{"id":59901,"date":"2018-11-30T11:33:25","date_gmt":"2018-11-30T17:33:25","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59901"},"modified":"2018-11-30T11:33:25","modified_gmt":"2018-11-30T17:33:25","slug":"cyber-threat-vector-rdp","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/","title":{"rendered":"The Latest Cyber Threat Vector &#8211; RDP"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">RDP, or Remote Desktop Protocol, is a port on devices that allow for remote access to be gained by anyone who has the appropriate credentials. \u00a0An RDP attack means an unauthorized person or entity is accessing the network through the device\u2019s RDP ports. The attack may be an actual person or automated technology using brute force to hack into the RDP port. \u00a0Brute force is a term used when someone, or something, is guessing user credentials over and over again until they are able to gain access.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How Common Are They?<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Over the last year, RDP attacks have increased as a popular attack vector. \u00a0This specific form of malicious attack carries a significant payday if it is able to be executed. \u00a0Typically the execution process takes a bit longer and is more labor-intensive than alternative hacking methods, but the end result is worth it to the cyber criminals. \u00a0For instance, <\/span><a href=\"https:\/\/techtalk.pcpitstop.com\/2018\/07\/23\/labcorp-riddled-ransomware\/\"><span style=\"font-weight: 400;\">LabCorps<\/span><\/a><span style=\"font-weight: 400;\">, a major American labs facility was hit with ransomware that executed through an RDP attack earlier this summer. \u00a0The ransomware attack infected thousands of PCs and almost 2,000 servers. Most recently, Otsego County in New York was hacked through the RDP ports, so criminals could use the county\u2019s system resources for crypto-mining. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The malware options are limitless when it comes to an RDP attack. \u00a0Once the hacker has access, they have the ability to install spyware, keyloggers, crypto-jacking software, worms, ransomware, or any other form of malware they\u2019d like.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Staying Protected<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">The best way to prevent an RDP attack is to disable the remote access to your device. Visit our blog post regarding disabling RDP ports <\/span><a href=\"https:\/\/techtalk.pcpitstop.com\/2018\/10\/02\/proactive-approach-rdp-attacks\/\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, IT professionals are encouraged to conduct an audit of all enabled RDP ports. \u00a0If adequate rationale cannot be provided regarding the reason for these ports to be left open, they should be disabled immediately. \u00a0PC Matic Pro recently added an endpoint vulnerability feature to its portal, allowing IT pros to gather this information quickly and efficiently. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lastly, PC Matic has now included a timeout feature for all users, home and business, which we believe will thwart brute force attacks. \u00a0<\/span><\/p>\n<p>To read the Q3 PC Pitstop Newsletter in its entirety, click <a href=\"https:\/\/www.pcpitstop.com\/news\/Quarterly_Report\/default.asp\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RDP, or Remote Desktop Protocol, is a port on devices that allow for remote access to be gained by anyone who has the appropriate credentials. \u00a0An RDP attack means an unauthorized person or entity is accessing the network through the device\u2019s RDP ports. The attack may be an actual person or automated technology using brute [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":57210,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5586],"tags":[4787,4141,5589,5563],"class_list":["post-59901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-q3-2018-newsletter","tag-brute-force","tag-cyber-threats","tag-q3","tag-rdp"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Latest Cyber Threat Vector - RDP<\/title>\n<meta name=\"description\" content=\"The latest cyber security threat goes beyond the malware variable, but the actual attack vector cyber criminals are using. RDP, or remote...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Latest Cyber Threat Vector - RDP\" \/>\n<meta property=\"og:description\" content=\"The latest cyber security threat goes beyond the malware variable, but the actual attack vector cyber criminals are using. RDP, or remote...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-30T17:33:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcpitstop_newsletter_thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"The Latest Cyber Threat Vector &#8211; RDP\",\"datePublished\":\"2018-11-30T17:33:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/\"},\"wordCount\":369,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcpitstop_newsletter_thumb.jpg\",\"keywords\":[\"brute force\",\"cyber threats\",\"q3\",\"RDP\"],\"articleSection\":[\"Q3 2018 Newsletter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/\",\"name\":\"The Latest Cyber Threat Vector - RDP\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcpitstop_newsletter_thumb.jpg\",\"datePublished\":\"2018-11-30T17:33:25+00:00\",\"description\":\"The latest cyber security threat goes beyond the malware variable, but the actual attack vector cyber criminals are using. RDP, or remote...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcpitstop_newsletter_thumb.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcpitstop_newsletter_thumb.jpg\",\"width\":730,\"height\":410,\"caption\":\"PC Matic Antivirus Protection - Server Security Solutions\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-threat-vector-rdp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Latest Cyber Threat Vector &#8211; RDP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Latest Cyber Threat Vector - RDP","description":"The latest cyber security threat goes beyond the malware variable, but the actual attack vector cyber criminals are using. RDP, or remote...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/","og_locale":"en_US","og_type":"article","og_title":"The Latest Cyber Threat Vector - RDP","og_description":"The latest cyber security threat goes beyond the malware variable, but the actual attack vector cyber criminals are using. RDP, or remote...","og_url":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-11-30T17:33:25+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcpitstop_newsletter_thumb.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"The Latest Cyber Threat Vector &#8211; RDP","datePublished":"2018-11-30T17:33:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/"},"wordCount":369,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcpitstop_newsletter_thumb.jpg","keywords":["brute force","cyber threats","q3","RDP"],"articleSection":["Q3 2018 Newsletter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/","url":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/","name":"The Latest Cyber Threat Vector - RDP","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcpitstop_newsletter_thumb.jpg","datePublished":"2018-11-30T17:33:25+00:00","description":"The latest cyber security threat goes beyond the malware variable, but the actual attack vector cyber criminals are using. RDP, or remote...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcpitstop_newsletter_thumb.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcpitstop_newsletter_thumb.jpg","width":730,"height":410,"caption":"PC Matic Antivirus Protection - Server Security Solutions"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-threat-vector-rdp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Latest Cyber Threat Vector &#8211; RDP"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59901"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59901\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/57210"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}