{"id":66731,"date":"2023-10-04T10:18:10","date_gmt":"2023-10-04T15:18:10","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=66731"},"modified":"2023-10-04T10:23:30","modified_gmt":"2023-10-04T15:23:30","slug":"webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/","title":{"rendered":"WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart"},"content":{"rendered":"\n<p>By now, most of us are no strangers to terms like \u201czero-day vulnerability\u201d or \u201csecurity patch.\u201d These aren\u2019t merely buzzwords. They carry weight, especially in a world increasingly reliant on digital platforms.<\/p>\n\n\n\n<p>Recently, a critical security flaw was uncovered, originally attributed to Google Chrome. It turns out, however, that the problem runs much deeper, affecting not just Chrome but virtually every web browser in existence! Let\u2019s explore this further.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s a Vulnerability and What Are CVEs?<\/h2>\n\n\n\n<p>In the simplest terms, a vulnerability is a gap or weakness in a system\u2019s security measures that could potentially be exploited by malicious actors. It\u2019s akin to a burglar eyeing an unlocked window in an otherwise secure home.<\/p>\n\n\n\n<p>Now, the term CVE may sound like alphabet soup, but it\u2019s an acronym for Common Vulnerabilities and Exposures. These are unique identifiers given to publicly disclosed security gaps. Think of CVEs as the \u201cstock tickers\u201d of cybersecurity.<\/p>\n\n\n\n<p>They help professionals to quickly identify and discuss vulnerabilities in a standardized way, which in turn facilitates the swift sharing of critical information across databases and platforms. You could say they\u2019re the glue that holds the cybersecurity community\u2019s collective knowledge together.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Historic Security Gap<\/h2>\n\n\n\n<p>So what specifically is the WebP vulnerability and why is it such a big deal? Simply put, this is not your everyday vulnerability. Tagged under the identifier CVE-2023-5129, this particular issue has rattled even the most seasoned cybersecurity experts. What sets it apart is its staggering reach and potential for damage. Simply put, it can affect anybody that uses any website or software with images, which is almost all of them!<\/p>\n\n\n\n<p>It\u2019s not merely a small crack in the wall but more of a seismic fault line threatening to shake the very foundations of digital security. If vulnerabilities had a hall of fame, this one would be front and center.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who\u2019s At Risk? Maybe Your Favorite Apps<\/h2>\n\n\n\n<p>The full extent of this vulnerability\u2019s impact is still not completely known, adding a layer of urgency to the situation. We don\u2019t have a complete list, but it\u2019s safe to assume that the range of affected products is large. It\u2019s not just your standard-issue web browsers like Safari, Firefox, or Microsoft Edge that are involved.<\/p>\n\n\n\n<p>If you\u2019re a user of popular apps such as 1Password or Signal, you might want to sit up and take note. These apps could also be susceptible, making this vulnerability a potentially widespread issue that could touch various aspects of our digital lives.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is WebP, and Why Should I Care?<\/h2>\n\n\n\n<p>Developed by Google, WebP is an image format engineered for the web. Its unique selling point is its ability to compress images without any substantial loss in quality. This may sound technical, but in layman\u2019s terms, it\u2019s what makes websites look good without draining your data plan or your device\u2019s processing power.<\/p>\n\n\n\n<p>As a result, WebP has been widely adopted, making its rounds across various platforms and applications. Unfortunately, its ubiquity also means that this vulnerability has the potential to disrupt a vast array of services and platforms. It\u2019s not just a needle in a haystack; it\u2019s a needle that\u2019s found its way into multiple haystacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stay Updated or Risk Being Outdated<\/h2>\n\n\n\n<p>In light of this colossal vulnerability, one takeaway looms larger than the rest: the absolute necessity of keeping your software updated with the latest patches as soon as they become available. Anything less than that, and you\u2019re rolling the dice with your data security.<\/p>\n\n\n\n<p>The risk isn\u2019t theoretical; it\u2019s immediate and palpable. Not updating in a timely manner makes you a sitting duck for attackers who are all too willing to exploit outdated systems. So mark your calendars, set your reminders, and make updating a part of your routine. Your data\u2019s safety depends on it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The PC Matic Approach: Allowlisting\u2014Your Virtual Security Guard<\/h2>\n\n\n\n<p>Enter PC Matic and its real-time security technology, SuperShield Whitelisting. Unlike traditional security solutions like Norton, McAfee, and Webroot, which use a blacklist approach, PC Matic utilizes a global application allowlist. While blacklist-based software only blocks known threats, allowlisting stops any software not verified as safe.<\/p>\n\n\n\n<p>In the case of the WebP vulnerability, this means the malicious code would be stopped in its tracks before it could wreak havoc on your system. It\u2019s like having a security guard who not only knows all the usual suspects but also doesn\u2019t let in anyone who\u2019s not on the VIP list.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Allowlisting Is the Future<\/h3>\n\n\n\n<p>Allowlisting isn\u2019t just a trendy term in cybersecurity. It\u2019s becoming an industry standard. Even the United States government and cybersecurity experts advocate for its use. Unlike traditional blacklist methods, allowlisting is agile and prepared for the ever-changing threat landscape.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vigilance and the Right Tools are Key<\/h2>\n\n\n\n<p>The WebP vulnerability serves as a stark reminder that security loopholes can appear where we least expect them\u2014even in something as seemingly innocuous as an image format. Being vigilant about updates and using a security approach like PC Matic\u2019s allowlisting can make all the difference in safeguarding your digital world.<\/p>\n\n\n\n<p><a><\/a>So if you\u2019re still pondering whether to update your software or considering which security solution to choose, let this be your wake-up call. With the right tools and a bit of attention to detail, you can navigate this digital landscape with a little more peace of mind.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By now, most of us are no strangers to terms like \u201czero-day vulnerability\u201d or \u201csecurity patch.\u201d These aren\u2019t merely buzzwords. They carry weight, especially in a world increasingly reliant on digital platforms. Recently, a critical security flaw was uncovered, originally attributed to Google Chrome. It turns out, however, that the problem runs much deeper, affecting [&hellip;]<\/p>\n","protected":false},"author":77,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6216],"tags":[],"class_list":["post-66731","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-home-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart<\/title>\n<meta name=\"description\" content=\"By now, most of us are no strangers to terms like \u201czero-day vulnerability\u201d or \u201csecurity patch.\u201d These aren\u2019t merely buzzwords. They carry weight,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart\" \/>\n<meta property=\"og:description\" content=\"By now, most of us are no strangers to terms like \u201czero-day vulnerability\u201d or \u201csecurity patch.\u201d These aren\u2019t merely buzzwords. They carry weight,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-04T15:18:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-04T15:23:30+00:00\" \/>\n<meta name=\"author\" content=\"Nick Buikema\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nick Buikema\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/\"},\"author\":{\"name\":\"Nick Buikema\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/60e2fbadf072463b23c69b0949f4ab4b\"},\"headline\":\"WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart\",\"datePublished\":\"2023-10-04T15:18:10+00:00\",\"dateModified\":\"2023-10-04T15:23:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/\"},\"wordCount\":924,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"articleSection\":[\"Home Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/\",\"name\":\"WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2023-10-04T15:18:10+00:00\",\"dateModified\":\"2023-10-04T15:23:30+00:00\",\"description\":\"By now, most of us are no strangers to terms like \u201czero-day vulnerability\u201d or \u201csecurity patch.\u201d These aren\u2019t merely buzzwords. They carry weight,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/60e2fbadf072463b23c69b0949f4ab4b\",\"name\":\"Nick Buikema\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/nick-buikema\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart","description":"By now, most of us are no strangers to terms like \u201czero-day vulnerability\u201d or \u201csecurity patch.\u201d These aren\u2019t merely buzzwords. They carry weight,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/","og_locale":"en_US","og_type":"article","og_title":"WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart","og_description":"By now, most of us are no strangers to terms like \u201czero-day vulnerability\u201d or \u201csecurity patch.\u201d These aren\u2019t merely buzzwords. They carry weight,","og_url":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2023-10-04T15:18:10+00:00","article_modified_time":"2023-10-04T15:23:30+00:00","author":"Nick Buikema","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Nick Buikema","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/"},"author":{"name":"Nick Buikema","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/60e2fbadf072463b23c69b0949f4ab4b"},"headline":"WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart","datePublished":"2023-10-04T15:18:10+00:00","dateModified":"2023-10-04T15:23:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/"},"wordCount":924,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","articleSection":["Home Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/","url":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/","name":"WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2023-10-04T15:18:10+00:00","dateModified":"2023-10-04T15:23:30+00:00","description":"By now, most of us are no strangers to terms like \u201czero-day vulnerability\u201d or \u201csecurity patch.\u201d These aren\u2019t merely buzzwords. They carry weight,","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/webp-vulnerability-and-how-pc-matics-allowlisting-stands-apart\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"WebP Vulnerability and How PC Matic\u2019s Allowlisting Stands Apart"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/60e2fbadf072463b23c69b0949f4ab4b","name":"Nick Buikema","url":"https:\/\/www.pcmatic.com\/blog\/author\/nick-buikema\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/66731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=66731"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/66731\/revisions"}],"predecessor-version":[{"id":66732,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/66731\/revisions\/66732"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=66731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=66731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=66731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}