{"id":58718,"date":"2018-02-14T16:52:53","date_gmt":"2018-02-14T22:52:53","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=58718"},"modified":"2018-02-16T11:36:31","modified_gmt":"2018-02-16T17:36:31","slug":"crypto-mining-next-major-cyber-threat","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/","title":{"rendered":"Crypto-Jacking: The Next Major Cyber Threat"},"content":{"rendered":"<h3>Experts Believe Crypto-Jacking is Next Big Cyber Threat<\/h3>\n<p>Experts have shifted their emphasis from ransomware to crypto-jacking when considering today&#8217;s emerging cyber threats.\u00a0 Ransomware is a malicious software that encrypts files, then demands a payment to unlock them.\u00a0 Alternatively, crypto-jacking is the unauthorized use of one&#8217;s computer or network to mine for digital currency, or crypto-mine.\u00a0 Mining for crypto-currencies takes an extreme amount of resources, including power and bandwidth.\u00a0 It is for these reasons, hackers are using other&#8217;s resources and devices.<\/p>\n<p>Buy why the shift?\u00a0 First, ransomware is no longer an emerging threat, but an existing threat.\u00a0 Also, ransomware has been incredibly lucrative, but can be costly for hackers to use.\u00a0 Alternatively, <a href=\"https:\/\/www.csoonline.com\/article\/3253572\/internet\/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html\">CSO Online<\/a>\u00a0reported a crypto-mining service called Coinhive recently earned over $300k in one month.\u00a0 That, along with a crypto-jacking kits costing as little as $30, it makes sense hackers are making the switch.\u00a0 Also, ransomware infections require the user to actually make the payment.\u00a0 Unlike crypto-jacking which does not require the user to make any kind of payment.<\/p>\n<h4>Threat Models<\/h4>\n<p>The threat model for ransomware and crypto-jacking is similar.\u00a0 Both impact the functionality of the victim&#8217;s systems, and both could render them useless.\u00a0 However, crypto-jacking may not be a noticeable threat, like ransomware is.\u00a0 If you&#8217;re infected with ransomware, users receive a ransom note demanding a payment.\u00a0 Crypto-jacking doesn&#8217;t notify the user.\u00a0 Instead, it monopolizes resources in the background.\u00a0 Since crypto-mining takes up a majority of the resources, users may notice a significant decrease in bandwidth or device speed.<\/p>\n<p>If you are concerned your system is infected with a crypto-jacking malware, it is important the user run a virus scan to identify any kind of malicious activity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Experts Believe Crypto-Jacking is Next Big Cyber Threat Experts have shifted their emphasis from ransomware to crypto-jacking when considering today&#8217;s emerging cyber threats.\u00a0 Ransomware is a malicious software that encrypts files, then demands a payment to unlock them.\u00a0 Alternatively, crypto-jacking is the unauthorized use of one&#8217;s computer or network to mine for digital currency, or [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55249,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,183],"tags":[5463,5427,4141,56],"class_list":["post-58718","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-tips","tag-crypto-jacking","tag-crypto-mining","tag-cyber-threats","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Crypto-Jacking: The Next Major Cyber Threat<\/title>\n<meta name=\"description\" content=\"Experts are reporting today&#039;s emerging cyber threat is crypto-jacking. Crypto-jacking occurs when an unauthorized party takes over one&#039;s device to mine for digital currencies...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crypto-Jacking: The Next Major Cyber Threat\" \/>\n<meta property=\"og:description\" content=\"Experts are reporting today&#039;s emerging cyber threat is crypto-jacking. Crypto-jacking occurs when an unauthorized party takes over one&#039;s device to mine for digital currencies...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-14T22:52:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-16T17:36:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fightMalware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Crypto-Jacking: The Next Major Cyber Threat\",\"datePublished\":\"2018-02-14T22:52:53+00:00\",\"dateModified\":\"2018-02-16T17:36:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/\"},\"wordCount\":291,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/fightMalware.jpg\",\"keywords\":[\"crypto-jacking\",\"crypto-mining\",\"cyber threats\",\"malware\"],\"articleSection\":[\"Newsletter\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/\",\"name\":\"Crypto-Jacking: The Next Major Cyber Threat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/fightMalware.jpg\",\"datePublished\":\"2018-02-14T22:52:53+00:00\",\"dateModified\":\"2018-02-16T17:36:31+00:00\",\"description\":\"Experts are reporting today's emerging cyber threat is crypto-jacking. Crypto-jacking occurs when an unauthorized party takes over one's device to mine for digital currencies...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/fightMalware.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/fightMalware.jpg\",\"width\":730,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/crypto-mining-next-major-cyber-threat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crypto-Jacking: The Next Major Cyber Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crypto-Jacking: The Next Major Cyber Threat","description":"Experts are reporting today's emerging cyber threat is crypto-jacking. Crypto-jacking occurs when an unauthorized party takes over one's device to mine for digital currencies...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/","og_locale":"en_US","og_type":"article","og_title":"Crypto-Jacking: The Next Major Cyber Threat","og_description":"Experts are reporting today's emerging cyber threat is crypto-jacking. Crypto-jacking occurs when an unauthorized party takes over one's device to mine for digital currencies...","og_url":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-02-14T22:52:53+00:00","article_modified_time":"2018-02-16T17:36:31+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fightMalware.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Crypto-Jacking: The Next Major Cyber Threat","datePublished":"2018-02-14T22:52:53+00:00","dateModified":"2018-02-16T17:36:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/"},"wordCount":291,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fightMalware.jpg","keywords":["crypto-jacking","crypto-mining","cyber threats","malware"],"articleSection":["Newsletter","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/","url":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/","name":"Crypto-Jacking: The Next Major Cyber Threat","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fightMalware.jpg","datePublished":"2018-02-14T22:52:53+00:00","dateModified":"2018-02-16T17:36:31+00:00","description":"Experts are reporting today's emerging cyber threat is crypto-jacking. Crypto-jacking occurs when an unauthorized party takes over one's device to mine for digital currencies...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fightMalware.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fightMalware.jpg","width":730,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/crypto-mining-next-major-cyber-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Crypto-Jacking: The Next Major Cyber Threat"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=58718"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58718\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55249"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=58718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=58718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=58718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}