{"id":22926,"date":"2011-07-21T07:42:36","date_gmt":"2011-07-21T12:42:36","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=22926"},"modified":"2011-07-21T07:42:36","modified_gmt":"2011-07-21T12:42:36","slug":"malware-minute-1-in-3-teens-contacted-by-a-stranger-online","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/","title":{"rendered":"Malware Minute: 1 in 3 Teens Contacted by a Stranger Online"},"content":{"rendered":"<p><b>By GFI Vipre<\/b><\/p>\n<p>To gain a better understanding of home computing practices, GFI\u00ae Software commissioned a scientific study of home Internet use by parents and their teenage children. This population represents a particularly interesting \u201crisk pool\u201d not only due to their usage patterns in the home, but also due to the theory that \u201ctech savvy\u201d teens, who have spent their entire cognizant lives in the Internet age, may prove to be a harder human target for social engineering attacks than their elders.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/20110720gfi-300x218.jpg\" alt=\"\" title=\"gfi\" width=\"300\" height=\"218\" class=\"alignleft size-medium wp-image-22928\" \/><br \/>\n<BR CLEAR=LEFT><\/p>\n<p>29% of teens report that they have been<br \/>\ncontacted online by a person they would<br \/>\ndeem a stranger \u2013 someone with no<br \/>\nknown ties to them or their friends. Of<br \/>\nthat group, 62% report that they have<br \/>\nbeen contacted by a stranger on more<br \/>\nthan one occasion, and 23% confess<br \/>\nthey have responded to the stranger in<br \/>\nsome way.<\/p>\n<p>In households where the parent and teen both have Facebook profiles, 87% of parents indicate they are \u201cfriends\u201d with their teens on Facebook. However, 83% of teens with Facebook accounts say they have a good idea about how to control privacy settings \u2013 meaning they understand how to hide content from \u201cfriends\u201d and other visitors.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/20110720facebook_gfi-300x186.jpg\" alt=\"\" title=\"facebook_gfi\" width=\"300\" height=\"186\" class=\"alignleft size-medium wp-image-22939\" \/><\/p>\n<p><BR CLEAR=LEFT><br \/>\n<\/br><\/p>\n<h3><b><a href=\"http:\/\/www.gfi.com\/documents\/GFI%20_2011_parent_teen_internet_safety_report_june.pdf\" target=\"_blank\">Download the Entire Report for Free Here<\/a><\/b><\/h3>\n<p>This excerpt is shared with permission from GFI Vipre.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/20101109sunbeltmalware.jpg\" alt=\"\" title=\"GFI\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-18914\" \/><\/p>\n<p>To gain a better understanding of home computing practices, GFI\u00ae Software commissioned a scientific study of home Internet use by parents and their teenage children. This population represents a particularly interesting \u201crisk pool\u201d not only due to their usage patterns in the home, but also due to the theory that \u201ctech savvy\u201d teens, who have spent their entire cognizant lives in the Internet age, may prove to be a harder human target for social engineering attacks than their elders.<\/p>\n","protected":false},"author":22,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[57],"tags":[216,56,619,316],"class_list":["post-22926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-minute","tag-facebook","tag-malware","tag-parental-controls","tag-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malware Minute: 1 in 3 Teens Contacted by a Stranger Online<\/title>\n<meta name=\"description\" content=\"To gain a better understanding of home computing practices, GFI\u00ae Software commissioned a scientific study of home Internet use by parents and their teenage children. This population represents a particularly interesting \u201crisk pool\u201d not only due to their usage patterns in the home, but also due to the theory that \u201ctech savvy\u201d teens, who have spent their entire cognizant lives in the Internet age, may prove to be a harder human target for social engineering attacks than their elders.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Minute: 1 in 3 Teens Contacted by a Stranger Online\" \/>\n<meta property=\"og:description\" content=\"To gain a better understanding of home computing practices, GFI\u00ae Software commissioned a scientific study of home Internet use by parents and their teenage children. This population represents a particularly interesting \u201crisk pool\u201d not only due to their usage patterns in the home, but also due to the theory that \u201ctech savvy\u201d teens, who have spent their entire cognizant lives in the Internet age, may prove to be a harder human target for social engineering attacks than their elders.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2011-07-21T12:42:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"GFI Vipre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GFI Vipre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/\"},\"author\":{\"name\":\"GFI Vipre\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/6fcdb8c6c9957c63fd9f751b9a32140a\"},\"headline\":\"Malware Minute: 1 in 3 Teens Contacted by a Stranger Online\",\"datePublished\":\"2011-07-21T12:42:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/\"},\"wordCount\":214,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"facebook\",\"malware\",\"parental controls\",\"privacy\"],\"articleSection\":[\"Malware Minute\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/\",\"name\":\"Malware Minute: 1 in 3 Teens Contacted by a Stranger Online\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2011-07-21T12:42:36+00:00\",\"description\":\"To gain a better understanding of home computing practices, GFI\u00ae Software commissioned a scientific study of home Internet use by parents and their teenage children. This population represents a particularly interesting \u201crisk pool\u201d not only due to their usage patterns in the home, but also due to the theory that \u201ctech savvy\u201d teens, who have spent their entire cognizant lives in the Internet age, may prove to be a harder human target for social engineering attacks than their elders.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Minute: 1 in 3 Teens Contacted by a Stranger Online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/6fcdb8c6c9957c63fd9f751b9a32140a\",\"name\":\"GFI Vipre\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/gfisoftware\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Minute: 1 in 3 Teens Contacted by a Stranger Online","description":"To gain a better understanding of home computing practices, GFI\u00ae Software commissioned a scientific study of home Internet use by parents and their teenage children. This population represents a particularly interesting \u201crisk pool\u201d not only due to their usage patterns in the home, but also due to the theory that \u201ctech savvy\u201d teens, who have spent their entire cognizant lives in the Internet age, may prove to be a harder human target for social engineering attacks than their elders.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/","og_locale":"en_US","og_type":"article","og_title":"Malware Minute: 1 in 3 Teens Contacted by a Stranger Online","og_description":"To gain a better understanding of home computing practices, GFI\u00ae Software commissioned a scientific study of home Internet use by parents and their teenage children. This population represents a particularly interesting \u201crisk pool\u201d not only due to their usage patterns in the home, but also due to the theory that \u201ctech savvy\u201d teens, who have spent their entire cognizant lives in the Internet age, may prove to be a harder human target for social engineering attacks than their elders.","og_url":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2011-07-21T12:42:36+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"GFI Vipre","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"GFI Vipre","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/"},"author":{"name":"GFI Vipre","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/6fcdb8c6c9957c63fd9f751b9a32140a"},"headline":"Malware Minute: 1 in 3 Teens Contacted by a Stranger Online","datePublished":"2011-07-21T12:42:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/"},"wordCount":214,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["facebook","malware","parental controls","privacy"],"articleSection":["Malware Minute"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/","url":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/","name":"Malware Minute: 1 in 3 Teens Contacted by a Stranger Online","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2011-07-21T12:42:36+00:00","description":"To gain a better understanding of home computing practices, GFI\u00ae Software commissioned a scientific study of home Internet use by parents and their teenage children. This population represents a particularly interesting \u201crisk pool\u201d not only due to their usage patterns in the home, but also due to the theory that \u201ctech savvy\u201d teens, who have spent their entire cognizant lives in the Internet age, may prove to be a harder human target for social engineering attacks than their elders.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/malware-minute-1-in-3-teens-contacted-by-a-stranger-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Malware Minute: 1 in 3 Teens Contacted by a Stranger Online"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/6fcdb8c6c9957c63fd9f751b9a32140a","name":"GFI Vipre","url":"https:\/\/www.pcmatic.com\/blog\/author\/gfisoftware\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/22926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=22926"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/22926\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=22926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=22926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=22926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}