{"version":"1.0","provider_name":"Wavecrest Blog","provider_url":"https:\/\/blog.wavecrest.net","author_name":"admin","author_url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/","title":"Monitoring Internet Usage ... From the IT Department - Wavecrest Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Bz9Nh5HcbF\"><a href=\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/\">Monitoring Internet Usage &#8230; From the IT Department<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/embed\/#?secret=Bz9Nh5HcbF\" width=\"600\" height=\"338\" title=\"&#8220;Monitoring Internet Usage &#8230; From the IT Department&#8221; &#8212; Wavecrest Blog\" data-secret=\"Bz9Nh5HcbF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.wavecrest.net\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"During July, August, and September of 2011, Commtouch assessed categories of Web sites most likely to be home to malware, below are the top ranking offenders.\u00a0 The Portals category includes those sites offering free hosting which are often abused to publish malware and phishing content or will redirect to sites with this content. What were [&hellip;]","thumbnail_url":"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg"}