{"id":54045,"date":"2016-08-18T19:27:23","date_gmt":"2016-08-18T19:27:23","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=54045"},"modified":"2016-08-19T18:28:35","modified_gmt":"2016-08-19T18:28:35","slug":"ransomware-continues-evolve","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/","title":{"rendered":"Ransomware Continues to Evolve"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h4><\/h4>\n<h4><a href=\"http:\/\/www.pcmatic.com\/ransomware\">Ransomware <\/a>has continued to evolve within the second quarter of 2016, with new variants popping up all over the place&#8230;<!--more--><\/h4>\n<p>The <a href=\"http:\/\/www.pcmatic.com\/ransomware\" target=\"_blank\">ransomware <\/a>epidemic is not slowing down anytime soon. \u00a0We saw first hand throughout the second quarter of 2016 the new ransomware viruses attacking PC users. \u00a0These new variants range from new versions of the Locky ransomware, Zepto, to Cerber simply becoming polymorphic.<\/p>\n<p>This is not including the brand new strands that have been called<a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/06\/27\/two-new-ransomware-viruses-loose\/\" target=\"_blank\"> Bart and MIRCOP<\/a>, or the dynamic duo <a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/05\/16\/petya-ransomware-adds-new-features\/\" target=\"_blank\">Petya and Mischa<\/a>. \u00a0So as a society who has become increasingly dependent on computing, what do you do to protect yourself?<\/p>\n<p>The <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA16-091A\" target=\"_blank\">United States Computer Emergency Readiness Team (US-CERT)<\/a> strongly advises using a whitelist security technology. \u00a0For personal uses,<a href=\"https:\/\/www.pcmatic.com\/\" target=\"_blank\"> PC Matic<\/a> home protection offers superior protection with advanced whitelisting technology. \u00a0For enterprise use, there is <a href=\"http:\/\/www.pcmatic.com\/pro\" target=\"_blank\">PC Matic Pro<\/a>, which offers advanced security protection with proprietary whitelisting technology.<\/p>\n<p>But what if it\u2019s too late, and you\u2019ve already become a victim of <a href=\"http:\/\/www.pcmatic.com\/ransomware\" target=\"_blank\">ransomware<\/a>? \u00a0What do you do now? \u00a0We suggest following these five steps:<\/p>\n<ol>\n<li><b>Do not pay the ransom<\/b> \u2013 If you do, you\u2019re just giving the hackers a reason to keep hacking. \u00a0Use your backup files to restore your systems. \u00a0Again, don\u2019t pay!!<\/li>\n<li><b>Inform the FBI<\/b> \u2013 By informing the FBI they can investigate to potentially bring legal action against the hacker. \u00a0All cyber criminal activity should be reported to the federal IC3 agency. \u00a0You can file a complaint with them<a href=\"https:\/\/www.ic3.gov\/default.aspx\"> here<\/a>.<\/li>\n<li><b>Notify your current security software company<\/b> \u2013 You also MUST inform your security software company. \u00a0If they didn\u2019t know they missed a malicious attack, they cannot stop it in the future. \u00a0Also, many anti-virus software companies share their blacklist, or the list of known bad files. \u00a0So by sharing it with your software company, they then share it with others; saving thousands of people from falling victim to the same attack that just got you.<\/li>\n<li><b>Educate yourselves and your employees <\/b>\u2013 Many times we attend one training, or listen to one webinar and consider ourselves educated on the matter. \u00a0This cannot be further from the truth. \u00a0Continued education on current cyber security threats is imperative. \u00a0We recommend our friends at<a href=\"https:\/\/www.knowbe4.com\/\" target=\"_blank\"> KnowBe4<\/a> for both personal and enterprise training on cyber security. \u00a0As always, all PC Matic home security subscribers are offered a<a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/02\/12\/free-cyber-security-training-for-pc-matic-users\/\" target=\"_blank\"> free cyber security training<\/a> through KnowBe4 as well.<\/li>\n<li><b>Reevaluate your security software protection<\/b> \u2013 If your security software failed you, perhaps you should look for an alternative security option. \u00a0The world needs better security. \u00a0We got it.<\/li>\n<\/ol>\n<p>To read the full PC Pitstop Second Quarter Report, you can do so here: <a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCPitstop-Quarterly_Report_Q2_2016.pdf\" target=\"_blank\">PCPitstop-Quarterly_Report_Q2_2016<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Ransomware has continued to evolve within the second quarter of 2016, with new variants popping up all over the place&#8230;<\/p>\n","protected":false},"author":54,"featured_media":53460,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5022],"tags":[5024,4363],"class_list":["post-54045","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-q2-2016-newsletter","tag-q2","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Continues to Evolve<\/title>\n<meta name=\"description\" content=\"Ransomware has continued to evolve within the second quarter of 2016, with new variants and attack methods showing up all over the place...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Continues to Evolve\" \/>\n<meta property=\"og:description\" content=\"Ransomware has continued to evolve within the second quarter of 2016, with new variants and attack methods showing up all over the place...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-18T19:27:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-08-19T18:28:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/red-padlock.png\" \/>\n\t<meta property=\"og:image:width\" content=\"271\" \/>\n\t<meta property=\"og:image:height\" content=\"186\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Ransomware Continues to Evolve\",\"datePublished\":\"2016-08-18T19:27:23+00:00\",\"dateModified\":\"2016-08-19T18:28:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/\"},\"wordCount\":441,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/red-padlock.png\",\"keywords\":[\"q2\",\"ransomware\"],\"articleSection\":[\"Q2 2016 Newsletter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/\",\"name\":\"Ransomware Continues to Evolve\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/red-padlock.png\",\"datePublished\":\"2016-08-18T19:27:23+00:00\",\"dateModified\":\"2016-08-19T18:28:35+00:00\",\"description\":\"Ransomware has continued to evolve within the second quarter of 2016, with new variants and attack methods showing up all over the place...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/red-padlock.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/red-padlock.png\",\"width\":271,\"height\":186},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-continues-evolve\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Continues to Evolve\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Continues to Evolve","description":"Ransomware has continued to evolve within the second quarter of 2016, with new variants and attack methods showing up all over the place...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Continues to Evolve","og_description":"Ransomware has continued to evolve within the second quarter of 2016, with new variants and attack methods showing up all over the place...","og_url":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-08-18T19:27:23+00:00","article_modified_time":"2016-08-19T18:28:35+00:00","og_image":[{"width":271,"height":186,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/red-padlock.png","type":"image\/png"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Ransomware Continues to Evolve","datePublished":"2016-08-18T19:27:23+00:00","dateModified":"2016-08-19T18:28:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/"},"wordCount":441,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/red-padlock.png","keywords":["q2","ransomware"],"articleSection":["Q2 2016 Newsletter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/","url":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/","name":"Ransomware Continues to Evolve","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/red-padlock.png","datePublished":"2016-08-18T19:27:23+00:00","dateModified":"2016-08-19T18:28:35+00:00","description":"Ransomware has continued to evolve within the second quarter of 2016, with new variants and attack methods showing up all over the place...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/red-padlock.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/red-padlock.png","width":271,"height":186},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-continues-evolve\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware Continues to Evolve"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/54045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=54045"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/54045\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53460"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=54045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=54045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=54045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}