{"id":41068,"date":"2013-01-29T13:35:59","date_gmt":"2013-01-29T13:35:59","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=41068"},"modified":"2013-01-29T13:36:54","modified_gmt":"2013-01-29T13:36:54","slug":"fake-apple-invoices","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/","title":{"rendered":"Fake Apple Invoices"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeitunes.jpg\" alt=\"fakeitunes\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-41073\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeitunes.jpg 150w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeitunes-120x120.jpg 120w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><\/br><br \/>\n<strong>Fake Apple Invoices<\/strong><\/p>\n<p>By Stu Sjouwerman, for KnowBe4.com Security Awareness Training<\/p>\n<p>Internet criminals are getting more and more inventive with their social engineering attacks. Here are two examples of fake Apple invoices. The first is an example from the Sophos blog showing a $699.99 charge for a postcard. The link \u201cView\/Download\u201d ends in download.jpg.exe, while the \u201cCancel\u201d and \u201cNot your order\u201d URLs end in check.php. The smart social engineering in these fakes is that the victim gets scammed either way, whether you are curious what this is about or upset with this seemingly unauthorized charge, you are still likely to click one of the links:<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Fake_Apple_2.png\" alt=\"Fake_Apple_2\" width=\"500\" height=\"502\" class=\"alignleft size-full wp-image-41071\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Fake_Apple_2.png 500w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Fake_Apple_2-150x150.png 150w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Fake_Apple_2-298x300.png 298w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Fake_Apple_2-120x120.png 120w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><BR CLEAR=LEFT><\/p>\n<p><strong><a href=\"http:\/\/blog.knowbe4.com\/fake-apple-invoices\/\" target=\"_blank\">Article continued here<\/a><\/strong><\/p>\n<p>This excerpt appears with permission from knowbe4.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/fakeitunes.jpg\" alt=\"fakeitunes\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-41073\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeitunes.jpg 150w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeitunes-120x120.jpg 120w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>Internet criminals are getting more and more inventive with their social engineering attacks.<\/p>\n","protected":false},"author":40,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4352],"tags":[235],"class_list":["post-41068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowbe4-com","tag-scams"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fake Apple Invoices<\/title>\n<meta name=\"description\" content=\"Internet criminals are getting more and more inventive with their social engineering attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fake Apple Invoices\" \/>\n<meta property=\"og:description\" content=\"Internet criminals are getting more and more inventive with their social engineering attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2013-01-29T13:35:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-01-29T13:36:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"knowbe4.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"knowbe4.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/\"},\"author\":{\"name\":\"knowbe4.com\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/02162494533603435e72f7f0cfc7dfd0\"},\"headline\":\"Fake Apple Invoices\",\"datePublished\":\"2013-01-29T13:35:59+00:00\",\"dateModified\":\"2013-01-29T13:36:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/\"},\"wordCount\":123,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"scams\"],\"articleSection\":[\"knowbe4.com\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/\",\"name\":\"Fake Apple Invoices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2013-01-29T13:35:59+00:00\",\"dateModified\":\"2013-01-29T13:36:54+00:00\",\"description\":\"Internet criminals are getting more and more inventive with their social engineering attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fake-apple-invoices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fake Apple Invoices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/02162494533603435e72f7f0cfc7dfd0\",\"name\":\"knowbe4.com\",\"description\":\"KnowBe4 delivers next-generation security awareness training and testing, security consulting \\\/ penetration testing and innovative security software products addressing the needs of business owners, IT, HR, and end-users.\",\"sameAs\":[\"http:\\\/\\\/knowbe4.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/knowbe4-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fake Apple Invoices","description":"Internet criminals are getting more and more inventive with their social engineering attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/","og_locale":"en_US","og_type":"article","og_title":"Fake Apple Invoices","og_description":"Internet criminals are getting more and more inventive with their social engineering attacks.","og_url":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2013-01-29T13:35:59+00:00","article_modified_time":"2013-01-29T13:36:54+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"knowbe4.com","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"knowbe4.com","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/"},"author":{"name":"knowbe4.com","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/02162494533603435e72f7f0cfc7dfd0"},"headline":"Fake Apple Invoices","datePublished":"2013-01-29T13:35:59+00:00","dateModified":"2013-01-29T13:36:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/"},"wordCount":123,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["scams"],"articleSection":["knowbe4.com"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/","url":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/","name":"Fake Apple Invoices","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2013-01-29T13:35:59+00:00","dateModified":"2013-01-29T13:36:54+00:00","description":"Internet criminals are getting more and more inventive with their social engineering attacks.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/fake-apple-invoices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Fake Apple Invoices"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/02162494533603435e72f7f0cfc7dfd0","name":"knowbe4.com","description":"KnowBe4 delivers next-generation security awareness training and testing, security consulting \/ penetration testing and innovative security software products addressing the needs of business owners, IT, HR, and end-users.","sameAs":["http:\/\/knowbe4.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/knowbe4-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/41068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=41068"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/41068\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=41068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=41068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=41068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}