{"version":"1.0","provider_name":"iTeam","provider_url":"https:\/\/carleton.ca\/iteam","author_name":"cuthemeedtr5","author_url":"https:\/\/carleton.ca\/iteam\/author\/cuthemeedtr5\/","title":"Tips to recognize and avoid scams - iTeam","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"nIMA3s9Y6Q\"><a href=\"https:\/\/carleton.ca\/iteam\/2025\/avoid-scams\/\">Tips to recognize and avoid scams<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/carleton.ca\/iteam\/2025\/avoid-scams\/embed\/#?secret=nIMA3s9Y6Q\" width=\"600\" height=\"338\" title=\"&#8220;Tips to recognize and avoid scams&#8221; &#8212; iTeam\" data-secret=\"nIMA3s9Y6Q\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/carleton.ca\/iteam\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/carleton.ca\/iteam\/wp-content\/uploads\/sites\/215\/2026\/03\/woman-using-iphone-e1745335334233.png","thumbnail_width":599,"thumbnail_height":599,"description":"Recognize and avoid social engineering schemes including phishing messages, phony support calls, and other scams Apple shares tips to avoid scams and learn what to do if you receive suspicious emails, phone calls, or other messages. Social engineering is a type of targeted attack that relies on impersonation, deception, and manipulation to gain access to [&hellip;]"}