{"id":39458,"date":"2012-11-21T20:06:52","date_gmt":"2012-11-21T20:06:52","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=39458"},"modified":"2012-11-23T14:41:53","modified_gmt":"2012-11-23T14:41:53","slug":"7-computer-threats-you-might-miss","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/","title":{"rendered":"7 Computer Threats You Might Miss"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/threats.jpg\" alt=\"\" title=\"threats\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-39468\" \/><\/p>\n<p><\/br><\/p>\n<p>by Mitz Pantic from Tips4pc.com<\/p>\n<h3>7 Computer Threats You Might Miss<\/h3>\n<p>Some computer threats aren\u2019t immediately apparent, and they aren\u2019t often talked about by the so-called experts. They\u2019re risks that you can\u2019t block by just turning on your anti-virus software or by avoiding certain email attachments. Let\u2019s look at seven of these threats now.<\/p>\n<p><\/br><\/p>\n<p><strong>1\u2014Unprotected Home WiFi<\/strong><\/p>\n<p>The easiest wireless router to connect to is the unprotected wireless router. There\u2019s no password, so there\u2019s no hassle when you want to connect. That\u2019s a tempting reason to setup your home router with an open connection, but I suggest you take the extra few minutes to password-protect your router.<\/p>\n<p>There\u2019s two reasons\u2014privacy and liability. I\u2019ll discuss privacy in another section because the liability part can get you sent to jail.<\/p>\n<p>If you own an open router, anyone can connect to the Internet through your router. Sure, that means they can hog your bandwidth, but that isn\u2019t as much as a problem as when they use your Internet connection to do something illegal\u2014such as download child pornography.<\/p>\n<p>When the police discover someone do something illegal on the Internet, they track down the Internet Protocol (IP) address of the offender. Then they contact the Internet Service Provider (ISP) which owns that IP address and get the home address for the customer using that IP addresses so they can get an arrest warrant.<\/p>\n<p>If the police track the IP address back to your wireless router, they\u2019re going to arrest you, not the person who was accessing the Internet through your open router. You may be able to make a case in court that it wasn\u2019t you, but it will probably cost you thousands of dollars in legal fees to make that point in addition to the jail time, bond money, and cost to your career of being accused of downloading child pornography.<\/p>\n<p>The five minutes it takes to secure your router can avoid all of that, so I highly recommend it.<\/p>\n<p><strong>2\u2014Unprotected Public Wifi<\/strong><\/p>\n<p>When you use an unprotected wireless connection in public, anyone within range of the router (which can be up to a mile with the right equipment) can snoop on your connection.<\/p>\n<p>Not only can they see the same web pages you visit, but they can also access the hidden HTTP cookie your Web browser sends to websites to identify you.<\/p>\n<p>For example, you login to Facebook, whether at home or in public. When you open up Facebook at the public coffee shop, your computer sends a secret message (cookie) to Facebook saying, \u201cThis is _____. Remember me?\u201d Facebook verifies the secret and lets you access your wall and other information.<\/p>\n<p>But when you send that cookie at the coffee shop on the unprotected connection, anyone else who is listening to the wireless connection can grab your cookie. Then they can send it to Facebook and Facebook will show them your wall and other information.<\/p>\n<p>This method doesn\u2019t just apply to Facebook, but almost every website on the Internet. The only websites which are secure are the websites which run in SSL (HTTPS) mode all the time. Your Web browser indicates you\u2019re on a secure website by turning the address bar green or gold. (Different colors for different browsers.)<\/p>\n<p>I recommend that you avoid unprotected Internet, but if you must use it, open your Web browser in private mode (also called incognito)\u2014look in the File menu or try pressing Ctrl-Shift-N. Private mode won\u2019t send any of your usual cookies, so as long as you don\u2019t log into any sites, you should be safe.<\/p>\n<p><strong>3\u2014Losing It All<\/strong><\/p>\n<p>What if a hacker uses the above technique or another technique to access your online account, what is he likely to do? The answer, unfortunately, includes a likely possibility that he\u2019ll wipe out all of your data.<\/p>\n<p>Some hackers are just bad intentioned\u2014they delete all of your data out of spite. Other hackers use your account for some scam, but then they delete all of your data to make it harder for your to undo the scam.<\/p>\n<p>For example, a common scam is the Western Union scam. A hacker breaks into your email account and sends everyone in your address book an email telling them you\u2019re stuck in a foreign country and you\u2019ve lost your wallet. The email continues with a plea for your friends to send you a few hundred dollars by Western Union Moneygram.<\/p>\n<p>If your friends and family do send money, it\u2019ll be picked up by an associate of the scammer and will never be seen again. (Moneygrams are not refundable when fraud occurs.)<\/p>\n<p>To make it harder for you to ruin this scheme, hackers will delete your entire email address book and all of your old messages so you can\u2019t find the addresses for your friends and family to tell them that you\u2019ve been hacked and that the money request is a scam.<\/p>\n<p>As I said earlier, that unfortunately leaves you without email or address book. Scammers will also delete your information off of social media sites for the same reason, leaving you without any friends or followers.<\/p>\n<p>For this reason, you should use secure passwords, avoid unprotected wireless connections, and backup your online data if possible. GMail and several other online email sites make backups easy, and I highly encourage you to make regular backups part of your monthly or weekly schedule. (GMail will also provide automatic backups for about $5 a month.)<\/p>\n<h3><a href=\"http:\/\/tips4pc.com\/computer_tips_and_tricks\/7-computer-threats-you-might-miss.htm\" target=\"_blank\">Article Continued Here<\/a><\/h3>\n<p><em>This excerpt appears with permission from Tips4PC.com<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/threats.jpg\" alt=\"\" title=\"threats\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-39468\" \/><\/p>\n<p>Some computer threats aren\u2019t immediately apparent, and they aren\u2019t often talked about by the so-called experts. They\u2019re risks that you can\u2019t block by just turning on your anti-virus software or by avoiding certain email attachments. Let\u2019s look at seven of these threats now.<\/p>\n","protected":false},"author":33,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[834],"tags":[4351],"class_list":["post-39458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips4pc","tag-computer-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 Computer Threats You Might Miss<\/title>\n<meta name=\"description\" content=\"Some computer threats aren\u2019t immediately apparent, and they aren\u2019t often talked about by the so-called experts. They\u2019re risks that you can\u2019t block by just turning on your anti-virus software or by avoiding certain email attachments. Let\u2019s look at seven of these threats now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Computer Threats You Might Miss\" \/>\n<meta property=\"og:description\" content=\"Some computer threats aren\u2019t immediately apparent, and they aren\u2019t often talked about by the so-called experts. They\u2019re risks that you can\u2019t block by just turning on your anti-virus software or by avoiding certain email attachments. Let\u2019s look at seven of these threats now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2012-11-21T20:06:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-11-23T14:41:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tips4 PC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tips4 PC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/\"},\"author\":{\"name\":\"Tips4 PC\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/181845ffbd3d2cd01345e2d6cfd75ca0\"},\"headline\":\"7 Computer Threats You Might Miss\",\"datePublished\":\"2012-11-21T20:06:52+00:00\",\"dateModified\":\"2012-11-23T14:41:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/\"},\"wordCount\":945,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"computer threats\"],\"articleSection\":[\"Tips4PC\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/\",\"name\":\"7 Computer Threats You Might Miss\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2012-11-21T20:06:52+00:00\",\"dateModified\":\"2012-11-23T14:41:53+00:00\",\"description\":\"Some computer threats aren\u2019t immediately apparent, and they aren\u2019t often talked about by the so-called experts. They\u2019re risks that you can\u2019t block by just turning on your anti-virus software or by avoiding certain email attachments. Let\u2019s look at seven of these threats now.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-computer-threats-you-might-miss\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Computer Threats You Might Miss\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/181845ffbd3d2cd01345e2d6cfd75ca0\",\"name\":\"Tips4 PC\",\"description\":\"Tips4PC.com provides free computer tips and advice for anyone who wants to learn something new. All the information is written in an easy to understand way.\",\"sameAs\":[\"http:\\\/\\\/tips4pc.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/tips4pc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Computer Threats You Might Miss","description":"Some computer threats aren\u2019t immediately apparent, and they aren\u2019t often talked about by the so-called experts. They\u2019re risks that you can\u2019t block by just turning on your anti-virus software or by avoiding certain email attachments. Let\u2019s look at seven of these threats now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/","og_locale":"en_US","og_type":"article","og_title":"7 Computer Threats You Might Miss","og_description":"Some computer threats aren\u2019t immediately apparent, and they aren\u2019t often talked about by the so-called experts. They\u2019re risks that you can\u2019t block by just turning on your anti-virus software or by avoiding certain email attachments. Let\u2019s look at seven of these threats now.","og_url":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2012-11-21T20:06:52+00:00","article_modified_time":"2012-11-23T14:41:53+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Tips4 PC","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Tips4 PC","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/"},"author":{"name":"Tips4 PC","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/181845ffbd3d2cd01345e2d6cfd75ca0"},"headline":"7 Computer Threats You Might Miss","datePublished":"2012-11-21T20:06:52+00:00","dateModified":"2012-11-23T14:41:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/"},"wordCount":945,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["computer threats"],"articleSection":["Tips4PC"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/","url":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/","name":"7 Computer Threats You Might Miss","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2012-11-21T20:06:52+00:00","dateModified":"2012-11-23T14:41:53+00:00","description":"Some computer threats aren\u2019t immediately apparent, and they aren\u2019t often talked about by the so-called experts. They\u2019re risks that you can\u2019t block by just turning on your anti-virus software or by avoiding certain email attachments. Let\u2019s look at seven of these threats now.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/7-computer-threats-you-might-miss\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"7 Computer Threats You Might Miss"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/181845ffbd3d2cd01345e2d6cfd75ca0","name":"Tips4 PC","description":"Tips4PC.com provides free computer tips and advice for anyone who wants to learn something new. All the information is written in an easy to understand way.","sameAs":["http:\/\/tips4pc.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/tips4pc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/39458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=39458"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/39458\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=39458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=39458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=39458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}