{"id":56534,"date":"2017-02-28T10:27:53","date_gmt":"2017-02-28T16:27:53","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=56534"},"modified":"2017-02-28T11:42:28","modified_gmt":"2017-02-28T17:42:28","slug":"2m-recordings-leaked-cloudpets","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/","title":{"rendered":"2.2M Voice Recordings Leaked From Children&#8217;s Toy, CloudPets"},"content":{"rendered":"<h4>CloudPets\u00a0Breached Leaving 820k Users Exposed<\/h4>\n<p>The children&#8217;s toy, CloudPets, has been breached, leaving 820,000 users exposed. \u00a0This led to an estimated 2.2 million voice recordings between parents and their children being leaked. \u00a0What is most shocking is just how avoidable this data breach was.<\/p>\n<p>According to <a href=\"https:\/\/www.troyhunt.com\/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages\/\">Troy Hunt<\/a>, the platform the toy used, MongoDB, did not require any form of authentication to obtain the stored data. \u00a0This led to several individuals gaining the ability to obtain the data. \u00a0The exact number of people who have gained access in unknown.<\/p>\n<p>The company reported to <a href=\"http:\/\/www.networkworld.com\/article\/3175225\/security\/smart-teddy-bears-involved-in-a-contentious-data-breach.html\">Network World<\/a> they were just informed of the issue last week by Vice Media. \u00a0Mark Myers, CEO of the company,\u00a0<a href=\"http:\/\/www.networkworld.com\/article\/3175225\/security\/smart-teddy-bears-involved-in-a-contentious-data-breach.html\">stated<\/a>,<\/p>\n<blockquote><p>&#8220;The headlines that say 2 million messages were leaked on the internet are completely false. \u00a0We looked at it and thought it was a very minimal issue.&#8221;<\/p><\/blockquote>\n<p>However, there is evidence suggesting these issues were brought to the company&#8217;s attention long before a week ago. \u00a0Hunt reports there were actually four attempts to contact the company regarding the breach. \u00a0Below are the screenshots of two of the emails sent to CloudPets, featured on <a href=\"https:\/\/www.troyhunt.com\/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages\/\">Hunt&#8217;s<\/a> blog,<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-56535 aligncenter\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/bear-breach.png\" alt=\"\" width=\"889\" height=\"294\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/bear-breach.png 889w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/bear-breach-768x254.png 768w\" sizes=\"(max-width: 889px) 100vw, 889px\" \/><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-56536 aligncenter\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/breached-clouldbear.png\" alt=\"\" width=\"928\" height=\"317\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/breached-clouldbear.png 928w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/breached-clouldbear-768x262.png 768w\" sizes=\"(max-width: 928px) 100vw, 928px\" \/><\/p>\n<p>As you can see, the first email correspondence was sent December 31, 2016. \u00a0A follow-up was sent on January 4, 2017 explaining the magnitude of the issue.<\/p>\n<h4>Minimal Issue?<\/h4>\n<p>For Myers to refer to a breach as a &#8220;minimal issue&#8221; is rather bold considering 820K accounts were breached, leading to 2.2M voice recordings being exposed. \u00a0Also, this data was being held for ransom by the hackers. \u00a0The ransomware variant used was not released, nor was the specific payment demand. \u00a0However, several ransom notes were found stating if payment was not received, the data would be deleted.<\/p>\n<h4>But It Gets Worse<\/h4>\n<p><a href=\"https:\/\/www.troyhunt.com\/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages\/\">Hunt<\/a> did a little more digging, and tested the app used for the toy. \u00a0He found what he called a &#8220;double edge sword&#8221;. \u00a0First, the passwords are encrypted with bcrypt, which is a good thing. \u00a0However, there are no password requirements. \u00a0So, you could literally have a password of &#8220;1&#8221; or &#8220;j&#8221;. \u00a0Even using the bcrypt feature, Hunt was able to decrypt several passwords very quickly due to the lack of password requirements. \u00a0Myers made the following <a href=\"http:\/\/www.networkworld.com\/article\/3175225\/security\/smart-teddy-bears-involved-in-a-contentious-data-breach.html\">statement <\/a>regarding the password requirement concerns,<\/p>\n<blockquote><p>&#8220;We have to find a balance. \u00a0How much is too much?\u00a0Maybe our solution is to put more complex passwords.&#8221;<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CloudPets\u00a0Breached Leaving 820k Users Exposed The children&#8217;s toy, CloudPets, has been breached, leaving 820,000 users exposed. \u00a0This led to an estimated 2.2 million voice recordings between parents and their children being leaked. \u00a0What is most shocking is just how avoidable this data breach was. According to Troy Hunt, the platform the toy used, MongoDB, did [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55106,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,5000,183],"tags":[5188,450],"class_list":["post-56534","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-ransomwarewar","category-tips","tag-cloudpets","tag-security-breach"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2.2M Voice Recordings Leaked From Children&#039;s Toy, CloudPets<\/title>\n<meta name=\"description\" content=\"Children&#039;s toy, CloudPets was breached, leaving 820,000 users exposed, including 2.2M voice recordings between parents and their children...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2.2M Voice Recordings Leaked From Children&#039;s Toy, CloudPets\" \/>\n<meta property=\"og:description\" content=\"Children&#039;s toy, CloudPets was breached, leaving 820,000 users exposed, including 2.2M voice recordings between parents and their children...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-28T16:27:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-28T17:42:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"2.2M Voice Recordings Leaked From Children&#8217;s Toy, CloudPets\",\"datePublished\":\"2017-02-28T16:27:53+00:00\",\"dateModified\":\"2017-02-28T17:42:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/\"},\"wordCount\":398,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"keywords\":[\"CloudPets\",\"security breach\"],\"articleSection\":[\"Ransomware\",\"RansomwareWar\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/\",\"name\":\"2.2M Voice Recordings Leaked From Children's Toy, CloudPets\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"datePublished\":\"2017-02-28T16:27:53+00:00\",\"dateModified\":\"2017-02-28T17:42:28+00:00\",\"description\":\"Children's toy, CloudPets was breached, leaving 820,000 users exposed, including 2.2M voice recordings between parents and their children...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"width\":730,\"height\":410,\"caption\":\"Contact a Cyber Security Expert to Learn about Application Whitelisting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2m-recordings-leaked-cloudpets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2.2M Voice Recordings Leaked From Children&#8217;s Toy, CloudPets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2.2M Voice Recordings Leaked From Children's Toy, CloudPets","description":"Children's toy, CloudPets was breached, leaving 820,000 users exposed, including 2.2M voice recordings between parents and their children...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/","og_locale":"en_US","og_type":"article","og_title":"2.2M Voice Recordings Leaked From Children's Toy, CloudPets","og_description":"Children's toy, CloudPets was breached, leaving 820,000 users exposed, including 2.2M voice recordings between parents and their children...","og_url":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-02-28T16:27:53+00:00","article_modified_time":"2017-02-28T17:42:28+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"2.2M Voice Recordings Leaked From Children&#8217;s Toy, CloudPets","datePublished":"2017-02-28T16:27:53+00:00","dateModified":"2017-02-28T17:42:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/"},"wordCount":398,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","keywords":["CloudPets","security breach"],"articleSection":["Ransomware","RansomwareWar","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/","url":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/","name":"2.2M Voice Recordings Leaked From Children's Toy, CloudPets","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","datePublished":"2017-02-28T16:27:53+00:00","dateModified":"2017-02-28T17:42:28+00:00","description":"Children's toy, CloudPets was breached, leaving 820,000 users exposed, including 2.2M voice recordings between parents and their children...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","width":730,"height":410,"caption":"Contact a Cyber Security Expert to Learn about Application Whitelisting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/2m-recordings-leaked-cloudpets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"2.2M Voice Recordings Leaked From Children&#8217;s Toy, CloudPets"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=56534"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56534\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55106"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=56534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=56534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=56534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}