{"id":51081,"date":"2015-06-17T16:29:25","date_gmt":"2015-06-17T16:29:25","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=51081"},"modified":"2015-06-18T01:27:41","modified_gmt":"2015-06-18T01:27:41","slug":"federal-hack-runs-deep","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/","title":{"rendered":"Federal Hack Runs Deep"},"content":{"rendered":"<p><\/br><\/p>\n<h4>Federal Hack Runs Deep<\/h4>\n<p>The recently revealed hack of federal computers runs much deeper than previously thought.<\/p>\n<blockquote><p><strong>Up to 14 million exposed in federal hack<\/strong><\/p>\n<p>A massive hack of the federal government may have compromised personal information belonging to 9 million to 14 million people, far more than was initially believed. <\/p>\n<p>Multiple sources on Capitol Hill, within the federal workforce and around Washington have estimated that the final tally of people affected by the hack could easily eclipse the 4 million reported by the Obama administration. <\/p>\n<p>Already, the theft of data from the Office of Personnel Management (OPM) is the largest data breach ever at the federal government. With an increase in the scope of the attack \u2014 which officials, speaking privately, have traced back to China \u2014 the Obama administration&#8217;s response will face further scrutiny and more questions about the state of the nation\u2019s digital security.&#8211;<\/br><a href=\"http:\/\/thehill.com\/policy\/cybersecurity\/244737-up-to-14-million-exposed-in-fed-hack\" target=\"_blank\">http:\/\/thehill.com\/policy\/cybersecurity\/244737-up-to-14-million-exposed-in-fed-hack<\/a><\/p><\/blockquote>\n<blockquote><p><strong>Officials say deeply personal information in hackers&#8217; hands<\/strong><\/p>\n<p>Deeply personal information submitted by U.S. intelligence and military personnel for security clearances \u2014 mental illnesses, drug and alcohol use, past arrests, bankruptcies and more \u2014 is in the hands of hackers linked to China, officials say.<\/p>\n<p>In describing a cyberbreach of federal records dramatically worse than first acknowledged, authorities point to Standard Form 86, which applicants are required to complete. Applicants also must list contacts and relatives, potentially exposing any foreign relatives of U.S. intelligence employees to coercion. Both the applicant&#8217;s Social Security number and that of his or her cohabitant are required.<\/p>\n<p>&#8230;the hackers are now in possession of all personnel data for every federal employee, every federal retiree and up to 1 million former federal employees.&#8221;<\/p>\n<p>&#8220;Former Rep. Mike Rogers, one-time chairman of the House Intelligence Committee, said last week that he believes China will use the recently stolen information for &#8216;the mother of all spear-phishing attacks.&#8211;<\/br><a href=\"http:\/\/www.stripes.com\/news\/us\/officials-say-deeply-personal-information-in-hackers-hands-1.352202\" target=\"_blank\">http:\/\/www.stripes.com\/news\/us\/officials-say-deeply-personal-information-in-hackers-hands-1.352202<\/a><\/p><\/blockquote>\n<p><iframe width=\"590\" height=\"332\" src=\"http:\/\/launch.newsinc.com\/?type=VideoPlayer\/Single&#038;widgetId=1&#038;trackingGroup=69016&#038;siteSection=stripes_hom_non_sec_dynamic_wire_ap&#038;videoId=29229297\" frameborder=\"no\" scrolling=\"no\" noresize marginwidth=\"0\" marginheight=\"0\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recently revealed hack of federal computers runs much deeper than previously thought.<\/p>\n","protected":false},"author":12,"featured_media":41764,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[183],"tags":[625],"class_list":["post-51081","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips","tag-online-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Federal Hack Runs Deep<\/title>\n<meta name=\"description\" content=\"Federal Hack Runs Deep - The recently revealed hack of federal computers runs much deeper than previously thought.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Federal Hack Runs Deep\" \/>\n<meta property=\"og:description\" content=\"Federal Hack Runs Deep - The recently revealed hack of federal computers runs much deeper than previously thought.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-17T16:29:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-06-18T01:27:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PC Matic Cybersecurity\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Cybersecurity\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/\"},\"author\":{\"name\":\"PC Matic Cybersecurity\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\"},\"headline\":\"Federal Hack Runs Deep\",\"datePublished\":\"2015-06-17T16:29:25+00:00\",\"dateModified\":\"2015-06-18T01:27:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/\"},\"wordCount\":320,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/hackers.jpg\",\"keywords\":[\"online security\"],\"articleSection\":[\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/\",\"name\":\"Federal Hack Runs Deep\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/hackers.jpg\",\"datePublished\":\"2015-06-17T16:29:25+00:00\",\"dateModified\":\"2015-06-18T01:27:41+00:00\",\"description\":\"Federal Hack Runs Deep - The recently revealed hack of federal computers runs much deeper than previously thought.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/hackers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/hackers.jpg\",\"width\":150,\"height\":150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-hack-runs-deep\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Federal Hack Runs Deep\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\",\"name\":\"PC Matic Cybersecurity\",\"description\":\"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.\",\"sameAs\":[\"https:\\\/\\\/techtalk.pcpitstop.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pcpitstop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Federal Hack Runs Deep","description":"Federal Hack Runs Deep - The recently revealed hack of federal computers runs much deeper than previously thought.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/","og_locale":"en_US","og_type":"article","og_title":"Federal Hack Runs Deep","og_description":"Federal Hack Runs Deep - The recently revealed hack of federal computers runs much deeper than previously thought.","og_url":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2015-06-17T16:29:25+00:00","article_modified_time":"2015-06-18T01:27:41+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackers.jpg","type":"image\/jpeg"}],"author":"PC Matic Cybersecurity","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Cybersecurity","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/"},"author":{"name":"PC Matic Cybersecurity","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f"},"headline":"Federal Hack Runs Deep","datePublished":"2015-06-17T16:29:25+00:00","dateModified":"2015-06-18T01:27:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/"},"wordCount":320,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackers.jpg","keywords":["online security"],"articleSection":["tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/","url":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/","name":"Federal Hack Runs Deep","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackers.jpg","datePublished":"2015-06-17T16:29:25+00:00","dateModified":"2015-06-18T01:27:41+00:00","description":"Federal Hack Runs Deep - The recently revealed hack of federal computers runs much deeper than previously thought.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackers.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackers.jpg","width":150,"height":150},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/federal-hack-runs-deep\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Federal Hack Runs Deep"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f","name":"PC Matic Cybersecurity","description":"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.","sameAs":["https:\/\/techtalk.pcpitstop.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/pcpitstop\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/51081","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=51081"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/51081\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/41764"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=51081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=51081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=51081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}