{"id":60900,"date":"2019-04-05T08:31:50","date_gmt":"2019-04-05T13:31:50","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=60900"},"modified":"2019-04-05T08:51:00","modified_gmt":"2019-04-05T13:51:00","slug":"researchers-exploit-security-gaps-in-medical-imaging-devices","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/","title":{"rendered":"Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff"},"content":{"rendered":"\n<p>In an attempt to draw attention to the security gaps found in many medical imaging devices, like CT or MRI machines, Israeli researchers have developed a malware specifically designed to exploit the vulnerability.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">The Malware Variant&nbsp; <\/h4>\n\n\n\n<p>The malware they created would allow cyber criminals&nbsp;to add realistic, malignant-seeming growths&nbsp;to imaging scans before radiologists and doctors examine them.&nbsp; As if this wasn\u2019t bad enough, the malware would also grant hackers the ability to remove real cancerous nodules and lesions without detection.&nbsp; Therefore, if these security gaps go unpatched, this malware could lead to misdiagnosis and possibly a failure to treat patients who need critical and timely care.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Testing Their Theory<\/h4>\n\n\n\n<p>To\nprove this as a legitimate possibility, researchers conducted a blind study involving\nreal CT lung scans, 70 of which were altered by the malware.&nbsp; Alarmingly, three skilled radiologists\nmisdiagnosed conditions nearly every time. In the case of scans with fabricated\ncancerous nodules, the radiologists diagnosed cancer 99% of the time. In cases\nwhere the malware removed real cancerous nodules from scans, the radiologists\nsaid those patients were healthy 94% of the time.<\/p>\n\n\n\n<p>Not only were the radiologists tricked, but the altered scan images <g class=\"gr_ gr_4 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace\" id=\"4\" data-gr-id=\"4\">were ran<\/g> against a lung-cancer screening software tool that radiologists often use to confirm their diagnoses.&nbsp; Surprisingly, it too was unable to identify alterations were made to the images, leading to misdiagnosing the scans with false tumors every time.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">The Exploit<\/h4>\n\n\n\n<p>The vulnerabilities permitting someone to alter\nscans reside in the equipment and networks hospitals use to transmit and store\nCT and MRI images. These images are sent to radiology workstations and back-end\ndatabases through what\u2019s known as a picture archiving and communication system\n(PACS).&nbsp; It was confirmed, these forms of\nattacks are able to be executed because hospitals don\u2019t digitally sign the\nscans, nor do they use encryption within the PACS networks.&nbsp; Therefore, once an intruder gains access,\nthey are not only able to view the scans, but alter them as well.&nbsp; <\/p>\n\n\n\n<p>In order to gain access to the PACS network, the\nattacker would either need physical access to connect a malicious device\ndirectly to the network cables, or they could plant malware remotely from the\nInternet. Based on the information discovered by the researchers, this would\nnot be difficult, as many PACS networks are either directly connected to the\nInternet or accessible through hospital machines that are connected to the\nInternet.<\/p>\n\n\n\n<p>To prevent hackers from altering CT and MRI scans, hospitals would need to enable end-to-end encryption across their PACS network and digitally sign all images while also making sure that radiology and doctor workstations are set up to verify those signatures and flag any images that aren\u2019t properly signed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an attempt to draw attention to the security gaps found in many medical imaging devices, like CT or MRI machines, Israeli researchers have developed a malware specifically designed to exploit the vulnerability. The Malware Variant&nbsp; The malware they created would allow cyber criminals&nbsp;to add realistic, malignant-seeming growths&nbsp;to imaging scans before radiologists and doctors examine [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,5090],"tags":[5501,56],"class_list":["post-60900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-slider","tag-exploit","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff<\/title>\n<meta name=\"description\" content=\"In an attempt to draw attention to the security gaps found in many medical imaging devices, like CT or MRI machines, Israeli researchers have developed a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff\" \/>\n<meta property=\"og:description\" content=\"In an attempt to draw attention to the security gaps found in many medical imaging devices, like CT or MRI machines, Israeli researchers have developed a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-05T13:31:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-05T13:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff\",\"datePublished\":\"2019-04-05T13:31:50+00:00\",\"dateModified\":\"2019-04-05T13:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/\"},\"wordCount\":465,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"keywords\":[\"exploit\",\"malware\"],\"articleSection\":[\"Newsletter\",\"TechTalk Slider\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/\",\"name\":\"Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"datePublished\":\"2019-04-05T13:31:50+00:00\",\"dateModified\":\"2019-04-05T13:51:00+00:00\",\"description\":\"In an attempt to draw attention to the security gaps found in many medical imaging devices, like CT or MRI machines, Israeli researchers have developed a\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"width\":1920,\"height\":550,\"caption\":\"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/researchers-exploit-security-gaps-in-medical-imaging-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff","description":"In an attempt to draw attention to the security gaps found in many medical imaging devices, like CT or MRI machines, Israeli researchers have developed a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/","og_locale":"en_US","og_type":"article","og_title":"Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff","og_description":"In an attempt to draw attention to the security gaps found in many medical imaging devices, like CT or MRI machines, Israeli researchers have developed a","og_url":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2019-04-05T13:31:50+00:00","article_modified_time":"2019-04-05T13:51:00+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff","datePublished":"2019-04-05T13:31:50+00:00","dateModified":"2019-04-05T13:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/"},"wordCount":465,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","keywords":["exploit","malware"],"articleSection":["Newsletter","TechTalk Slider"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/","url":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/","name":"Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","datePublished":"2019-04-05T13:31:50+00:00","dateModified":"2019-04-05T13:51:00+00:00","description":"In an attempt to draw attention to the security gaps found in many medical imaging devices, like CT or MRI machines, Israeli researchers have developed a","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","width":1920,"height":550,"caption":"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/researchers-exploit-security-gaps-in-medical-imaging-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Researchers Exploit Security Gaps in Medical Imaging Devices\ufeff"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=60900"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60900\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55269"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=60900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=60900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=60900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}