{"id":59837,"date":"2018-11-19T10:50:48","date_gmt":"2018-11-19T16:50:48","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59837"},"modified":"2018-11-19T10:53:29","modified_gmt":"2018-11-19T16:53:29","slug":"browser-extensions-spread-malware","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/","title":{"rendered":"Cyber Criminals Use Browser Extensions to Spread Malware"},"content":{"rendered":"<p>As if there aren&#8217;t enough ways for users to stumble upon malware, hackers are now taking an aggressive approach with browser extensions.<\/p>\n<p>Users are known for downloading various browser extensions to increase the use and efficiency of their browsers.\u00a0 However, as browser extensions become more popular, it increases the odds malicious ones will worm their way in.\u00a0 However, a few browser companies are being proactive to prevent malicious extensions from being offered within their products.\u00a0 For example, Firefox and Chrome have begun a vetting process in an attempt to remove and\/or block malicious extensions from their browsers.\u00a0 If an extension is found to be malicious, it will also be disabled from all browsers it is installed on.<\/p>\n<p>Users are encouraged to check which browser extensions are currently installed and enabled.\u00a0 If anything is found that is either not recognized or is no longer is use &#8212; it should be disabled.<\/p>\n<h4>Confirming and Disabling Browser Extensions<\/h4>\n<p>Chrome:<\/p>\n<ol>\n<li>Click on the three vertical dots, in the top right corner of your browser<\/li>\n<li>Click on &#8220;More Tools&#8221;<\/li>\n<li>Select &#8220;Extensions&#8221;<\/li>\n<li>This will open a page with all of the installed and enabled extensions<\/li>\n<li>Slide the dot to disable any extensions no longer used or that are not recognized<\/li>\n<\/ol>\n<p>Firefox:<\/p>\n<ol>\n<li>Click on the three vertical dots, in the top right corner of your browser<\/li>\n<li>Click on &#8220;Add-ons&#8221;<\/li>\n<li>Select &#8220;Extensions&#8221;<\/li>\n<li>This will open a page with all of the installed and enabled extensions<\/li>\n<li>Disable any extensions no longer used or that are not recognized<\/li>\n<\/ol>\n<p>Edge:<\/p>\n<ol>\n<li>Click on the three horizontal dots, in the top right corner of your browser<\/li>\n<li>Click on &#8220;Extensions&#8221;<\/li>\n<li>This will open all of the installed and enabled extensions<\/li>\n<li>Disable any extensions no longer used or that are not recognized<\/li>\n<\/ol>\n<p>Internet Explorer:<\/p>\n<ol>\n<li>Click on the gear icon, in the top right corner of your browser<\/li>\n<li>Click on &#8220;Manage Add-ons&#8221;<\/li>\n<li>Select &#8220;Toolbars and Extensions&#8221;<\/li>\n<li>This will open a page with all of the installed and enabled extensions<\/li>\n<li>Disable any extensions no longer used or that are not recognized<\/li>\n<\/ol>\n<h4>** PC Matic users &#8212; <a href=\"http:\/\/www.pcmatic.com\/supported\">PC Matic<\/a> will block all malicious extensions from installing that includes a malicious executable.\u00a0 Also, if a trusted extension is edited in any way, post-installation, PC Matic will rescan, blocking any unknown executable from running on the PC.<\/h4>\n<h4>PC Matic has and will continue to keep your devices, and the data on them, secure.<\/h4>\n","protected":false},"excerpt":{"rendered":"<p>As if there aren&#8217;t enough ways for users to stumble upon malware, hackers are now taking an aggressive approach with browser extensions. Users are known for downloading various browser extensions to increase the use and efficiency of their browsers.\u00a0 However, as browser extensions become more popular, it increases the odds malicious ones will worm their [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,183],"tags":[4538,56],"class_list":["post-59837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-tips","tag-browser-extensions","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Criminals Use Browser Extensions to Spread Malware<\/title>\n<meta name=\"description\" content=\"With the increase in popularity, browser extensions have become a larger target for cyber criminals. Find out what you need to do to...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Criminals Use Browser Extensions to Spread Malware\" \/>\n<meta property=\"og:description\" content=\"With the increase in popularity, browser extensions have become a larger target for cyber criminals. Find out what you need to do to...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-19T16:50:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-19T16:53:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Cyber Criminals Use Browser Extensions to Spread Malware\",\"datePublished\":\"2018-11-19T16:50:48+00:00\",\"dateModified\":\"2018-11-19T16:53:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/\"},\"wordCount\":402,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"keywords\":[\"browser extensions\",\"malware\"],\"articleSection\":[\"Newsletter\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/\",\"name\":\"Cyber Criminals Use Browser Extensions to Spread Malware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"datePublished\":\"2018-11-19T16:50:48+00:00\",\"dateModified\":\"2018-11-19T16:53:29+00:00\",\"description\":\"With the increase in popularity, browser extensions have become a larger target for cyber criminals. Find out what you need to do to...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareSlider.jpg\",\"width\":1920,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/browser-extensions-spread-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Criminals Use Browser Extensions to Spread Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Criminals Use Browser Extensions to Spread Malware","description":"With the increase in popularity, browser extensions have become a larger target for cyber criminals. Find out what you need to do to...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Criminals Use Browser Extensions to Spread Malware","og_description":"With the increase in popularity, browser extensions have become a larger target for cyber criminals. Find out what you need to do to...","og_url":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-11-19T16:50:48+00:00","article_modified_time":"2018-11-19T16:53:29+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Cyber Criminals Use Browser Extensions to Spread Malware","datePublished":"2018-11-19T16:50:48+00:00","dateModified":"2018-11-19T16:53:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/"},"wordCount":402,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","keywords":["browser extensions","malware"],"articleSection":["Newsletter","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/","url":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/","name":"Cyber Criminals Use Browser Extensions to Spread Malware","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","datePublished":"2018-11-19T16:50:48+00:00","dateModified":"2018-11-19T16:53:29+00:00","description":"With the increase in popularity, browser extensions have become a larger target for cyber criminals. Find out what you need to do to...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareSlider.jpg","width":1920,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/browser-extensions-spread-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Criminals Use Browser Extensions to Spread Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59837"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59837\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55104"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}