{"version":"1.0","provider_name":"TechSolutions, Inc.","provider_url":"https:\/\/www.techsolutionsinc.com","author_name":"TechSolutions","title":"Are hackers using your PC to mine Bitcoin?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"4T529nzFZa\"><a href=\"https:\/\/www.techsolutionsinc.com\/blog\/are-hackers-using-your-pc-to-mine-bitcoin\/\">Are hackers using your PC to mine Bitcoin?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.techsolutionsinc.com\/blog\/are-hackers-using-your-pc-to-mine-bitcoin\/embed\/#?secret=4T529nzFZa\" width=\"600\" height=\"338\" title=\"&#8220;Are hackers using your PC to mine Bitcoin?&#8221; &#8212; TechSolutions, Inc.\" data-secret=\"4T529nzFZa\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018February22Hardware_A_PH.jpg","thumbnail_width":900,"thumbnail_height":300,"description":"Cryptocurrencies like Bitcoin and Monero are so popular because they\u2019re secure and potentially worth thousands of dollars. But investors and consumers aren\u2019t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they\u2019re doing it with something called cryptojacking. Hijacked hardware Cryptojacking secretly uses your computer to calculate complex mathematical [&hellip;]"}