{"id":57804,"date":"2017-09-06T09:49:27","date_gmt":"2017-09-06T14:49:27","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57804"},"modified":"2017-09-06T09:49:27","modified_gmt":"2017-09-06T14:49:27","slug":"ubuntu-ios-linux-security-software","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/","title":{"rendered":"Are Ubuntu, iOS and Linux Users Immune From Malware?"},"content":{"rendered":"<h3>Ubuntu, iOS and Linux Users Don&#8217;t Need Security Software?<\/h3>\n<p>PC Matic recently received feedback that if users transition to different operating systems (OS), there is no need for security software. \u00a0This couldn&#8217;t be more false. \u00a0Now, is the perfect time to clear up this misconception.<\/p>\n<p>Neither Linux, Ubuntu or iOS users are immune from cyber attacks. \u00a0It is believed these operating systems are more secure than the Windows OS. \u00a0But why? \u00a0In the feedback PC Matic received, a clear explanation was never provided. \u00a0Therefore, it can only be assumed why users believe these OS choices are better than Windows. \u00a0It is assumed, users believe Linux, Ubuntu and iOS are more secure because in most malware cases, Windows users are the victims. \u00a0Although it is true, Windows PCs are highly targeted, this is only because of their large market share. \u00a0Meaning, hackers can cast a wider net when targeting Windows PCs than if they were to target Linux, Ubuntu or iOS.<\/p>\n<p>However, this does not mean these users have not been targeted in the past, or won&#8217;t be in the future.<\/p>\n<h4>Linux<\/h4>\n<p>In 2016, <a href=\"https:\/\/techtalk.pcpitstop.com\/2016\/08\/05\/linex-ddos-attacks-surge-q2\/\">reports <\/a>suggested the Linux operating system was the primary target for DDoS attacks due to the potential vulnerabilities within the system.\u00a0 A major contributor of the issue, is the lack of security software that is available for this particular OS.<\/p>\n<p>Also, Nayana, a web hosting company located in South Korea, was <a href=\"https:\/\/techtalk.pcpitstop.com\/2017\/06\/20\/linux-ransomware-payday\/\">hit with ransomware <\/a>on June 10, 2017. \u00a0The ransomware variant, Erebus, successfully infiltrated 153 Linux servers, allowing the cyber criminals access to encrypt over 3,400 business websites hosted by Nayana. \u00a0This ransomware attack resulted in the largest ransomware payout in history, one million dollars.<\/p>\n<h4>Ubuntu<\/h4>\n<p>In the last 30 days, Ubuntu has<a href=\"https:\/\/usn.ubuntu.com\/usn\/\"> patched 49 software vulnerabilities<\/a>. \u00a0All of these security gaps could have been used by cyber criminals for malicious purposes. \u00a0Although no reports of malware exploiting these vulnerabilities have been reported, it doesn&#8217;t mean there won&#8217;t be.<\/p>\n<h4>iOS<\/h4>\n<p>Just months ago, <a href=\"https:\/\/techtalk.pcpitstop.com\/2017\/06\/14\/apple-declines-comment-growing-malware-threats\/\">Apple declined comments to the BBC <\/a>regarding the recent malware target that has been placed on their back. \u00a0In June of 2017, ransomware targeted iOS devices. \u00a0The ransomware creators did a poor job managing the decryption keys, which left every victim&#8217;s files locked without the ability to be decrypted.<\/p>\n<p>Spyware also began targeting iOS devices earlier this year. \u00a0The spyware variant identified was logging keystrokes, accessing the microphone, and had the ability to take screenshots.<\/p>\n<h3>Conclusion<\/h3>\n<p>Operating systems differ in several different ways. \u00a0However, they all have one thing in common &#8212; software vulnerabilities. \u00a0Regardless of the operating system users choose to put on their devices, they must also have a security solution in place. \u00a0While searching for a security solution, be sure it is compatible with the OS.<\/p>\n<p>It is also important to research the solution&#8217;s malware detection rates. \u00a0The Virus Bulletin Reactive and Proactive (RAP) test is a free, independent third-party, malware detection test offered to all security solution providers. \u00a0Users can see the most recent test results <a href=\"https:\/\/www.virusbulletin.com\/virusbulletin\/2016\/12\/vb100-comparative-review\/\">here<\/a>. \u00a0If a security solution is not listed, it is because they opted out of testing. \u00a0Users can make their own assumptions why&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ubuntu, iOS and Linux Users Don&#8217;t Need Security Software? PC Matic recently received feedback that if users transition to different operating systems (OS), there is no need for security software. \u00a0This couldn&#8217;t be more false. \u00a0Now, is the perfect time to clear up this misconception. Neither Linux, Ubuntu or iOS users are immune from cyber [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5090,183],"tags":[5328,623,5329,4094,4991],"class_list":["post-57804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-slider","category-tips","tag-ios","tag-linux","tag-operating-systems","tag-security-software","tag-ubuntu"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are Ubuntu, iOS and Linux Users Immune From Malware?<\/title>\n<meta name=\"description\" content=\"A misconception has been came to light regarding Ubuntu, Linux, and the iOS operating systems. Although malware creators regularly do not...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Ubuntu, iOS and Linux Users Immune From Malware?\" \/>\n<meta property=\"og:description\" content=\"A misconception has been came to light regarding Ubuntu, Linux, and the iOS operating systems. Although malware creators regularly do not...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-06T14:49:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Are Ubuntu, iOS and Linux Users Immune From Malware?\",\"datePublished\":\"2017-09-06T14:49:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/\"},\"wordCount\":527,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"keywords\":[\"iOS\",\"linux\",\"operating systems\",\"security software\",\"ubuntu\"],\"articleSection\":[\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/\",\"name\":\"Are Ubuntu, iOS and Linux Users Immune From Malware?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"datePublished\":\"2017-09-06T14:49:27+00:00\",\"description\":\"A misconception has been came to light regarding Ubuntu, Linux, and the iOS operating systems. Although malware creators regularly do not...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"width\":1920,\"height\":550,\"caption\":\"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ubuntu-ios-linux-security-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are Ubuntu, iOS and Linux Users Immune From Malware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are Ubuntu, iOS and Linux Users Immune From Malware?","description":"A misconception has been came to light regarding Ubuntu, Linux, and the iOS operating systems. Although malware creators regularly do not...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/","og_locale":"en_US","og_type":"article","og_title":"Are Ubuntu, iOS and Linux Users Immune From Malware?","og_description":"A misconception has been came to light regarding Ubuntu, Linux, and the iOS operating systems. Although malware creators regularly do not...","og_url":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-09-06T14:49:27+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Are Ubuntu, iOS and Linux Users Immune From Malware?","datePublished":"2017-09-06T14:49:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/"},"wordCount":527,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","keywords":["iOS","linux","operating systems","security software","ubuntu"],"articleSection":["TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/","url":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/","name":"Are Ubuntu, iOS and Linux Users Immune From Malware?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","datePublished":"2017-09-06T14:49:27+00:00","description":"A misconception has been came to light regarding Ubuntu, Linux, and the iOS operating systems. Although malware creators regularly do not...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","width":1920,"height":550,"caption":"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/ubuntu-ios-linux-security-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Are Ubuntu, iOS and Linux Users Immune From Malware?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57804"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57804\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55269"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}