{"id":4874,"date":"2017-05-15T19:05:41","date_gmt":"2017-05-15T16:05:41","guid":{"rendered":"https:\/\/cy.technology\/?p=4874\/"},"modified":"2018-02-06T16:21:54","modified_gmt":"2018-02-06T14:21:54","slug":"h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis","status":"publish","type":"post","link":"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/","title":{"rendered":"\u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2"},"content":{"rendered":"<p>\u03a4\u03b7\u03bd \u03a0\u03b1\u03c1\u03b1\u03c3\u03ba\u03b5\u03c5\u03ae 12 \u039c\u03b1\u03ca\u03bf\u03c5 2017, \u03b7 \u03bc\u03b5\u03b3\u03b1\u03bb\u03cd\u03c4\u03b5\u03c1\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 ransomware \u03b5\u03be\u03b1\u03c0\u03bb\u03ce\u03b8\u03b7\u03ba\u03b5 \u03c3\u03b5 \u03cc\u03bb\u03bf \u03c4\u03bf\u03bd \u03ba\u03cc\u03c3\u03bc\u03bf \u03bc\u03ad\u03c3\u03c9 \u03bc\u03b9\u03b1\u03c2 \u03bc\u03b1\u03b6\u03b9\u03ba\u03ae\u03c2 \u03b5\u03ba\u03c3\u03c4\u03c1\u03b1\u03c4\u03b5\u03af\u03b1\u03c2. \u0388\u03c7\u03bf\u03c5\u03bd \u03bc\u03bf\u03bb\u03c5\u03bd\u03b8\u03b5\u03af \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b5\u03c2 \u03b1\u03c0\u03cc 150 \u03c7\u03ce\u03c1\u03b5\u03c2 \u03bc\u03b5 \u03c4\u03bf\u03bd \u03b1\u03c1\u03b9\u03b8\u03bc\u03cc \u03bc\u03b5\u03bc\u03bf\u03bd\u03c9\u03bc\u03ad\u03bd\u03c9\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd \u03bd\u03b1 \u03b1\u03bd\u03ad\u03c1\u03c7\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03b5 \u03c0\u03ac\u03bd\u03c9 \u03b1\u03c0\u03cc 230,000 \u03ba\u03b1\u03b9 \u03bf\u03b9 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03bd\u03b1 \u03c5\u03c0\u03b5\u03c1\u03b2\u03b1\u03af\u03bd\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 10,000. \u0391\u03c5\u03c4\u03cc \u03c4\u03bf Ransomware \u03b3\u03bd\u03c9\u03c3\u03c4\u03cc \u03c9\u03c2 WannaCrypt \u03ae WannaCry \u03ad\u03c7\u03b5\u03b9 \u03b4\u03b7\u03bc\u03b9\u03bf\u03c5\u03c1\u03b3\u03ae\u03c3\u03b5\u03b9 \u03c0\u03b1\u03bd\u03b9\u03ba\u03cc \u03c3\u03c4\u03b9\u03c2 \u03b4\u03b9\u03b5\u03b8\u03bd\u03b5\u03af\u03c2 \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u03cc\u03c0\u03c9\u03c2 \u03c4\u03bf NHS, \u03c4\u03bf FedEx, \u03b7 Telefonica \u03c4\u03b7\u03c2 \u0399\u03c3\u03c0\u03b1\u03bd\u03af\u03b1\u03c2 \u03ba\u03b1\u03b9 \u03b7 Renault.<\/p>\n<p><!--more--><\/p>\n<p>\u0391\u03c5\u03c4\u03cc \u03c4\u03bf \u03c0\u03b5\u03c1\u03b9\u03c3\u03c4\u03b1\u03c4\u03b9\u03ba\u03cc \u03ad\u03c7\u03b5\u03b9 \u03b5\u03be\u03b1\u03c0\u03bb\u03c9\u03b8\u03b5\u03af \u03b5\u03c0\u03b5\u03b9\u03b4\u03ae \u03bc\u03b9\u03b1 \u03bf\u03bc\u03ac\u03b4\u03b1 \u03c7\u03ac\u03ba\u03b5\u03c1 \u03c0\u03bf\u03c5 \u03bf\u03bd\u03bf\u03bc\u03ac\u03b6\u03b5\u03c4\u03b1\u03b9 The Shadow Brokers \u03ba\u03c5\u03ba\u03bb\u03bf\u03c6\u03cc\u03c1\u03b7\u03c3\u03b5 \u03ad\u03bd\u03b1 \u03b5\u03c1\u03b3\u03b1\u03bb\u03b5\u03af\u03bf \u03c0\u03bf\u03c5 \u03b7 NSA (National Security Agency) \u03b1\u03bd\u03ad\u03c0\u03c4\u03c5\u03be\u03b5 \u03ba\u03b1\u03b9 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b5 \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03ba\u03b1\u03c4\u03b1\u03c3\u03ba\u03bf\u03c0\u03b5\u03cd\u03c3\u03b5\u03b9 \u03c4\u03bf\u03c5\u03c2 \u03c3\u03c4\u03cc\u03c7\u03bf\u03c5\u03c2 \u03c4\u03b7\u03c2.<\/p>\n<p>\u039f\u03b9 \u03b5\u03c1\u03b5\u03c5\u03bd\u03b7\u03c4\u03ad\u03c2 \u03bb\u03ad\u03bd\u03b5 \u03cc\u03c4\u03b9 \u03b4\u03b5\u03bd \u03c5\u03c0\u03ac\u03c1\u03c7\u03b5\u03b9 \u03c0\u03b9\u03b8\u03b1\u03bd\u03cc\u03c2 \u03c4\u03c1\u03cc\u03c0\u03bf\u03c2 \u03bd\u03b1 \u03b1\u03c0\u03bf\u03ba\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03b1\u03c6\u03b7\u03b8\u03bf\u03cd\u03bd \u03c4\u03b1 \u03bc\u03bf\u03bb\u03c5\u03c3\u03bc\u03ad\u03bd\u03b1 \u03b1\u03c1\u03c7\u03b5\u03af\u03b1 \u03b1\u03ba\u03cc\u03bc\u03b1 \u03ba\u03b1\u03b9 \u03cc\u03c4\u03b9 \u03bf \u03bc\u03cc\u03bd\u03bf\u03c2 \u03c4\u03c1\u03cc\u03c0\u03bf\u03c2 \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03c0\u03ac\u03c1\u03b5\u03c4\u03b5 \u03c4\u03b1 \u03b1\u03c1\u03c7\u03b5\u03af\u03b1 \u03c3\u03b1\u03c2 \u03c0\u03af\u03c3\u03c9 \u03b5\u03af\u03bd\u03b1\u03b9 \u03bd\u03b1 \u03c0\u03bb\u03b7\u03c1\u03ce\u03c3\u03b5\u03c4\u03b5 \u03c4\u03bf\u03c5\u03c2 \u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2. \u0391\u03c5\u03c4\u03cc \u03cc\u03bc\u03c9\u03c2 \u03c0\u03bf\u03c5 \u03c0\u03c1\u03bf\u03c4\u03b5\u03af\u03bd\u03bf\u03c5\u03bd \u03bf\u03b9 \u03b5\u03c1\u03b5\u03c5\u03bd\u03b7\u03c4\u03ad\u03c2 \u03b5\u03af\u03bd\u03b1\u03b9 \u03bd\u03b1 \u03b1\u03c0\u03bf\u03b8\u03b7\u03ba\u03b5\u03cd\u03c3\u03b5\u03c4\u03b5 \u03c4\u03b1 \u03bc\u03bf\u03bb\u03c5\u03c3\u03bc\u03ad\u03bd\u03b1 \u03b1\u03c1\u03c7\u03b5\u03af\u03b1 \u03c3\u03b1\u03c2 \u03c3\u03b5 \u03c0\u03b5\u03c1\u03af\u03c0\u03c4\u03c9\u03c3\u03b7 \u03c0\u03bf\u03c5 \u03b2\u03c1\u03b5\u03b8\u03b5\u03af \u03c3\u03c4\u03bf \u03b5\u03b3\u03b3\u03cd\u03c2 \u03bc\u03ad\u03bb\u03bb\u03bf\u03bd \u03bb\u03cd\u03c3\u03b7 \u03c0\u03bf\u03c5 \u03b8\u03b1 \u03c3\u03b1\u03c2 \u03b2\u03bf\u03b7\u03b8\u03ae\u03c3\u03b5\u03b9 \u03bd\u03b1 \u03c4\u03b1 \u03b1\u03c0\u03bf\u03ba\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03b1\u03c6\u03ae\u03c3\u03b5\u03c4\u03b5.<\/p>\n<p><strong>\u03a4\u03b9 \u03b5\u03af\u03bd\u03b1\u03b9 \u03bf \u03b9\u03cc\u03c2 <\/strong><strong>Ransomware<\/strong><strong>;<\/strong><\/p>\n<p>\u0388\u03bd\u03b1 Ransomware \u03b5\u03af\u03bd\u03b1\u03b9 \u03ad\u03bd\u03b1\u03c2 \u03c4\u03cd\u03c0\u03bf\u03c2 \u03b9\u03bf\u03cd \u03c0\u03bf\u03c5 \u03ba\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03b1\u03c6\u03b5\u03af \u03c4\u03b1 \u03b1\u03c1\u03c7\u03b5\u03af\u03b1 \u03c3\u03b1\u03c2 \u03ba\u03b1\u03b9 \u03b1\u03c0\u03b1\u03b9\u03c4\u03b5\u03af \u03c0\u03bb\u03b7\u03c1\u03c9\u03bc\u03ae \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03b1\u03c0\u03bf\u03ba\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03ac\u03c6\u03b7\u03c3\u03b7 \u03c4\u03bf\u03c5\u03c2. \u0391\u03c5\u03c4\u03cc\u03c2 \u03bf \u03c4\u03cd\u03c0\u03bf\u03c2 Ransomware \u03c0\u03bf\u03c5 \u03ad\u03c0\u03bb\u03b7\u03be\u03b5 \u03c4\u03bf\u03bd \u03ba\u03cc\u03c3\u03bc\u03bf \u03c0\u03c1\u03cc\u03c3\u03c6\u03b1\u03c4\u03b1 \u03c0\u03b5\u03c1\u03b9\u03bb\u03b1\u03bc\u03b2\u03ac\u03bd\u03b5\u03b9 \u03b5\u03c0\u03af\u03c3\u03b7\u03c2 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b5\u03c2 \u03c0\u03bf\u03c5 \u03c4\u03bf\u03c5 \u03b5\u03c0\u03b9\u03c4\u03c1\u03ad\u03c0\u03bf\u03c5\u03bd \u03bd\u03b1 \u03b5\u03be\u03b1\u03c0\u03bb\u03ce\u03bd\u03b5\u03c4\u03b5 \u03c3\u03b5 \u03ac\u03bb\u03bb\u03bf\u03c5\u03c2 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2.<\/p>\n<p><strong>\u03a4\u03b9 \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03ba\u03ac\u03bd\u03b5\u03b9 \u03ba\u03ac\u03c0\u03bf\u03b9\u03bf\u03c2 \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03b5\u03af\u03bd\u03b1\u03b9 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03b5\u03c5\u03bc\u03ad\u03bd\u03bf\u03c2<\/strong><\/p>\n<ul>\n<li>\u039d\u03b1 \u03ba\u03ac\u03bd\u03b5\u03b9 backups \u03c3\u03b5 \u03b5\u03be\u03c9\u03c4\u03b5\u03c1\u03b9\u03ba\u03bf\u03cd\u03c2 \u03c3\u03ba\u03bb\u03b7\u03c1\u03bf\u03cd\u03c2 \u03b4\u03af\u03c3\u03ba\u03bf\u03c5\u03c2<\/li>\n<li>\u0395\u03ac\u03bd \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03b5\u03af\u03c4\u03b5 \u03bc\u03b7 \u03c5\u03c0\u03bf\u03c3\u03c4\u03b7\u03c1\u03b9\u03b6\u03cc\u03bc\u03b5\u03bd\u03b7 \u03ad\u03ba\u03b4\u03bf\u03c3\u03b7 \u03c4\u03c9\u03bd Microsoft Windows, \u03b5\u03bd\u03b7\u03bc\u03b5\u03c1\u03ce\u03c3\u03c4\u03b5 \u03c4\u03b1 \u03c3\u03c4\u03b1 Windows 10.<\/li>\n<li>\u039d\u03b1 \u03b5\u03bd\u03b7\u03bc\u03b5\u03c1\u03ce\u03bd\u03b5\u03c4\u03b5 \u03c4\u03bf \u03c3\u03cd\u03c3\u03c4\u03b7\u03bc\u03ac \u03c3\u03b1\u03c2. \u0392\u03b5\u03b2\u03b1\u03b9\u03c9\u03b8\u03b5\u03af\u03c4\u03b5 \u03cc\u03c4\u03b9 \u03b5\u03bd\u03b7\u03bc\u03b5\u03c1\u03ce\u03bd\u03b5\u03c4\u03b5 \u03c4\u03b1\u03ba\u03c4\u03b9\u03ba\u03ac \u03c4\u03bf \u03c3\u03cd\u03c3\u03c4\u03b7\u03bc\u03ac \u03c3\u03b1\u03c2<\/li>\n<li>\u0394\u03b9\u03b1\u03c4\u03b7\u03c1\u03ae\u03c3\u03c4\u03b5 \u03b5\u03bd\u03b7\u03bc\u03b5\u03c1\u03c9\u03bc\u03ad\u03bd\u03bf \u03c4\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1\u03c2 \u03c3\u03b1\u03c2 (Antivirus)<\/li>\n<li>\u039c\u0397\u039d \u03ba\u03ac\u03bd\u03b5\u03c4\u03b5 \u03ba\u03bb\u03b9\u03ba \u03c3\u03b5 \u03c3\u03c5\u03bd\u03b4\u03ad\u03c3\u03bc\u03bf\u03c5\u03c2 \u03ae \u03c3\u03c5\u03bd\u03b7\u03bc\u03bc\u03ad\u03bd\u03b1 \u03c0\u03bf\u03c5 \u03ad\u03bd\u03b1 \u03ac\u03c4\u03bf\u03bc\u03bf \u03c3\u03b1\u03c2 \u03c3\u03c4\u03ad\u03bb\u03bd\u03b5\u03b9 \u03c3\u03b5 \u03c3\u03c5\u03bd\u03bf\u03bc\u03b9\u03bb\u03af\u03b1 \u03ae e-mail<\/li>\n<li>\u0393\u03b9\u03b1 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2, \u03c5\u03c0\u03ac\u03c1\u03c7\u03bf\u03c5\u03bd \u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b1 \u03bc\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2. \u039c\u03c0\u03bf\u03c1\u03b5\u03af\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03c3\u03b5\u03c4\u03b5 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b1 \u03c3\u03c4\u03bf <a title=\"\u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae \u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\" href=\"https:\/\/cy.technology\/gr\/ipiresies\/ipiresies-pliroforikis-kypros\/pliroforiki-asfaleia\/\">\u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae \u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1<\/a> \u03ae \u03bd\u03b1 <a title=\"\u0395\u03c0\u03b9\u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03af\u03b1\" href=\"https:\/\/cy.technology\/gr\/epikoinonia\/\">\u03b5\u03c0\u03b9\u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03ae\u03c3\u03b5\u03c4\u03b5 \u03bc\u03b1\u03b6\u03af \u03bc\u03b1\u03c2<\/a> \u03b3\u03b9\u03b1 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b5\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03af\u03b5\u03c2<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u03a4\u03b7\u03bd \u03a0\u03b1\u03c1\u03b1\u03c3\u03ba\u03b5\u03c5\u03ae 12 \u039c\u03b1\u03ca\u03bf\u03c5 2017, \u03b7 \u03bc\u03b5\u03b3\u03b1\u03bb\u03cd\u03c4\u03b5\u03c1\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 ransomware \u03b5\u03be\u03b1\u03c0\u03bb\u03ce\u03b8\u03b7\u03ba\u03b5 \u03c3\u03b5 \u03cc\u03bb\u03bf \u03c4\u03bf\u03bd \u03ba\u03cc\u03c3\u03bc\u03bf \u03bc\u03ad\u03c3\u03c9 \u03bc\u03b9\u03b1\u03c2 \u03bc\u03b1\u03b6\u03b9\u03ba\u03ae\u03c2 \u03b5\u03ba\u03c3\u03c4\u03c1\u03b1\u03c4\u03b5\u03af\u03b1\u03c2. \u0388\u03c7\u03bf\u03c5\u03bd \u03bc\u03bf\u03bb\u03c5\u03bd\u03b8\u03b5\u03af \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b5\u03c2 \u03b1\u03c0\u03cc 150 \u03c7\u03ce\u03c1\u03b5\u03c2 \u03bc\u03b5 \u03c4\u03bf\u03bd \u03b1\u03c1\u03b9\u03b8\u03bc\u03cc \u03bc\u03b5\u03bc\u03bf\u03bd\u03c9\u03bc\u03ad\u03bd\u03c9\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd \u03bd\u03b1 \u03b1\u03bd\u03ad\u03c1\u03c7\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03b5 \u03c0\u03ac\u03bd\u03c9 \u03b1\u03c0\u03cc 230,000 \u03ba\u03b1\u03b9 \u03bf\u03b9 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03bd\u03b1 \u03c5\u03c0\u03b5\u03c1\u03b2\u03b1\u03af\u03bd\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 10,000. \u0391\u03c5\u03c4\u03cc \u03c4\u03bf Ransomware \u03b3\u03bd\u03c9\u03c3\u03c4\u03cc \u03c9\u03c2 WannaCrypt \u03ae WannaCry \u03ad\u03c7\u03b5\u03b9 \u03b4\u03b7\u03bc\u03b9\u03bf\u03c5\u03c1\u03b3\u03ae\u03c3\u03b5\u03b9 \u03c0\u03b1\u03bd\u03b9\u03ba\u03cc \u03c3\u03c4\u03b9\u03c2 \u03b4\u03b9\u03b5\u03b8\u03bd\u03b5\u03af\u03c2 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":9580,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[394],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CyTechnology | \u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/\" \/>\n<meta property=\"og:locale\" content=\"el_GR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyTechnology | \u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2\" \/>\n<meta property=\"og:description\" content=\"\u03a4\u03b7\u03bd \u03a0\u03b1\u03c1\u03b1\u03c3\u03ba\u03b5\u03c5\u03ae 12 \u039c\u03b1\u03ca\u03bf\u03c5 2017, \u03b7 \u03bc\u03b5\u03b3\u03b1\u03bb\u03cd\u03c4\u03b5\u03c1\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 ransomware \u03b5\u03be\u03b1\u03c0\u03bb\u03ce\u03b8\u03b7\u03ba\u03b5 \u03c3\u03b5 \u03cc\u03bb\u03bf \u03c4\u03bf\u03bd \u03ba\u03cc\u03c3\u03bc\u03bf \u03bc\u03ad\u03c3\u03c9 \u03bc\u03b9\u03b1\u03c2 \u03bc\u03b1\u03b6\u03b9\u03ba\u03ae\u03c2 \u03b5\u03ba\u03c3\u03c4\u03c1\u03b1\u03c4\u03b5\u03af\u03b1\u03c2. \u0388\u03c7\u03bf\u03c5\u03bd \u03bc\u03bf\u03bb\u03c5\u03bd\u03b8\u03b5\u03af \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b5\u03c2 \u03b1\u03c0\u03cc 150 \u03c7\u03ce\u03c1\u03b5\u03c2 \u03bc\u03b5 \u03c4\u03bf\u03bd \u03b1\u03c1\u03b9\u03b8\u03bc\u03cc \u03bc\u03b5\u03bc\u03bf\u03bd\u03c9\u03bc\u03ad\u03bd\u03c9\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd \u03bd\u03b1 \u03b1\u03bd\u03ad\u03c1\u03c7\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03b5 \u03c0\u03ac\u03bd\u03c9 \u03b1\u03c0\u03cc 230,000 \u03ba\u03b1\u03b9 \u03bf\u03b9 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03bd\u03b1 \u03c5\u03c0\u03b5\u03c1\u03b2\u03b1\u03af\u03bd\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 10,000. \u0391\u03c5\u03c4\u03cc \u03c4\u03bf Ransomware \u03b3\u03bd\u03c9\u03c3\u03c4\u03cc \u03c9\u03c2 WannaCrypt \u03ae WannaCry \u03ad\u03c7\u03b5\u03b9 \u03b4\u03b7\u03bc\u03b9\u03bf\u03c5\u03c1\u03b3\u03ae\u03c3\u03b5\u03b9 \u03c0\u03b1\u03bd\u03b9\u03ba\u03cc \u03c3\u03c4\u03b9\u03c2 \u03b4\u03b9\u03b5\u03b8\u03bd\u03b5\u03af\u03c2 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/\" \/>\n<meta property=\"og:site_name\" content=\"CyTechnology\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyTechnologyLtd\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-15T16:05:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-06T14:21:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cy.technology\/wp-content\/uploads\/blog-cyberattack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CyTechnology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyTechnology\" \/>\n<meta name=\"twitter:site\" content=\"@CyTechnology\" \/>\n<meta name=\"twitter:label1\" content=\"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc\" \/>\n\t<meta name=\"twitter:data1\" content=\"CyTechnology\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/\"},\"author\":{\"name\":\"CyTechnology\",\"@id\":\"https:\/\/cy.technology\/gr\/#\/schema\/person\/a48acd746cb957da1125fff61d717727\"},\"headline\":\"\u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2\",\"datePublished\":\"2017-05-15T16:05:41+00:00\",\"dateModified\":\"2018-02-06T14:21:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/\"},\"wordCount\":25,\"publisher\":{\"@id\":\"https:\/\/cy.technology\/gr\/#organization\"},\"articleSection\":[\"\u039d\u03ad\u03b1 \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2\"],\"inLanguage\":\"el\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/\",\"url\":\"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/\",\"name\":\"CyTechnology | \u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2\",\"isPartOf\":{\"@id\":\"https:\/\/cy.technology\/gr\/#website\"},\"datePublished\":\"2017-05-15T16:05:41+00:00\",\"dateModified\":\"2018-02-06T14:21:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/#breadcrumb\"},\"inLanguage\":\"el\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cy.technology\/gr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cy.technology\/gr\/#website\",\"url\":\"https:\/\/cy.technology\/gr\/\",\"name\":\"CyTechnology\",\"description\":\"Web &amp; IT solutions Cyprus\",\"publisher\":{\"@id\":\"https:\/\/cy.technology\/gr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cy.technology\/gr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"el\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cy.technology\/gr\/#organization\",\"name\":\"CyTechnology Ltd\",\"url\":\"https:\/\/cy.technology\/gr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\/\/cy.technology\/gr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cy.technology\/wp-content\/uploads\/cytechnology-logo.png\",\"contentUrl\":\"https:\/\/cy.technology\/wp-content\/uploads\/cytechnology-logo.png\",\"width\":213,\"height\":65,\"caption\":\"CyTechnology Ltd\"},\"image\":{\"@id\":\"https:\/\/cy.technology\/gr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyTechnologyLtd\",\"https:\/\/twitter.com\/CyTechnology\",\"https:\/\/www.instagram.com\/CyTechnology\/\",\"https:\/\/www.linkedin.com\/company\/cytechnology\",\"https:\/\/www.youtube.com\/CyTechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cy.technology\/gr\/#\/schema\/person\/a48acd746cb957da1125fff61d717727\",\"name\":\"CyTechnology\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\/\/cy.technology\/gr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/de280ff5c1009f1800388256ca61d520?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/de280ff5c1009f1800388256ca61d520?s=96&d=mm&r=g\",\"caption\":\"CyTechnology\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyTechnology | \u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/","og_locale":"el_GR","og_type":"article","og_title":"CyTechnology | \u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2","og_description":"\u03a4\u03b7\u03bd \u03a0\u03b1\u03c1\u03b1\u03c3\u03ba\u03b5\u03c5\u03ae 12 \u039c\u03b1\u03ca\u03bf\u03c5 2017, \u03b7 \u03bc\u03b5\u03b3\u03b1\u03bb\u03cd\u03c4\u03b5\u03c1\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 ransomware \u03b5\u03be\u03b1\u03c0\u03bb\u03ce\u03b8\u03b7\u03ba\u03b5 \u03c3\u03b5 \u03cc\u03bb\u03bf \u03c4\u03bf\u03bd \u03ba\u03cc\u03c3\u03bc\u03bf \u03bc\u03ad\u03c3\u03c9 \u03bc\u03b9\u03b1\u03c2 \u03bc\u03b1\u03b6\u03b9\u03ba\u03ae\u03c2 \u03b5\u03ba\u03c3\u03c4\u03c1\u03b1\u03c4\u03b5\u03af\u03b1\u03c2. \u0388\u03c7\u03bf\u03c5\u03bd \u03bc\u03bf\u03bb\u03c5\u03bd\u03b8\u03b5\u03af \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b5\u03c2 \u03b1\u03c0\u03cc 150 \u03c7\u03ce\u03c1\u03b5\u03c2 \u03bc\u03b5 \u03c4\u03bf\u03bd \u03b1\u03c1\u03b9\u03b8\u03bc\u03cc \u03bc\u03b5\u03bc\u03bf\u03bd\u03c9\u03bc\u03ad\u03bd\u03c9\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd \u03bd\u03b1 \u03b1\u03bd\u03ad\u03c1\u03c7\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03b5 \u03c0\u03ac\u03bd\u03c9 \u03b1\u03c0\u03cc 230,000 \u03ba\u03b1\u03b9 \u03bf\u03b9 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03bd\u03b1 \u03c5\u03c0\u03b5\u03c1\u03b2\u03b1\u03af\u03bd\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 10,000. \u0391\u03c5\u03c4\u03cc \u03c4\u03bf Ransomware \u03b3\u03bd\u03c9\u03c3\u03c4\u03cc \u03c9\u03c2 WannaCrypt \u03ae WannaCry \u03ad\u03c7\u03b5\u03b9 \u03b4\u03b7\u03bc\u03b9\u03bf\u03c5\u03c1\u03b3\u03ae\u03c3\u03b5\u03b9 \u03c0\u03b1\u03bd\u03b9\u03ba\u03cc \u03c3\u03c4\u03b9\u03c2 \u03b4\u03b9\u03b5\u03b8\u03bd\u03b5\u03af\u03c2 [&hellip;]","og_url":"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/","og_site_name":"CyTechnology","article_publisher":"https:\/\/www.facebook.com\/CyTechnologyLtd","article_published_time":"2017-05-15T16:05:41+00:00","article_modified_time":"2018-02-06T14:21:54+00:00","og_image":[{"width":2000,"height":1000,"url":"https:\/\/cy.technology\/wp-content\/uploads\/blog-cyberattack.jpg","type":"image\/jpeg"}],"author":"CyTechnology","twitter_card":"summary_large_image","twitter_creator":"@CyTechnology","twitter_site":"@CyTechnology","twitter_misc":{"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc":"CyTechnology"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/#article","isPartOf":{"@id":"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/"},"author":{"name":"CyTechnology","@id":"https:\/\/cy.technology\/gr\/#\/schema\/person\/a48acd746cb957da1125fff61d717727"},"headline":"\u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2","datePublished":"2017-05-15T16:05:41+00:00","dateModified":"2018-02-06T14:21:54+00:00","mainEntityOfPage":{"@id":"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/"},"wordCount":25,"publisher":{"@id":"https:\/\/cy.technology\/gr\/#organization"},"articleSection":["\u039d\u03ad\u03b1 \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2"],"inLanguage":"el"},{"@type":"WebPage","@id":"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/","url":"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/","name":"CyTechnology | \u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2","isPartOf":{"@id":"https:\/\/cy.technology\/gr\/#website"},"datePublished":"2017-05-15T16:05:41+00:00","dateModified":"2018-02-06T14:21:54+00:00","breadcrumb":{"@id":"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/#breadcrumb"},"inLanguage":"el","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cy.technology\/gr\/nea-pliroforikis\/h-pio-megali-epithesi-ransomware-pou-katagraftike-mexri-stigmis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cy.technology\/gr\/"},{"@type":"ListItem","position":2,"name":"\u0397 \u03c0\u03b9\u03bf \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 Ransomware \u03c0\u03bf\u03c5 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03c4\u03b7\u03ba\u03b5 \u03bc\u03ad\u03c7\u03c1\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03ae\u03c2"}]},{"@type":"WebSite","@id":"https:\/\/cy.technology\/gr\/#website","url":"https:\/\/cy.technology\/gr\/","name":"CyTechnology","description":"Web &amp; IT solutions Cyprus","publisher":{"@id":"https:\/\/cy.technology\/gr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cy.technology\/gr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"el"},{"@type":"Organization","@id":"https:\/\/cy.technology\/gr\/#organization","name":"CyTechnology Ltd","url":"https:\/\/cy.technology\/gr\/","logo":{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/cy.technology\/gr\/#\/schema\/logo\/image\/","url":"https:\/\/cy.technology\/wp-content\/uploads\/cytechnology-logo.png","contentUrl":"https:\/\/cy.technology\/wp-content\/uploads\/cytechnology-logo.png","width":213,"height":65,"caption":"CyTechnology Ltd"},"image":{"@id":"https:\/\/cy.technology\/gr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyTechnologyLtd","https:\/\/twitter.com\/CyTechnology","https:\/\/www.instagram.com\/CyTechnology\/","https:\/\/www.linkedin.com\/company\/cytechnology","https:\/\/www.youtube.com\/CyTechnology"]},{"@type":"Person","@id":"https:\/\/cy.technology\/gr\/#\/schema\/person\/a48acd746cb957da1125fff61d717727","name":"CyTechnology","image":{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/cy.technology\/gr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/de280ff5c1009f1800388256ca61d520?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/de280ff5c1009f1800388256ca61d520?s=96&d=mm&r=g","caption":"CyTechnology"}}]}},"_links":{"self":[{"href":"https:\/\/cy.technology\/gr\/wp-json\/wp\/v2\/posts\/4874"}],"collection":[{"href":"https:\/\/cy.technology\/gr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cy.technology\/gr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cy.technology\/gr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cy.technology\/gr\/wp-json\/wp\/v2\/comments?post=4874"}],"version-history":[{"count":0,"href":"https:\/\/cy.technology\/gr\/wp-json\/wp\/v2\/posts\/4874\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cy.technology\/gr\/wp-json\/wp\/v2\/media\/9580"}],"wp:attachment":[{"href":"https:\/\/cy.technology\/gr\/wp-json\/wp\/v2\/media?parent=4874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cy.technology\/gr\/wp-json\/wp\/v2\/categories?post=4874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cy.technology\/gr\/wp-json\/wp\/v2\/tags?post=4874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}