{"version":"1.0","provider_name":"Antigua News Room","provider_url":"https:\/\/antiguanewsroom.com","author_name":"Editor","author_url":"https:\/\/antiguanewsroom.com\/author\/editor\/","title":"Hackers, Cybercriminals and Identity Thieves: What is the Difference?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"m61t7QBJqb\"><a href=\"https:\/\/antiguanewsroom.com\/hackers-cybercriminals-and-identity-thieves-what-is-the-difference\/\">Hackers, Cybercriminals and Identity Thieves: What is the Difference?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/antiguanewsroom.com\/hackers-cybercriminals-and-identity-thieves-what-is-the-difference\/embed\/#?secret=m61t7QBJqb\" width=\"600\" height=\"338\" title=\"&#8220;Hackers, Cybercriminals and Identity Thieves: What is the Difference?&#8221; &#8212; Antigua News Room\" data-secret=\"m61t7QBJqb\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Hackers leverage their technical computer skills to violate cybersecurity protection. Some good hackers use their skills for the betterment of online security systems. Bad hackers infiltrate online security systems for personal benefit. Cybercriminals use their computer networking skills to intrude into network systems. They steal sensitive information for profit generation from ransoms or the sale [&hellip;]"}