{"id":293,"date":"2022-06-23T15:11:09","date_gmt":"2022-06-23T15:11:09","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=293"},"modified":"2022-06-23T15:11:09","modified_gmt":"2022-06-23T15:11:09","slug":"vulnerabilitate-aplicatie-jacuzzi-expune-date-private","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/vulnerabilitate-aplicatie-jacuzzi-expune-date-private\/","title":{"rendered":"Vulnerabilitatea aplica\u021biei Jacuzzi expune date private"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Trebuie s\u0103 citi\u021bi acest articol dac\u0103 sunte\u021bi unul dintre milioanele de posesori ai unei c\u0103zi cu hidromasaj Jacuzzi. Cercet\u0103torii au identificat o vulnerabilitate \u00een func\u021bia SmartTub a aplica\u021biei Jacuzzi Brand, care v\u0103 poate dezv\u0103lui datele private atacatorilor r\u0103u inten\u021biona\u021bi de la distan\u021b\u0103. Vulnerabilitatea exist\u0103 \u00een interfa\u021ba web a aplica\u021biei \u0219i ar putea permite atacatorilor s\u0103 acceseze informa\u021biile personale ale utilizatorilor, inclusiv numele, adresa, adresa de e-mail \u0219i num\u0103rul de telefon. Deci, dac\u0103 ave\u021bi o cad\u0103 cu hidromasaj marca Jacuzzi, actualiza\u021bi aplica\u021bia SmartTub c\u00e2t mai cur\u00e2nd posibil!<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Despre aplica\u021bia SmartTub<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Aplica\u021bia Jacuzzi Brand este o aplica\u021bie mobil\u0103 gratuit\u0103 care permite utilizatorilor s\u0103 \u00ee\u0219i controleze jacuzzi-urile Jacuzzi de pe smartphone-urile lor. Aplica\u021bia include func\u021bii precum posibilitatea de a porni \u0219i opri de la distan\u021b\u0103 cada cu hidromasaj, de a seta temperatura, de a programa orele de \u00eenc\u0103lzire \u0219i multe altele. Aplica\u021bia ofer\u0103, de asemenea, o interfa\u021b\u0103 web care permite utilizatorilor s\u0103 acceseze informa\u021biile despre contul lor \u0219i s\u0103 vizualizeze starea jacuzzi-urilor lor.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Care este problema?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Vulnerabilitatea exist\u0103 \u00een modul \u00een care func\u021bia SmartTub a aplica\u021biei Jacuzzi Brand gestioneaz\u0103 datele introduse de utilizator. Mai exact, aceasta nu valideaz\u0103 sau nu verific\u0103 \u00een mod corespunz\u0103tor datele furnizate de utilizator \u00eenainte de a le afi\u0219a utilizatorului. Aceast\u0103 vulnerabilitate ar putea permite unui atacator s\u0103 furnizeze date mali\u021bioase care ar duce la afi\u0219area de c\u0103tre aplica\u021bie a unor informa\u021bii sensibile, cum ar fi numele, adresa, adresa de e-mail \u0219i num\u0103rul de telefon ale utilizatorului.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Scenariul atacului explicat<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Un atacator trebuie mai \u00eent\u00e2i s\u0103 ob\u021bin\u0103 acces la contul de Jacuzzi al utilizatorului pentru a exploata aceast\u0103 vulnerabilitate. Hackerul ar putea fura acredit\u0103rile utilizatorului (nume de utilizator \u0219i parol\u0103) prin phishing sau alte mijloace. Odat\u0103 ce atacatorul a ob\u021binut acces la contul utilizatorului, acesta poate furniza date mali\u021bioase func\u021biei SmartTub a aplica\u021biei, ceea ce ar determina afi\u0219area unor informa\u021bii sensibile.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Ce date au fost expuse?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Datele care ar putea fi expuse din cauza acestei vulnerabilit\u0103\u021bi includ numele, adresa, adresa de e-mail \u0219i num\u0103rul de telefon ale utilizatorului.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Cum folosesc hackerii aceste informa\u021bii?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Informa\u021biile sensibile care ar putea fi expuse ca urmare a acestei vulnerabilit\u0103\u021bi ar putea fi utilizate de atacatori \u00een diverse scopuri, cum ar fi furtul de identitate, frauda sau atacurile de phishing direc\u021bionate.<\/span><\/p>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Furtul identit\u0103\u021bii:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Atacatorul ar putea utiliza informa\u021biile expuse pentru a se da drept victim\u0103 \u0219i a comite fraude sau alte infrac\u021biuni.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Fraud\u0103:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Atacatorul ar putea exploata informa\u021biile dezv\u0103luite pentru a deschide conturi noi pe numele victimei \u0219i pentru a efectua cheltuieli frauduloase.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Phishing direc\u021bionat:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Atacatorul ar putea utiliza datele expuse pentru a viza victima cu un atac de phishing menit s\u0103 \u00eei fure acredit\u0103rile sau s\u0103 \u00eei infecteze dispozitivul cu malware.<\/span><\/li>\n<\/ul>\n<h2><strong><span data-preserver-spaces=\"true\">Ce pute\u021bi face?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Dac\u0103 e\u0219ti proprietarul unui jacuzzi de marc\u0103 Jacuzzi, cel mai bun lucru pe care \u00eel po\u021bi face este s\u0103 \u00ee\u021bi actualizezi aplica\u021bia SmartTub la cea mai recent\u0103 versiune. Aplica\u021bia de marc\u0103 Jacuzzi este disponibil\u0103 pentru desc\u0103rcare din App Store \u0219i Google Play.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Pe l\u00e2ng\u0103 actualizarea aplica\u021biei SmartTub, trebuie s\u0103 v\u0103 proteja\u021bi acredit\u0103rile contului Jacuzzi (numele de utilizator \u0219i parola). Asigura\u021bi-v\u0103 c\u0103 utiliza\u021bi parole puternice, greu de ghicit, \u0219i nu reutiliza\u021bi niciodat\u0103 parolele \u00een conturi diferite. De asemenea, trebuie s\u0103 activa\u021bi autentificarea cu doi factori (dac\u0103 este disponibil\u0103) pentru contul dvs. Jacuzzi pentru a-l proteja \u0219i mai mult de accesul neautorizat.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Concluzie<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Dac\u0103 de\u021bine\u021bi o cad\u0103 Jacuzzi, actualiza\u021bi aplica\u021bia SmartTub c\u00e2t mai cur\u00e2nd posibil. Compania a lansat o actualizare care remediaz\u0103 vulnerabilitatea, a\u0219a c\u0103 asigura\u021bi-v\u0103 c\u0103 o desc\u0103rca\u021bi \u0219i c\u0103 v\u0103 schimba\u021bi parola pentru aplica\u021bie. De asemenea, ar trebui s\u0103 activa\u021bi autentificarea cu doi factori, dac\u0103 aceasta este disponibil\u0103.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Ve\u021bi dori s\u0103 citi\u021bi acest lucru dac\u0103 sunte\u021bi unul dintre milioanele care de\u021bin o cad\u0103 cu hidromasaj Jacuzzi. Cercet\u0103torii au identificat o vulnerabilitate \u00een func\u021bia SmartTub a m\u0103rcii Jacuzzi... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/vulnerabilitate-aplicatie-jacuzzi-expune-date-private\/\">Continue reading <span class=\"screen-reader-text\">Vulnerabilitatea aplica\u021biei Jacuzzi expune date private<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":296,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14],"tags":[],"class_list":["post-293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Jacuzzi App Vulnerability Exposes Private Data | Security Briefing<\/title>\n<meta name=\"description\" content=\"Researchers have identified a vulnerability in the SmartTub App that can reveal your private data to remote malicious attackers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/vulnerabilitate-aplicatie-jacuzzi-expune-date-private\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jacuzzi App Vulnerability Exposes Private Data | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Researchers have identified a vulnerability in the SmartTub App that can reveal your private data to remote malicious attackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/vulnerabilitate-aplicatie-jacuzzi-expune-date-private\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-23T15:11:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"668\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Jacuzzi App Vulnerability Exposes Private Data\",\"datePublished\":\"2022-06-23T15:11:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/\"},\"wordCount\":579,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/\",\"name\":\"Jacuzzi App Vulnerability Exposes Private Data | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg\",\"datePublished\":\"2022-06-23T15:11:09+00:00\",\"description\":\"Researchers have identified a vulnerability in the SmartTub App that can reveal your private data to remote malicious attackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg\",\"width\":1000,\"height\":668,\"caption\":\"Jacuzzi-App-Vulnerability-Exposes-Private-Data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jacuzzi App Vulnerability Exposes Private Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilitatea aplica\u021biei Jacuzzi expune date private | Informare de securitate","description":"Cercet\u0103torii au identificat o vulnerabilitate \u00een aplica\u021bia SmartTub care v\u0103 poate dezv\u0103lui datele private atacatorilor r\u0103u inten\u021biona\u021bi de la distan\u021b\u0103.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/vulnerabilitate-aplicatie-jacuzzi-expune-date-private\/","og_locale":"ro_RO","og_type":"article","og_title":"Jacuzzi App Vulnerability Exposes Private Data | Security Briefing","og_description":"Researchers have identified a vulnerability in the SmartTub App that can reveal your private data to remote malicious attackers.","og_url":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/vulnerabilitate-aplicatie-jacuzzi-expune-date-private\/","og_site_name":"Security Briefing","article_published_time":"2022-06-23T15:11:09+00:00","og_image":[{"width":1000,"height":668,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"3 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Jacuzzi App Vulnerability Exposes Private Data","datePublished":"2022-06-23T15:11:09+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/"},"wordCount":579,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg","articleSection":["Cyber Attacks","Cyber Threats"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/","name":"Vulnerabilitatea aplica\u021biei Jacuzzi expune date private | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg","datePublished":"2022-06-23T15:11:09+00:00","description":"Cercet\u0103torii au identificat o vulnerabilitate \u00een aplica\u021bia SmartTub care v\u0103 poate dezv\u0103lui datele private atacatorilor r\u0103u inten\u021biona\u021bi de la distan\u021b\u0103.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg","width":1000,"height":668,"caption":"Jacuzzi-App-Vulnerability-Exposes-Private-Data"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Jacuzzi App Vulnerability Exposes Private Data"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/296"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}