{"data":{"allSitePage":{"edges":[{"node":{"path":"/dictionary/rootkit"}},{"node":{"path":"/dictionary/reverse-engineering"}},{"node":{"path":"/dictionary/restore"}},{"node":{"path":"/dictionary/pharming"}},{"node":{"path":"/dictionary/payment-card-skimmer"}},{"node":{"path":"/dictionary/patch"}},{"node":{"path":"/dictionary/parasitic-viruses"}},{"node":{"path":"/dictionary/packet"}},{"node":{"path":"/dictionary/nimda"}},{"node":{"path":"/dictionary/network-vulnerability-scanning"}},{"node":{"path":"/dictionary/network-sniffing"}},{"node":{"path":"/dictionary/network"}},{"node":{"path":"/dictionary/national-security-agency-nsa"}},{"node":{"path":"/dictionary/national-computer-security-center-ncsc"}},{"node":{"path":"/dictionary/mobile-phone-malware"}},{"node":{"path":"/dictionary/masquerade-attack"}},{"node":{"path":"/dictionary/man-in-the-middle-attack"}},{"node":{"path":"/dictionary/malicious-code"}},{"node":{"path":"/dictionary/logic-bomb"}},{"node":{"path":"/dictionary/live-capture"}},{"node":{"path":"/dictionary/link-jacking"}},{"node":{"path":"/dictionary/lawful-interception"}},{"node":{"path":"/dictionary/kraken"}},{"node":{"path":"/dictionary/knowledge-based-authentication"}},{"node":{"path":"/dictionary/klez"}},{"node":{"path":"/dictionary/juice-jacking"}},{"node":{"path":"/dictionary/jboh-attack"}},{"node":{"path":"/dictionary/internet-worm"}},{"node":{"path":"/dictionary/incident-handling"}},{"node":{"path":"/dictionary/isp-internet-service-provider"}},{"node":{"path":"/dictionary/ipsec"}},{"node":{"path":"/dictionary/ip-address"}},{"node":{"path":"/dictionary/honeypot"}},{"node":{"path":"/dictionary/hoax"}},{"node":{"path":"/dictionary/hashing"}},{"node":{"path":"/dictionary/https"}},{"node":{"path":"/dictionary/guardio"}},{"node":{"path":"/dictionary/gateway-security"}},{"node":{"path":"/dictionary/gdpr-general-data-protection-regulation"}},{"node":{"path":"/dictionary/firewall"}},{"node":{"path":"/dictionary/fingerprint"}},{"node":{"path":"/dictionary/ftp-file-transfer-protocol"}},{"node":{"path":"/dictionary/extension"}},{"node":{"path":"/dictionary/exploit"}},{"node":{"path":"/dictionary/encryption"}},{"node":{"path":"/dictionary/easter-egg"}},{"node":{"path":"/dictionary/drive-by-downloads"}},{"node":{"path":"/dictionary/download"}},{"node":{"path":"/dictionary/domain"}},{"node":{"path":"/dictionary/denial-of-service-attack"}},{"node":{"path":"/dictionary/database"}},{"node":{"path":"/dictionary/cracking"}},{"node":{"path":"/dictionary/compromised"}},{"node":{"path":"/dictionary/command-and-control-center"}},{"node":{"path":"/dictionary/cloud"}},{"node":{"path":"/dictionary/cve-common-vulnerabilities-and-exposures"}},{"node":{"path":"/dictionary/bug"}},{"node":{"path":"/dictionary/brute-force-attack"}},{"node":{"path":"/dictionary/browsing-activity"}},{"node":{"path":"/dictionary/browser"}},{"node":{"path":"/dictionary/botnet"}},{"node":{"path":"/dictionary/boot-sector-malware"}},{"node":{"path":"/dictionary/bluetooth"}},{"node":{"path":"/dictionary/blacklist"}},{"node":{"path":"/dictionary/autorun-worm"}},{"node":{"path":"/dictionary/anonymizing-proxy"}},{"node":{"path":"/dictionary/hacking"}},{"node":{"path":"/dictionary/authentication"}},{"node":{"path":"/dictionary/phishing"}},{"node":{"path":"/dictionary/malware"}},{"node":{"path":"/dictionary/browser-protection"}},{"node":{"path":"/dictionary/browser-hijacker"}},{"node":{"path":"/dictionary/data-breach"}},{"node":{"path":"/dictionary/block-page"}},{"node":{"path":"/dictionary/backdoor-trojan"}},{"node":{"path":"/dictionary/cybersecurity"}},{"node":{"path":"/dictionary/antivirus"}},{"node":{"path":"/dictionary/adware"}},{"node":{"path":"/dictionary/advanced-persistent-threat-apt"}},{"node":{"path":"/dictionary/antispyware"}},{"node":{"path":"/dictionary/remote-access-scams"}},{"node":{"path":"/dictionary/account-takeover"}},{"node":{"path":"/dictionary/vpn-virtual-private-network"}},{"node":{"path":"/dictionary/vishing"}},{"node":{"path":"/dictionary/spyware"}},{"node":{"path":"/dictionary/sql-injection"}},{"node":{"path":"/dictionary/spam"}},{"node":{"path":"/dictionary/ransomware"}},{"node":{"path":"/dictionary/quarantining"}},{"node":{"path":"/dictionary/pop-up-blocker"}},{"node":{"path":"/dictionary/potentially-unwanted-application-pua"}},{"node":{"path":"/dictionary/push-notifications-web"}},{"node":{"path":"/dictionary/over-the-air-attack"}},{"node":{"path":"/dictionary/operating-system"}},{"node":{"path":"/dictionary/open-source-hardening-project"}},{"node":{"path":"/dictionary/open-source-code"}},{"node":{"path":"/dictionary/malvertising"}},{"node":{"path":"/dictionary/kaptoxa"}},{"node":{"path":"/dictionary/identity-theft"}},{"node":{"path":"/dictionary/ghosting-scams"}},{"node":{"path":"/dictionary/pig-butchering-scams"}},{"node":{"path":"/dictionary/data-theft"}},{"node":{"path":"/dictionary/dns-hijacking"}},{"node":{"path":"/dictionary/ddos"}},{"node":{"path":"/dictionary/credential-theft"}},{"node":{"path":"/dictionary/cookie"}},{"node":{"path":"/dictionary/clickbait-clickjacking"}},{"node":{"path":"/dictionary/pretexting"}},{"node":{"path":"/dictionary/infostealers"}},{"node":{"path":"/dictionary/malicious-links"}},{"node":{"path":"/dictionary/smishing"}},{"node":{"path":"/dictionary/tech-support-scam"}},{"node":{"path":"/dictionary/online-scams"}},{"node":{"path":"/dictionary/catfishing"}},{"node":{"path":"/dictionary/dark-web"}},{"node":{"path":"/dictionary/ssl-certificate"}},{"node":{"path":"/dictionary/scareware"}},{"node":{"path":"/dictionary/search-hijacking"}},{"node":{"path":"/dictionary/social-networking"}},{"node":{"path":"/dictionary/software"}},{"node":{"path":"/dictionary/trojan"}},{"node":{"path":"/dictionary/threat"}},{"node":{"path":"/dictionary/wiretapping"}},{"node":{"path":"/dictionary/url-or-web-content-filtering"}},{"node":{"path":"/dictionary/unauthorized-access"}},{"node":{"path":"/dictionary/virus"}},{"node":{"path":"/dictionary/voip"}},{"node":{"path":"/dictionary/wifi"}},{"node":{"path":"/dictionary/worm"}},{"node":{"path":"/dictionary/xss"}},{"node":{"path":"/dictionary/xafecopy"}},{"node":{"path":"/dictionary/yahoo-search-virus"}},{"node":{"path":"/dictionary/yubikey"}},{"node":{"path":"/dictionary/zero-day-attack"}},{"node":{"path":"/dictionary/zero-day-vulnerability"}},{"node":{"path":"/dictionary/zeus-game-over"}},{"node":{"path":"/dictionary/zip-bomb"}},{"node":{"path":"/dictionary/zombie-computer"}},{"node":{"path":"/dictionary/url-uniform-resource-locator"}},{"node":{"path":"/dictionary/social-engineering"}},{"node":{"path":"/dictionary/spoofing"}},{"node":{"path":"/features/secure-links"}},{"node":{"path":"/404.html"}},{"node":{"path":"/404/"}},{"node":{"path":"/about/"}},{"node":{"path":"/dictionary/"}},{"node":{"path":"/faq/"}},{"node":{"path":"/findusonline/"}},{"node":{"path":"/internal-bot-page/"}},{"node":{"path":"/licenses/"}},{"node":{"path":"/maintenance/"}},{"node":{"path":"/privacy/"}},{"node":{"path":"/tech/"}},{"node":{"path":"/terms-sms/"}},{"node":{"path":"/terms/"}}]}}}