","modified_gmt":"2023-03-14T07:57:11","slug":"iot-geraete-subito-gehackt","status":null,"type":"post","link":"https:\/\/news.save.ch\/it\/iot-geraete-subito-gehackt\/","title":{"rendered":"Dispositivi IoT violati subito"},"content":{"rendered":"<figure id=\"attachment_1026\" aria-describedby=\"caption-attachment-1026\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1026\" src=\"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/IoT-Ger\u00e4te-subito-gehackt-it-security.jpg\" alt=\"Dal rapporto &quot;IoT Enterprise Risk.\" width=\"680\" height=\"442\" \/><figcaption id=\"caption-attachment-1026\" class=\"wp-caption-text\">Dal rapporto \"IoT Enterprise Risk.<\/figcaption><\/figure>\n<p>\"L'IoT \u00e8 destinato a rimanere, ma la proliferazione e l'ubiquit\u00e0 di questi dispositivi aumenta notevolmente la superficie di attacco e fornisce agli hacker gateway facilmente sfruttabili\", spiega Michael DeCesare, Presidente e CEO, <a href=\"https:\/\/www.forescout.com\/\" data-cke-saved-href=\"https:\/\/www.forescout.com\/\">ForeScout Technologies, Inc.<\/a> \"La soluzione a questo problema inizia con la visibilit\u00e0, la trasparenza e il controllo continui dei dispositivi IoT in tempo reale, dal momento in cui si collegano alla rete. Perch\u00e9 non si pu\u00f2 proteggere ci\u00f2 che non si vede\".<\/p>\n<p>Samy Kamkar, uno dei pi\u00f9 noti hacker etici degli Stati Uniti, ha indagato per la <a href=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2016\/10\/iot-enterprise-risk-report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" data-cke-saved-href=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2016\/10\/iot-enterprise-risk-report.pdf\">Studio<\/a> sette dispositivi IoT comunemente utilizzati nelle aziende, come i sistemi di sicurezza connessi via IP, i condizionatori e i contatori di energia intelligenti, i sistemi di videoconferenza e le stampanti di rete. Sulla base di un test fisico e dell'analisi di ricerche indipendenti di settore, Kamkar conclude che questi dispositivi rappresentano un rischio significativo per le aziende, perch\u00e9 per lo pi\u00f9 mancano di funzioni di sicurezza integrate. Per i dispositivi che disponevano di funzioni di sicurezza rudimentali, Kamkar ha scoperto che molti erano dotati di un firmware pericolosamente obsoleto.<\/p>\n<p>Nell'ambito della sua indagine, Kamkar \u00e8 entrato fisicamente in una telecamera di sorveglianza di rete progettata per le aziende. La fotocamera non \u00e8 stata modificata in alcun modo ed era dotata dell'ultimo firmware del produttore. Tuttavia, si \u00e8 rivelato vulnerabile e alla fine ha permesso l'installazione di una backdoor che poteva essere controllata dall'esterno della rete. Per vedere l'intero attacco di hacking, visitate il sito <a href=\"https:\/\/www.youtube.com\/watch?v=CeTILnlh2ek&amp;feature=youtu.be\" data-cke-saved-href=\"https:\/\/www.youtube.com\/watch?v=CeTILnlh2ek&amp;feature=youtu.be\">qui <\/a>click.<\/p>\n<p><strong>I risultati pi\u00f9 importanti dell'\"IoT Enterprise Risk Report\": <\/strong><\/p>\n<ul>\n<li>I sette dispositivi IoT studiati possono essere violati in soli tre minuti, mentre la risoluzione del problema pu\u00f2 richiedere giorni o settimane.<\/li>\n<\/ul>\n<ul>\n<li>Se un dispositivo di questo tipo viene infettato, gli hacker possono impostare delle backdoor per sviluppare e lanciare un attacco DDoS automatizzato di botnet IoT.<\/li>\n<\/ul>\n<ul>\n<li>Utilizzando tecniche di jamming o spoofing, i cybercriminali possono introdursi nei sistemi di sicurezza intelligenti delle aziende e prendere cos\u00ec il controllo di rilevatori di movimento, serrature e tecnologie di sorveglianza.<\/li>\n<\/ul>\n<ul>\n<li>Con i telefoni VoIP, le impostazioni di configurazione possono essere sfruttate per aggirare l'autenticazione, dando agli aggressori la possibilit\u00e0 di ascoltare e registrare le conversazioni telefoniche.<\/li>\n<\/ul>\n<ul>\n<li>Gli hacker possono utilizzare i sistemi di condizionamento dell'aria e i contatori di energia collegati in rete per surriscaldare le infrastrutture critiche in ambienti critici (ad esempio le sale server) e causare cos\u00ec danni fisici.<\/li>\n<\/ul>\n<p>L'IoT sta proliferando e non c'\u00e8 alcun segno di rallentamento di questa tendenza. Entro il 2020 si prevedono 20 miliardi di dispositivi connessi e fino a un terzo di questi potrebbe essere in uso con vulnerabilit\u00e0 non rilevate nelle reti di aziende, agenzie governative, strutture sanitarie e attivit\u00e0 industriali. Gli hacker, a loro volta, possono facilmente utilizzare dispositivi insicuri come punto di ingresso in una rete sicura e, in ultima analisi, accedere ad altri sistemi aziendali che possono contenere dati bancari, file del personale o informazioni aziendali riservate.<\/p>\n<p><em><strong>Metodologia di ricerca: <\/strong>Per l'\"IoT Enterprise Risk Report\", ForeScout Technologies, Inc. si avvale delle conoscenze di Samy Kamkar, uno dei principali hacker White Hat del mondo. \u00c8 stato incaricato di studiare i rischi per la sicurezza posti dai dispositivi IoT negli ambienti aziendali. Lo studio mirava a scoprire le vulnerabilit\u00e0 delle tecnologie di livello aziendale, utilizzando sia test fisici che ricerche di settore sottoposte a revisione paritaria.<\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>\u201eDas IoT ist nicht mehr wegzudenken, doch die Verbreitung und Allgegenwart dieser Ger\u00e4te vergr\u00f6ssert die Angriffsfl\u00e4che enorm \u2013 und bietet Hackern leicht nutzbare Einfallstore\u201c, erkl\u00e4rt Michael DeCesare, Pr\u00e4sident und CEO, ForeScout Technologies, Inc. \u201eDie L\u00f6sung dieses Problems beginnt mit kontinuierlicher Sichtbarkeit, Transparenz und Kontrolle von IoT-Ger\u00e4ten in Echtzeit, und zwar von dem Augenblick an, in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1026,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[96,62,63],"class_list":["post-14200","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cyber-crime","tag-ict-sicherheit","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"IoT","_yoast_wpseo_opengraph-image":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/IoT-Ger\u00e4te-subito-gehackt-it-security.jpg","_yoast_wpseo_opengraph-description":"Die soeben ver\u00f6ffentlichte Studie \u201eIoT Enterprise Risk Report\u201c zeigt die Gefahr, die g\u00e4ngige IoT-Ger\u00e4te in Unternehmen mitbringen: Die meisten er\u00f6ffnen leichten Zugriff in kritische Unternehmensnetze, wie ForeScout Technologies schreibt.","_yoast_wpseo_opengraph-title":"IoT-Ger\u00e4te subito gehackt","enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IoT-Ger\u00e4te subito gehackt - Save<\/title>\n<meta name=\"description\" content=\"Die soeben ver\u00f6ffentlichte Studie \u201eIoT Enterprise Risk Report\u201c zeigt die Gefahr, die g\u00e4ngige IoT-Ger\u00e4te in Unternehmen mitbringen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/it\/iot-geraete-subito-gehackt\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT-Ger\u00e4te subito gehackt\" \/>\n<meta property=\"og:description\" content=\"Die soeben ver\u00f6ffentlichte Studie \u201eIoT Enterprise Risk Report\u201c zeigt die Gefahr, die g\u00e4ngige IoT-Ger\u00e4te in Unternehmen mitbringen: Die meisten er\u00f6ffnen leichten Zugriff in kritische Unternehmensnetze, wie ForeScout Technologies schreibt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/it\/iot-geraete-subito-gehackt\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-27T12:34:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/IoT-Ger\u00e4te-subito-gehackt-it-security.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\"},\"headline\":\"IoT-Ger\u00e4te subito gehackt\",\"datePublished\":\"2016-10-27T12:34:40+00:00\",\"dateModified\":\"2023-03-14T07:57:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/\"},\"wordCount\":551,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/IoT-Geraete-subito-gehackt-it-security.jpg\",\"keywords\":[\"Cyber-Crime\",\"ICT-Sicherheit\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/\",\"name\":\"IoT-Ger\u00e4te subito gehackt - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/IoT-Geraete-subito-gehackt-it-security.jpg\",\"datePublished\":\"2016-10-27T12:34:40+00:00\",\"dateModified\":\"2023-03-14T07:57:11+00:00\",\"description\":\"Die soeben ver\u00f6ffentlichte Studie \u201eIoT Enterprise Risk Report\u201c zeigt die Gefahr, die g\u00e4ngige IoT-Ger\u00e4te in Unternehmen mitbringen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/IoT-Geraete-subito-gehackt-it-security.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/IoT-Geraete-subito-gehackt-it-security.jpg\",\"width\":1295,\"height\":841,\"caption\":\"Aus dem Report \u201eIoT Enterprise Risk\u201c.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/iot-geraete-subito-gehackt\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT-Ger\u00e4te subito gehackt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/develop.organisator.galledia.ch\"],\"url\":\"https:\\\/\\\/news.save.ch\\\/it\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dispositivi IoT violati subito - Save","description":"Lo studio appena pubblicato \"IoT Enterprise Risk Report\" mostra il pericolo che i comuni dispositivi IoT comportano per le aziende.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/it\/iot-geraete-subito-gehackt\/","og_locale":"it_IT","og_type":"article","og_title":"IoT-Ger\u00e4te subito gehackt","og_description":"Die soeben ver\u00f6ffentlichte Studie \u201eIoT Enterprise Risk Report\u201c zeigt die Gefahr, die g\u00e4ngige IoT-Ger\u00e4te in Unternehmen mitbringen: Die meisten er\u00f6ffnen leichten Zugriff in kritische Unternehmensnetze, wie ForeScout Technologies schreibt.","og_url":"https:\/\/news.save.ch\/it\/iot-geraete-subito-gehackt\/","og_site_name":"Save","article_published_time":"2016-10-27T12:34:40+00:00","article_modified_time":"2023-03-14T07:57:11+00:00","og_image":[{"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/IoT-Ger\u00e4te-subito-gehackt-it-security.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"admin","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/"},"author":{"name":"admin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b"},"headline":"IoT-Ger\u00e4te subito gehackt","datePublished":"2016-10-27T12:34:40+00:00","dateModified":"2023-03-14T07:57:11+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/"},"wordCount":551,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/IoT-Geraete-subito-gehackt-it-security.jpg","keywords":["Cyber-Crime","ICT-Sicherheit","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/","url":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/","name":"Dispositivi IoT violati subito - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/IoT-Geraete-subito-gehackt-it-security.jpg","datePublished":"2016-10-27T12:34:40+00:00","dateModified":"2023-03-14T07:57:11+00:00","description":"Lo studio appena pubblicato \"IoT Enterprise Risk Report\" mostra il pericolo che i comuni dispositivi IoT comportano per le aziende.","breadcrumb":{"@id":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/IoT-Geraete-subito-gehackt-it-security.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/IoT-Geraete-subito-gehackt-it-security.jpg","width":1295,"height":841,"caption":"Aus dem Report \u201eIoT Enterprise Risk\u201c."},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/iot-geraete-subito-gehackt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"IoT-Ger\u00e4te subito gehackt"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Risparmiare","description":"Rivista svizzera specializzata in sicurezza","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sulla sicurezza","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b","name":"amministratore","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/develop.organisator.galledia.ch"],"url":"https:\/\/news.save.ch\/it\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/14200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/comments?post=14200"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/14200\/revisions"}],"predecessor-version":[{"id":17560,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/14200\/revisions\/17560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media\/1026"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media?parent=14200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/categories?post=14200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/tags?post=14200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}