[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-biggest-security-threats-in-smart-home-devices-and-how-to-avoid-it":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":95,"popular_news":160,"categories":229},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":72,"text":74,"slug":75,"created_at":76,"publish_at":77,"formatted_created_at":78,"category_id":50,"links":79,"view_type":84,"video_url":85,"views":86,"likes":87,"lang":88,"comments_count":87,"category":89},"Biggest Security Threats in Smart Home Devices and How to avoid it","The Internet of Things has gripped the world and provided humankind with extrinsic benefits.","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aep-1.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" src=\"https://cdn.quasa.io/photos/foto-14/aep-1.jpg\" width=\"300\" / alt=\"Biggest Security Threats in Smart Home Devices and How to avoid it\" loading=\"lazy\">\u003C/picture>The\u003Ca href=\"https://quasa.io/media/iot-role-of-banking-in-the-developing-the-internet-of-things-world\"> Internet of Things\u003C/a> has gripped the world and provided humankind with extrinsic benefits. People are transforming their traditional homes to smart homes to get control of everything they own whether it be lighting, home entertainment, or room temperature.\u003C/p>\n\n\u003Cp>Smart homes are attracting a large chunk of people to add convenience and ease the way they control their appliances, tech devices, and much more.\u003C/p>\n\n\u003Cp>If you are thinking of converting your traditional home to a smart home, the first thing to consider is to opt for high-speed internet. Without that, you won&rsquo;t be able to control your home and do other internet activities in a seamless manner.\u003C/p>\n\n\u003Cp>Many internet service providers offer plans and packages that meet your daily internet requirements without any disruptions or lags.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aep-10.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"225\" src=\"https://cdn.quasa.io/photos/foto-14/aep-10.jpeg\" width=\"225\" / alt=\"Biggest Security Threats in Smart Home Devices and How to avoid it\" loading=\"lazy\">\u003C/picture>For instance,&nbsp;Spectrum plans&nbsp;offer&nbsp;you unlimited data caps along with speed as high as 940Mbps that are more than enough to handle any smart home environment.\u003C/p>\n\n\u003Cp>However, with so much ease and convenience, you might need to pay the price in terms of security and privacy threats.\u003C/p>\n\n\u003Cp>Smart homes undoubtedly provide convenience but also vulnerable to security threats. Approximately 80% of IoT devices are susceptible to cyberattacks.\u003C/p>\n\n\u003Cp>In this post, we are going to discuss some of the potential attacks on smart home devices that can jeopardize your privacy and security. Without further ado, let&rsquo;s dive straight into it.\u003C/p>\n\n\u003Ch3>Targeted Attacks\u003C/h3>\n\n\u003Cp>Smart home devices are loaded with your personal and private information including your credit card details to birth dates.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aep-11.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/aep-11.jpeg\" width=\"300\" / alt=\"Biggest Security Threats in Smart Home Devices and How to avoid it\" loading=\"lazy\">\u003C/picture>It could prove to be a haven for cybercriminals to steal your private and sensitive data, especially if the devices are not backed with robust protection.\u003C/p>\n\n\u003Cp>The stolen data can be used in various ways including threatening, blackmailing, or stealing. For instance, if a hacker comes to know that you or someone in your family is under debt, he/she could send a phony request for money.\u003C/p>\n\n\u003Cp>If you want to avoid such situations, make sure not to share your financial and personal information such as bank details with your smart devices.\u003C/p>\n\n\u003Cp>Moreover, don&rsquo;t connect your smart devices to calendars, and other apps containing sensitive and private information.\u003C/p>\n\n\u003Ch3>Weak Passwords are Vulnerable to Greater Risks\u003C/h3>\n\n\u003Cp>Choosing a password has always been a headache for internet users and you may not be an exception. The majority of smart home devices connected on the network are secured with a short, and weak password.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aep-12.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-14/aep-12.jpeg\" width=\"300\" / alt=\"Biggest Security Threats in Smart Home Devices and How to avoid it\" loading=\"lazy\">\u003C/picture>The loophole allows a hacker to get into the device and gain access to tamper with the smart home devices. For instance, the hacker might change the TV channels, turn the lights on and off, or tamper with the room&rsquo;s thermostat.\u003C/p>\n\n\u003Cp>To avoid such spooky incidents, make sure to always choose a complex and new password. The ideal password length is 12-18 characters with a combination of smaller and uppercase alphabets, numbers, and special characters. Most of the home devices also use two-factor authentication to give you an extra layer of protection.\u003C/p>\n\n\u003Cp>If you are not sure about how to secure your home devices, consult manual, or find a solution on YouTube. In case of any assistance, you can contact the customer support of the company.\u003C/p>\n\n\u003Ch3>Tracking Location\u003C/h3>\n\n\u003Cp>Smart home devices are optimal for homeowners to add convenience and ease. We all have faith in our smart devices keeping our information private and secure.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aep-5.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/aep-5.jpeg\" width=\"299\" / alt=\"Biggest Security Threats in Smart Home Devices and How to avoid it\" loading=\"lazy\">\u003C/picture>However, when it comes to your location, smart home devices can betray you by giving the information about your location to the hackers.\u003C/p>\n\n\u003Cp>The hackers can use this information to spy on you and can blackmail or threaten you for some ransom. For instance, clicking on a suspicious link on the computer or smartphone can reveal the user&rsquo;s location when the device is connected to the same network.\u003C/p>\n\n\u003Cp>Make sure to allocate a separate network for smart home devices and avoid clicking malicious links. These links can be intimidating and may cause serious problems in the future.\u003C/p>\n\n\u003Ch3>Taking Control of Smart Speakers\u003C/h3>\n\n\u003Cp>Smart homeowners might find themselves in a situation when they feel someone is spying on them. Especially when it comes to smart speakers, many users have complained about unusual activity.\u003C/p>\n\n\u003Cp>Smart speakers are always listening to what you say.It could lead hackers to exploit security and privacy loopholes to get control of your speaker, command their instructions, and extract prior recordings.\u003C/p>\n\n\u003Cp>To avoid such situations, make sure to clear the clutter and delete recordings from time to time. Don&rsquo;t connect your smart door locks or cameras with the smart speaker and turn off when not in use.\u003C/p>\n\n\u003Ch3>Data Manipulation\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aep-9.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"175\" src=\"https://cdn.quasa.io/photos/foto-14/aep-9.jpeg\" width=\"300\" / alt=\"Biggest Security Threats in Smart Home Devices and How to avoid it\" loading=\"lazy\">\u003C/picture>The devious thing about&nbsp;smart home devices is data manipulation&nbsp;that leaves no evidence of any unusual or suspicious activity. The reason is that the data transferred by smart devices such as TVs, and printers are not encrypted.\u003C/p>\n\n\u003Cp>This leads the hacker to view and manipulate data collected by your devices. With this method, someone can break into your home and swap the existing video feed with a fake one to avoid getting into jail.\u003C/p>\n\n\u003Cp>Make sure to use state of the art monitoring tools to stay informed about suspicious activities or operations on the network.\u003C/p>\n\n\u003Ch3>Outdated Software\u003C/h3>\n\n\u003Cp>Most of the homeowners don&rsquo;t take software update notifications seriously. However, the fact is that using the older version could lead hackers to easily get control of your devices and manipulate them to their advantage.\u003C/p>\n\n\u003Cp>Whenever a software update is available, make sure to take the action instantly. The software update is meant to remove any security bugs and discrepancies, leading to the security and privacy of your personal information.\u003C/p>\n\n\u003Cp>Moreover, software updates also remove any loopholes that are vulnerable to security and privacy.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","biggest-security-threats-in-smart-home-devices-and-how-to-avoid-it","2022-04-29T08:53:08.000000Z","2022-04-29T12:30:00.000000Z","29.04.2022",{"image":80,"image_webp":81,"thumb":82,"thumb_webp":83},"https://cdn.quasa.io/images/news/Hubyf9cAMUSN7dEBhAxcSJ5mYECtxKxwkPm5LKqS.jpg","https://cdn.quasa.io/images/news/Hubyf9cAMUSN7dEBhAxcSJ5mYECtxKxwkPm5LKqS.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Hubyf9cAMUSN7dEBhAxcSJ5mYECtxKxwkPm5LKqS.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Hubyf9cAMUSN7dEBhAxcSJ5mYECtxKxwkPm5LKqS.webp","large",null,2859,0,"en",{"id":50,"title":51,"slug":52,"meta_title":90,"meta_description":91,"meta_keywords":92,"deleted_at":85,"created_at":93,"updated_at":94,"lang":88},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[96,111,122,134,147],{"title":97,"description":98,"slug":99,"created_at":100,"publish_at":100,"formatted_created_at":101,"category":102,"links":103,"view_type":108,"video_url":85,"views":109,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":104,"image_webp":105,"thumb":106,"thumb_webp":107},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",4,false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":115,"formatted_created_at":101,"category":116,"links":117,"view_type":108,"video_url":85,"views":26,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":118,"image_webp":119,"thumb":120,"thumb_webp":121},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",{"title":123,"description":124,"slug":125,"created_at":126,"publish_at":126,"formatted_created_at":101,"category":127,"links":128,"view_type":108,"video_url":85,"views":133,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":129,"image_webp":130,"thumb":131,"thumb_webp":132},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",23,{"title":135,"description":136,"slug":137,"created_at":138,"publish_at":139,"formatted_created_at":101,"category":140,"links":141,"view_type":108,"video_url":85,"views":146,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":142,"image_webp":143,"thumb":144,"thumb_webp":145},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",43,{"title":148,"description":149,"slug":150,"created_at":151,"publish_at":152,"formatted_created_at":101,"category":153,"links":154,"view_type":108,"video_url":85,"views":159,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":155,"image_webp":156,"thumb":157,"thumb_webp":158},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",54,[161,174,188,200,215],{"title":162,"description":163,"slug":164,"created_at":165,"publish_at":166,"formatted_created_at":167,"category":168,"links":169,"view_type":108,"video_url":85,"views":172,"likes":173,"lang":88,"comments_count":87,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":170,"image_webp":85,"thumb":171,"thumb_webp":171},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70819,2,{"title":175,"description":176,"slug":177,"created_at":178,"publish_at":179,"formatted_created_at":180,"category":181,"links":182,"view_type":84,"video_url":85,"views":187,"likes":109,"lang":88,"comments_count":87,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":183,"image_webp":184,"thumb":185,"thumb_webp":186},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70584,{"title":189,"description":190,"slug":191,"created_at":192,"publish_at":193,"formatted_created_at":194,"category":195,"links":196,"view_type":108,"video_url":85,"views":199,"likes":109,"lang":88,"comments_count":87,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":197,"image_webp":85,"thumb":198,"thumb_webp":198},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68217,{"title":201,"description":202,"slug":203,"created_at":204,"publish_at":205,"formatted_created_at":206,"category":207,"links":208,"view_type":108,"video_url":85,"views":213,"likes":173,"lang":88,"comments_count":214,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":209,"image_webp":210,"thumb":211,"thumb_webp":212},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42195,1,{"title":216,"description":217,"slug":218,"created_at":219,"publish_at":220,"formatted_created_at":221,"category":222,"links":223,"view_type":84,"video_url":85,"views":228,"likes":173,"lang":88,"comments_count":87,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":224,"image_webp":225,"thumb":226,"thumb_webp":227},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41291,[230,231,232,233,234,235,236,237,238,239,240,241,242],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]