{"id":58597,"date":"2018-01-17T11:52:46","date_gmt":"2018-01-17T17:52:46","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=58597"},"modified":"2018-01-17T11:52:46","modified_gmt":"2018-01-17T17:52:46","slug":"hackers-exploit-meltdown-spectre","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/","title":{"rendered":"Hackers Exploit Meltdown\/Spectre Vulnerabilities with Malicious &#8220;Patches&#8221;"},"content":{"rendered":"<h3>Cyber Criminals Use Processor Vulnerabilities to Spread Malware<\/h3>\n<p>Once security issues go global, cyber criminals tend to exploit them for their own gain.\u00a0 It happened with the global ransomware treats, NotPetya, BadRabbit and WannaCry.\u00a0 Hackers used fraudulent decryption keys to spread malware.\u00a0 Now, they&#8217;re using malicious Meltdown\/Spectre &#8220;patches&#8221; to spread malware.\u00a0 According to <a href=\"https:\/\/www.techrepublic.com\/article\/this-fake-spectremeltdown-patch-will-infect-your-pc-with-malware\/\">Tech Republic<\/a>, the malicious patches have been targeting Germany; however, it won&#8217;t be long until they&#8217;re spread globally.<\/p>\n<p>The malicious patch is being sent via phishing scams, claiming that the installation of the patch is critical.\u00a0 Within the email, users are asked to go to a certain website to download the patch.\u00a0 Interesting enough, the website they&#8217;re asked to go to is an https:\/\/ page.\u00a0 Often times users believe clicking on https:\/\/ links are safe because the &#8220;s&#8221; stands for secure.\u00a0 Although, the data transmitting from the computer to the website is secure, it does not mean the content within the page is safe and not malicious.<\/p>\n<p>Avoid scams such as these by keeping two things in mind.\u00a0 First, valid security patches will not be distributed to users individually.\u00a0 Secondly, any email or website that is urging users to implement patches or updates are signs of red flags.\u00a0 Instead patches will be launched within an automatic update.\u00a0 Unless of course the user has opted out of automatic updates, in which case the patch will launch at the time the software update is manually launched, which can be done through the Settings feature within the operating systems.<\/p>\n<h5>**Please keep in mind, if your computer is acting bizarre after it was patched, it does not mean it was a malware attack.\u00a0 Several reports have been brought to light regarding <a href=\"https:\/\/www.techrepublic.com\/article\/meltdown-spectre-patch-watch-out-for-random-reboots-warns-intel\/\">rebooting issues<\/a> and <a href=\"https:\/\/www.computerworld.com\/article\/3247676\/microsoft-windows\/microsofts-mystifying-meltdownspectre-patches-for-amd-processors.html\">BSoD errors<\/a> after the legitimate patch was installed.\u00a0 If you&#8217;re a PC Matic user and are experiencing any of these issues, please reach out to our helpdesk team at www.pcmatic.com\/help.\u00a0 Explain what is going on, as well as when it started.\u00a0 Our team will do everything they can to get your computer back up and running.<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Criminals Use Processor Vulnerabilities to Spread Malware Once security issues go global, cyber criminals tend to exploit them for their own gain.\u00a0 It happened with the global ransomware treats, NotPetya, BadRabbit and WannaCry.\u00a0 Hackers used fraudulent decryption keys to spread malware.\u00a0 Now, they&#8217;re using malicious Meltdown\/Spectre &#8220;patches&#8221; to spread malware.\u00a0 According to Tech Republic, [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55334,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5090,183],"tags":[5441,5447,133,5440],"class_list":["post-58597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-slider","category-tips","tag-meltdown","tag-patches","tag-scam","tag-spectre"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Exploit Meltdown\/Spectre Vulnerabilities with Malicious &quot;Patches&quot;<\/title>\n<meta name=\"description\" content=\"It didn&#039;t take long for hackers to begin using the Meltdown\/Spectre update for their own gain. Billions of computers have been notified of the threat, and hackers are sending out malicious emails claiming to have the &quot;right patch&quot;...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Exploit Meltdown\/Spectre Vulnerabilities with Malicious &quot;Patches&quot;\" \/>\n<meta property=\"og:description\" content=\"It didn&#039;t take long for hackers to begin using the Meltdown\/Spectre update for their own gain. Billions of computers have been notified of the threat, and hackers are sending out malicious emails claiming to have the &quot;right patch&quot;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-17T17:52:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/scamAlertSlider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Hackers Exploit Meltdown\\\/Spectre Vulnerabilities with Malicious &#8220;Patches&#8221;\",\"datePublished\":\"2018-01-17T17:52:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/\"},\"wordCount\":356,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/scamAlertSlider.jpg\",\"keywords\":[\"Meltdown\",\"patches\",\"scam\",\"Spectre\"],\"articleSection\":[\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/\",\"name\":\"Hackers Exploit Meltdown\\\/Spectre Vulnerabilities with Malicious \\\"Patches\\\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/scamAlertSlider.jpg\",\"datePublished\":\"2018-01-17T17:52:46+00:00\",\"description\":\"It didn't take long for hackers to begin using the Meltdown\\\/Spectre update for their own gain. Billions of computers have been notified of the threat, and hackers are sending out malicious emails claiming to have the \\\"right patch\\\"...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/scamAlertSlider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/scamAlertSlider.jpg\",\"width\":1920,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-exploit-meltdown-spectre\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Exploit Meltdown\\\/Spectre Vulnerabilities with Malicious &#8220;Patches&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Exploit Meltdown\/Spectre Vulnerabilities with Malicious \"Patches\"","description":"It didn't take long for hackers to begin using the Meltdown\/Spectre update for their own gain. Billions of computers have been notified of the threat, and hackers are sending out malicious emails claiming to have the \"right patch\"...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Exploit Meltdown\/Spectre Vulnerabilities with Malicious \"Patches\"","og_description":"It didn't take long for hackers to begin using the Meltdown\/Spectre update for their own gain. Billions of computers have been notified of the threat, and hackers are sending out malicious emails claiming to have the \"right patch\"...","og_url":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-01-17T17:52:46+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/scamAlertSlider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Hackers Exploit Meltdown\/Spectre Vulnerabilities with Malicious &#8220;Patches&#8221;","datePublished":"2018-01-17T17:52:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/"},"wordCount":356,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/scamAlertSlider.jpg","keywords":["Meltdown","patches","scam","Spectre"],"articleSection":["TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/","url":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/","name":"Hackers Exploit Meltdown\/Spectre Vulnerabilities with Malicious \"Patches\"","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/scamAlertSlider.jpg","datePublished":"2018-01-17T17:52:46+00:00","description":"It didn't take long for hackers to begin using the Meltdown\/Spectre update for their own gain. Billions of computers have been notified of the threat, and hackers are sending out malicious emails claiming to have the \"right patch\"...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/scamAlertSlider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/scamAlertSlider.jpg","width":1920,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-exploit-meltdown-spectre\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Exploit Meltdown\/Spectre Vulnerabilities with Malicious &#8220;Patches&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=58597"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58597\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55334"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=58597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=58597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=58597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}