{"id":41558,"date":"2013-02-13T01:17:30","date_gmt":"2013-02-13T01:17:30","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=41558"},"modified":"2013-02-13T15:19:57","modified_gmt":"2013-02-13T15:19:57","slug":"how-secure-is-your-email","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/","title":{"rendered":"How Secure is your Email?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/email.jpg\" alt=\"email\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-41561\" \/><\/p>\n<p>By Rob Cheng<\/p>\n<p>Think for a moment about a piece of information that you know about yourself that no one else in the world knows.  I mean absolutely no one.  It isn&#8217;t your high school&#8217;s mascot.  Obviously everyone with whom you went to high school would know that.  It isn&#8217;t your mother&#8217;s maiden name.  Your mother and everyone that knew your mother before she was married would know that.  It isn&#8217;t the last 4 digits of your social security number.  Your bank, your cable company, your doctor&#8217;s office and virtually every other business has that information.<\/p>\n<p>There are two distinct types of security holes that threaten your identity and your life as you know it.  First, is your computer itself.  As we described in the prior article, criminals are overtaking our computers through security holes and then <a href=\"https:\/\/www.pcmatic.com\/blog\/2013\/01\/31\/the-anatomy-of-a-virus\/\">extorting millions through fear<\/a> and doubt.  The other and perhaps more dangerous type is hacking our email accounts and passwords.<\/p>\n<p>In the 2008 presidential campaign <a href=\"http:\/\/en.wikipedia.org\/wiki\/Sarah_Palin_email_hack\">Republican vice presidential candidate<\/a> Sarah Palin&#8217;s Yahoo email account was hacked. In order to hack Mrs. Palin&#8217;s account, the hacker needed only two pieces of information, her birth date and her high school.  Since she was a vice presidential candidate, in the words of the hacker himself, it took only minutes to obtain the information to hack her account.<\/p>\n<p>Once the hacker had this information, it was child&#8217;s play to get Yahoo to reset Palin&#8217;s password allowing him full access to her email.  The hacker then read all of her email and made public her most embarrassing emails.  To be honest, Sarah Palin was quite lucky.  The hacker was just a kid that wanted to derail her election campaign.  Had the hacker been an organization, they now had the ability to get the passwords for everything that Mrs. Palin held near and dear.  This includes her Facebook and Google accounts, but more importantly, all of her financial institutions, Amazon credit card information, and so on.  She could have been ruined, all because she told the truth on her security questions.<\/p>\n<p>That was 4 years ago, and sadly, Yahoo&#8217;s security hasn&#8217;t improved much.  On top of that, we learn that <a href=\"http:\/\/www.thesmokinggun.com\/documents\/bush-family-hacked-589132\">George W Bush&#8217;s email was hacked<\/a>, and somehow the state of <a href=\"http:\/\/venturebeat.com\/2012\/10\/26\/south-carolina-hack\/\">South Carolina&#8217;s tax database was hacked<\/a> putting close to 4 millions taxpayers at risk of identity theft.<\/p>\n<p>Your email is the hub to your digital world.  Once your email is compromised, the hacker has access to every web site that is linked to that email address potentially including your favorite online shopping sites, your bank balance, your credit card and so on.  The problem is that the free email sites (Yahoo, GMail and Hotmail) have implemented security questions which represent a huge security hole into your email. <\/p>\n<p>The advice is clear.  NEVER answer the security question accurately unless you are absolutely 100% sure that no one else can ascertain this information.  In today&#8217;s day and age of Facebook and thousands of public online databases, this is essentially impossible.  My friend <a href=\"http:\/\/billpstudios.blogspot.com\/2013\/02\/banking-system-fails-due-to-security.html\" target=\"_blank\">Bill Pytlovany suggests inventing interesting and playful responses<\/a> to your security questions.  This is good fun, but I would suggest the following.  <\/p>\n<p>Choose a new password for your email password that is different than all of the other passwords you have.  Engrave that password in your mind until it is permanent because this is so important.  Then after that has been accomplished, delete all the security questions.  I have done this with my Yahoo and Google email accounts and life is just more secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/email.jpg\" alt=\"email\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-41561\" \/><\/p>\n<p>There are two distinct types of security holes that threaten your identity and your life as you know it.<\/p>\n","protected":false},"author":2,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[445],"class_list":["post-41558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog","tag-email-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Secure is your Email?<\/title>\n<meta name=\"description\" content=\"There are two distinct types of security holes that threaten your identity and your life as you know it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Secure is your Email?\" \/>\n<meta property=\"og:description\" content=\"There are two distinct types of security holes that threaten your identity and your life as you know it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-13T01:17:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-02-13T15:19:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"chengrob\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"chengrob\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/\"},\"author\":{\"name\":\"chengrob\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f4bc5db4f3aebf42c74a093db5fbef76\"},\"headline\":\"How Secure is your Email?\",\"datePublished\":\"2013-02-13T01:17:30+00:00\",\"dateModified\":\"2013-02-13T15:19:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/\"},\"wordCount\":601,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"email security\"],\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/\",\"name\":\"How Secure is your Email?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2013-02-13T01:17:30+00:00\",\"dateModified\":\"2013-02-13T15:19:57+00:00\",\"description\":\"There are two distinct types of security holes that threaten your identity and your life as you know it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-secure-is-your-email\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Secure is your Email?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f4bc5db4f3aebf42c74a093db5fbef76\",\"name\":\"chengrob\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/chengrob\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Secure is your Email?","description":"There are two distinct types of security holes that threaten your identity and your life as you know it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/","og_locale":"en_US","og_type":"article","og_title":"How Secure is your Email?","og_description":"There are two distinct types of security holes that threaten your identity and your life as you know it.","og_url":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2013-02-13T01:17:30+00:00","article_modified_time":"2013-02-13T15:19:57+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"chengrob","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"chengrob","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/"},"author":{"name":"chengrob","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f4bc5db4f3aebf42c74a093db5fbef76"},"headline":"How Secure is your Email?","datePublished":"2013-02-13T01:17:30+00:00","dateModified":"2013-02-13T15:19:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/"},"wordCount":601,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["email security"],"articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/","url":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/","name":"How Secure is your Email?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2013-02-13T01:17:30+00:00","dateModified":"2013-02-13T15:19:57+00:00","description":"There are two distinct types of security holes that threaten your identity and your life as you know it.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/how-secure-is-your-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Secure is your Email?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f4bc5db4f3aebf42c74a093db5fbef76","name":"chengrob","url":"https:\/\/www.pcmatic.com\/blog\/author\/chengrob\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/41558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=41558"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/41558\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=41558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=41558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=41558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}