{"id":9738,"date":"2009-07-06T11:00:51","date_gmt":"2009-07-06T16:00:51","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=9738"},"modified":"2009-07-06T11:00:51","modified_gmt":"2009-07-06T16:00:51","slug":"bits-from-bill-twitter-under-attack","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/","title":{"rendered":"Bits from Bill: Twitter Under Attack"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/billpwp.jpg\" alt=\"billpwp\" width=\"150\" height=\"150\" class=\"attachment wp-att-7652 alignleft\" \/><\/p>\n<p>By Bill Pytlovany<\/p>\n<p>No, it\u00e2\u20ac\u2122s not under attack by rebel\u00e2\u20ac\u2122s in Iran. It\u00e2\u20ac\u2122s the same old malware attacks using popular topics or trends on Twitter.<\/p>\n<p>It\u00e2\u20ac\u2122s natural as soon as something on the Internet is popular, it will be the target of greedy, bad guys.  These days most of the buzz is about Twitter and sure enough Twitter is the new playground for evil tricksters.<\/p>\n<p>The popular attack continues to be the old \u00e2\u20ac\u0153You have a virus. Pay us to remove your virus or else\u00e2\u20ac\u009d.  The virus comes in the form of an rogue AntiSpyware program or what we I call ExtortionWare. Some other attacks will just trick you into entering a name and password.<\/p>\n<p>Rule #1: Just because the tweet or messages comes from someone you know and trust, there\u00e2\u20ac\u2122s no guarantee it\u00e2\u20ac\u2122s really them.  If there is a link they want you to click on, contact them and confirm they still have control over<br \/>\ntheir account.<\/p>\n<p>But what about a verified Twitter account?<\/p>\n<p><a href=\"http:\/\/billpstudios.blogspot.com\/2009\/06\/twitter-under-attack.html\" target=\"_blank\">ARTICLE CONTINUED HERE<\/a><\/p>\n<p>This post is excerpted with Bill P&#8217;s permission from his <a href=\"http:\/\/billpstudios.blogspot.com\/\" target=\"_blank\">blog<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/billpwp.jpg\" alt=\"bill p\" class=\"attachment wp-att-7167 alignleft\" \/><\/p>\n<p>By Bill Pytlovany<\/p>\n<p>No, it\u00e2\u20ac\u2122s not under attack by rebel\u00e2\u20ac\u2122s in Iran. It\u00e2\u20ac\u2122s the same old malware attacks using popular topics or trends on Twitter.<\/p>\n<p>It\u00e2\u20ac\u2122s natural as soon as something on the Internet is popular, it will be the target of greedy, bad guys.  These days most of the buzz is about Twitter and sure enough Twitter is the new playground for evil tricksters.<\/p>\n","protected":false},"author":14,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[86],"tags":[2397,2398,401,2115,2399,2400,1449,1664,75,482],"class_list":["post-9738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bill-pytlovany","tag-antispyware","tag-bad-guys","tag-bits","tag-ita","tag-pay","tag-playground","tag-target","tag-tweet","tag-twitter","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bits from Bill: Twitter Under Attack<\/title>\n<meta name=\"description\" content=\"By Bill Pytlovany No, it\u00e2\u20ac\u2122s not under attack by rebel\u00e2\u20ac\u2122s in Iran. It\u00e2\u20ac\u2122s the same old malware attacks using popular topics or trends on Twitter. It\u00e2\u20ac\u2122s natural as soon as something on the Internet is popular, it will be the target of greedy, bad guys. These days most of the buzz is about Twitter and sure enough Twitter is the new playground for evil tricksters.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bits from Bill: Twitter Under Attack\" \/>\n<meta property=\"og:description\" content=\"By Bill Pytlovany No, it\u00e2\u20ac\u2122s not under attack by rebel\u00e2\u20ac\u2122s in Iran. It\u00e2\u20ac\u2122s the same old malware attacks using popular topics or trends on Twitter. It\u00e2\u20ac\u2122s natural as soon as something on the Internet is popular, it will be the target of greedy, bad guys. These days most of the buzz is about Twitter and sure enough Twitter is the new playground for evil tricksters.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2009-07-06T16:00:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bill Pytlovany\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bill Pytlovany\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/\"},\"author\":{\"name\":\"Bill Pytlovany\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/bdfb84810004329361ff982a09c6fde0\"},\"headline\":\"Bits from Bill: Twitter Under Attack\",\"datePublished\":\"2009-07-06T16:00:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/\"},\"wordCount\":191,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"Antispyware\",\"bad guys\",\"Bits\",\"It\u00e2\",\"Pay\",\"playground\",\"target\",\"Tweet\",\"twitter\",\"virus\"],\"articleSection\":[\"Bill Pytlovany\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/\",\"name\":\"Bits from Bill: Twitter Under Attack\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2009-07-06T16:00:51+00:00\",\"description\":\"By Bill Pytlovany No, it\u00e2\u20ac\u2122s not under attack by rebel\u00e2\u20ac\u2122s in Iran. It\u00e2\u20ac\u2122s the same old malware attacks using popular topics or trends on Twitter. It\u00e2\u20ac\u2122s natural as soon as something on the Internet is popular, it will be the target of greedy, bad guys. These days most of the buzz is about Twitter and sure enough Twitter is the new playground for evil tricksters.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-twitter-under-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bits from Bill: Twitter Under Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/bdfb84810004329361ff982a09c6fde0\",\"name\":\"Bill Pytlovany\",\"description\":\"BillP Studios founder and industry insider Bill Pytlovany was at one time best known for his leading role in creating the software behind the service now called, AOL. These days Bill is better for helping to increase the performance and security of hundreds of thousand of computers - through his award winning product - Win Patrol.\",\"sameAs\":[\"http:\\\/\\\/billpstudios.blogspot.com\\\/\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/bill-p\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bits from Bill: Twitter Under Attack","description":"By Bill Pytlovany No, it\u00e2\u20ac\u2122s not under attack by rebel\u00e2\u20ac\u2122s in Iran. It\u00e2\u20ac\u2122s the same old malware attacks using popular topics or trends on Twitter. It\u00e2\u20ac\u2122s natural as soon as something on the Internet is popular, it will be the target of greedy, bad guys. These days most of the buzz is about Twitter and sure enough Twitter is the new playground for evil tricksters.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/","og_locale":"en_US","og_type":"article","og_title":"Bits from Bill: Twitter Under Attack","og_description":"By Bill Pytlovany No, it\u00e2\u20ac\u2122s not under attack by rebel\u00e2\u20ac\u2122s in Iran. It\u00e2\u20ac\u2122s the same old malware attacks using popular topics or trends on Twitter. It\u00e2\u20ac\u2122s natural as soon as something on the Internet is popular, it will be the target of greedy, bad guys. These days most of the buzz is about Twitter and sure enough Twitter is the new playground for evil tricksters.","og_url":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2009-07-06T16:00:51+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Bill Pytlovany","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Bill Pytlovany","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/"},"author":{"name":"Bill Pytlovany","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/bdfb84810004329361ff982a09c6fde0"},"headline":"Bits from Bill: Twitter Under Attack","datePublished":"2009-07-06T16:00:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/"},"wordCount":191,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["Antispyware","bad guys","Bits","It\u00e2","Pay","playground","target","Tweet","twitter","virus"],"articleSection":["Bill Pytlovany"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/","url":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/","name":"Bits from Bill: Twitter Under Attack","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2009-07-06T16:00:51+00:00","description":"By Bill Pytlovany No, it\u00e2\u20ac\u2122s not under attack by rebel\u00e2\u20ac\u2122s in Iran. It\u00e2\u20ac\u2122s the same old malware attacks using popular topics or trends on Twitter. It\u00e2\u20ac\u2122s natural as soon as something on the Internet is popular, it will be the target of greedy, bad guys. These days most of the buzz is about Twitter and sure enough Twitter is the new playground for evil tricksters.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-twitter-under-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Bits from Bill: Twitter Under Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/bdfb84810004329361ff982a09c6fde0","name":"Bill Pytlovany","description":"BillP Studios founder and industry insider Bill Pytlovany was at one time best known for his leading role in creating the software behind the service now called, AOL. These days Bill is better for helping to increase the performance and security of hundreds of thousand of computers - through his award winning product - Win Patrol.","sameAs":["http:\/\/billpstudios.blogspot.com\/"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/bill-p\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/9738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=9738"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/9738\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=9738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=9738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=9738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}