{"id":46728,"date":"2013-12-02T19:52:30","date_gmt":"2013-12-02T19:52:30","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=46728"},"modified":"2013-12-05T18:32:25","modified_gmt":"2013-12-05T18:32:25","slug":"preventing-pc-crippling-extortion-attack","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/","title":{"rendered":"Preventing a Crippling Cryptolocker Extortion Attack"},"content":{"rendered":"<p><\/br>By Bill Pytlovany<\/p>\n<h3>Preventing a Crippling Cryptolocker Extortion Attack<\/h3>\n<p><i><font SIZE=\"2\">A common example of how Cryptolocker is infecting computers.&#8211;PC Pitstop<\/i><\/font><\/p>\n<p>A common way computers are infected or compromised has always been a simple yet well thought out deception. It can happen to anyone and the use of social trickery is nothing new. Understanding the victim is all that\u2019s needed to receive their cooperation.  <\/p>\n<p>If you\u2019re thinking it could never happen to me this refresher couldn\u2019t hurt. You might want to share the examples here with your friends, family and especially your employees. Social engineering has come a long way since the possibility of seeing Anna Kournikova naked.<\/p>\n<p>Here\u2019s a common example that has been used to infect computers with the crippling Cryptolocker extortion attack.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-email-fedex_thumb1.jpg\" alt=\"blog-email-fedex_thumb1\" width=\"496\" height=\"414\" class=\"alignleft size-full wp-image-46734\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-email-fedex_thumb1.jpg 496w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-email-fedex_thumb1-300x250.jpg 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/><\/p>\n<p><BR CLEAR=LEFT><\/p>\n<p>This one and variations are going to get more popular as Santa starts shipping his presents. In this example the \u201cFrom\u201d email isn\u2019t even disguised which means these guys were really lazy. Don\u2019t bother replying because the Email address belongs to someone who has already been hacked and was probably shut down by the time you receive your Email. <\/p>\n<p><strong><a href=\"http:\/\/billpstudios.blogspot.com\/2013\/11\/employee-manual-to-prevent-crytolocker.html\" target=\"_blank\">Article continued here<\/a><\/strong><\/p>\n<p>This post is excerpted with Bill&#8217;s permission from his blog<\/p>\n<p><strong><br \/>\nNote to PC Matic users:<\/strong> Because PC Matic\u2019s security, called Super Shield, uses a white list and a black list, you are protected from ransomware like Cryptolocker, but you have to make sure Super Shield is properly enabled. We are getting reports of PC Matic users becoming infected because they have not enabled Super Shield. It is not hard to know. Just look at the tray icon and the Super Shield logo should be present and green.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/blog-email-fedex_thumb1-150x150.jpg\" alt=\"blog-email-fedex_thumb1\" width=\"150\" height=\"150\" class=\"alignleft size-thumbnail wp-image-46734\" \/><\/p>\n<p>A common example of how Cryptolocker is infecting computers.<\/p>\n","protected":false},"author":14,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[86],"tags":[4590],"class_list":["post-46728","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bill-pytlovany","tag-cryptolocker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preventing a Crippling Cryptolocker Extortion Attack<\/title>\n<meta name=\"description\" content=\"Preventing a Crippling Cryptolocker Extortion Attack\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preventing a Crippling Cryptolocker Extortion Attack\" \/>\n<meta property=\"og:description\" content=\"Preventing a Crippling Cryptolocker Extortion Attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2013-12-02T19:52:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-12-05T18:32:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bill Pytlovany\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bill Pytlovany\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/\"},\"author\":{\"name\":\"Bill Pytlovany\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/bdfb84810004329361ff982a09c6fde0\"},\"headline\":\"Preventing a Crippling Cryptolocker Extortion Attack\",\"datePublished\":\"2013-12-02T19:52:30+00:00\",\"dateModified\":\"2013-12-05T18:32:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/\"},\"wordCount\":287,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"cryptolocker\"],\"articleSection\":[\"Bill Pytlovany\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/\",\"name\":\"Preventing a Crippling Cryptolocker Extortion Attack\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2013-12-02T19:52:30+00:00\",\"dateModified\":\"2013-12-05T18:32:25+00:00\",\"description\":\"Preventing a Crippling Cryptolocker Extortion Attack\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-pc-crippling-extortion-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preventing a Crippling Cryptolocker Extortion Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/bdfb84810004329361ff982a09c6fde0\",\"name\":\"Bill Pytlovany\",\"description\":\"BillP Studios founder and industry insider Bill Pytlovany was at one time best known for his leading role in creating the software behind the service now called, AOL. These days Bill is better for helping to increase the performance and security of hundreds of thousand of computers - through his award winning product - Win Patrol.\",\"sameAs\":[\"http:\\\/\\\/billpstudios.blogspot.com\\\/\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/bill-p\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preventing a Crippling Cryptolocker Extortion Attack","description":"Preventing a Crippling Cryptolocker Extortion Attack","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/","og_locale":"en_US","og_type":"article","og_title":"Preventing a Crippling Cryptolocker Extortion Attack","og_description":"Preventing a Crippling Cryptolocker Extortion Attack","og_url":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2013-12-02T19:52:30+00:00","article_modified_time":"2013-12-05T18:32:25+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Bill Pytlovany","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Bill Pytlovany","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/"},"author":{"name":"Bill Pytlovany","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/bdfb84810004329361ff982a09c6fde0"},"headline":"Preventing a Crippling Cryptolocker Extortion Attack","datePublished":"2013-12-02T19:52:30+00:00","dateModified":"2013-12-05T18:32:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/"},"wordCount":287,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["cryptolocker"],"articleSection":["Bill Pytlovany"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/","url":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/","name":"Preventing a Crippling Cryptolocker Extortion Attack","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2013-12-02T19:52:30+00:00","dateModified":"2013-12-05T18:32:25+00:00","description":"Preventing a Crippling Cryptolocker Extortion Attack","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/preventing-pc-crippling-extortion-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Preventing a Crippling Cryptolocker Extortion Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/bdfb84810004329361ff982a09c6fde0","name":"Bill Pytlovany","description":"BillP Studios founder and industry insider Bill Pytlovany was at one time best known for his leading role in creating the software behind the service now called, AOL. These days Bill is better for helping to increase the performance and security of hundreds of thousand of computers - through his award winning product - Win Patrol.","sameAs":["http:\/\/billpstudios.blogspot.com\/"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/bill-p\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/46728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=46728"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/46728\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=46728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=46728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=46728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}