{"version":"1.0","provider_name":"PC Matic Blog","provider_url":"https:\/\/www.pcmatic.com\/blog","author_name":"Dave","author_url":"https:\/\/www.pcmatic.com\/blog\/author\/dave\/","title":"P2P Downloads Fuel Spyware","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Bd7Wqlh6TH\"><a href=\"https:\/\/www.pcmatic.com\/blog\/p2p-downloads-fuel-spyware\/\">P2P Downloads Fuel Spyware<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.pcmatic.com\/blog\/p2p-downloads-fuel-spyware\/embed\/#?secret=Bd7Wqlh6TH\" width=\"600\" height=\"338\" title=\"&#8220;P2P Downloads Fuel Spyware&#8221; &#8212; PC Matic Blog\" data-secret=\"Bd7Wqlh6TH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.pcmatic.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","thumbnail_width":1920,"thumbnail_height":1080,"description":"PC Pitstop has previously examined the dangers in P2P software bundles but there are also dangers in the files you can get from these networks. Last week, Chris Boyd (a.k.a. PaperGhost) of VitalSecurity.org published the first public information of spyware installs created by a company named Marketing Metrix Group (MMG). In many ways, though, that is the last chapter of the story."}