
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"N3xog65x0j\"><a href=\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/\">Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/embed\/#?secret=N3xog65x0j\" width=\"600\" height=\"338\" title=\"&#8220;Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting&#8221; &#8212; OTAVA\" data-secret=\"N3xog65x0j\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"The Better Business Bureau of Western Michigan has posted an alert on new cyber threats that Michigan businesses should watch out for in 2013: Cloud-Based Botnets: Cloud computing allows businesses to quickly scale computing power up or down, creating the potential for massive virtual networks to simultaneously send thousands of spam emails. A growing concern is that cloud computing resources will be purchased using credit card information obtained from phishing schemes. Search History Poisoning: Hackers attempt to bump illegitimate websites to the top of search engine results, and now, try to manipulate individuals\u2019 search histories\u2014according to the Emerging Cyber Threats Report 2013 from Georgia Tech. Compromised search histories can follow users from computer to computer, perpetuating the inaccurate results and increasing the likelihood of visiting malicious websites. Mobile Wallet Vulnerabilities: Near field communication, or NFC\u2014a technology which allows two devices to exchange data when in the proximity of each other\u2014is being considered by many smartphone manufacturers, retailers and airlines. With this technology, near field scanners may attempt to capture stored credit card information from passersby. Malicious Mobile Apps: The Internet Crime Complaint Center recently issued an alert on malware in Android applications. As the market for mobile applications expands, it..."}