{"id":101054,"date":"2023-12-07T10:40:53","date_gmt":"2023-12-07T09:40:53","guid":{"rendered":"https:\/\/www.megasoft.de\/?p=101054"},"modified":"2024-01-09T15:42:11","modified_gmt":"2024-01-09T14:42:11","slug":"die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing","status":"publish","type":"post","link":"https:\/\/www.megasoft.de\/en\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/","title":{"rendered":"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"101054\" class=\"elementor elementor-101054\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c8321f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c8321f7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bf8c905\" data-id=\"bf8c905\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-785e509 elementor-widget elementor-widget-heading\" data-id=\"785e509\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49cd675 elementor-widget elementor-widget-text-editor\" data-id=\"49cd675\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In einer Welt, die immer st\u00e4rker von der Digitalisierung gepr\u00e4gt wird, erleben wir nicht nur die Vorteile des technologischen Fortschritts, sondern sehen uns auch mit neuen Gefahren konfrontiert. Eines der zunehmend bedrohlichen Ph\u00e4nomene ist der Identit\u00e4tsdiebstahl, der durch Datenleaks und Doxing verursacht wird. In diesem Artikel m\u00f6chten wir Sie \u00fcber diese Gefahren aufkl\u00e4ren, anhand konkreter Beispiele verdeutlichen und Ihnen Wege aufzeigen, wie Sie sich vor diesen Bedrohungen sch\u00fctzen k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fa765ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fa765ce\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3c58fa8\" data-id=\"3c58fa8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-096ad1b elementor-widget elementor-widget-spacer\" data-id=\"096ad1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4bef188 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4bef188\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-39ba0ea\" data-id=\"39ba0ea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ded5499 elementor-widget elementor-widget-heading\" data-id=\"ded5499\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Datenleaks und ihre Auswirkungen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0280601 elementor-widget elementor-widget-text-editor\" data-id=\"0280601\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Die fortschreitende Digitalisierung hat zu einer Zunahme von Datenleaks gef\u00fchrt, bei denen pers\u00f6nliche Informationen und sensible Daten von Unternehmen oder Organisationen gestohlen werden. Ein drastisches Beispiel hierf\u00fcr ist der Hackerangriff auf die Kreditwirtschaftsdatenbank Equifax im Jahr 2017. Bei diesem Vorfall wurden Daten von rund 143 Millionen Menschen gestohlen, darunter Namen, Sozialversicherungsnummern und Geburtsdaten. Die gestohlenen Informationen werden von Cyberkriminellen oft f\u00fcr Identit\u00e4tsdiebstahl genutzt, beispielsweise durch das Er\u00f6ffnen von Bankkonten oder das Aufnehmen von Krediten auf den Namen des Opfers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8548cf1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8548cf1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-98ff418\" data-id=\"98ff418\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5437e89 elementor-widget elementor-widget-spacer\" data-id=\"5437e89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a6704bb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6704bb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8341f53\" data-id=\"8341f53\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4bd8b8d elementor-widget elementor-widget-heading\" data-id=\"4bd8b8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Doxing als gezielte Bedrohung der Privatsph\u00e4re<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9402c2b elementor-widget elementor-widget-text-editor\" data-id=\"9402c2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ein weiteres Mittel, um Identit\u00e4ten zu stehlen, ist das sogenannte Doxing. Hierbei werden pers\u00f6nliche Informationen wie Wohnadressen, Telefonnummern und Arbeitspl\u00e4tze gezielt ver\u00f6ffentlicht. Ein beispielhafter Fall ist der Angriff auf die Schauspielerin Leslie Jones im Jahr 2016. Jones wurde Opfer von Doxing und massiven Online-Angriffen, bei denen pers\u00f6nliche Informationen ver\u00f6ffentlicht wurden. Diese Attacke f\u00fchrte nicht nur zu erheblichem pers\u00f6nlichem Leid, sondern auch zu beruflichen Konsequenzen f\u00fcr die Schauspielerin.<\/p><p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a6fd6ee elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6fd6ee\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3ae98f9\" data-id=\"3ae98f9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-95e9aa1 elementor-widget elementor-widget-spacer\" data-id=\"95e9aa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6235f6e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6235f6e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-274138d\" data-id=\"274138d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86b4378 elementor-widget elementor-widget-heading\" data-id=\"86b4378\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Schutzma\u00dfnahmen gegen Identit\u00e4tsdiebstahl<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0df3c15 elementor-widget elementor-widget-text-editor\" data-id=\"0df3c15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Um sich vor Identit\u00e4tsdiebstahl zu sch\u00fctzen, sind grundlegende Sicherheitsvorkehrungen unerl\u00e4sslich.<\/p><p>&#8211; Verwenden Sie komplexe Passw\u00f6rter und \u00e4ndern Sie diese regelm\u00e4\u00dfig.<br \/>&#8211; Nutzen Sie die Zwei-Faktor-Authentifizierung, wenn m\u00f6glich.<br \/>&#8211; \u00dcberpr\u00fcfen Sie regelm\u00e4\u00dfig Ihre Bankausz\u00fcge und Kreditberichte.<br \/>&#8211; Seien Sie vorsichtig beim Teilen pers\u00f6nlicher Informationen online und pr\u00fcfen Sie Datenschutzeinstellungen in Online-Profilen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f441123 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f441123\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf2f5c4\" data-id=\"cf2f5c4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d6074e elementor-widget elementor-widget-spacer\" data-id=\"4d6074e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9a9dcae elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9a9dcae\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ad52bad\" data-id=\"ad52bad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-85fc1d6 elementor-widget elementor-widget-heading\" data-id=\"85fc1d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bewusstsein schaffen und proaktiv handeln<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3746ca3 elementor-widget elementor-widget-text-editor\" data-id=\"3746ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Es ist wichtig, sich bewusst zu machen, dass Identit\u00e4tsdiebstahl nicht nur finanzielle Sch\u00e4den verursachen kann, sondern auch schwerwiegende pers\u00f6nliche Konsequenzen haben kann. Informieren Sie sich \u00fcber die Datenschutzrichtlinien von Unternehmen, deren Dienste Sie nutzen, und seien Sie wachsam gegen\u00fcber verd\u00e4chtigen Aktivit\u00e4ten. Nur durch eine proaktive Herangehensweise k\u00f6nnen wir uns effektiv vor den Gefahren von Datenleaks und Doxing sch\u00fctzen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd5240f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd5240f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cb5438f\" data-id=\"cb5438f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e27d05a elementor-widget elementor-widget-spacer\" data-id=\"e27d05a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e6a208d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e6a208d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0ff833f\" data-id=\"0ff833f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6bf9b5 elementor-widget elementor-widget-text-editor\" data-id=\"c6bf9b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Bleiben Sie sicher und sch\u00fctzen Sie Ihre Identit\u00e4t!<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5edf7ca elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5edf7ca\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb56624\" data-id=\"eb56624\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-012b836 elementor-widget elementor-widget-spacer\" data-id=\"012b836\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e9f047b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e9f047b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ffa8278\" data-id=\"ffa8278\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f36724b elementor-widget elementor-widget-text-editor\" data-id=\"f36724b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mehr zum Thema:<\/strong>\u00a0 <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Verbraucherinnen-und-Verbraucher\/Cyber-Sicherheitslage\/Methoden-der-Cyber-Kriminalitaet\/Identitaetsdiebstahl\/identitaetsdiebstahl_node.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.bsi.bund.de\/DE\/Themen\/Verbraucherinnen-und-Verbraucher\/Cyber-Sicherheitslage\/Methoden-der-Cyber-Kriminalitaet\/Identitaetsdiebstahl\/identitaetsdiebstahl_node.html<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d36c633 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d36c633\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eeb6377\" data-id=\"eeb6377\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-08e0746 elementor-widget elementor-widget-spacer\" data-id=\"08e0746\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8adc1b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8adc1b9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ce32cac\" data-id=\"ce32cac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6568004 elementor-widget elementor-widget-text-editor\" data-id=\"6568004\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"has-text-align-center o-typing-delay-500ms\" style=\"text-align: center;\"><strong><o-anim-typing>Anfragen unter:<\/o-anim-typing><\/strong><\/p><p class=\"has-text-align-center\" style=\"text-align: center;\"><a href=\"https:\/\/www.megasoft.de\/en\/kontakt\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.megasoft.de\/kontakt\/<\/a><br \/>Email:<span>\u00a0<\/span><a href=\"mailto:vertrieb@megasoft.de\" target=\"_blank\" rel=\"noopener\">vertrieb@megasoft.de<\/a><br \/>Tel.: +49 2173 265 06 0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing In einer Welt, die immer st\u00e4rker von der Digitalisierung gepr\u00e4gt wird, erleben wir nicht nur die Vorteile des technologischen Fortschritts, sondern sehen uns auch mit neuen Gefahren konfrontiert. Eines der zunehmend bedrohlichen Ph\u00e4nomene ist der Identit\u00e4tsdiebstahl, der durch Datenleaks und Doxing verursacht [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":101064,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[266,1],"tags":[800,799,798],"class_list":["post-101054","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-magazin","category-startseite","tag-datenleaks","tag-doxing","tag-identitaetsdiebstahl","wpautop"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing - megasoft IT GmbH &amp; Co. KG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.megasoft.de\/en\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing - megasoft IT GmbH &amp; Co. KG\" \/>\n<meta property=\"og:description\" content=\"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing In einer Welt, die immer st\u00e4rker von der Digitalisierung gepr\u00e4gt wird, erleben wir nicht nur die Vorteile des technologischen Fortschritts, sondern sehen uns auch mit neuen Gefahren konfrontiert. Eines der zunehmend bedrohlichen Ph\u00e4nomene ist der Identit\u00e4tsdiebstahl, der durch Datenleaks und Doxing verursacht [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.megasoft.de\/en\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/\" \/>\n<meta property=\"og:site_name\" content=\"megasoft IT GmbH &amp; Co. KG\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-07T09:40:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-09T14:42:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.megasoft.de\/wp-content\/uploads\/Doxing-megasoft-it-loesungen-scaled.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/\"},\"author\":{\"name\":\"Marketing\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/person\\\/603fa30405f4eaba95ae711730bd7db6\"},\"headline\":\"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing\",\"datePublished\":\"2023-12-07T09:40:53+00:00\",\"dateModified\":\"2024-01-09T14:42:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/\"},\"wordCount\":440,\"publisher\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/Doxing-megasoft-it-loesungen-scaled.webp\",\"keywords\":[\"Datenleaks\",\"doxing\",\"Identit\u00e4tsdiebstahl\"],\"articleSection\":[\"Magazin\",\"Startseite\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/\",\"name\":\"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing - megasoft IT GmbH &amp; Co. KG\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/Doxing-megasoft-it-loesungen-scaled.webp\",\"datePublished\":\"2023-12-07T09:40:53+00:00\",\"dateModified\":\"2024-01-09T14:42:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/Doxing-megasoft-it-loesungen-scaled.webp\",\"contentUrl\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/Doxing-megasoft-it-loesungen-scaled.webp\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.megasoft.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#website\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/\",\"name\":\"megasoft IT GmbH &amp; Co. KG\",\"description\":\"Your IT Procurement Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.megasoft.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\",\"name\":\"megasoft IT GmbH &amp; Co. KG\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/megasoft_logo_IT_Procurement_Partner.png\",\"contentUrl\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/megasoft_logo_IT_Procurement_Partner.png\",\"width\":1400,\"height\":350,\"caption\":\"megasoft IT GmbH &amp; Co. KG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/person\\\/603fa30405f4eaba95ae711730bd7db6\",\"name\":\"Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g\",\"caption\":\"Marketing\"},\"url\":\"https:\\\/\\\/www.megasoft.de\\\/en\\\/author\\\/marketing\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing - megasoft IT GmbH &amp; Co. KG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.megasoft.de\/en\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/","og_locale":"en_US","og_type":"article","og_title":"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing - megasoft IT GmbH &amp; Co. KG","og_description":"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing In einer Welt, die immer st\u00e4rker von der Digitalisierung gepr\u00e4gt wird, erleben wir nicht nur die Vorteile des technologischen Fortschritts, sondern sehen uns auch mit neuen Gefahren konfrontiert. Eines der zunehmend bedrohlichen Ph\u00e4nomene ist der Identit\u00e4tsdiebstahl, der durch Datenleaks und Doxing verursacht [&hellip;]","og_url":"https:\/\/www.megasoft.de\/en\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/","og_site_name":"megasoft IT GmbH &amp; Co. KG","article_published_time":"2023-12-07T09:40:53+00:00","article_modified_time":"2024-01-09T14:42:11+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.megasoft.de\/wp-content\/uploads\/Doxing-megasoft-it-loesungen-scaled.webp","type":"image\/jpeg"}],"author":"Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marketing","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/#article","isPartOf":{"@id":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/"},"author":{"name":"Marketing","@id":"https:\/\/www.megasoft.de\/#\/schema\/person\/603fa30405f4eaba95ae711730bd7db6"},"headline":"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing","datePublished":"2023-12-07T09:40:53+00:00","dateModified":"2024-01-09T14:42:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/"},"wordCount":440,"publisher":{"@id":"https:\/\/www.megasoft.de\/#organization"},"image":{"@id":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.megasoft.de\/wp-content\/uploads\/Doxing-megasoft-it-loesungen-scaled.webp","keywords":["Datenleaks","doxing","Identit\u00e4tsdiebstahl"],"articleSection":["Magazin","Startseite"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/","url":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/","name":"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing - megasoft IT GmbH &amp; Co. KG","isPartOf":{"@id":"https:\/\/www.megasoft.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/#primaryimage"},"image":{"@id":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.megasoft.de\/wp-content\/uploads\/Doxing-megasoft-it-loesungen-scaled.webp","datePublished":"2023-12-07T09:40:53+00:00","dateModified":"2024-01-09T14:42:11+00:00","breadcrumb":{"@id":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/#primaryimage","url":"https:\/\/www.megasoft.de\/wp-content\/uploads\/Doxing-megasoft-it-loesungen-scaled.webp","contentUrl":"https:\/\/www.megasoft.de\/wp-content\/uploads\/Doxing-megasoft-it-loesungen-scaled.webp","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.megasoft.de\/magazin\/die-gefahren-von-identitaetsdiebstahl-durch-datenleaks-und-doxing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.megasoft.de\/"},{"@type":"ListItem","position":2,"name":"Die Gefahren von Identit\u00e4tsdiebstahl durch Datenleaks und Doxing"}]},{"@type":"WebSite","@id":"https:\/\/www.megasoft.de\/#website","url":"https:\/\/www.megasoft.de\/","name":"megasoft IT GmbH &amp; Co. KG","description":"Your IT Procurement Partner","publisher":{"@id":"https:\/\/www.megasoft.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.megasoft.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.megasoft.de\/#organization","name":"megasoft IT GmbH &amp; Co. KG","url":"https:\/\/www.megasoft.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.megasoft.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.megasoft.de\/wp-content\/uploads\/megasoft_logo_IT_Procurement_Partner.png","contentUrl":"https:\/\/www.megasoft.de\/wp-content\/uploads\/megasoft_logo_IT_Procurement_Partner.png","width":1400,"height":350,"caption":"megasoft IT GmbH &amp; Co. KG"},"image":{"@id":"https:\/\/www.megasoft.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.megasoft.de\/#\/schema\/person\/603fa30405f4eaba95ae711730bd7db6","name":"Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4c1c8e75b65e76157d78c248ef0845f9a19c827a7df87f283cf26d92610998a?s=96&d=mm&r=g","caption":"Marketing"},"url":"https:\/\/www.megasoft.de\/en\/author\/marketing\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-06 23:24:35","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts\/101054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/comments?post=101054"}],"version-history":[{"count":4,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts\/101054\/revisions"}],"predecessor-version":[{"id":101063,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts\/101054\/revisions\/101063"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/media\/101064"}],"wp:attachment":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/media?parent=101054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/categories?post=101054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/tags?post=101054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}