{"id":51297,"date":"2015-07-14T20:21:13","date_gmt":"2015-07-14T20:21:13","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=51297"},"modified":"2015-07-17T01:13:14","modified_gmt":"2015-07-17T01:13:14","slug":"dealing-with-flash-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/","title":{"rendered":"Dealing with Flash Vulnerabilities"},"content":{"rendered":"<p><\/br><\/p>\n<h4>Dealing with Flash Vulnerabilities<\/h4>\n<p>At this point, there are not many viable alternatives to Flash. However, the security concerns associated with Flash have become so serious and prevalent \u2013 that we decided it was important to share the warnings being issued across the industry \u2013 so members of our community can be better informed. Should you prefer to keep Flash, we strongly encourage you to make sure the application is always up to date.<\/p>\n<p>Great information from Tom&#8217;s Hardware for those looking for the best way to cope with the seemingly never ending list of Flash security vulnerabilities.<\/p>\n<blockquote><p>\n<strong>(UPDATE:<\/strong> As of the morning of July 14, both the <a href=\"http:\/\/arstechnica.com\/security\/2015\/07\/firefox-blacklists-flash-player-due-to-unpatched-0-day-vulnerabilities\/\" target=\"_blank\">Mozilla Firefox<\/a> and Google Chrome browsers blocked Flash from running automatically. Users could still choose to run individual instances of Flash.)<\/p>\n<p><strong>(UPDATE:<\/strong> Adobe patched the two latest flaws July 14, according to the company&#8217;s latest security bulletin. As of this writing, both Chrome and Firefox were still blocking Flash from automatically running. Firefox and Microsoft Internet Explorer users can manually update here; be sure to uncheck the &#8220;optional offers&#8221; to avoid potentially unwanted programs being installed along with the Flash update. Chrome should automatically update itself later today.)<\/p>\n<p>The previously unknown flaws were in files stolen from Hacking Team, an Italian company that sells digital surveillance tools to governments worldwide, and posted online July 5. In an advisory posted Friday, Adobe said it &#8220;expects&#8221; to provide patches for the vulnerabilities &#8220;during the week of July 12, 2015.&#8221;<\/p>\n<p>Even after these flaws are patched, Adobe Flash Player will still be a huge security risk. Alex Stamos, head of security at Facebook, yesterday urged that &#8220;Adobe &#8230; announce the end-of-life date for Flash,&#8221; adding that browsers should disable Flash at the same time.<\/p>\n<p>To heed Stamos&#8217; advice, you may want to leave Flash permanently disabled, although you won&#8217;t be able to view many animations and, well, animated ads. A less drastic solution is to set Flash to &#8220;click to run&#8221;; any Flash animation that wants to run will need your permission first.&#8211;<a href=\"http:\/\/www.tomsguide.com\/us\/disable-flash-how-to,news-21335.html\" target=\"_blank\">http:\/\/www.tomsguide.com\/us\/disable-flash-how-to,news-21335.html<\/a> <\/p><\/blockquote>\n<blockquote><p><strong><br \/>\nHow to Disable Flash<\/strong> <a href=\"http:\/\/www.tomsguide.com\/us\/disable-flash-how-to,news-21335.html\" target=\"_blank\">http:\/\/www.tomsguide.com\/us\/disable-flash-how-to,news-21335.html<\/a><\/p>\n<p>Two critical flaws in Adobe Flash Player were found this past Friday (July 10), and Adobe can promise only that it will patch the vulnerabilities sometime this week. Until then, it&#8217;s best to disable Flash Player in all desktop Web browsers.<\/p><\/blockquote>\n<blockquote><p><strong>How to Set Adobe Flash Player to Click-to-Run<\/strong> <a href=\"http:\/\/www.tomsguide.com\/us\/flash-click-to-run-how-to,news-20422.html\" target=\"_blank\">http:\/\/www.tomsguide.com\/us\/flash-click-to-run-how-to,news-20422.html<\/a><\/p>\n<p>To maximize your Web security and defeat the seemingly endless supply of malware that exploits the innumerable flaws in Flash Player, you should change your browser settings so that Flash Player plays only the content that you select by clicking on it.<\/p>\n<p>This way, you&#8217;ll still be able to watch YouTube videos in older browsers (newer ones use HTML5), but you won&#8217;t be bothered by annoying animated ads or infected by malicious websites and ads\n<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Great information from Tom&#8217;s Hardware for those looking for the best way to cope with the seemingly never ending list of Flash security vulnerabilities.<\/p>\n","protected":false},"author":12,"featured_media":45923,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[183],"tags":[4812],"class_list":["post-51297","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips","tag-adobe-flash"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dealing with Flash Vulnerabilities<\/title>\n<meta name=\"description\" content=\"Dealing with Flash Vulnerabilities - Great information from Tom&#039;s Hardware for those looking for the best way to cope with the seemingly never ending list of Flash security vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dealing with Flash Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"Dealing with Flash Vulnerabilities - Great information from Tom&#039;s Hardware for those looking for the best way to cope with the seemingly never ending list of Flash security vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-14T20:21:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-17T01:13:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/adobe150.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PC Matic Cybersecurity\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Cybersecurity\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/\"},\"author\":{\"name\":\"PC Matic Cybersecurity\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\"},\"headline\":\"Dealing with Flash Vulnerabilities\",\"datePublished\":\"2015-07-14T20:21:13+00:00\",\"dateModified\":\"2015-07-17T01:13:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/\"},\"wordCount\":491,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/adobe150.jpg\",\"keywords\":[\"adobe flash\"],\"articleSection\":[\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/\",\"name\":\"Dealing with Flash Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/adobe150.jpg\",\"datePublished\":\"2015-07-14T20:21:13+00:00\",\"dateModified\":\"2015-07-17T01:13:14+00:00\",\"description\":\"Dealing with Flash Vulnerabilities - Great information from Tom's Hardware for those looking for the best way to cope with the seemingly never ending list of Flash security vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/adobe150.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/adobe150.jpg\",\"width\":150,\"height\":150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/dealing-with-flash-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dealing with Flash Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\",\"name\":\"PC Matic Cybersecurity\",\"description\":\"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.\",\"sameAs\":[\"https:\\\/\\\/techtalk.pcpitstop.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pcpitstop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dealing with Flash Vulnerabilities","description":"Dealing with Flash Vulnerabilities - Great information from Tom's Hardware for those looking for the best way to cope with the seemingly never ending list of Flash security vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Dealing with Flash Vulnerabilities","og_description":"Dealing with Flash Vulnerabilities - Great information from Tom's Hardware for those looking for the best way to cope with the seemingly never ending list of Flash security vulnerabilities.","og_url":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2015-07-14T20:21:13+00:00","article_modified_time":"2015-07-17T01:13:14+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/adobe150.jpg","type":"image\/jpeg"}],"author":"PC Matic Cybersecurity","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Cybersecurity","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/"},"author":{"name":"PC Matic Cybersecurity","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f"},"headline":"Dealing with Flash Vulnerabilities","datePublished":"2015-07-14T20:21:13+00:00","dateModified":"2015-07-17T01:13:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/"},"wordCount":491,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/adobe150.jpg","keywords":["adobe flash"],"articleSection":["tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/","url":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/","name":"Dealing with Flash Vulnerabilities","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/adobe150.jpg","datePublished":"2015-07-14T20:21:13+00:00","dateModified":"2015-07-17T01:13:14+00:00","description":"Dealing with Flash Vulnerabilities - Great information from Tom's Hardware for those looking for the best way to cope with the seemingly never ending list of Flash security vulnerabilities.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/adobe150.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/adobe150.jpg","width":150,"height":150},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/dealing-with-flash-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Dealing with Flash Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f","name":"PC Matic Cybersecurity","description":"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.","sameAs":["https:\/\/techtalk.pcpitstop.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/pcpitstop\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/51297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=51297"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/51297\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/45923"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=51297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=51297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=51297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}