{"id":220,"date":"2015-02-16T18:08:01","date_gmt":"2015-02-16T18:08:01","guid":{"rendered":"http:\/\/securitybydesign.de\/?p=220"},"modified":"2015-03-08T15:18:53","modified_gmt":"2015-03-08T15:18:53","slug":"top-10-privacy-risks-flyer","status":"publish","type":"post","link":"https:\/\/securitybydesign.de\/?p=220","title":{"rendered":"Top 10 Privacy Risks Flyer"},"content":{"rendered":"<p>OWASP published an infographics banner about its <a href=\"https:\/\/www.owasp.org\/index.php\/OWASP_Top_10_Privacy_Risks_Project\">Top 10 Privacy Risks<\/a>.<\/p>\n<p><a href=\"https:\/\/securitybydesign.de\/wp-content\/uploads\/2015\/02\/Top_10_Privacy_Risks_medium1.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-223 size-thumbnail alignleft\" src=\"https:\/\/securitybydesign.de\/wp-content\/uploads\/2015\/02\/Top_10_Privacy_Risks_medium1-150x150.png\" alt=\"OWASP Top 10 Privacy Risks\" width=\"150\" height=\"150\" \/><\/a><\/p>\n<div class=\"shariff\" data-title=\"Top 10 Privacy Risks Flyer\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/securitybydesign.de\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"gftlx\" data-services='[\"googleplus\",\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"info\"]' data-image=\"https:\/\/securitybydesign.de\/wp-content\/uploads\/2015\/02\/Top_10_Privacy_Risks_medium1-150x150.png\" data-url=\"https:\/\/securitybydesign.de\/?p=220\" data-lang=\"en\" data-theme=\"round\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>OWASP published an infographics banner about its Top 10 Privacy Risks.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,4],"tags":[],"class_list":["post-220","post","type-post","status-publish","format-standard","hentry","category-law-politics","category-privacy"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=220"}],"version-history":[{"count":6,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/220\/revisions"}],"predecessor-version":[{"id":230,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/220\/revisions\/230"}],"wp:attachment":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}