{"id":43257,"date":"2013-05-06T19:43:06","date_gmt":"2013-05-06T19:43:06","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=43257"},"modified":"2013-05-06T19:43:06","modified_gmt":"2013-05-06T19:43:06","slug":"dont-click-that-unknown-email-link","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/","title":{"rendered":"4 Simple Steps to Protect Yourself from Phishing"},"content":{"rendered":"<p><\/p>\n<p>By MakeTechEasier.com<\/p>\n<h3>4 Simple Steps to Protect Yourself from Phishing<\/h3>\n<p>Fishing can be a really enjoyable activity. But, getting fished, or phished for that matter, is not so fun. Yes, it is actually possible for people to get phished. Just like how fish that are fished are lured and killed, people who are phished are deceived and victimized. What exactly is phishing? Phishing is the act of deceiving (usually through email) people to reveal sensitive information such as passwords, bank account numbers, social security number, and credit card information.<\/p>\n<p>With such sensitive information on the line, the stakes are obviously high. Sadly, as dangerous as they are, phishing attacks are common \u2013 very common. The 2012 RSA online fraud report indicates that there is an average of 33,000 phishing attacks each month; and these are just the ones reported. Because phishing attacks are so dangerous and prevalent, it is definitely important to protect yourself from them. This guide shows you how phishing attacks work and how to protect yourselves from them.<\/p>\n<p><strong>How Phishing Attacks Work<\/strong><\/p>\n<p>The main objective of phishing scammers is to steal information. To do this, hackers determine what information they need and how to retrieve it. They usually do this by sending you counterfeit or fake emails that seem to be from a legitimate company like Facebook, Bank of America, and LinkedIn. In a majority of cases, they tell you that you need to update your personal information for security purposes. Here is how one phishing email might look like:<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/facebook-malware-email.png\" alt=\"facebook-malware-email\" width=\"600\" height=\"521\" class=\"alignleft size-full wp-image-43262\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/facebook-malware-email.png 600w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/facebook-malware-email-300x260.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><BR CLEAR=LEFT><\/p>\n<p>Exceptionally aggressive spammers may even tell you that your account will be permanently deleted if you don\u2019t update your information. Such scare tactics may indeed move you to give out your personal information. This is why many people are victims of identity theft. Here is an example of a phishing attack process:<\/p>\n<p><strong>1.<\/strong> You receive an email that seem to be from a legitimate company.<br \/>\n<strong>2.<\/strong> You are told that you need to update personal information for security purposes.<br \/>\n<strong>3.<\/strong> Concerned about safety, you click on the link that points to the counterfeit website.<br \/>\n<strong>4.<\/strong> You land on a website that looks exactly like the real one.<br \/>\n<strong>5.<\/strong> You enter your personal information and attempt to login.<br \/>\n<strong>6.<\/strong> The hacker now has your information \u2013 you\u2019ve just been phished. You are at the mercy of the \u201cphisherman\u201d or hacker. They can hijack your account, go on a spending spree, or selling your account information in the online black market.<\/p>\n<p>As you can see, it only takes about a minute or less to get hacked. Fortunately, you can protect yourself. Follow these tips below.<\/p>\n<p><a href=\"http:\/\/www.maketecheasier.com\/how-email-phising-works\/2013\/05\/04\" target=\"_blank\">How to Protect Yourself \u2013 4 Simple Steps. Article Continued Here<\/a><\/p>\n<p>This excerpt is shared with permission from maketecheasier.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/phishing150.jpg\" alt=\"phishing150\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-43264\" \/><\/p>\n<p>It only takes about a minute or less to get hacked via a phishing attack.. Fortunately, you can protect yourself. Follow these tips.<\/p>\n","protected":false},"author":25,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[20],"tags":[280],"class_list":["post-43257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-maketecheasier-com","tag-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 Simple Steps to Protect Yourself from Phishing<\/title>\n<meta name=\"description\" content=\"It only takes about a minute or less to get hacked via a phishing attack.. Fortunately, you can protect yourself. Follow these tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Simple Steps to Protect Yourself from Phishing\" \/>\n<meta property=\"og:description\" content=\"It only takes about a minute or less to get hacked via a phishing attack.. Fortunately, you can protect yourself. Follow these tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-06T19:43:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Make Tech Easier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Make Tech Easier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/\"},\"author\":{\"name\":\"Make Tech Easier\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ff318d0b7a43136127b75fca5a6f308\"},\"headline\":\"4 Simple Steps to Protect Yourself from Phishing\",\"datePublished\":\"2013-05-06T19:43:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/\"},\"wordCount\":453,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"phishing\"],\"articleSection\":[\"maketecheasier.com\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/\",\"name\":\"4 Simple Steps to Protect Yourself from Phishing\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2013-05-06T19:43:06+00:00\",\"description\":\"It only takes about a minute or less to get hacked via a phishing attack.. Fortunately, you can protect yourself. Follow these tips.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dont-click-that-unknown-email-link\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Simple Steps to Protect Yourself from Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ff318d0b7a43136127b75fca5a6f308\",\"name\":\"Make Tech Easier\",\"description\":\"Make Tech Easier offers computer tips and tricks that will change you to a computer geek (even without you knowing it). Topics covered here include troubleshooting your computer, optimizing operating system performance (be it Windows, Mac or Linux), simplifying tasks, software review and plenty of cool stuff. If you think that computer technology is only for geeks, then they aspire to change your thinking.\",\"sameAs\":[\"http:\\\/\\\/maketecheasier.com\\\/\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/maketecheasier\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 Simple Steps to Protect Yourself from Phishing","description":"It only takes about a minute or less to get hacked via a phishing attack.. Fortunately, you can protect yourself. Follow these tips.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/","og_locale":"en_US","og_type":"article","og_title":"4 Simple Steps to Protect Yourself from Phishing","og_description":"It only takes about a minute or less to get hacked via a phishing attack.. Fortunately, you can protect yourself. Follow these tips.","og_url":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2013-05-06T19:43:06+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Make Tech Easier","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Make Tech Easier","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/"},"author":{"name":"Make Tech Easier","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/1ff318d0b7a43136127b75fca5a6f308"},"headline":"4 Simple Steps to Protect Yourself from Phishing","datePublished":"2013-05-06T19:43:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/"},"wordCount":453,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["phishing"],"articleSection":["maketecheasier.com"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/","url":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/","name":"4 Simple Steps to Protect Yourself from Phishing","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2013-05-06T19:43:06+00:00","description":"It only takes about a minute or less to get hacked via a phishing attack.. Fortunately, you can protect yourself. Follow these tips.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/dont-click-that-unknown-email-link\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"4 Simple Steps to Protect Yourself from Phishing"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/1ff318d0b7a43136127b75fca5a6f308","name":"Make Tech Easier","description":"Make Tech Easier offers computer tips and tricks that will change you to a computer geek (even without you knowing it). Topics covered here include troubleshooting your computer, optimizing operating system performance (be it Windows, Mac or Linux), simplifying tasks, software review and plenty of cool stuff. If you think that computer technology is only for geeks, then they aspire to change your thinking.","sameAs":["http:\/\/maketecheasier.com\/"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/maketecheasier\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/43257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=43257"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/43257\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=43257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=43257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=43257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}