{"id":449,"date":"2016-05-26T12:38:32","date_gmt":"2016-05-26T11:38:32","guid":{"rendered":"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36.jpg"},"modified":"2016-05-26T12:41:03","modified_gmt":"2016-05-26T11:41:03","slug":"2016-05-26-09-35-36","status":"inherit","type":"attachment","link":"https:\/\/blogs.ncl.ac.uk\/security\/2016\/05\/26\/cyber-security-a-mooc-in-progress\/2016-05-26-09-35-36\/","title":{"rendered":"2016-05-26 09.35.36"},"author":4550,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"class_list":["post-449","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"210\" src=\"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-300x210.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-300x210.jpg 300w, https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-768x537.jpg 768w, https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-1024x716.jpg 1024w, https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-429x300.jpg 429w, https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36.jpg 1600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Filming a video as part of the upcoming MOOC in Cyber Security: Safety at Home, Online, in Life<\/p>\n"},"caption":{"rendered":"<p>Preparing to discuss how we handle risks in everyday life <a href=\"https:\/\/blogs.ncl.ac.uk\/security\/2016\/05\/26\/cyber-security-a-mooc-in-progress\/2016-05-26-09-35-36\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":1600,"height":1119,"file":"2016\/05\/2016-05-26-09.35.36.jpg","sizes":{"thumbnail":{"file":"2016-05-26-09.35.36-150x150.jpg","width":150,"height":150,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-150x150.jpg"},"medium":{"file":"2016-05-26-09.35.36-300x210.jpg","width":300,"height":210,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-300x210.jpg"},"medium_large":{"file":"2016-05-26-09.35.36-768x537.jpg","width":768,"height":537,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-768x537.jpg"},"large":{"file":"2016-05-26-09.35.36-1024x716.jpg","width":1024,"height":716,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-1024x716.jpg"},"post-thumbnail":{"file":"2016-05-26-09.35.36-1000x288.jpg","width":1000,"height":288,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-1000x288.jpg"},"large-feature":{"file":"2016-05-26-09.35.36-1000x288.jpg","width":1000,"height":288,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-1000x288.jpg"},"small-feature":{"file":"2016-05-26-09.35.36-429x300.jpg","width":429,"height":300,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36-429x300.jpg"},"full":{"file":"2016-05-26-09.35.36.jpg","width":1600,"height":1119,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36.jpg"}},"image_meta":{"aperture":"2.8","credit":"Picasa","camera":"DMC-FZ28","caption":"","created_timestamp":"1464255336","copyright":"","focal_length":"4.8","iso":"400","shutter_speed":"0.033333333333333","title":"","orientation":"0","keywords":[]}},"post":448,"source_url":"https:\/\/blogs.ncl.ac.uk\/security\/files\/2016\/05\/2016-05-26-09.35.36.jpg","_links":{"self":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/media\/449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/users\/4550"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/comments?post=449"}]}}