{"version":"1.0","provider_name":"RealVNC\u00ae","provider_url":"https:\/\/www.realvnc.com\/en\/","author_name":"David","author_url":"https:\/\/www.realvnc.com\/en\/news\/author\/david\/","title":"4 ways to protect yourself from credential stuffing","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"mPsgyde7TO\"><a href=\"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/\">4 ways to protect yourself from credential stuffing<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/embed\/#?secret=mPsgyde7TO\" width=\"600\" height=\"338\" title=\"&#8220;4 ways to protect yourself from credential stuffing&#8221; &#8212; RealVNC\u00ae\" data-secret=\"mPsgyde7TO\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.realvnc.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Credentials.jpg","thumbnail_width":693,"thumbnail_height":462,"description":"Credential stuffing happens when cybercriminals get hold of lists of user credentials and corresponding passwords that have been leaked in previous cyberattacks. This is what you can do to prevent it from happening."}