{"id":60160,"date":"2019-02-01T12:30:55","date_gmt":"2019-02-01T18:30:55","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=60160"},"modified":"2019-02-01T12:30:55","modified_gmt":"2019-02-01T18:30:55","slug":"global-ransomware-attack-projections","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/","title":{"rendered":"The Next Global Ransomware Attack Isn&#8217;t Exactly New News"},"content":{"rendered":"<p>You may have read about it already &#8212; the next global ransomware attack is <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/global-ransomware-attack-could\/\">projected to cost almost two billion dollars<\/a>.\u00a0 There are also reports <a href=\"https:\/\/securityboulevard.com\/2019\/01\/my-take-bashe-attack-theorizes-a-200-billion-ransomware-raid-using-nsa-class-cyber-weapons\/\">claiming<\/a> this attack will likely exploit cyber-weapons from the U.S. government.\u00a0 Both of these claims are frightening and generating public concern.\u00a0 It is because of this concern, I decided to address this topic &#8212; but likely not how you will read about it elsewhere.<\/p>\n<h4>This is Old News<\/h4>\n<p>For those who don&#8217;t know, there have already been global ransomware attacks.\u00a0 The first, deemed WannaCry, exploited EternalBlue, vulnerabilities known by the NSA to use as a &#8220;cyber-weapon&#8221;.\u00a0 The total costs associated with WannaCry reached approximately $4 billion.\u00a0 To be fair, that&#8217;s a far reach from the projected $193 billion of the next attack.\u00a0 However, hackers have continued to advance their attack methods since WannaCry was released, meaning it&#8217;s not unrealistic to expect a higher financial loss for future attacks.<\/p>\n<h4>The Next Attack<\/h4>\n<p>Experts have suggested the next global ransomware attack will be sent via email.\u00a0 The victim would then open the email and click on the attachment.\u00a0 Upon clicking on the malicious attachment, the user would begin installing the malware.\u00a0 Sound familiar?\u00a0 It should &#8212; most ransomware attacks are distributed in this exact same manner.\u00a0 Again, this is not new news.<\/p>\n<p>One of the bigger fears generated with this projected attack is the malicious email spreading through the contact list of the original victim.\u00a0 This in itself could be incredibly problematic, as it would allow for the ransomware to spread at an epidemic level.\u00a0 Think about this for one second.\u00a0 You get an email, and once you open it, it gets redistributed to all of your contacts.\u00a0 If only a fraction of them open it, it will still continue to spread to all of their contacts, and so on.\u00a0 This is a big, scary problem &#8212; but far from new news.\u00a0 Cyber attacks have used this method of distribution before.<\/p>\n<h4>Silver Lining<\/h4>\n<p>Although there may be another global attack in the works, it&#8217;s not projected to use a new, never before seen way, to infect users.\u00a0 This is good, considering there is a way to prevent this form of malicious attack.\u00a0 To avoid infection, use of an <a href=\"http:\/\/www.pcmatic.com\/whitelist\">application whitelist<\/a>.\u00a0 A whitelist will only allow for known, safe programs to execute.\u00a0 Therefore, the malicious attachment would not download to the device, nor would it have the opportunity to spread throughout the network if this was in a business setting.\u00a0 Again, this isn&#8217;t new news.\u00a0 Several major government\u00a0entities have encouraged the use of application whitelisting to keep data and devices secure from modern cyber threats.\u00a0 You may have even heard about <a href=\"http:\/\/www.pcmatic.com\/whitelist\">application whitelisting<\/a> in our blogs before! \ud83d\ude42<\/p>\n<h4>Conclusion<\/h4>\n<p>Global ransomware attacks have already occurred.\u00a0 These attacks also used malicious emails to distribute ransomware.\u00a0 Historically, malicious emails have also spread throughout victim&#8217;s contact lists &#8212; not always, but it has happened.\u00a0 None of these threats are new.\u00a0 Analysts are merely theorizing how the hackers could successfully execute another global attack by pairing the latter two.<\/p>\n<p>The best method to prevent falling victim, application whitelisting, is also not a new theory.\u00a0 However, now that users know the potential damages of the next global cyber attack, they may be more apt to focus on a preventative approach.\u00a0 So our question is, now that you know what may be coming &#8211; <a href=\"http:\/\/www.pcmatic.com\">what are you going to do about it<\/a>?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may have read about it already &#8212; the next global ransomware attack is projected to cost almost two billion dollars.\u00a0 There are also reports claiming this attack will likely exploit cyber-weapons from the U.S. government.\u00a0 Both of these claims are frightening and generating public concern.\u00a0 It is because of this concern, I decided to [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55106,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,4949,5000],"tags":[5267,4363],"class_list":["post-60160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-ransomware","category-ransomwarewar","tag-global-attack","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Next Global Ransomware Attack Isn&#039;t Exactly New News<\/title>\n<meta name=\"description\" content=\"Several theories have been released regarding the next global ransomware attack, but is what they&#039;re saying new? With projected damages of...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Next Global Ransomware Attack Isn&#039;t Exactly New News\" \/>\n<meta property=\"og:description\" content=\"Several theories have been released regarding the next global ransomware attack, but is what they&#039;re saying new? With projected damages of...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-01T18:30:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"The Next Global Ransomware Attack Isn&#8217;t Exactly New News\",\"datePublished\":\"2019-02-01T18:30:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/\"},\"wordCount\":583,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"keywords\":[\"global attack\",\"ransomware\"],\"articleSection\":[\"Newsletter\",\"Ransomware\",\"RansomwareWar\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/\",\"name\":\"The Next Global Ransomware Attack Isn't Exactly New News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"datePublished\":\"2019-02-01T18:30:55+00:00\",\"description\":\"Several theories have been released regarding the next global ransomware attack, but is what they're saying new? With projected damages of...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"width\":730,\"height\":410,\"caption\":\"Contact a Cyber Security Expert to Learn about Application Whitelisting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/global-ransomware-attack-projections\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Next Global Ransomware Attack Isn&#8217;t Exactly New News\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Next Global Ransomware Attack Isn't Exactly New News","description":"Several theories have been released regarding the next global ransomware attack, but is what they're saying new? With projected damages of...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/","og_locale":"en_US","og_type":"article","og_title":"The Next Global Ransomware Attack Isn't Exactly New News","og_description":"Several theories have been released regarding the next global ransomware attack, but is what they're saying new? With projected damages of...","og_url":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2019-02-01T18:30:55+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"The Next Global Ransomware Attack Isn&#8217;t Exactly New News","datePublished":"2019-02-01T18:30:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/"},"wordCount":583,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","keywords":["global attack","ransomware"],"articleSection":["Newsletter","Ransomware","RansomwareWar"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/","url":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/","name":"The Next Global Ransomware Attack Isn't Exactly New News","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","datePublished":"2019-02-01T18:30:55+00:00","description":"Several theories have been released regarding the next global ransomware attack, but is what they're saying new? With projected damages of...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","width":730,"height":410,"caption":"Contact a Cyber Security Expert to Learn about Application Whitelisting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/global-ransomware-attack-projections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Next Global Ransomware Attack Isn&#8217;t Exactly New News"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=60160"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60160\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55106"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=60160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=60160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=60160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}