{"id":56677,"date":"2017-03-23T07:55:35","date_gmt":"2017-03-23T12:55:35","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=56677"},"modified":"2017-03-23T08:16:49","modified_gmt":"2017-03-23T13:16:49","slug":"14-av-solutions-vulnerable-double-agent","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/","title":{"rendered":"14 Security Solutions Vulnerable to Double Agent Malware"},"content":{"rendered":"<h4>Double Agent Malware Infects Security Solutions<\/h4>\n<p>A malware attack dubbed Double Agent has been discovered by security vendor,\u00a0Cybellum. \u00a0It is reported, although this attack has been discovered, it has not been yet witnessed in the public.<\/p>\n<p>Double Agent effectively uses a 15 year-old vulnerability within the Windows operating system. \u00a0The security gap is associated with Microsoft Application Verifier, which can be found on all Windows PCs ranging from XP to Windows 10. \u00a0What is troubling being, by gaining access to Microsoft Application Verifier, this malware variant has access to all of the legitimate programs on your PC. \u00a0Since Double Agent has access to this platform, it has been able to successfully alter 14 different anti-virus solutions by adding malware to their platforms. \u00a0The 14 impacted security solutions include:<\/p>\n<ul>\n<li>AVG<\/li>\n<li>Malwarebytes<\/li>\n<li>Avast<\/li>\n<li>Avira<\/li>\n<li>Bitdefender<\/li>\n<li>Trend Micro<\/li>\n<li>Comodo<\/li>\n<li>ESET<\/li>\n<li>F-Secure<\/li>\n<li>Kaspersky<\/li>\n<li>McAfee<\/li>\n<li>Panda<\/li>\n<li>Quick Heal<\/li>\n<li>Norton<\/li>\n<\/ul>\n<p>All of the AV programs have had over 90 days to patch the vulnerability; however, out of these 14 programs that have been compromised, only four have been effectively patched.\u00a0 According to <a href=\"http:\/\/www.networkworld.com\/article\/3183587\/security\/double-agent-attack-can-turn-antivirus-into-malware.html\">Network World<\/a>, those are AVG, Kaspersky, Trend Micro and Malwarebytes.<\/p>\n<p>Although this malware variant could infiltrate various other programs that are verified by Microsoft, it does not. \u00a0It chooses security solutions because they are trusted by PC users, and have access to the entire PC. \u00a0It&#8217;s essentially the golden key.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Double Agent Malware Infects Security Solutions A malware attack dubbed Double Agent has been discovered by security vendor,\u00a0Cybellum. \u00a0It is reported, although this attack has been discovered, it has not been yet witnessed in the public. Double Agent effectively uses a 15 year-old vulnerability within the Windows operating system. \u00a0The security gap is associated with [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55111,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5090,12],"tags":[5211,56,5212,229],"class_list":["post-56677","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-slider","category-the-pit-blog","tag-double-agent","tag-malware","tag-microsoft-application-verifier","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>14 Security Solutions Vulnerable to Double Agent Malware<\/title>\n<meta name=\"description\" content=\"A new malware variant, Double Agent, exploits a 15 year old security vulnerability in Microsoft Application Verifier, providing accessibility...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"14 Security Solutions Vulnerable to Double Agent Malware\" \/>\n<meta property=\"og:description\" content=\"A new malware variant, Double Agent, exploits a 15 year old security vulnerability in Microsoft Application Verifier, providing accessibility...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-23T12:55:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-23T13:16:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackerMSSlider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"14 Security Solutions Vulnerable to Double Agent Malware\",\"datePublished\":\"2017-03-23T12:55:35+00:00\",\"dateModified\":\"2017-03-23T13:16:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/\"},\"wordCount\":231,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/hackerMSSlider.jpg\",\"keywords\":[\"Double Agent\",\"malware\",\"microsoft application verifier\",\"Windows\"],\"articleSection\":[\"TechTalk Slider\",\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/\",\"name\":\"14 Security Solutions Vulnerable to Double Agent Malware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/hackerMSSlider.jpg\",\"datePublished\":\"2017-03-23T12:55:35+00:00\",\"dateModified\":\"2017-03-23T13:16:49+00:00\",\"description\":\"A new malware variant, Double Agent, exploits a 15 year old security vulnerability in Microsoft Application Verifier, providing accessibility...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/hackerMSSlider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/hackerMSSlider.jpg\",\"width\":1920,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/14-av-solutions-vulnerable-double-agent\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"14 Security Solutions Vulnerable to Double Agent Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"14 Security Solutions Vulnerable to Double Agent Malware","description":"A new malware variant, Double Agent, exploits a 15 year old security vulnerability in Microsoft Application Verifier, providing accessibility...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/","og_locale":"en_US","og_type":"article","og_title":"14 Security Solutions Vulnerable to Double Agent Malware","og_description":"A new malware variant, Double Agent, exploits a 15 year old security vulnerability in Microsoft Application Verifier, providing accessibility...","og_url":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-03-23T12:55:35+00:00","article_modified_time":"2017-03-23T13:16:49+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackerMSSlider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"14 Security Solutions Vulnerable to Double Agent Malware","datePublished":"2017-03-23T12:55:35+00:00","dateModified":"2017-03-23T13:16:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/"},"wordCount":231,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackerMSSlider.jpg","keywords":["Double Agent","malware","microsoft application verifier","Windows"],"articleSection":["TechTalk Slider","The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/","url":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/","name":"14 Security Solutions Vulnerable to Double Agent Malware","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackerMSSlider.jpg","datePublished":"2017-03-23T12:55:35+00:00","dateModified":"2017-03-23T13:16:49+00:00","description":"A new malware variant, Double Agent, exploits a 15 year old security vulnerability in Microsoft Application Verifier, providing accessibility...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackerMSSlider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackerMSSlider.jpg","width":1920,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/14-av-solutions-vulnerable-double-agent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"14 Security Solutions Vulnerable to Double Agent Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=56677"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56677\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55111"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=56677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=56677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=56677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}