{"id":53022,"date":"2016-04-04T21:43:03","date_gmt":"2016-04-04T21:43:03","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53022"},"modified":"2016-05-23T17:10:28","modified_gmt":"2016-05-23T17:10:28","slug":"the-ransomware-epidemic","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/","title":{"rendered":"The Ransomware Epidemic"},"content":{"rendered":"<p>Has the ransomware epidemic just begun?<!--more--><\/p>\n<p><a href=\"http:\/\/www.pcmatic.com\/ransomware\" target=\"_blank\">Ransomware <\/a>takes your computer by storm, encrypting your most important files and demanding a payout in return for the ecryption key.\u00a0 Unless you have back-ups that are safe, you ultimately have no choice but to pay the ransom to get back whatever files they have locked.\u00a0 According to our Vice President of Cybersecurity, ransomware started by two Pakistani brothers in 1986, and <a href=\"http:\/\/www.infosectoday.com\/Articles\/Ransomware\/Evolution-of-Ransomware.htm#.VwLV24-cEiQ\" target=\"_blank\">the evolution began<\/a>.<\/p>\n<p>Recently, we&#8217;ve read about the increased number of ransomware hits in the public sector.\u00a0 Hospitals, schools, government agencies, and corporations large and small have all fallen victim to ransomware.\u00a0 So why the sudden increase?\u00a0 Because the hackers have been getting away with it, and its been proven to be rather lucrative.<\/p>\n<p><a href=\"http:\/\/www.pcmatic.com\/ransomware\" target=\"_blank\">Ransomware <\/a>has also continued to evolve due to the advances in technology.\u00a0 There is ransomware that may encrypt only files deemed important on your PC.\u00a0 There is ransomware that searches for open endpoints and moves from your computer to the next open endpoint encrypting data along the way.\u00a0 There is also ransomware that locks your entire hard drive.<\/p>\n<p><a href=\"http:\/\/phishme.com\/increase-in-ransomware\/#\" target=\"_blank\">Phish Me <\/a>CEO and co-founder, Rohyt Belani, made the following statement regarding the uptake in ransomware attacks:<\/p>\n<blockquote><p>\u201cRansomware attacks have the potential to become the biggest crime in digital history. They threaten every major sector, from the healthcare industry to government agencies, drive unquantifiable financial losses and, in the case of healthcare, could have life and death implications.\u201d<\/p><\/blockquote>\n<p>So how do you protect yourself?\u00a0 It simply requires two things, a little common sense and a security software program that can keep up with the evolving ransomware threats.\u00a0 First, many of these hackers invade your computer through a phishing attack.\u00a0 So my best advice, think before you click.\u00a0 Do you know the sender of that email?\u00a0 No &#8211; delete.\u00a0 Yes &#8211; Are you expecting something from this person?\u00a0 No &#8211; follow up to make sure it&#8217;s truly from them.\u00a0 Hackers are smart and can make anything look legitimate.<\/p>\n<p>Now, not all phishing attacks will be obvious, so it could be beneficial to take part in a cyber security training course.\u00a0 <a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/02\/12\/free-cyber-security-training-for-pc-matic-users\/\" target=\"_blank\">KnowBe4 <\/a>offers cyber security training, which is a free service to all PC Matic subscribers.<\/p>\n<p>Lastly, and I cannot reiterate this enough, you need a security software that uses <a href=\"http:\/\/www.pcmatic.com\" target=\"_blank\">whitelist technology<\/a>.\u00a0 It is impossible for security software developers to maintain a list of all the malicious viruses in order to keep their blacklist up to date.\u00a0 Using this method, there will always be a victim.\u00a0 In order for the developers to know it is a bad file or program, it had to have been founded doing bad things somewhere, and that somewhere could have been your computer.\u00a0 Do you want to be their guinea pig?\u00a0 I don&#8217;t.<\/p>\n<p>Whitelisting technology uses a list of all the known good programs and only allows them to run.\u00a0 This has been <a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/03\/24\/locky-ransomware-is-becoming-more-prevalent\/\">proven to block ransomware<\/a>.<\/p>\n<p>For a list of the\u00a02016\u00a0ransomware attacks,\u00a0click <a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/04\/06\/53032-ransomware-attacks-of-2016\/\" target=\"_blank\">here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Has the ransomware epidemic just begun?<\/p>\n","protected":false},"author":54,"featured_media":52244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4522,4949,183,4959],"tags":[4363],"class_list":["post-53022","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pc-safety-2","category-ransomware","category-tips","category-whitelisting","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Ransomware Epidemic<\/title>\n<meta name=\"description\" content=\"Has the ransomware epidemic just begun? Ransomware takes your computer by storm, encrypting your most important files and demanding a payout in return for\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ransomware Epidemic\" \/>\n<meta property=\"og:description\" content=\"Has the ransomware epidemic just begun? Ransomware takes your computer by storm, encrypting your most important files and demanding a payout in return for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-04T21:43:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-05-23T17:10:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"The Ransomware Epidemic\",\"datePublished\":\"2016-04-04T21:43:03+00:00\",\"dateModified\":\"2016-05-23T17:10:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/\"},\"wordCount\":495,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"PC Safety\",\"Ransomware\",\"tips\",\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/\",\"name\":\"The Ransomware Epidemic\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"datePublished\":\"2016-04-04T21:43:03+00:00\",\"dateModified\":\"2016-05-23T17:10:28+00:00\",\"description\":\"Has the ransomware epidemic just begun? Ransomware takes your computer by storm, encrypting your most important files and demanding a payout in return for\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-ransomware-epidemic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Ransomware Epidemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Ransomware Epidemic","description":"Has the ransomware epidemic just begun? Ransomware takes your computer by storm, encrypting your most important files and demanding a payout in return for","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/","og_locale":"en_US","og_type":"article","og_title":"The Ransomware Epidemic","og_description":"Has the ransomware epidemic just begun? Ransomware takes your computer by storm, encrypting your most important files and demanding a payout in return for","og_url":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-04-04T21:43:03+00:00","article_modified_time":"2016-05-23T17:10:28+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"The Ransomware Epidemic","datePublished":"2016-04-04T21:43:03+00:00","dateModified":"2016-05-23T17:10:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/"},"wordCount":495,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","keywords":["ransomware"],"articleSection":["PC Safety","Ransomware","tips","Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/","url":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/","name":"The Ransomware Epidemic","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","datePublished":"2016-04-04T21:43:03+00:00","dateModified":"2016-05-23T17:10:28+00:00","description":"Has the ransomware epidemic just begun? Ransomware takes your computer by storm, encrypting your most important files and demanding a payout in return for","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/the-ransomware-epidemic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Ransomware Epidemic"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53022"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53022\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/52244"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}