{"id":18513,"date":"2010-09-30T10:56:19","date_gmt":"2010-09-30T15:56:19","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=18513"},"modified":"2010-09-30T10:56:19","modified_gmt":"2010-09-30T15:56:19","slug":"are-you-a-target-for-zero-day-attacks","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/","title":{"rendered":"Are You A Target For Zero Day Attacks?"},"content":{"rendered":"<p><iframe src=\"http:\/\/www.facebook.com\/plugins\/like.php?href=http%3A%2F%2Ftechtalk.pcpitstop.com%2F2010%2F09%2F30%2Fare-you-a-target-for-zero-day-attacks%2F&amp;layout=standard&amp;show_faces=true&amp;width=450&amp;action=like&amp;colorscheme=light&amp;height=80\" scrolling=\"no\" frameborder=\"0\" style=\"border:none; overflow:hidden; width:450px; height:80px;\" allowTransparency=\"true\"><\/iframe><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/20100930untitled-e1285860615485.png\" alt=\"\" title=\"untitled\" width=\"150\" height=\"112\" class=\"alignleft size-full wp-image-18595\" \/><\/p>\n<p>According to Wikipedia, &#8220;A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit computer application vulnerabilities  unknown to others or undisclosed to the software developer. Zero-day exploits (actual code that can use a security hole to carry out an attack) are used or shared by attackers before the software developer knows the vulnerability exists.&#8221;<\/p>\n<p>When a security vulnerability is first discovered,  it is usually by hackers and malware developers.  The bad guys then write and distribute malware to exploit the vulnerability.  Once a security fix is developed and distributed  you are at safe&#8230;.right?  Wrong,  until you update and <strong> install it on your computer<\/strong>, you are at risk<\/p>\n<p> This is why I view all malware as Zero Day attacks.  Unless I&#8217;ve installed the latest updates  it doesn&#8217;t matter what program I use.  The effectiveness of my software is determined as much by <em>my<\/em> diligence as it is by developers.  Until I update my security software, all attacks and threats are zero day attacks for me.<\/p>\n<p><p>For several years  I&#8217;ve written articles on trojans, hijackers, and all forms of security threats.  The main theme has been &#8220;HOW TO REMOVE&#8221; these threats once  infected.  The majority of those infected do have an antivirus installed but either the user hasn&#8217;t updated  or  their particular program hasn&#8217;t written protection yet.<\/p>\n<p> Because of this I&#8217;ve always advocated the use of  more than one security program for detection and removal.  This only increases your chances of successfully removing any and all threats.  Please don&#8217;t take  this as meaning you should run more than one real time antivirus.  That is the worst thing you can do.  Multiple  programs, will give false positives and slow your system to a crawl.  I&#8217;m talking multiple detect and removal.<\/p>\n<p><strong>Methods Of Defense<\/strong><\/p>\n<p>Prevention is a must.  For years now I&#8217;ve used no real time protection and have even suggested that for others.  I&#8217;ve always been able to get away with it but things are different now.  Malware is much more sophisticated  than in years past.  Today I use realtime protection.<\/p>\n<p> My antivirus is constantly on the lookout for new threats and is fast to implement prevention, detection and removal.   All top notch antivirus developers want to be the best but I can only choose one to be the cornerstone of my protection.  Only one can be the front line.  It must be real time and it must be the best.<\/p>\n<p><strong>Horn Tooting<\/strong><\/p>\n<p>The PC Pitstop development team has always been at the front of innovative software development.   Our latest product, PC Matic has been a huge success, combining cloud computing and the first one click, FIX ALL, to be the most effective tool in the industry. One click gives you faster Internet, registry tweaks, cleaning, system optimizations, defragmentation and drive optimization,  driver updates, and malware detection and removal. Dave, Rob, Keith, Mark, Rob, Andy, Sandy, Larry, are the people you never hear about, but they are the cornerstone of PC Pitstop.  They are the developers that produce our software, &#8220;the coders&#8221;.  Believe me when I say &#8220;the coders&#8221; have been very busy lately.<\/p>\n<p><strong>Cliff Hanger<\/strong><\/p>\n<p> So what is it that&#8217;s good enough to finally get me using an antivirus?   What has an extremely small foot print but is strong enough to be the real time protection I&#8217;ve always wanted?  It&#8217;s been running on my system for weeks but until it stopped an attack this morning, I forgot it was there.<\/p>\n<p>  Stay tuned and find out what I&#8217;ve been using.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><a href=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/20100930untitled.png\"><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/20100930untitled-e1285860615485.png\" alt=\"\" title=\"untitled\" width=\"150\" height=\"112\" class=\"alignleft size-full wp-image-18595\" \/><\/a><\/p>\n<p>ZeroDay Attacks have finally met their match.  There&#8217;s no reason to be a target for hackers and cyber attacks.  Many PC Pitstop users will be the first to get the best protection available and finally be able to use their systems as intended.  No more blocked access, no more stolen info or stolen resources.<\/p>\n","protected":false},"author":7,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[48,1666,261,226,1667,257,1668,1669,1670,1671],"class_list":["post-18513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog","tag-computer","tag-computer-threat","tag-protection","tag-security","tag-security-vulnerability","tag-threat","tag-time-protection","tag-trojans-hijackers","tag-zero","tag-zero-day"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are You A Target For Zero Day Attacks?<\/title>\n<meta name=\"description\" content=\"ZeroDay Attacks have finally met their match. There&#039;s no reason to be a target for hackers and cyber attacks. Many PC Pitstop users will be the first to get the best protection available and finally be able to use their systems as intended. No more blocked access, no more stolen info or stolen resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are You A Target For Zero Day Attacks?\" \/>\n<meta property=\"og:description\" content=\"ZeroDay Attacks have finally met their match. There&#039;s no reason to be a target for hackers and cyber attacks. Many PC Pitstop users will be the first to get the best protection available and finally be able to use their systems as intended. No more blocked access, no more stolen info or stolen resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2010-09-30T15:56:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"S.Hogan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"S.Hogan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/\"},\"author\":{\"name\":\"S.Hogan\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/c77560e23beee1fc0225a031e4995d4c\"},\"headline\":\"Are You A Target For Zero Day Attacks?\",\"datePublished\":\"2010-09-30T15:56:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/\"},\"wordCount\":608,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"computer\",\"computer threat\",\"protection\",\"security\",\"security vulnerability\",\"threat\",\"time protection\",\"trojans hijackers\",\"Zero\",\"zero day\"],\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/\",\"name\":\"Are You A Target For Zero Day Attacks?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2010-09-30T15:56:19+00:00\",\"description\":\"ZeroDay Attacks have finally met their match. There's no reason to be a target for hackers and cyber attacks. Many PC Pitstop users will be the first to get the best protection available and finally be able to use their systems as intended. No more blocked access, no more stolen info or stolen resources.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/are-you-a-target-for-zero-day-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are You A Target For Zero Day Attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/c77560e23beee1fc0225a031e4995d4c\",\"name\":\"S.Hogan\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/shogan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are You A Target For Zero Day Attacks?","description":"ZeroDay Attacks have finally met their match. There's no reason to be a target for hackers and cyber attacks. Many PC Pitstop users will be the first to get the best protection available and finally be able to use their systems as intended. No more blocked access, no more stolen info or stolen resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Are You A Target For Zero Day Attacks?","og_description":"ZeroDay Attacks have finally met their match. There's no reason to be a target for hackers and cyber attacks. Many PC Pitstop users will be the first to get the best protection available and finally be able to use their systems as intended. No more blocked access, no more stolen info or stolen resources.","og_url":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2010-09-30T15:56:19+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"S.Hogan","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"S.Hogan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/"},"author":{"name":"S.Hogan","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/c77560e23beee1fc0225a031e4995d4c"},"headline":"Are You A Target For Zero Day Attacks?","datePublished":"2010-09-30T15:56:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/"},"wordCount":608,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["computer","computer threat","protection","security","security vulnerability","threat","time protection","trojans hijackers","Zero","zero day"],"articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/","url":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/","name":"Are You A Target For Zero Day Attacks?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2010-09-30T15:56:19+00:00","description":"ZeroDay Attacks have finally met their match. There's no reason to be a target for hackers and cyber attacks. Many PC Pitstop users will be the first to get the best protection available and finally be able to use their systems as intended. No more blocked access, no more stolen info or stolen resources.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/are-you-a-target-for-zero-day-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Are You A Target For Zero Day Attacks?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/c77560e23beee1fc0225a031e4995d4c","name":"S.Hogan","url":"https:\/\/www.pcmatic.com\/blog\/author\/shogan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/18513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=18513"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/18513\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=18513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=18513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=18513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}