{"id":57273,"date":"2017-06-16T09:34:18","date_gmt":"2017-06-16T14:34:18","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57273"},"modified":"2017-06-28T13:41:47","modified_gmt":"2017-06-28T18:41:47","slug":"infographic-blacklist-whitelist","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/","title":{"rendered":"Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection"},"content":{"rendered":"<h4>Blacklist or Whitelist? \u00a0Which Keeps Your Data Safer?<\/h4>\n<p>Most of the security products on the market rely on a blacklist approach to detect and prevent malware. \u00a0But is it effective? \u00a0An alternative approach, application whitelisting, is also available. \u00a0However, which is better for you? \u00a0Follow the infographic below to learn more about the difference between the two.<\/p>\n<h4>Fileless Malware Threats<\/h4>\n<p>According to <a href=\"http:\/\/www.techrepublic.com\/article\/fileless-malware-an-undetectable-threat\/\">Tech Republic<\/a>, fileless malware has become an &#8220;undetectable threat&#8221;. \u00a0However, is it really undetectable? \u00a0For most antivirus programs &#8212; yes. \u00a0But there&#8217;s a solution that will block that too. \u00a0Find out more below:<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-57274\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmPro_compare_infographic.jpg\" alt=\"\" width=\"750\" height=\"4017\" \/><\/p>\n<h3>Share this Image On Your Site<\/h3>\n<p><textarea style=\"width: 750; height: 4017;\">&lt;\/p&gt;&lt;br \/&gt;<br \/>\n&lt;p&gt;&lt;strong&gt;Please include attribution to pcmatic.com with this graphic.&lt;\/strong&gt;&lt;\/p&gt;&lt;br \/&gt;<br \/>\n&lt;p&gt;&lt;a href=&#8217;https:\/\/www.pcmatic.com\/blog\/2017\/06\/16\/infographic-blacklist-whitelist\/&#8217;&gt;&lt;img src=&#8217;https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmPro_compare_infographic.jpg&#8217; alt=&#8217;Protecting Against the New Generations of Malware&#8217; width=&#8217;750&#8242; height=&#8217;4017&#8242; border=&#8217;0&#8242; \/&gt;&lt;\/a&gt;&lt;\/p&gt;&lt;br \/&gt;<br \/>\n&lt;p&gt;<\/textarea><\/p>\n<h4>Considering Application Whitelisting?<\/h4>\n<p>Have you decided to try the whitelist approach? \u00a0<a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504631\">PC Matic<\/a> is available for home users, and <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\">PC Matic Pro<\/a> is available for businesses, government agencies, educational institutions and non-profits.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Blacklist or Whitelist? \u00a0Which Keeps Your Data Safer? Most of the security products on the market rely on a blacklist approach to detect and prevent malware. \u00a0But is it effective? \u00a0An alternative approach, application whitelisting, is also available. \u00a0However, which is better for you? \u00a0Follow the infographic below to learn more about the difference between [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55110,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5090,183],"tags":[5285,5282,5286,4244,5074],"class_list":["post-57273","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-slider","category-tips","tag-blacklist","tag-fileless-malware","tag-fileless-malware-detection","tag-infographic","tag-whitelist"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection<\/title>\n<meta name=\"description\" content=\"Most AV programs on the market use the blacklist for malware detection and prevention -- but is it effective? An alternative approach is now available...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection\" \/>\n<meta property=\"og:description\" content=\"Most AV programs on the market use the blacklist for malware detection and prevention -- but is it effective? An alternative approach is now available...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-16T14:34:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-06-28T18:41:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securitySlider-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection\",\"datePublished\":\"2017-06-16T14:34:18+00:00\",\"dateModified\":\"2017-06-28T18:41:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/\"},\"wordCount\":223,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securitySlider-1.jpg\",\"keywords\":[\"blacklist\",\"fileless malware\",\"fileless malware detection\",\"infographic\",\"whitelist\"],\"articleSection\":[\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/\",\"name\":\"Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securitySlider-1.jpg\",\"datePublished\":\"2017-06-16T14:34:18+00:00\",\"dateModified\":\"2017-06-28T18:41:47+00:00\",\"description\":\"Most AV programs on the market use the blacklist for malware detection and prevention -- but is it effective? An alternative approach is now available...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securitySlider-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securitySlider-1.jpg\",\"width\":1920,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/infographic-blacklist-whitelist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection","description":"Most AV programs on the market use the blacklist for malware detection and prevention -- but is it effective? An alternative approach is now available...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/","og_locale":"en_US","og_type":"article","og_title":"Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection","og_description":"Most AV programs on the market use the blacklist for malware detection and prevention -- but is it effective? An alternative approach is now available...","og_url":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-06-16T14:34:18+00:00","article_modified_time":"2017-06-28T18:41:47+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securitySlider-1.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection","datePublished":"2017-06-16T14:34:18+00:00","dateModified":"2017-06-28T18:41:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/"},"wordCount":223,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securitySlider-1.jpg","keywords":["blacklist","fileless malware","fileless malware detection","infographic","whitelist"],"articleSection":["TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/","url":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/","name":"Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securitySlider-1.jpg","datePublished":"2017-06-16T14:34:18+00:00","dateModified":"2017-06-28T18:41:47+00:00","description":"Most AV programs on the market use the blacklist for malware detection and prevention -- but is it effective? An alternative approach is now available...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securitySlider-1.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securitySlider-1.jpg","width":1920,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/infographic-blacklist-whitelist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57273"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57273\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55110"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}