{"id":39743,"date":"2012-12-04T19:30:49","date_gmt":"2012-12-04T19:30:49","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=39743"},"modified":"2012-12-04T19:30:49","modified_gmt":"2012-12-04T19:30:49","slug":"five-common-wifi-security-mistakes","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/","title":{"rendered":"Five Common WiFi Security Mistakes"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/wifirankin.jpg\" alt=\"\" title=\"wifirankin\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-39748\" \/><\/p>\n<h3>Five Common WiFi Security Mistakes<\/h3>\n<p>By Bob Rankin<\/p>\n<p>WiFi networking is convenient and liberating, and essential if you have a laptop or tablet. But if you aren\u2019t careful, using wireless Internet can leave you open to hackers and unauthorized moochers of your Internet service. Here are five of the biggest mistakes that people make with WiFi, and how to avoid them. Read on!<\/p>\n<p><strong>Is Your WiFi Wide Open?<\/strong><\/p>\n<p>Several years ago, I got a new high-speed Internet service at my home. And then something curious happened. Cars were stopping in front my house, and staying for 10 or 15 minutes. There&#8217;s no reason for anyone to stop there, so my spider sense began to tingle. After checking my wireless router, I found that Verizon had left it wide open. Without a wifi password, anyone could connect! I locked it down with an encryption password, and the daily stream of cars stopped.<\/p>\n<p><strong>MISTAKE #1:<\/strong> Failing to enable encryption on your WiFi network lets anyone within range of your wireless router join your network. If file and printer sharing are also enabled, random passersby may be able to sift through everything on every computer on your home or office network. Unencrypted WiFi also allows eavesdropping on your Internet traffic even if the snoop is not connected to your network. Data passing between a computer and a wireless router is broadcast in all directions as far as several hundred feet. <\/p>\n<p>Moochers on unsecured WiFi networks may slow the traffic of authorized users, or even download illegally while leaving the network\u2019s owner with the legal consequences. For these reasons, it\u2019s vital to set up your wireless network to use one of the encryption methods built into all wireless routers.<\/p>\n<p><strong>MISTAKE #2:<\/strong> While you&#8217;re locking down your wifi signal, don\u2019t make the mistake of choosing WEP, the oldest and weakest encryption method. It can be cracked in about two minutes using software easily found online. Unfortunately, WEP is often the first option on a router\u2019s list of available encryption methods, so don\u2019t be lazy and choose it for that reason. Use WPA2 encryption with the Personal (PSK) option, for the best protection.<\/p>\n<p>(See my related article Is Your Wireless Router REALLY Secure? to learn how a couple in Minnesota almost got framed for harassment, trafficking in child porn, and threatening the Vice President &#8212; all because they used WEP encryption on their wireless router.)<\/p>\n<p><b><a href=\"http:\/\/askbobrankin.com\/five_common_wifi_security_mistakes.html?pcp\">Article Continued Here<\/a><\/b><\/p>\n<p>Excerpt shared with permission from Bob Rankin.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/wifirankin.jpg\" alt=\"\" title=\"wifirankin\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-39748\" \/><\/p>\n<p>Here are five of the biggest mistakes that people make with WiFi, and how to avoid them. Read on!<\/p>\n","protected":false},"author":20,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[13],"tags":[512],"class_list":["post-39743","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bob-rankin","tag-wifi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Five Common WiFi Security Mistakes<\/title>\n<meta name=\"description\" content=\"Here are five of the biggest mistakes that people make with WiFi, and how to avoid them. Read on!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Common WiFi Security Mistakes\" \/>\n<meta property=\"og:description\" content=\"Here are five of the biggest mistakes that people make with WiFi, and how to avoid them. Read on!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-04T19:30:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bob Rankin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rankin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/\"},\"author\":{\"name\":\"Bob Rankin\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/14737bf7fced6827446b09e297ea0744\"},\"headline\":\"Five Common WiFi Security Mistakes\",\"datePublished\":\"2012-12-04T19:30:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/\"},\"wordCount\":418,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"wifi\"],\"articleSection\":[\"Bob Rankin\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/\",\"name\":\"Five Common WiFi Security Mistakes\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2012-12-04T19:30:49+00:00\",\"description\":\"Here are five of the biggest mistakes that people make with WiFi, and how to avoid them. Read on!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/five-common-wifi-security-mistakes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five Common WiFi Security Mistakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/14737bf7fced6827446b09e297ea0744\",\"name\":\"Bob Rankin\",\"description\":\"Bob Rankin is a translator for the technology impaired -- a writer and computer programmer who enjoys exploring the Internet and explaining technology in plain English. His work has appeared in Computer World, NY Newsday, and other publications. Bob is also publisher of Internet TOURBUS, author of several computer books, and creator of the Lowfat Linux tutorial.\",\"sameAs\":[\"http:\\\/\\\/askbobrankin.com\\\/tbsignup.html?pcp\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/bobrankin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Common WiFi Security Mistakes","description":"Here are five of the biggest mistakes that people make with WiFi, and how to avoid them. Read on!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/","og_locale":"en_US","og_type":"article","og_title":"Five Common WiFi Security Mistakes","og_description":"Here are five of the biggest mistakes that people make with WiFi, and how to avoid them. Read on!","og_url":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2012-12-04T19:30:49+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Bob Rankin","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Bob Rankin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/"},"author":{"name":"Bob Rankin","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/14737bf7fced6827446b09e297ea0744"},"headline":"Five Common WiFi Security Mistakes","datePublished":"2012-12-04T19:30:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/"},"wordCount":418,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["wifi"],"articleSection":["Bob Rankin"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/","url":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/","name":"Five Common WiFi Security Mistakes","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2012-12-04T19:30:49+00:00","description":"Here are five of the biggest mistakes that people make with WiFi, and how to avoid them. Read on!","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/five-common-wifi-security-mistakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Five Common WiFi Security Mistakes"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/14737bf7fced6827446b09e297ea0744","name":"Bob Rankin","description":"Bob Rankin is a translator for the technology impaired -- a writer and computer programmer who enjoys exploring the Internet and explaining technology in plain English. His work has appeared in Computer World, NY Newsday, and other publications. Bob is also publisher of Internet TOURBUS, author of several computer books, and creator of the Lowfat Linux tutorial.","sameAs":["http:\/\/askbobrankin.com\/tbsignup.html?pcp"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/bobrankin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/39743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=39743"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/39743\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=39743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=39743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=39743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}