{"id":51896,"date":"2015-10-05T22:15:30","date_gmt":"2015-10-05T22:15:30","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=51896"},"modified":"2015-10-05T22:15:30","modified_gmt":"2015-10-05T22:15:30","slug":"8-steps-for-coping-with-email-hacks","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/","title":{"rendered":"8 Steps for Coping with Email Hacks"},"content":{"rendered":"<p><\/p>\n<p><i><font SIZE=\"2\">8 steps for coping and recovering from an email hack.&#8211;PC Pitstop.<\/i><\/font><\/p>\n<h4>8 Steps for Coping with Email Hacks<\/h4>\n<p>by Suzanne Kantra for Techlicious<\/p>\n<p>Recently, I got an email from a friend urging me to check out an amazing page. Between the grammatical errors and a link pointing to a server somewhere in Russia, it was obvious that my friend\u2019s email account had been hacked.  <\/p>\n<p>When I checked in with her another way, she already knew about the problem\u2014the hacker&#8217;s message had gone out to her entire address book\u2014and she was quite concerned. So I walked her through the steps for getting everything back in order.<\/p>\n<p><strong>Step #1: Change your password<\/strong><br \/>\nThe very first thing you should do is keep the hacker from getting back into your email account. Change your password to a strong password that is not related to your prior password; if your last password was billyjoe1, don&#8217;t pick billyjoe2\u2014and if your name is actually BillyJoe, you shouldn&#8217;t have been using your name as your password in the first place.<\/p>\n<p>Try using a meaningful sentence as the basis of your new password. For example, \u201cI go to the gym in the morning\u201d turns into \u201cIg2tGYMitm\u201d using the first letter of each word in the sentence, mixing uppercase and lowercase letters and replacing the word \u201cto\u201d with \u201c2.\u201d<\/p>\n<p><strong>Step #2: Reclaim your account<\/strong><br \/>\nIf you\u2019re lucky, the hacker only logged into your account to send a mass email to all of your contacts.<\/p>\n<p>If you\u2019re not so lucky, the hacker changed your password too, locking you out of your account. If that\u2019s the case, you\u2019ll need to reclaim your account, usually a matter of using the \u201cforgot your password\u201d link and answering your security questions or using your backup email address.<\/p>\n<p>Check out the specific recommendations for reclaiming possession of your account for Gmail, Outlook.com and Hotmail, Yahoo! and AOL.<\/p>\n<p><strong>Step #3: Enable two-factor authentication<\/strong><br \/>\nSet your email account to require a second form of authentication in addition to your password whenever you log into your email account from a new device. When you log in, you&#8217;ll also need to enter a special one-time use code the site will text to your phone or generated via an app.<\/p>\n<p>Check out two-step authentication setup instructions for Gmail, Microsoft\u2019s Outlook.com and Hotmail and Yahoo!. AOL doesn\u2019t support two-factor authentication yet.<\/p>\n<p><b><a href=\"http:\/\/www.techlicious.com\/tip\/what-to-do-when-your-email-gets-hacked\/\" target=\"_blank\">Steps Continued Here<\/a><\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>8 steps for coping and recovering from an email hack.<\/p>\n","protected":false},"author":28,"featured_media":33428,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[671],"tags":[445],"class_list":["post-51896","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techlicious","tag-email-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>8 Steps for Coping with Email Hacks<\/title>\n<meta name=\"description\" content=\"8 Steps for Coping with Email Hacks - 8 steps for coping and recovering from an email hack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Steps for Coping with Email Hacks\" \/>\n<meta property=\"og:description\" content=\"8 Steps for Coping with Email Hacks - 8 steps for coping and recovering from an email hack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-05T22:15:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/email_theft.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Techlicious\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Techlicious\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/\"},\"author\":{\"name\":\"Techlicious\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/00ed303fb3673e23b03fdf5893ec6ab9\"},\"headline\":\"8 Steps for Coping with Email Hacks\",\"datePublished\":\"2015-10-05T22:15:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/\"},\"wordCount\":410,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/email_theft.jpg\",\"keywords\":[\"email security\"],\"articleSection\":[\"Techlicious\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/\",\"name\":\"8 Steps for Coping with Email Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/email_theft.jpg\",\"datePublished\":\"2015-10-05T22:15:30+00:00\",\"description\":\"8 Steps for Coping with Email Hacks - 8 steps for coping and recovering from an email hack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/email_theft.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/email_theft.jpg\",\"width\":\"150\",\"height\":\"150\",\"caption\":\"email hacked? 7 things to do\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-steps-for-coping-with-email-hacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Steps for Coping with Email Hacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/00ed303fb3673e23b03fdf5893ec6ab9\",\"name\":\"Techlicious\",\"description\":\"Techlicious was founded by consumer tech guru, Suzanne Kantra, Techlicious is your daily scoop on everything from the best new mobile phones and apps to holiday shopping guides to step-by-step instructions for protecting your privacy on the Internet.\",\"sameAs\":[\"http:\\\/\\\/techlicious.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/techlicious\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Steps for Coping with Email Hacks","description":"8 Steps for Coping with Email Hacks - 8 steps for coping and recovering from an email hack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/","og_locale":"en_US","og_type":"article","og_title":"8 Steps for Coping with Email Hacks","og_description":"8 Steps for Coping with Email Hacks - 8 steps for coping and recovering from an email hack.","og_url":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2015-10-05T22:15:30+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/email_theft.jpg","type":"image\/jpeg"}],"author":"Techlicious","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Techlicious","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/"},"author":{"name":"Techlicious","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/00ed303fb3673e23b03fdf5893ec6ab9"},"headline":"8 Steps for Coping with Email Hacks","datePublished":"2015-10-05T22:15:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/"},"wordCount":410,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/email_theft.jpg","keywords":["email security"],"articleSection":["Techlicious"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/","url":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/","name":"8 Steps for Coping with Email Hacks","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/email_theft.jpg","datePublished":"2015-10-05T22:15:30+00:00","description":"8 Steps for Coping with Email Hacks - 8 steps for coping and recovering from an email hack.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/email_theft.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/email_theft.jpg","width":"150","height":"150","caption":"email hacked? 7 things to do"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/8-steps-for-coping-with-email-hacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"8 Steps for Coping with Email Hacks"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/00ed303fb3673e23b03fdf5893ec6ab9","name":"Techlicious","description":"Techlicious was founded by consumer tech guru, Suzanne Kantra, Techlicious is your daily scoop on everything from the best new mobile phones and apps to holiday shopping guides to step-by-step instructions for protecting your privacy on the Internet.","sameAs":["http:\/\/techlicious.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/techlicious\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/51896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=51896"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/51896\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/33428"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=51896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=51896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=51896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}