{"id":59526,"date":"2018-08-29T16:25:23","date_gmt":"2018-08-29T21:25:23","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59526"},"modified":"2018-08-29T16:25:23","modified_gmt":"2018-08-29T21:25:23","slug":"hackers-hit-gold-mine","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/","title":{"rendered":"How Hackers Know If They&#8217;ve Hit a Gold Mine"},"content":{"rendered":"<h3>Top Information Hackers Look For<\/h3>\n<p>There are two types of cyber attacks, targeted and untargeted.\u00a0 Targeted could be as specific as going after a certain business or government agency, or as broad as a certain sector such as education or healthcare.\u00a0 Targeted attacks often occur when an enemy or competitor specifically targets a business or entity for the purpose of creating reputational or production damage, or monetary loss by the victim.<\/p>\n<p>Untargeted attacks are far more common than the alternative.\u00a0 In an untargeted attack,\u00a0hackers cast a wide net hoping to infect as many people as possible.\u00a0 Since cyber attacks often result in a monetary\u00a0gain by the hacker, casting a wider net means higher profits.\u00a0 But what exactly is profitable?<\/p>\n<p>It depends on the attack.\u00a0 If a hacker is looking to steal information to sell on the dark web, they will think they hit a gold mine with the information below:<\/p>\n<ul>\n<li>Name<\/li>\n<li>Date of birth<\/li>\n<li>Address<\/li>\n<li>Social security number<\/li>\n<\/ul>\n<p>With that information, they could also create fraudulent credit card accounts.\u00a0 Again, a gold mine.<\/p>\n<h4>Other Means of Monetary Gain<\/h4>\n<p>Hackers are also infecting users with ransomware, which locks the user&#8217;s files until a payment demand is met.\u00a0 The only way for a user to work around this is to restore their system using backup files.\u00a0 Often times businesses will have backup files in place, but it may be more costly to restore using backups than to just pay the ransom.\u00a0 Often times, home-users do not have their backup files stored on an external device or cloud-based provider, meaning they feel like they have no choice but to either pay or be out their information.<\/p>\n<p>Ransomware hackers also know certain verticals are more willing to pay the ransom than to wait out restoring their systems on their own.\u00a0 For instance, financial institutions are entirely dependent on IT.\u00a0 This means, if a hacker were to take down a banking network they would be entirely paralyzed.\u00a0 Customers would have no idea what their bank balance is, online banking wouldn&#8217;t work, balance transfers would not be available, and all credit\/debit card transactions would be denied.\u00a0 The bank would have no option but to shut down until the systems were remediated.<\/p>\n<p>The healthcare industry has also been the victim of multiple ransomware attacks.\u00a0 Unfortunately, at times they&#8217;ve opted to pay the hackers with the hope of getting access to their systems again.\u00a0 Historically when a hospital has been hit with ransomware, various appointments\u00a0were canceled, and patients were rerouted to other facilities to have their medical care needs met.\u00a0 Not only does this impact the hospital&#8217;s bottom line, but also their reputation.<\/p>\n<h4>Don&#8217;t Fall Victim<\/h4>\n<p>Data is only as safe as the endpoint it is kept on.\u00a0 The easiest way to avoid falling victim is to employ an antivirus protection that uses an <a href=\"http:\/\/www.pcmatic.com\/pro\/whitelist\">automated application whitelist technology<\/a>.\u00a0 This will block all unknown and potentially malicious files from executing on your device.\u00a0 A whitelist, also known as a default-deny approach, will only allow known trusted programs to execute.\u00a0 The technology should also include a way to<a href=\"https:\/\/techtalk.pcpitstop.com\/2017\/06\/16\/infographic-blacklist-whitelist\/\"> block fileless malware attacks,<\/a> which use scripting engines to execute malware, instead of downloadable files.<\/p>\n<p>Also, users need to keep their operating systems and third-party applications updated with the latest versions.\u00a0 This mitigates the risk of hackers using known security vulnerabilities to exploit the system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Top Information Hackers Look For There are two types of cyber attacks, targeted and untargeted.\u00a0 Targeted could be as specific as going after a certain business or government agency, or as broad as a certain sector such as education or healthcare.\u00a0 Targeted attacks often occur when an enemy or competitor specifically targets a business or [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55153,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,4949,183],"tags":[4704,4499],"class_list":["post-59526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-ransomware","category-tips","tag-hackers","tag-hacking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Hackers Know If They&#039;ve Hit a Gold Mine<\/title>\n<meta name=\"description\" content=\"Hackers are hitting various entities with both targeted and untargeted attacks, but the real question is, how do they know if they&#039;ve hit a gold mine...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Know If They&#039;ve Hit a Gold Mine\" \/>\n<meta property=\"og:description\" content=\"Hackers are hitting various entities with both targeted and untargeted attacks, but the real question is, how do they know if they&#039;ve hit a gold mine...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-29T21:25:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG-blue.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"How Hackers Know If They&#8217;ve Hit a Gold Mine\",\"datePublished\":\"2018-08-29T21:25:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/\"},\"wordCount\":572,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG-blue.jpg\",\"keywords\":[\"hackers\",\"hacking\"],\"articleSection\":[\"Newsletter\",\"Ransomware\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/\",\"name\":\"How Hackers Know If They've Hit a Gold Mine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG-blue.jpg\",\"datePublished\":\"2018-08-29T21:25:23+00:00\",\"description\":\"Hackers are hitting various entities with both targeted and untargeted attacks, but the real question is, how do they know if they've hit a gold mine...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG-blue.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG-blue.jpg\",\"width\":730,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-hit-gold-mine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Hackers Know If They&#8217;ve Hit a Gold Mine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Hackers Know If They've Hit a Gold Mine","description":"Hackers are hitting various entities with both targeted and untargeted attacks, but the real question is, how do they know if they've hit a gold mine...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/","og_locale":"en_US","og_type":"article","og_title":"How Hackers Know If They've Hit a Gold Mine","og_description":"Hackers are hitting various entities with both targeted and untargeted attacks, but the real question is, how do they know if they've hit a gold mine...","og_url":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-08-29T21:25:23+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG-blue.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"How Hackers Know If They&#8217;ve Hit a Gold Mine","datePublished":"2018-08-29T21:25:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/"},"wordCount":572,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG-blue.jpg","keywords":["hackers","hacking"],"articleSection":["Newsletter","Ransomware","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/","url":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/","name":"How Hackers Know If They've Hit a Gold Mine","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG-blue.jpg","datePublished":"2018-08-29T21:25:23+00:00","description":"Hackers are hitting various entities with both targeted and untargeted attacks, but the real question is, how do they know if they've hit a gold mine...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG-blue.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG-blue.jpg","width":730,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-hit-gold-mine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Hackers Know If They&#8217;ve Hit a Gold Mine"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59526"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59526\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55153"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}