{"id":56076,"date":"2017-01-12T19:02:50","date_gmt":"2017-01-12T19:02:50","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=56076"},"modified":"2017-01-12T19:02:50","modified_gmt":"2017-01-12T19:02:50","slug":"latest-ransomware-craze-holding-mongodb-databases-hostage","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/","title":{"rendered":"The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage"},"content":{"rendered":"<p>As if our jobs as IT admins isn\u2019t difficult enough, hackers have taken to finding misconfigured MongoDB databases, and are holding them hostage, until a ransom has been paid. Similar to traditional ransomware, where files on a computer are encrypted until a fee has been paid, databases, are being held hostage, instead.<\/p>\n<p>The modus operandi is the hackers look for open ports, particularly 27017, and find MongoDB instances where security settings, such as usernames and passwords, are not set properly. Once they find the database, they back it up to their own servers, but then delete it on your server. Afterwards, they create a replacement database with names like \u201cCONTACTME\u201d or \u201cPLEASE_READ.\u201d In the ransom notes left behind, the hacker states they have saved all of the data, and if the victim wants to recover the data, they would need to send Bitcoins, an anonymous online currency, to a specific Bitcoin wallet. Once the victim pays the ransom, the victim would send an email to the hacker with their IP address. Afterwards, the hacker would restore the data.<\/p>\n<p>Unfortunately, this threat doesn\u2019t appear to be a one-off situation. Princeton University recently became a victim of one of the 27,000 MongoDB ransomware attacks. In their case, the database instance was wiped, and a replacement database, called PLEASE_READ, was left behind. The hacker was requesting .2 BTC, or roughly $160.58. This seems like a low price to pay for having the data restored, however, in many instances, the hackers actually do not return the data.<\/p>\n<p>For those of us who run MongoDB instances, please see this <a href=\"https:\/\/www.mongodb.com\/blog\/post\/how-to-avoid-a-malicious-attack-that-ransoms-your-data\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.mongodb.com\/blog\/post\/how-to-avoid-a-malicious-attack-that-ransoms-your-data&amp;source=gmail&amp;ust=1484328634768000&amp;usg=AFQjCNHWXHZE1hyBZsj2eifFrqFWT-y3UA\">article<\/a> on how to avoid ransom attacks. More specifically, the <a href=\"https:\/\/docs.mongodb.com\/manual\/administration\/security-checklist\/\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/docs.mongodb.com\/manual\/administration\/security-checklist\/&amp;source=gmail&amp;ust=1484328634768000&amp;usg=AFQjCNERvrA1H4-Tppre6LrS4NQXKnof7g\">Security Checklist<\/a>, written by MongoDB, states you should follow these best practices<\/p>\n<ul>\n<li>Enable Access Control and Enforce Authentication<\/li>\n<li>Configure Role-Based Access Control<\/li>\n<li>Encrypt Communication<\/li>\n<li>Encrypt and Protect Data<\/li>\n<li>Limit Network Exposure<\/li>\n<li>Audit System Activity<\/li>\n<li>Run MongoDB with a Dedicated User<\/li>\n<li>Run MongoDB with Secure Configuration Options<\/li>\n<li>Request a Security Technical Implementation Guide (where applicable)<\/li>\n<li>Consider Security Standards Compliance<\/li>\n<\/ul>\n<p>Stay safe out there!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As if our jobs as IT admins isn\u2019t difficult enough, hackers have taken to finding misconfigured MongoDB databases, and are holding them hostage, until a ransom has been paid. Similar to traditional ransomware, where files on a computer are encrypted until a fee has been paid, databases, are being held hostage, instead. The modus operandi [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":55127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,5000,4987],"tags":[5141,4363],"class_list":["post-56076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-ransomwarewar","category-spiceworks","tag-mongodb","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage<\/title>\n<meta name=\"description\" content=\"As if our jobs as IT admins isn\u2019t difficult enough, hackers have taken to finding misconfigured MongoDB databases, and are holding them hostage...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage\" \/>\n<meta property=\"og:description\" content=\"As if our jobs as IT admins isn\u2019t difficult enough, hackers have taken to finding misconfigured MongoDB databases, and are holding them hostage...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-12T19:02:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dodi Glenn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dodi Glenn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/\"},\"author\":{\"name\":\"Dodi Glenn\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/48ddc92048489e51436331f82e991e37\"},\"headline\":\"The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage\",\"datePublished\":\"2017-01-12T19:02:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/\"},\"wordCount\":344,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"keywords\":[\"MongoDB\",\"ransomware\"],\"articleSection\":[\"Ransomware\",\"RansomwareWar\",\"SpiceWorks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/\",\"name\":\"The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"datePublished\":\"2017-01-12T19:02:50+00:00\",\"description\":\"As if our jobs as IT admins isn\u2019t difficult enough, hackers have taken to finding misconfigured MongoDB databases, and are holding them hostage...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"width\":730,\"height\":410,\"caption\":\"Computer Virus Software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/latest-ransomware-craze-holding-mongodb-databases-hostage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/48ddc92048489e51436331f82e991e37\",\"name\":\"Dodi Glenn\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/dodig\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage","description":"As if our jobs as IT admins isn\u2019t difficult enough, hackers have taken to finding misconfigured MongoDB databases, and are holding them hostage...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/","og_locale":"en_US","og_type":"article","og_title":"The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage","og_description":"As if our jobs as IT admins isn\u2019t difficult enough, hackers have taken to finding misconfigured MongoDB databases, and are holding them hostage...","og_url":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-01-12T19:02:50+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","type":"image\/jpeg"}],"author":"Dodi Glenn","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Dodi Glenn","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/"},"author":{"name":"Dodi Glenn","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/48ddc92048489e51436331f82e991e37"},"headline":"The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage","datePublished":"2017-01-12T19:02:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/"},"wordCount":344,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","keywords":["MongoDB","ransomware"],"articleSection":["Ransomware","RansomwareWar","SpiceWorks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/","url":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/","name":"The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","datePublished":"2017-01-12T19:02:50+00:00","description":"As if our jobs as IT admins isn\u2019t difficult enough, hackers have taken to finding misconfigured MongoDB databases, and are holding them hostage...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","width":730,"height":410,"caption":"Computer Virus Software"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/latest-ransomware-craze-holding-mongodb-databases-hostage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Latest Ransomware Craze \u2013 Holding MongoDB Databases Hostage"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/48ddc92048489e51436331f82e991e37","name":"Dodi Glenn","url":"https:\/\/www.pcmatic.com\/blog\/author\/dodig\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=56076"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56076\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55127"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=56076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=56076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=56076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}