




<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>ips</provider_name><provider_url>https://lux-dog.com/en/</provider_url><author_name>Bojan Kiculovic</author_name><author_url>https://lux-dog.com/en/author/bojan/</author_url><title>VARIOUS TYPES OF CYBER THREATS - ips</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="KE574sJYDA"&gt;&lt;a href="https://lux-dog.com/en/publications/razlicite-vrste-sajber-pretnji/"&gt;VARIOUS TYPES OF CYBER THREATS&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://lux-dog.com/en/publications/razlicite-vrste-sajber-pretnji/embed/#?secret=KE574sJYDA" width="600" height="338" title="&#x201C;VARIOUS TYPES OF CYBER THREATS&#x201D; &#x2014; ips" data-secret="KE574sJYDA" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://lux-dog.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://lux-dog.com/wp-content/uploads/2024/02/edan-korica.jpg</thumbnail_url><thumbnail_width>1205</thumbnail_width><thumbnail_height>1859</thumbnail_height><description>Security of the Internet and online communication has become an essential challenge in contemporary world. Paper discusses different types of cyber threats: cyber-attack, cyber terrorism and cybercrime. Individuals, companies and the states rely their communication and daily functioning on information and communication technologies (ICT). The purpose of the study is to highlight importance of the [&hellip;]</description></oembed>
