{"id":53823,"date":"2016-07-20T17:25:05","date_gmt":"2016-07-20T17:25:05","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53823"},"modified":"2016-07-20T17:25:05","modified_gmt":"2016-07-20T17:25:05","slug":"cuteransomware-uses-cloud-based-services","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/","title":{"rendered":"cuteRansomware Uses Cloud Based Services"},"content":{"rendered":"<p>The new ransomware, cuteRansomware, is using cloud based services for distribution&#8230;<!--more--><\/p>\n<p>cuteRansomare is the latest ransomware strain that is starting to use a popular cloud based service for distribution.\u00a0 The ransomware is functioning off of Google Docs.\u00a0 They&#8217;re using this platform as their command and control center.\u00a0 It is also being used to avoid detection.<\/p>\n<p>According to <a href=\"http:\/\/www.scmagazineuk.com\/ransomware-writers-adopt-cloud-services\/article\/510011\/\">SC Magazine UK<\/a>, the latest ransomware is a variant of the Chinese ransomware, my-Little-Ransomware.<\/p>\n<p>To properly protect against ransomware, the<a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA16-091A\"> US-CERT<\/a> recommends implementing an application whitelist approach to avoid unwanted programs from running on your PC.<\/p>\n<p>If you find yourself a victim of ransomware, we encourage you follow these five steps:<\/p>\n<ol>\n<li><b>Do not pay the ransom<\/b> \u2013 If you do, you\u2019re just giving the hackers a reason to keep hacking.\u00a0 Use your back up files to restore your systems.\u00a0 Again, don\u2019t pay!!<\/li>\n<li><strong>Inform the FBI<\/strong> \u2013 By informing the FBI they can investigate to potentially bring legal action against the hacker.\u00a0 All cyber criminal activity should be reported to the federal IC3 agency.\u00a0 You can file a complaint with them <a href=\"https:\/\/www.ic3.gov\/default.aspx\">here<\/a>.<\/li>\n<li><strong>Notify your current security software company<\/strong> \u2013 You also MUST inform your security software company.\u00a0 If they didn\u2019t know they missed a malicious attack, they cannot stop it in the future.\u00a0 Also, many anti-virus software companies share their blacklist, or the list of known bad files.\u00a0 So by sharing it with your software company, they then share it with others; saving thousands of people from falling victim to the same attack that just got you.<\/li>\n<li><strong>Educate yourselves and your employees <\/strong>\u2013 Many times we attend one training, or listen to one webinar and consider ourselves educated on the matter.\u00a0 This cannot be further from the truth.\u00a0 Continued education on current cyber security threats is imperative.\u00a0 We recommend our friends at <a href=\"https:\/\/www.knowbe4.com\/\">KnowBe4 <\/a>for both personal and enterprise training on cyber security.\u00a0 As always, all PC Matic home\u00a0security subscribers are offered a <a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/02\/12\/free-cyber-security-training-for-pc-matic-users\/\">free cyber security training<\/a> through KnowBe4 as well.<\/li>\n<li><strong>Reevaluate your security software protection<\/strong> \u2013 If your security software failed you, perhaps you should look for an alternative security option.\u00a0\u00a0The\u00a0<a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA16-091A\">United States\u00a0Computer Emergency Readiness Team\u00a0(US-CERT)<\/a> strongly advises using a whitelist security technology.\u00a0 For personal uses, <a href=\"https:\/\/www.pcmatic.com\/\">PC Matic<\/a> home protection offers superior protection with advanced whitelisting technology.\u00a0 For enterprise use, there is PC Matic Pro, which offers advanced security protection with proprietary whitelisting technology.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>The new ransomware, cuteRansomware, is using cloud based services for distribution&#8230;<\/p>\n","protected":false},"author":54,"featured_media":52778,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,5000],"tags":[4363],"class_list":["post-53823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-ransomwarewar","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>cuteRansomware Uses Cloud Based Services<\/title>\n<meta name=\"description\" content=\"The new ransomware, cuteRansomware, is using cloud based services for their distribution methods, as well as their command and control center...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"cuteRansomware Uses Cloud Based Services\" \/>\n<meta property=\"og:description\" content=\"The new ransomware, cuteRansomware, is using cloud based services for their distribution methods, as well as their command and control center...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-20T17:25:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"cuteRansomware Uses Cloud Based Services\",\"datePublished\":\"2016-07-20T17:25:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/\"},\"wordCount\":398,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Cybersecurity.png\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"Ransomware\",\"RansomwareWar\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/\",\"name\":\"cuteRansomware Uses Cloud Based Services\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Cybersecurity.png\",\"datePublished\":\"2016-07-20T17:25:05+00:00\",\"description\":\"The new ransomware, cuteRansomware, is using cloud based services for their distribution methods, as well as their command and control center...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Cybersecurity.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Cybersecurity.png\",\"width\":225,\"height\":225},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cuteransomware-uses-cloud-based-services\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cuteRansomware Uses Cloud Based Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"cuteRansomware Uses Cloud Based Services","description":"The new ransomware, cuteRansomware, is using cloud based services for their distribution methods, as well as their command and control center...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/","og_locale":"en_US","og_type":"article","og_title":"cuteRansomware Uses Cloud Based Services","og_description":"The new ransomware, cuteRansomware, is using cloud based services for their distribution methods, as well as their command and control center...","og_url":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-07-20T17:25:05+00:00","og_image":[{"width":225,"height":225,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Cybersecurity.png","type":"image\/png"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"cuteRansomware Uses Cloud Based Services","datePublished":"2016-07-20T17:25:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/"},"wordCount":398,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Cybersecurity.png","keywords":["ransomware"],"articleSection":["Ransomware","RansomwareWar"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/","url":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/","name":"cuteRansomware Uses Cloud Based Services","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Cybersecurity.png","datePublished":"2016-07-20T17:25:05+00:00","description":"The new ransomware, cuteRansomware, is using cloud based services for their distribution methods, as well as their command and control center...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Cybersecurity.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Cybersecurity.png","width":225,"height":225},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/cuteransomware-uses-cloud-based-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"cuteRansomware Uses Cloud Based Services"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53823"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53823\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/52778"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}