{"id":59740,"date":"2018-10-24T15:43:08","date_gmt":"2018-10-24T20:43:08","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59740"},"modified":"2018-10-24T15:43:08","modified_gmt":"2018-10-24T20:43:08","slug":"top-cyber-tricks","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/","title":{"rendered":"Top 10 Tricks Cyber Ghouls Hope You Fall For"},"content":{"rendered":"<h3>Hackers Offer No Treats, Only Tricks&#8230;<\/h3>\n<p>As we inch closer and closer to the holiday season, hackers are becoming more and more aware of ways to exploit users.\u00a0 Below are the top 10 ways cyber criminals are capitalizing on user behavior:<\/p>\n<ul>\n<li><strong>Unsecured WiFi connections, what&#8217;s the harm?<\/strong> By using public WiFi, or any other form of unsecured connections, users are setting themselves up for a potential security hack.\u00a0 All of the information disclosed during that unsecured connection is easily intercepted.\u00a0 Meaning, every login credential typed in, ever email written, every credit card number entered &#8212; could all be exploited.<\/li>\n<li><strong>Are you practicing proper password maintenance?<\/strong> This includes using the same password for multiple login credentials or using the same password that you&#8217;ve had since 2005.\u00a0 You should be changing your passwords every three months.\u00a0 Sounds time-consuming, we know.\u00a0 But so are disputing fraud charges.\u00a0 Be proactive.<\/li>\n<li><strong>Watch out for fake tracking emails.<\/strong>\u00a0 Hackers know users are insanely click-happy.\u00a0 Especially with the increased buying season right around the corner, users will likely see an uptake in fraudulent tracking emails.\u00a0 To avoid this, track your package directly through the vendor or deliver&#8217;s website.<\/li>\n<li><strong>Feeling generous?<\/strong> Hackers will also set up fake charity sites so users can &#8220;donate&#8221; funds to make someone&#8217;s holiday a little brighter.\u00a0 The problem, these are scams and your money is going right into the hacker&#8217;s pocket.\u00a0 BUT don&#8217;t let this jade you.\u00a0 There are tons of legitimate causes out there, just make sure you&#8217;re donating to a real one!<\/li>\n<li><strong>How could you be so lucky?!<\/strong>\u00a0Well, you probably aren&#8217;t.\u00a0 If a deal is too good to be true, it probably is, and the hacker is just using it as click bait.\u00a0 But, don&#8217;t just take my word for it.\u00a0 Instead, go to the seller&#8217;s website and see if they are really offering that price\/offer\/bundle etc.\u00a0 Do NOT click on the links in the email, as they could be malicious.<\/li>\n<li><strong>Just leaving doors wide open!\u00a0<\/strong>Please STOP doing this!!! This means users are leaving known vulnerabilities unpatched, which is done by not keeping operating systems or third-party applications updated.\u00a0 We get it.\u00a0 Updating a program in the middle of a project can be a pain, but then do it during your next break, or at the end of the day.\u00a0 Instead, users keep hitting the &#8220;Remind me Later&#8221; option and ignore the notification completely.\u00a0 User laziness is the hackers silver bullet.<\/li>\n<li><strong>Don&#8217;t forget to lock the back door.\u00a0<\/strong> This includes <a href=\"https:\/\/techtalk.pcpitstop.com\/2018\/09\/13\/rdp-attacks\/\">remote access ports<\/a>.\u00a0 Cyber criminals have begun exploiting this vulnerability, by using brute force to penetrate networks.\u00a0 Had users disabled the ports, these attacks would have never happened.\u00a0 Instead, companies and home users are falling victim.<\/li>\n<li><strong>Your device isn&#8217;t really broken.\u00a0\u00a0<\/strong>Hackers are infecting legitimate websites with malicious code which displays a pop-up box saying the user&#8217;s device is infected and they must call Microsoft, Dell, HP, etc.\u00a0 These alerts are called <a href=\"http:\/\/www.fakevirusscam.com\">fake virus scams.<\/a>\u00a0 The device is not compromised and simply needs to be rebooted.\u00a0 However, if a user does call the number, hackers will try to gain remote access to the computer to potentially install malware, as well as demand funds for &#8220;fixing&#8221; the PC.<\/li>\n<li><strong>If you don&#8217;t need it, delete it!\u00a0<\/strong>If you are not using the app or program on your device, please delete\/uninstall it.\u00a0 Chances are, if you&#8217;re not using it, you aren&#8217;t taking the time to keep it updated, creating a security hole.\u00a0 Also, if the app or program were to be compromised, you would also become a victim.<\/li>\n<li><strong>Please read&#8230;<\/strong>\u00a0As mentioned previously, users are click-happy.\u00a0 This means instead of reading through the <a href=\"https:\/\/techtalk.pcpitstop.com\/2016\/01\/07\/history-repeats-itself-eulas-continue-to-go-unread\/\">terms and conditions or the end-user license agreement,<\/a> they haphazardly click &#8220;I accept&#8221;, just to begin the installation process.\u00a0 But does anyone really know what they&#8217;re agreeing to?\u00a0 Hackers capitalize on this, so please read!!<\/li>\n<\/ul>\n<p>Hopefully, you found these tips helpful.\u00a0 Don&#8217;t forget to share this with friends and family, as the more users know, the less likely they are to fall victim.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers Offer No Treats, Only Tricks&#8230; As we inch closer and closer to the holiday season, hackers are becoming more and more aware of ways to exploit users.\u00a0 Below are the top 10 ways cyber criminals are capitalizing on user behavior: Unsecured WiFi connections, what&#8217;s the harm? By using public WiFi, or any other form [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,5090,183],"tags":[4704,235,503],"class_list":["post-59740","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-slider","category-tips","tag-hackers","tag-scams","tag-tricks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 10 Tricks Cyber Ghouls Hope You Fall For<\/title>\n<meta name=\"description\" content=\"Cyber ghouls are hoping users fall for these basic tricks. Here&#039;s what you need to know to avoid falling victim yourself...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 10 Tricks Cyber Ghouls Hope You Fall For\" \/>\n<meta property=\"og:description\" content=\"Cyber ghouls are hoping users fall for these basic tricks. Here&#039;s what you need to know to avoid falling victim yourself...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-24T20:43:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Top 10 Tricks Cyber Ghouls Hope You Fall For\",\"datePublished\":\"2018-10-24T20:43:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/\"},\"wordCount\":691,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"keywords\":[\"hackers\",\"scams\",\"Tricks\"],\"articleSection\":[\"Newsletter\",\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/\",\"name\":\"Top 10 Tricks Cyber Ghouls Hope You Fall For\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"datePublished\":\"2018-10-24T20:43:08+00:00\",\"description\":\"Cyber ghouls are hoping users fall for these basic tricks. Here's what you need to know to avoid falling victim yourself...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"width\":1920,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-cyber-tricks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 10 Tricks Cyber Ghouls Hope You Fall For\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 10 Tricks Cyber Ghouls Hope You Fall For","description":"Cyber ghouls are hoping users fall for these basic tricks. Here's what you need to know to avoid falling victim yourself...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/","og_locale":"en_US","og_type":"article","og_title":"Top 10 Tricks Cyber Ghouls Hope You Fall For","og_description":"Cyber ghouls are hoping users fall for these basic tricks. Here's what you need to know to avoid falling victim yourself...","og_url":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-10-24T20:43:08+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Top 10 Tricks Cyber Ghouls Hope You Fall For","datePublished":"2018-10-24T20:43:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/"},"wordCount":691,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","keywords":["hackers","scams","Tricks"],"articleSection":["Newsletter","TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/","url":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/","name":"Top 10 Tricks Cyber Ghouls Hope You Fall For","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","datePublished":"2018-10-24T20:43:08+00:00","description":"Cyber ghouls are hoping users fall for these basic tricks. Here's what you need to know to avoid falling victim yourself...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","width":1920,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/top-cyber-tricks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Top 10 Tricks Cyber Ghouls Hope You Fall For"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59740"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59740\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55104"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}