{"id":56716,"date":"2017-03-28T14:47:46","date_gmt":"2017-03-28T19:47:46","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=56716"},"modified":"2017-03-28T14:47:46","modified_gmt":"2017-03-28T19:47:46","slug":"users-grant-malware-permission","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/","title":{"rendered":"Users Grant Malware Permission to Manipulate Contact Information"},"content":{"rendered":"<h4>Crusader Malware Manipulates Contact Information<\/h4>\n<p>A new malware deemed Crusader has been found being installed on PCs all over. \u00a0The malware is actually an add-on to free bundle software programs. \u00a0By granting Crusader the permission they request, users are authorizing contact information found within ads to be manipulated. \u00a0Therefore, a legitimate ad could be altered to include fake contact information. \u00a0So\u00a0instead of calling who you believe you are, you are contacting hackers. \u00a0There is no limit to the contact information Crusader can manipulate. \u00a0ZD Net <a href=\"http:\/\/www.zdnet.com\/article\/adware-rewrites-phone-details-for-legitimate-security-software-on-google-search\/\">states<\/a>,<\/p>\n<blockquote><p>&#8220;Should a victim type &#8220;Dell support number&#8221; or &#8220;Norton support number,&#8221; then these keywords are picked up and the phone numbers are replaced with details leading to call centers where operators will pretend to be from these companies &#8212; potentially leading to the &#8216;representatives&#8217; persuading victims to hand over account and bank details, or even install additional malware on their system.&#8221;<\/p><\/blockquote>\n<p>The good news, if you can call it that, is so far this malware appears to still be in the developmental stages.<\/p>\n<h4>Tips to Prevent Infection<\/h4>\n<ul>\n<li>Install an adblocker, if you don&#8217;t have one already. \u00a0For those of you who are <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504631\">PC Matic<\/a> subscribers, you have an adblocker available to you. \u00a0To learn more about PC Matic&#8217;s adblocking technology, you can do so <a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/06\/29\/pc-matic-includes-adblocking-technology\/\">here<\/a>.<\/li>\n<li>Be aware of the correct contact methods to reach your security software program is imperative. \u00a0For <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504631\">PC Matic<\/a> users, support can be found at www.pcmatic.com\/help. \u00a0We do not offer phone based support. \u00a0Therefore, if you see an ad or a website with a phone number associated with PC Matic, do not call it. \u00a0The only legitimate phone number associated with PC Matic is our automated refund line, which is 843-203-0422. \u00a0If you call this number, you will not reach a live person. \u00a0Again, all tech support request must be submitted via our online support option at www.pcmatic.com\/help.<\/li>\n<li>This malware is bundled in with free software downloads. \u00a0Therefore, if you tend to download free software bundles, be aware of what you&#8217;re installing. \u00a0Read the End-User License Agreement, and which programs are associated with the bundle. \u00a0Often times when we download something there is an &#8220;express&#8221; or &#8220;automatic&#8221; process which is always recommended, or a &#8220;custom&#8221; or &#8220;manual&#8221; installation. \u00a0By customizing your installation, you have the opportunity to be in control of what you&#8217;re putting on your PC. \u00a0Unlike the automatic method which, is faster but, will download everything whether you want it or not.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crusader Malware Manipulates Contact Information A new malware deemed Crusader has been found being installed on PCs all over. \u00a0The malware is actually an add-on to free bundle software programs. \u00a0By granting Crusader the permission they request, users are authorizing contact information found within ads to be manipulated. \u00a0Therefore, a legitimate ad could be altered [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[183],"tags":[4979,5217,56],"class_list":["post-56716","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips","tag-adblocker","tag-crusader","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Users Grant Malware Permission to Manipulate Contact Information<\/title>\n<meta name=\"description\" content=\"New malware, dubbed Crusader, has the ability to alter contact information used in ads. PC users are actually granting this malware the permission it...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Users Grant Malware Permission to Manipulate Contact Information\" \/>\n<meta property=\"og:description\" content=\"New malware, dubbed Crusader, has the ability to alter contact information used in ads. PC users are actually granting this malware the permission it...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-28T19:47:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeThumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Users Grant Malware Permission to Manipulate Contact Information\",\"datePublished\":\"2017-03-28T19:47:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/\"},\"wordCount\":425,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/fakeThumb.jpg\",\"keywords\":[\"adblocker\",\"Crusader\",\"malware\"],\"articleSection\":[\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/\",\"name\":\"Users Grant Malware Permission to Manipulate Contact Information\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/fakeThumb.jpg\",\"datePublished\":\"2017-03-28T19:47:46+00:00\",\"description\":\"New malware, dubbed Crusader, has the ability to alter contact information used in ads. PC users are actually granting this malware the permission it...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/fakeThumb.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/fakeThumb.jpg\",\"width\":730,\"height\":410,\"caption\":\"Fake\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/users-grant-malware-permission\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Users Grant Malware Permission to Manipulate Contact Information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Users Grant Malware Permission to Manipulate Contact Information","description":"New malware, dubbed Crusader, has the ability to alter contact information used in ads. PC users are actually granting this malware the permission it...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/","og_locale":"en_US","og_type":"article","og_title":"Users Grant Malware Permission to Manipulate Contact Information","og_description":"New malware, dubbed Crusader, has the ability to alter contact information used in ads. PC users are actually granting this malware the permission it...","og_url":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-03-28T19:47:46+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeThumb.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Users Grant Malware Permission to Manipulate Contact Information","datePublished":"2017-03-28T19:47:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/"},"wordCount":425,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeThumb.jpg","keywords":["adblocker","Crusader","malware"],"articleSection":["tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/","url":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/","name":"Users Grant Malware Permission to Manipulate Contact Information","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeThumb.jpg","datePublished":"2017-03-28T19:47:46+00:00","description":"New malware, dubbed Crusader, has the ability to alter contact information used in ads. PC users are actually granting this malware the permission it...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeThumb.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fakeThumb.jpg","width":730,"height":410,"caption":"Fake"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/users-grant-malware-permission\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Users Grant Malware Permission to Manipulate Contact Information"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=56716"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56716\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55191"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=56716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=56716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=56716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}