{"id":59689,"date":"2018-10-15T15:48:02","date_gmt":"2018-10-15T20:48:02","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59689"},"modified":"2018-10-19T15:09:49","modified_gmt":"2018-10-19T20:09:49","slug":"sextortion-scam","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/","title":{"rendered":"Sextortion Scams Are Sending Users Into a Frenzy"},"content":{"rendered":"<div class=\"pa3 bg-slatelight br2 br-top b-slate bt bl br\">\n<h3>Advancements to Sextortion Scams Continue<\/h3>\n<p class=\"p1\">Hackers continue to trick users into thinking their computers have been infected with malware that recorded videos of them watching porn.\u00a0 In an attempt to legitimize their claims, the hackers reveal they know a real password the victim has used and have\u00a0begun spoofing victims\u2019 email addresses.\u00a0 By spoofing the email address, it makes it appear the messages are being sent from the victim\u2019s own email account.<\/p>\n<p class=\"p1\">After distributing these spoofed emails, the hackers then demand a payment in the untraceable cryptocurrency, bitcoin.\u00a0 They claim if a payment is not received, they will send the recordings to everyone in the recipient&#8217;s contacts list.\u00a0\u00a0The scam has been incredibly effective, raking in bitcoin payments totaling $4 million in just the last three months.<\/p>\n<\/div>\n<p>Below are a couple examples of these sextortion emails, provided by <a href=\"https:\/\/blog.barkly.com\/sextortion-email-scam-spoofing-password?utm_source=hs_email&amp;utm_medium=email&amp;utm_content=66648680&amp;_hsenc=p2ANqtz-9y8YFftQt6Ec71e--riDwd23FcdTqEksQVJd7TqyZHuhjPioF1iS-mIXZIwCjAPE0dAXcm3I0owTUDag1-BgnynD7ffw&amp;_hsmi=66648680\">Barkley<\/a>:<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/blog.barkly.com\/hs-fs\/hubfs\/Sextortion-scam-email-spoofing-1.png?t=1539632912217&amp;width=600&amp;name=Sextortion-scam-email-spoofing-1.png\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/blog.barkly.com\/hs-fs\/hubfs\/Sextortion-scam-email-spoofing-1.png?t=1539632912217&amp;width=300&amp;name=Sextortion-scam-email-spoofing-1.png 300w, https:\/\/blog.barkly.com\/hs-fs\/hubfs\/Sextortion-scam-email-spoofing-1.png?t=1539632912217&amp;width=600&amp;name=Sextortion-scam-email-spoofing-1.png 600w, https:\/\/blog.barkly.com\/hs-fs\/hubfs\/Sextortion-scam-email-spoofing-1.png?t=1539632912217&amp;width=900&amp;name=Sextortion-scam-email-spoofing-1.png 900w, https:\/\/blog.barkly.com\/hs-fs\/hubfs\/Sextortion-scam-email-spoofing-1.png?t=1539632912217&amp;width=1200&amp;name=Sextortion-scam-email-spoofing-1.png 1200w, https:\/\/blog.barkly.com\/hs-fs\/hubfs\/Sextortion-scam-email-spoofing-1.png?t=1539632912217&amp;width=1500&amp;name=Sextortion-scam-email-spoofing-1.png 1500w, https:\/\/blog.barkly.com\/hs-fs\/hubfs\/Sextortion-scam-email-spoofing-1.png?t=1539632912217&amp;width=1800&amp;name=Sextortion-scam-email-spoofing-1.png 1800w\" alt=\"Sextortion-scam-email-spoofing-1\" width=\"600\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/blog.barkly.com\/hs-fs\/hubfs\/sextortion-scam-spoofed-email-2.png?t=1539632912217&amp;width=600&amp;name=sextortion-scam-spoofed-email-2.png\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/blog.barkly.com\/hs-fs\/hubfs\/sextortion-scam-spoofed-email-2.png?t=1539632912217&amp;width=300&amp;name=sextortion-scam-spoofed-email-2.png 300w, https:\/\/blog.barkly.com\/hs-fs\/hubfs\/sextortion-scam-spoofed-email-2.png?t=1539632912217&amp;width=600&amp;name=sextortion-scam-spoofed-email-2.png 600w, https:\/\/blog.barkly.com\/hs-fs\/hubfs\/sextortion-scam-spoofed-email-2.png?t=1539632912217&amp;width=900&amp;name=sextortion-scam-spoofed-email-2.png 900w, https:\/\/blog.barkly.com\/hs-fs\/hubfs\/sextortion-scam-spoofed-email-2.png?t=1539632912217&amp;width=1200&amp;name=sextortion-scam-spoofed-email-2.png 1200w, https:\/\/blog.barkly.com\/hs-fs\/hubfs\/sextortion-scam-spoofed-email-2.png?t=1539632912217&amp;width=1500&amp;name=sextortion-scam-spoofed-email-2.png 1500w, https:\/\/blog.barkly.com\/hs-fs\/hubfs\/sextortion-scam-spoofed-email-2.png?t=1539632912217&amp;width=1800&amp;name=sextortion-scam-spoofed-email-2.png 1800w\" alt=\"sextortion-scam-spoofed-email-2\" width=\"600\" \/><\/p>\n<div class=\"pa3 bg-slatelight br2 br-top b-slate bt bl br\">\n<h3>How Users Are Being Exploited<\/h3>\n<p>First, it is important to clarify, these victims have not been infected with malware.\u00a0 Instead, they&#8217;ve received a scam email that is exploiting the password that was leaked in one of today&#8217;s major data breaches.\u00a0 There is NO recording!<\/p>\n<\/div>\n<p>Many recipients of these emails have confirmed the passwords included in the emails, haven&#8217;t been used in years.\u00a0 This has led several experts to believe these scams are using data dumps from data breaches that occurred years ago.<\/p>\n<h3>What&#8217;s Next?<\/h3>\n<p>If you received one of these emails, it is important you remember &#8212; this is only a scam, your device is NOT infected with malware.\u00a0 PC Matic encourages you NOT to pay the bitcoin demands.\u00a0 Instead, ensure you are no longer using the password the hacker discloses in the email.\u00a0 If you are still using this password, it is important to change the login credentials for those accounts.<\/p>\n<p>If you are wondering if your information has been breached, you may visit <a href=\"https:\/\/haveibeenpwned.com\/\">www.haveibeenpwned.com<\/a>.\u00a0 By typing in your email address, the website will tell you if and when your information was breached.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Advancements to Sextortion Scams Continue Hackers continue to trick users into thinking their computers have been infected with malware that recorded videos of them watching porn.\u00a0 In an attempt to legitimize their claims, the hackers reveal they know a real password the victim has used and have\u00a0begun spoofing victims\u2019 email addresses.\u00a0 By spoofing the email [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,5090,183],"tags":[235,5565],"class_list":["post-59689","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-slider","category-tips","tag-scams","tag-sextortion"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sextortion Scams Are Sending Users Into a Frenzy<\/title>\n<meta name=\"description\" content=\"Cyber criminals have been sending out mass emails regarding sextortion scams, claiming to have recordings of users watching...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sextortion Scams Are Sending Users Into a Frenzy\" \/>\n<meta property=\"og:description\" content=\"Cyber criminals have been sending out mass emails regarding sextortion scams, claiming to have recordings of users watching...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-15T20:48:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-19T20:09:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Sextortion Scams Are Sending Users Into a Frenzy\",\"datePublished\":\"2018-10-15T20:48:02+00:00\",\"dateModified\":\"2018-10-19T20:09:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/\"},\"wordCount\":339,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"keywords\":[\"scams\",\"sextortion\"],\"articleSection\":[\"Newsletter\",\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/\",\"name\":\"Sextortion Scams Are Sending Users Into a Frenzy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"datePublished\":\"2018-10-15T20:48:02+00:00\",\"dateModified\":\"2018-10-19T20:09:49+00:00\",\"description\":\"Cyber criminals have been sending out mass emails regarding sextortion scams, claiming to have recordings of users watching...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"width\":1920,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/sextortion-scam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sextortion Scams Are Sending Users Into a Frenzy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sextortion Scams Are Sending Users Into a Frenzy","description":"Cyber criminals have been sending out mass emails regarding sextortion scams, claiming to have recordings of users watching...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/","og_locale":"en_US","og_type":"article","og_title":"Sextortion Scams Are Sending Users Into a Frenzy","og_description":"Cyber criminals have been sending out mass emails regarding sextortion scams, claiming to have recordings of users watching...","og_url":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-10-15T20:48:02+00:00","article_modified_time":"2018-10-19T20:09:49+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Sextortion Scams Are Sending Users Into a Frenzy","datePublished":"2018-10-15T20:48:02+00:00","dateModified":"2018-10-19T20:09:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/"},"wordCount":339,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","keywords":["scams","sextortion"],"articleSection":["Newsletter","TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/","url":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/","name":"Sextortion Scams Are Sending Users Into a Frenzy","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","datePublished":"2018-10-15T20:48:02+00:00","dateModified":"2018-10-19T20:09:49+00:00","description":"Cyber criminals have been sending out mass emails regarding sextortion scams, claiming to have recordings of users watching...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","width":1920,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/sextortion-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Sextortion Scams Are Sending Users Into a Frenzy"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59689"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59689\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55104"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}