{"version":"1.0","provider_name":"LACNIC Blog","provider_url":"https:\/\/blog.lacnic.net\/en\/","title":"LACNIC Blog | Developing a Common Vocabulary to Fight Cybercrime","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Br0EIA6Z1U\"><a href=\"https:\/\/blog.lacnic.net\/en\/developing-a-common-vocabulary-to-fight-cybercrime\/\">Developing a Common Vocabulary to Fight Cybercrime<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.lacnic.net\/en\/developing-a-common-vocabulary-to-fight-cybercrime\/embed\/#?secret=Br0EIA6Z1U\" width=\"600\" height=\"338\" title=\"&#8220;Developing a Common Vocabulary to Fight Cybercrime&#8221; &#8212; LACNIC Blog\" data-secret=\"Br0EIA6Z1U\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.lacnic.net\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/11\/nov002.jpg","thumbnail_width":"550","thumbnail_height":"200","description":"Internet security and stability depend increasingly on cooperation between all parties involved, and such cooperation can be crucial to successfully fight against the growing number of information security incidents on the Internet. \u201cThe sum of each and every individual action will make problems easier to tackle. We must develop a common vocabulary.\u201d With this statement, [&hellip;]"}