{"id":21514,"date":"2011-04-19T11:00:24","date_gmt":"2011-04-19T16:00:24","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=21514"},"modified":"2011-04-19T11:00:24","modified_gmt":"2011-04-19T16:00:24","slug":"bob-rankin-spear-phishing-internet-security","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/","title":{"rendered":"Bob Rankin: Spear Phishing &#038; Internet Security"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/20100914bobrankinlarge.jpg\" alt=\"bobr\" class=\"attachment wp-att-7167 alignleft\" \/><\/p>\n<p>By Bob Rankin<\/p>\n<p><b>What is Spear Phishing?<\/b> <\/p>\n<p>Spear phishing is a more dangerous cyber attack than typically &#8220;blind&#8221; phishing or spam attempts because they lull people into a false sense of security. Consumers are on their guard against spam from sources they don&#8217;t know.  But when an email seems to be from a trusted entity, or include personal details such as their name, people are more likely to do what it says. <\/p>\n<p>A crude spear phish purportedly from your bank may tell you that your login information needs to be &#8220;verified&#8221; and instruct you to reply to the email with your username and password. That&#8217;s a pretty easy phish to avoid; no bank ever makes such a request. But what if the email tells you to &#8220;log on securely to our server via this link\u2026&#8221;? Many people will do it without a second thought, and get caught without even knowing it.<\/p>\n<p>Links in spear phishing emails don&#8217;t take you to the Web pages they say they will. While the highlighted text indicating a hyperlink may read, &#8220;Chase Bank&#8221; or &#8220;Your Ebay account,&#8221; the code underlying the link actually points to a Web page controlled by the phisher. When you go to that page, which is a copy of the legitimate one, you are asked to &#8220;log in&#8221; and that&#8217;s how the phisher gets your username and password. Then you may get a message saying, &#8220;server overloaded, try again later&#8221; or some other brush-off. That&#8217;s a fairly low-level technique; others are even more insidious and dangerous.<\/p>\n<p>Customers of VioVet, a UK pet supplies dealer, received spear phish emails purportedly from the company, offering discount coupons if they clicked on a link in the email. The link took victims to a page which surreptitiously downloaded a malware program to their computers. The Trojan sniffed out sensitive information on the victims&#8217; hard drives and transmitted it to the bad guys. Victims never knew what was going on.<\/p>\n<p><b><a href=\"http:\/\/askbobrankin.com\/spear_phishing_and_internet_security.html\" target=\"_blank\">Article continued here:<\/a><\/b><\/p>\n<p><b>BOB&#8217;S WORLD<\/b><\/p>\n<p> <a href=\"http:\/\/www.InternetTourbus.com?pcp\" target=\"_blank\">Internet Tourbus -> Free Newsletter<\/a><\/p>\n<p><a href=\"http:\/\/www.AskBobRankin.com?pcp\" target=\"_blank\">Ask Bob Rankin    -> Tech Support<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/20100914bobrankinlarge.jpg\" alt=\"bobr\" class=\"attachment wp-att-7167 alignleft\" \/><\/p>\n<p>By Bob Rankin<\/p>\n<p>Spear phishing is a cybercrime technique that lures victims into revealing passwords, credit card data, and other sensitive information by masquerading as a communication from a trusted entity. The spear phishing communication &#8211; usually an email &#8211; looks very much like a familiar email format sent by your bank, Facebook, or anyone from which you&#8217;re accustomed to getting email. It may even include your name and other details which reassure you that &#8220;this is someone I know&#8221;. But beware, it&#8217;s a wolf in sheep&#8217;s clothing&#8230;<\/p>\n","protected":false},"author":1,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[13],"tags":[14,483,15,484],"class_list":["post-21514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bob-rankin","tag-bob-rankin-2","tag-internet-security","tag-internet-tourbus","tag-spear-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bob Rankin: Spear Phishing &amp; Internet Security<\/title>\n<meta name=\"description\" content=\"By Bob Rankin Spear phishing is a cybercrime technique that lures victims into revealing passwords, credit card data, and other sensitive information by masquerading as a communication from a trusted entity. The spear phishing communication - usually an email - looks very much like a familiar email format sent by your bank, Facebook, or anyone from which you&#039;re accustomed to getting email. It may even include your name and other details which reassure you that &quot;this is someone I know&quot;. But beware, it&#039;s a wolf in sheep&#039;s clothing...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bob Rankin: Spear Phishing &amp; Internet Security\" \/>\n<meta property=\"og:description\" content=\"By Bob Rankin Spear phishing is a cybercrime technique that lures victims into revealing passwords, credit card data, and other sensitive information by masquerading as a communication from a trusted entity. The spear phishing communication - usually an email - looks very much like a familiar email format sent by your bank, Facebook, or anyone from which you&#039;re accustomed to getting email. It may even include your name and other details which reassure you that &quot;this is someone I know&quot;. But beware, it&#039;s a wolf in sheep&#039;s clothing...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2011-04-19T16:00:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ff8c1d67c1f368c60cbcf372986cb7ce\"},\"headline\":\"Bob Rankin: Spear Phishing &#038; Internet Security\",\"datePublished\":\"2011-04-19T16:00:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/\"},\"wordCount\":352,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"bob rankin\",\"internet security\",\"internet tourbus\",\"spear phishing\"],\"articleSection\":[\"Bob Rankin\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/\",\"name\":\"Bob Rankin: Spear Phishing & Internet Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2011-04-19T16:00:24+00:00\",\"description\":\"By Bob Rankin Spear phishing is a cybercrime technique that lures victims into revealing passwords, credit card data, and other sensitive information by masquerading as a communication from a trusted entity. The spear phishing communication - usually an email - looks very much like a familiar email format sent by your bank, Facebook, or anyone from which you're accustomed to getting email. It may even include your name and other details which reassure you that \\\"this is someone I know\\\". But beware, it's a wolf in sheep's clothing...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bob-rankin-spear-phishing-internet-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bob Rankin: Spear Phishing &#038; Internet Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ff8c1d67c1f368c60cbcf372986cb7ce\",\"name\":\"Admin\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/techboss\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bob Rankin: Spear Phishing & Internet Security","description":"By Bob Rankin Spear phishing is a cybercrime technique that lures victims into revealing passwords, credit card data, and other sensitive information by masquerading as a communication from a trusted entity. The spear phishing communication - usually an email - looks very much like a familiar email format sent by your bank, Facebook, or anyone from which you're accustomed to getting email. It may even include your name and other details which reassure you that \"this is someone I know\". But beware, it's a wolf in sheep's clothing...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/","og_locale":"en_US","og_type":"article","og_title":"Bob Rankin: Spear Phishing & Internet Security","og_description":"By Bob Rankin Spear phishing is a cybercrime technique that lures victims into revealing passwords, credit card data, and other sensitive information by masquerading as a communication from a trusted entity. The spear phishing communication - usually an email - looks very much like a familiar email format sent by your bank, Facebook, or anyone from which you're accustomed to getting email. It may even include your name and other details which reassure you that \"this is someone I know\". But beware, it's a wolf in sheep's clothing...","og_url":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2011-04-19T16:00:24+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Admin","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/"},"author":{"name":"Admin","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ff8c1d67c1f368c60cbcf372986cb7ce"},"headline":"Bob Rankin: Spear Phishing &#038; Internet Security","datePublished":"2011-04-19T16:00:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/"},"wordCount":352,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["bob rankin","internet security","internet tourbus","spear phishing"],"articleSection":["Bob Rankin"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/","url":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/","name":"Bob Rankin: Spear Phishing & Internet Security","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2011-04-19T16:00:24+00:00","description":"By Bob Rankin Spear phishing is a cybercrime technique that lures victims into revealing passwords, credit card data, and other sensitive information by masquerading as a communication from a trusted entity. The spear phishing communication - usually an email - looks very much like a familiar email format sent by your bank, Facebook, or anyone from which you're accustomed to getting email. It may even include your name and other details which reassure you that \"this is someone I know\". But beware, it's a wolf in sheep's clothing...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/bob-rankin-spear-phishing-internet-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Bob Rankin: Spear Phishing &#038; Internet Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ff8c1d67c1f368c60cbcf372986cb7ce","name":"Admin","url":"https:\/\/www.pcmatic.com\/blog\/author\/techboss\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/21514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=21514"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/21514\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=21514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=21514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=21514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}