{"id":58684,"date":"2018-02-06T12:30:56","date_gmt":"2018-02-06T18:30:56","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=58684"},"modified":"2018-02-06T12:34:08","modified_gmt":"2018-02-06T18:34:08","slug":"top-9-cyber-threats-targeting-education-sector","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/","title":{"rendered":"Top 9 Malware Variants Targeting the Education Sector"},"content":{"rendered":"<h4>Why Schools Are Targeted<\/h4>\n<p>When industries think of cyber targets, often times the education sector is not included.\u00a0 Why?\u00a0 Well, it is believed they do not carry the financial weight of bigger targets like enterprises or the healthcare industry.\u00a0 Although, school systems do still hold a plethora of critical data that can be easily exploited.\u00a0 Infecting an educational institution may also be easier than executing an attack on another industry.\u00a0 For example, often times schools lack updated software and have a minimal IT budget.\u00a0 Pair this with the increased technological role within the classroom, and student who do everything they can to bypass the school&#8217;s safe guards, you have a potential gold mine for hackers.<\/p>\n<h4>Top 9 Malware Variants Targeting School Systems<\/h4>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3250862\/security\/top-cybersecurity-exploits-active-in-the-education-sector-today-and-why-you-should-care.html\">CSO Online<\/a> recently reported the top nine malware threats that are targeting the education sector.\u00a0 These nine threats are listed below:<\/p>\n<ol>\n<li>Zero-Access Botnet: This variant infects devices by exploiting a Windows operating system vulnerability.\u00a0 It will often lay dormant, or spread throughout interconnected devices.<\/li>\n<li>Andromeda Botnet: A malware variant that often spreads other malware such as Zeus trojans, Tropig or Fareit.\u00a0 This typically injects itself into machines by HTTP websites.<\/li>\n<li>Mirai Botnet: The Mirai code was made public, before the creators were found &#8212; therefore it is likely different versions of the Mirai botnet will continue to spread.<\/li>\n<li>W32\/MS04028.fam!: This specific variant is used to exploit Windows XP operating systems.\u00a0 Since educational institutions often run on outdated operating systems, including XP, which hasn&#8217;t been issued Windows updates in years, the vulnerability continues to exist.<\/li>\n<li>W32\/StartPage.NIK!tr: This malware arrives as a CAB.file, which requires execution to install the malware &#8211; like the previous four.<\/li>\n<li>Riskware\/BitCoinMiner93EA: This particular variant finds infected devices and attempts to steal any bitcoins within the digital wallets on the device.<\/li>\n<li>Functions.Definitions.Remote.Code.Execution: Beyond using an executable, an attacker could also use this variant to exploit web servers using Bash shell scripts to execute malicious coding into the device.<\/li>\n<li>Tomcat.Arbitrary.JSP.file.Upload: The malware variant exploits a vulnerability in Java.\u00a0 If executed, the entire system could be compromised.<\/li>\n<li>Struts.2.Jakarta.Multipart.Parser.Code.Execution: Used to exploit the Apache Struts vulnerability, the hacker can then execute malicious software.<\/li>\n<\/ol>\n<h4>This is Avoidable<\/h4>\n<p>Something one should note is, every single one of these is avoidable.\u00a0 First, by ensuring programs and operating systems are updated.\u00a0 Second, IT professionals need to implement a security solution that uses application whitelisting technology and malicious script blocking.<\/p>\n<p>Even if the vulnerability exists, the hackers have to run an executable to install the malware.\u00a0 This executable would be blocked with the use of the default-deny approach.\u00a0 Lastly, some malicious events are triggered through scripts, no an executable.\u00a0 Therefore, by using a security solution that too includes malicious script blocking &#8211; you will be fully protected.<\/p>\n<p>But, we&#8217;ve all heard it &#8212; whitelisting is too much work.\u00a0 It certainly can be if it is not managed properly.\u00a0 However, PC Matic Pro offers an automated, global whitelist.\u00a0 This whitelist is managed by the PC Matic Pro malware research team, minimizing any back-end work for IT professionals.\u00a0 Also, over the last 12 months, PC Matic Pro has integrated a malicious script block to prevent scripting attack from executing on servers, as well as endpoints.<\/p>\n<p>Cyber threats continue to evolve, shouldn&#8217;t your security solution do the same?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why Schools Are Targeted When industries think of cyber targets, often times the education sector is not included.\u00a0 Why?\u00a0 Well, it is believed they do not carry the financial weight of bigger targets like enterprises or the healthcare industry.\u00a0 Although, school systems do still hold a plethora of critical data that can be easily exploited.\u00a0 [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4993,5090,183],"tags":[4773,4141,402,56],"class_list":["post-58684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pc-matic-pro-channel","category-slider","category-tips","tag-cyber-security","tag-cyber-threats","tag-education","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 9 Malware Variants Targeting the Education Sector<\/title>\n<meta name=\"description\" content=\"Nine of the top malware variants that are targeting the education sector have now been identified. Find out what IT professionals need to do to keep student, faculty and facility information secure...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 9 Malware Variants Targeting the Education Sector\" \/>\n<meta property=\"og:description\" content=\"Nine of the top malware variants that are targeting the education sector have now been identified. Find out what IT professionals need to do to keep student, faculty and facility information secure...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-06T18:30:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-06T18:34:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Top 9 Malware Variants Targeting the Education Sector\",\"datePublished\":\"2018-02-06T18:30:56+00:00\",\"dateModified\":\"2018-02-06T18:34:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/\"},\"wordCount\":571,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"keywords\":[\"cyber security\",\"cyber threats\",\"education\",\"malware\"],\"articleSection\":[\"PC Matic Pro - Channel\",\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/\",\"name\":\"Top 9 Malware Variants Targeting the Education Sector\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"datePublished\":\"2018-02-06T18:30:56+00:00\",\"dateModified\":\"2018-02-06T18:34:08+00:00\",\"description\":\"Nine of the top malware variants that are targeting the education sector have now been identified. Find out what IT professionals need to do to keep student, faculty and facility information secure...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"width\":1920,\"height\":550,\"caption\":\"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-9-cyber-threats-targeting-education-sector\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 9 Malware Variants Targeting the Education Sector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 9 Malware Variants Targeting the Education Sector","description":"Nine of the top malware variants that are targeting the education sector have now been identified. Find out what IT professionals need to do to keep student, faculty and facility information secure...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/","og_locale":"en_US","og_type":"article","og_title":"Top 9 Malware Variants Targeting the Education Sector","og_description":"Nine of the top malware variants that are targeting the education sector have now been identified. Find out what IT professionals need to do to keep student, faculty and facility information secure...","og_url":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-02-06T18:30:56+00:00","article_modified_time":"2018-02-06T18:34:08+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Top 9 Malware Variants Targeting the Education Sector","datePublished":"2018-02-06T18:30:56+00:00","dateModified":"2018-02-06T18:34:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/"},"wordCount":571,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","keywords":["cyber security","cyber threats","education","malware"],"articleSection":["PC Matic Pro - Channel","TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/","url":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/","name":"Top 9 Malware Variants Targeting the Education Sector","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","datePublished":"2018-02-06T18:30:56+00:00","dateModified":"2018-02-06T18:34:08+00:00","description":"Nine of the top malware variants that are targeting the education sector have now been identified. Find out what IT professionals need to do to keep student, faculty and facility information secure...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","width":1920,"height":550,"caption":"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/top-9-cyber-threats-targeting-education-sector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Top 9 Malware Variants Targeting the Education Sector"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=58684"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58684\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55269"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=58684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=58684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=58684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}