{"version":"1.0","provider_name":"Security - I\u00c9SEG","provider_url":"https:\/\/security.ieseg.fr\/en\/","author_name":"anaisandreosso","author_url":"https:\/\/security.ieseg.fr\/en\/author\/anaisandreosso\/","title":"Email Phishing #1 - Security - I\u00c9SEG","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qQWx5fW9wl\"><a href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-1-email-phishing\/email-1\/\">Email Phishing #1<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-1-email-phishing\/email-1\/embed\/#?secret=qQWx5fW9wl\" width=\"600\" height=\"338\" title=\"&#8220;Email Phishing #1&#8221; &#8212; Security - I\u00c9SEG\" data-secret=\"qQWx5fW9wl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"INCORRECT ! Thank you for participating! You chose the incorrect email. This email is a phish attack email. We marked up the phish email below to let you know what signs to look for. Think before\u00a0Click !\u00a0Students and staff who fall victim to phish attacks are responsible for their\u00a0actions !\u00a0When in doubt email\u00a0abuse@ieseg.fr TRY AGAIN [&hellip;]","thumbnail_url":"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2018\/12\/incorrect.png"}