{"id":54559,"date":"2016-09-21T18:47:37","date_gmt":"2016-09-21T18:47:37","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=54559"},"modified":"2017-01-20T13:15:30","modified_gmt":"2017-01-20T19:15:30","slug":"hacking-connected-devices-tesla-vulnerable-remote-hacks","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/","title":{"rendered":"Hacking Connected Devices &#8211; Tesla Vulnerable to Remote Hacks"},"content":{"rendered":"<div>\n<div>\n<h3>A security team demonstrates how Tesla can be hacked by taking control of various car controls&#8230;<!--more--><b><\/b><i><\/i><u><\/u><\/h3>\n<p>A Chinese security team, Keen Security, successfully hacked a Tesla Model S vehicle, and demonstrated several security vulnerabilities.\u00a0 While Tesla quickly rushed to fix the vulnerabilities, it is worthwhile to note that as we connect devices to the Internet, we have to expect vulnerabilities will be discovered.<\/p>\n<p>The security team demonstrated taking control over the vehicle&#8217;s braking system, the windshield wipers, folding mirrors, and even remotely unlocking the doors. While this sounds like something you would only see in the movies, the reality is that it was actually possible to be done.<\/p>\n<\/div>\n<p>According to Telsa, the vulnerability can only be triggered when the Tesla in-car browser in use and the vehicle is in range of a compromised Wi-Fi hotspot, which it is connected to.<\/p>\n<p>However, let&#8217;s not be foolish. Security costs a lot of money to implement and test, and it won&#8217;t increase sales or profits, however, when lives can be lost, it needs to be at the top of the developer&#8217;s mind. Imagine your vehicle coming to a complete stop, while driving down the highway at 70 miles per hour.<\/p>\n<\/div>\n<p>I&#8217;m pleased to see Tesla and the security team working closely together to resolve the issue in a prompt manner. If you own a Tesla, make sure you update it as soon as possible. The version you should have is v7.1, 2.36.31<\/p>\n<p>You can see the video below:<\/p>\n<div class=\"ast-oembed-container \" style=\"height: 100%;\"><iframe title=\"Car Hacking Research: Remote Attack Tesla Motors  by Keen Security Lab\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/c1XyhReNcHY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A security team demonstrates how Tesla can be hacked by taking control of various car controls&#8230;<\/p>\n","protected":false},"author":55,"featured_media":53138,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,4987],"tags":[4499,5054],"class_list":["post-54559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-spiceworks","tag-hacking","tag-tesla"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacking Connected Devices - Tesla Vulnerable to Remote Hacks<\/title>\n<meta name=\"description\" content=\"A Chinese security team, Keen Security, successfully hacked a Tesla Model S vehicle, and demonstrated several security vulnerabilities...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking Connected Devices - Tesla Vulnerable to Remote Hacks\" \/>\n<meta property=\"og:description\" content=\"A Chinese security team, Keen Security, successfully hacked a Tesla Model S vehicle, and demonstrated several security vulnerabilities...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-21T18:47:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-20T19:15:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_ransomware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dodi Glenn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dodi Glenn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/\"},\"author\":{\"name\":\"Dodi Glenn\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/48ddc92048489e51436331f82e991e37\"},\"headline\":\"Hacking Connected Devices &#8211; Tesla Vulnerable to Remote Hacks\",\"datePublished\":\"2016-09-21T18:47:37+00:00\",\"dateModified\":\"2017-01-20T19:15:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/\"},\"wordCount\":267,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_ransomware.png\",\"keywords\":[\"hacking\",\"Tesla\"],\"articleSection\":[\"Newsletter\",\"SpiceWorks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/\",\"name\":\"Hacking Connected Devices - Tesla Vulnerable to Remote Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_ransomware.png\",\"datePublished\":\"2016-09-21T18:47:37+00:00\",\"dateModified\":\"2017-01-20T19:15:30+00:00\",\"description\":\"A Chinese security team, Keen Security, successfully hacked a Tesla Model S vehicle, and demonstrated several security vulnerabilities...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_ransomware.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_ransomware.png\",\"width\":500,\"height\":278},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hacking-connected-devices-tesla-vulnerable-remote-hacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking Connected Devices &#8211; Tesla Vulnerable to Remote Hacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/48ddc92048489e51436331f82e991e37\",\"name\":\"Dodi Glenn\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/dodig\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking Connected Devices - Tesla Vulnerable to Remote Hacks","description":"A Chinese security team, Keen Security, successfully hacked a Tesla Model S vehicle, and demonstrated several security vulnerabilities...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/","og_locale":"en_US","og_type":"article","og_title":"Hacking Connected Devices - Tesla Vulnerable to Remote Hacks","og_description":"A Chinese security team, Keen Security, successfully hacked a Tesla Model S vehicle, and demonstrated several security vulnerabilities...","og_url":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-09-21T18:47:37+00:00","article_modified_time":"2017-01-20T19:15:30+00:00","og_image":[{"width":500,"height":278,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_ransomware.png","type":"image\/png"}],"author":"Dodi Glenn","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Dodi Glenn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/"},"author":{"name":"Dodi Glenn","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/48ddc92048489e51436331f82e991e37"},"headline":"Hacking Connected Devices &#8211; Tesla Vulnerable to Remote Hacks","datePublished":"2016-09-21T18:47:37+00:00","dateModified":"2017-01-20T19:15:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/"},"wordCount":267,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_ransomware.png","keywords":["hacking","Tesla"],"articleSection":["Newsletter","SpiceWorks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/","url":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/","name":"Hacking Connected Devices - Tesla Vulnerable to Remote Hacks","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_ransomware.png","datePublished":"2016-09-21T18:47:37+00:00","dateModified":"2017-01-20T19:15:30+00:00","description":"A Chinese security team, Keen Security, successfully hacked a Tesla Model S vehicle, and demonstrated several security vulnerabilities...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_ransomware.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_ransomware.png","width":500,"height":278},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/hacking-connected-devices-tesla-vulnerable-remote-hacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hacking Connected Devices &#8211; Tesla Vulnerable to Remote Hacks"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/48ddc92048489e51436331f82e991e37","name":"Dodi Glenn","url":"https:\/\/www.pcmatic.com\/blog\/author\/dodig\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/54559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=54559"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/54559\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53138"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=54559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=54559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=54559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}